Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Problem with snapshot 3/31 16:19:49

    CE 2.7.0 Development Snapshots (Retired)
    6
    46
    9.3k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • jimpJ
      jimp Rebel Alliance Developer Netgate
      last edited by

      I'm on the same snapshot here but have no problems loading rules.

      What is in /tmp/rules.debug?

      What happens if you try a filter reload from Status > Filter Reload?

      What shows up if you go to a shell prompt and try pfctl -f /tmp/rules.debug?

      Anything in the system log?

      You might try disabling or uninstalling packages temporarily to see if it's coming from a specific package.

      Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

      Need help fast? Netgate Global Support!

      Do not Chat/PM for help!

      1 Reply Last reply Reply Quote 0
      • jimpJ
        jimp Rebel Alliance Developer Netgate
        last edited by

        I found one VM where I can reproduce this and there may be a temporary workaround.

        The problem appears to be https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=262971 which is a new issue with multiple identical rules in the ruleset.

        The easiest way for that to happen on pfSense is from NAT reflection. Thus, if you disable NAT reflection and reboot, that may be sufficient to get the rules to load until we get a proper fix in today.

        Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

        Need help fast? Netgate Global Support!

        Do not Chat/PM for help!

        JonathanLeeJ 2 Replies Last reply Reply Quote 2
        • jimpJ
          jimp Rebel Alliance Developer Netgate
          last edited by

          If disabling NAT reflection doesn't help, check for other completely identical rules in your ruleset:

          # egrep -v '^#|^[[:blank:]]*$' /tmp/rules.debug | sort | uniq -c | grep -v '^   1 '
          

          That should output only 100% duplicate lines. In my case they were from NAT reflection. If you have some other source, you may need to address it there (e.g. pfBlocker), though most firewall rules won't be identical since they have unique tracking IDs. So most likely this will come from an internally generated rule like NAT reflection or perhaps from a package.

          Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

          Need help fast? Netgate Global Support!

          Do not Chat/PM for help!

          JonathanLeeJ 1 Reply Last reply Reply Quote 0
          • JonathanLeeJ
            JonathanLee @jimp
            last edited by

            @jimp Hello you asked about how the logs looked I still have it running in the faulted condition if you guys needed something.

            logs.PNG

            1 Reply Last reply Reply Quote 0
            • JonathanLeeJ
              JonathanLee @jimp
              last edited by

              @jimp reflection.PNG

              I have not changed this however it is already disabled

              1 Reply Last reply Reply Quote 0
              • JonathanLeeJ
                JonathanLee @jimp
                last edited by

                @jimp said in Problem with snapshot 3/31 16:19:49:

                egrep -v '^#|^[[:blank:]]*$' /tmp/rules.debug | sort | uniq -c | grep -v '^ 1 '

                command.PNG

                1 Reply Last reply Reply Quote 0
                • jimpJ
                  jimp Rebel Alliance Developer Netgate
                  last edited by

                  Is that no nat on [...] rule a manual outbound NAT rule you have?

                  If so, you have two of them, remove one.

                  Look in /tmp/rules.debug and find the line(s) for those rules and see what section they are in.

                  Also, once pf is in that bad state you have to reboot to recover. So fix the NAT rule(s) and then reboot.

                  Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                  Need help fast? Netgate Global Support!

                  Do not Chat/PM for help!

                  JonathanLeeJ 4 Replies Last reply Reply Quote 0
                  • JonathanLeeJ
                    JonathanLee @jimp
                    last edited by

                    @jimp I uninstalled all packages and reinstalled them all the same issue so far, the filter reload would fail. I originally had nat disabled I am turning on one to one to see if that changes anything. I don't remember it set to all disabled before this update.

                    1 Reply Last reply Reply Quote 0
                    • JonathanLeeJ
                      JonathanLee @jimp
                      last edited by

                      This post is deleted!
                      1 Reply Last reply Reply Quote 0
                      • JonathanLeeJ
                        JonathanLee @jimp
                        last edited by

                        This post is deleted!
                        1 Reply Last reply Reply Quote 0
                        • JonathanLeeJ
                          JonathanLee @jimp
                          last edited by

                          This post is deleted!
                          1 Reply Last reply Reply Quote 0
                          • jimpJ
                            jimp Rebel Alliance Developer Netgate
                            last edited by

                            Please post the text and not screenshots. It's making it unnecessarily hard to follow.

                            Looking at the code it looks like it's from NAT reflection not outbound NAT. Is that a port forward for NTP you have? Is NAT reflection enabled globally or perhaps on just that rule?

                            Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                            Need help fast? Netgate Global Support!

                            Do not Chat/PM for help!

                            JonathanLeeJ 2 Replies Last reply Reply Quote 0
                            • JonathanLeeJ
                              JonathanLee @jimp
                              last edited by JonathanLee

                              @jimp You got it thanks for the help

                              here is your request this was the original settings, I have tried to delete the one line however it re adds

                              Outbound NAT rules (automatic)

                              Subnets to NAT

                              tonatsubnets = "{ 127.0.0.0/8 ::1/128 192.168.0.0/16 }"
                              nat on $WAN inet from $tonatsubnets to any port 500 -> 64.113.111.129/32 static-port
                              nat on $WAN inet6 from $tonatsubnets to any port 500 -> (mvneta0) static-port
                              nat on $WAN inet from $tonatsubnets to any -> 64.113.111.129/32 port 1024:65535
                              nat on $WAN inet6 from $tonatsubnets to any -> (mvneta0) port 1024:65535

                              TFTP proxy

                              rdr-anchor "tftp-proxy/*"

                              NAT Inbound Redirects

                              rdr on mvneta1 inet proto { tcp udp } from 192.168.0.0/16 to any port $DNS -> 192.168.1.1
                              no nat on mvneta1 inet proto tcp from (mvneta1) to 192.168.0.0/16
                              nat on mvneta1 inet proto tcp from 192.168.0.0/16 to 192.168.1.1 port $DNS -> (mvneta1)

                              rdr on mvneta1 inet6 proto { tcp udp } from any to any port $DNS -> ::1
                              rdr on mvneta1 inet proto udp from 192.168.0.0/16 to any port 123 -> 192.168.1.1
                              no nat on mvneta1 inet proto tcp from (mvneta1) to 192.168.0.0/16
                              nat on mvneta1 inet proto tcp from 192.168.0.0/16 to 192.168.1.1 port 123 -> (mvneta1)

                              rdr on mvneta1 inet6 proto udp from any to any port 123 -> ::1

                              Setup Squid proxy redirect

                              rdr pass on mvneta1 inet proto tcp from any to !(mvneta1) port 80 -> 127.0.0.1 port 3128
                              rdr pass on mvneta1 inet proto tcp from any to !(mvneta1) port 443 -> 127.0.0.1 port 3129

                              1 Reply Last reply Reply Quote 0
                              • JonathanLeeJ
                                JonathanLee @jimp
                                last edited by JonathanLee

                                @jimp

                                This is my NAT for DNS and NTP

                                I force them to use the firewall

                                DNSNTP.PNG

                                This setting has worked for some time now I get time from the firewall no matter what wan ip address a device requests for NTP. I had issues with time being jumped 15-20 mins without this nat setting for NTP, no clue why so I added a rule that let the firewall handle all NTP requests, after that no issues with time jumps

                                1 Reply Last reply Reply Quote 0
                                • jimpJ
                                  jimp Rebel Alliance Developer Netgate
                                  last edited by

                                  Do you have NAT reflection enabled globablly or on those rules? If so, disable it.

                                  Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                                  Need help fast? Netgate Global Support!

                                  Do not Chat/PM for help!

                                  JonathanLeeJ 1 Reply Last reply Reply Quote 1
                                  • JonathanLeeJ
                                    JonathanLee @jimp
                                    last edited by

                                    @jimp

                                    Network Address Translation Settings for Firewall

                                    Natadmin.PNG

                                    All is disabled

                                    outbound.PNG

                                    1 Reply Last reply Reply Quote 0
                                    • jimpJ
                                      jimp Rebel Alliance Developer Netgate
                                      last edited by

                                      There is also a per-rule option on the individual port forwards. Is it enabled there?

                                      Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                                      Need help fast? Netgate Global Support!

                                      Do not Chat/PM for help!

                                      JonathanLeeJ 1 Reply Last reply Reply Quote 0
                                      • jimpJ
                                        jimp Rebel Alliance Developer Netgate
                                        last edited by

                                        Also your port forward target should really be 127.0.0.1 and not 192.168.1.1, assuming 192.168.1.1 is the LAN address of the firewall.

                                        Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                                        Need help fast? Netgate Global Support!

                                        Do not Chat/PM for help!

                                        JonathanLeeJ 1 Reply Last reply Reply Quote 1
                                        • JonathanLeeJ
                                          JonathanLee @jimp
                                          last edited by

                                          @jimp

                                          Firewall rulesrules.PNG

                                          1 Reply Last reply Reply Quote 0
                                          • JonathanLeeJ
                                            JonathanLee @jimp
                                            last edited by JonathanLee

                                            @jimp said in Problem with snapshot 3/31 16:19:49:

                                            127.0.0.1

                                            correct to loopback address

                                            127.PNG

                                            NTPfix.PNG

                                            filter reload failed at same point as before with loopback address

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.