Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Anyone know what this error could mean.

    Scheduled Pinned Locked Moved General pfSense Questions
    32 Posts 5 Posters 3.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • stephenw10S
      stephenw10 Netgate Administrator
      last edited by

      @steveits said in Anyone know what this error could mean.:

      https://forum.netgate.com/topic/173280/there-were-error-s-loading-the-rules-pfctl-pfctl_rules-the-line-in-question-reads-0

      Run the command referenced in that other thread at the command line:
      pfctl -vf /tmp/rules.debug

      Does it show errors there?

      Steve

      V 1 Reply Last reply Reply Quote 0
      • V
        vbjp @stephenw10
        last edited by

        @stephenw10
        Will do it locally, when arrive to location where firewall is deployed, later today.

        Any short explanation what that command does? have read the pfctl man page from BSD, it's bit confusing. Just want to be sure it will not make any changes, as firewall is running ok at least for now.

        dotdashD 1 Reply Last reply Reply Quote 0
        • dotdashD
          dotdash @vbjp
          last edited by

          @vbjp
          -f tells it load load from the file specified, the v is for verbose output

          1 Reply Last reply Reply Quote 0
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by

            It tries to manually reload the generated ruleset and has verbose output so any errors will show.

            One other thing that can present like that if the ruleset is good is if the upgrade didn't complete correctly and there is a mismatch between the kernel and pfctl.
            Try running:

            [22.05-RELEASE][admin@2100-3.stevew.lan]/root: pkg info -x 22.01
            pkg: No package(s) matching 22.01
            

            And:

            [22.05-RELEASE][admin@2100-3.stevew.lan]/root: freebsd-version -kur
            12.3-STABLE
            12.3-STABLE
            12.3-STABLE
            

            Steve

            V 1 Reply Last reply Reply Quote 0
            • V
              vbjp @stephenw10
              last edited by vbjp

              @stephenw10

              output of pkg info -x 22.01

              pkg: No package(s) matching 22.01
              

              output of freebsd-version -kur

              12.3-STABLE
              12.3-STABLE
              12.3-STABLE
              

              output of pfctl -vf /tmp/rules.debug attached as file removed IPs

              pfctl out censored.txt

              Thank you.

              1 Reply Last reply Reply Quote 0
              • stephenw10S
                stephenw10 Netgate Administrator
                last edited by

                Hmm, so it loaded without generating errors?

                I note you have a duplicate negate networks table. That's unexpected and fixed in 22.09 but shouldn't cause this.

                Steve

                1 Reply Last reply Reply Quote 0
                • V
                  vbjp
                  last edited by

                  It was one time occurrence, got bunch of errors, internet broke, rebooted and it works ok, not sure why it happened. Hope it does not return. But for now no problems.

                  1 Reply Last reply Reply Quote 0
                  • stephenw10S
                    stephenw10 Netgate Administrator
                    last edited by

                    Ah, in that case I suspect that there may have been a mismatch at that point before you rebooted.

                    Was that the first time you rebooted since upgrading?

                    Steve

                    1 Reply Last reply Reply Quote 0
                    • V
                      vbjp
                      last edited by

                      No it was at least 3rd reboot after upgrade. I rebooted once just after upgrade. Then few days later rebooted because dns broke. Upgraded to 22.05 on first week of release.

                      1 Reply Last reply Reply Quote 0
                      • stephenw10S
                        stephenw10 Netgate Administrator
                        last edited by

                        Hmm. If you see it again try to run those two command before rebooting to check for a mismatch.

                        If it's not doing it now though it's hard to say what might have caused it for sure.

                        1 Reply Last reply Reply Quote 0
                        • T
                          turrican64
                          last edited by turrican64

                          I am experiencing the same issue. Ver. 22.05
                          pfSense started to print this error after I installed mtr-nox11 package.

                          There were error(s) loading the rules: pfctl: pfctl_rules - The line in question reads [0]:
                          

                          No package(s) matching 22.01
                          12.3-STABLE
                          And I have no portforward at all.

                          Not sure why, but I also have a duplicated ruleset, which is my OpenVPN Tunnel Network.

                          [22.05-RELEASE][root@g.localdomain]/root: egrep -v '^#|^[[:blank:]]*$' /tmp/rules.debug | sort | uniq -c | grep -v '^   1 '
                             2 table <negate_networks> { 10.22.0.0/24 }
                          

                          This box was working nicely in the past 152 days without any issue till today's mtr package install. I have removed the package, but I am still receiving the error message, when for example I restart the OpenVPN.

                          The previous post was in August, is there any information since than what causes this error?
                          Thank you!

                          1 Reply Last reply Reply Quote 0
                          • stephenw10S
                            stephenw10 Netgate Administrator
                            last edited by

                            It's this: https://redmine.pfsense.org/issues/13408

                            It's caused by the new layer2 rules in 22.05. So that's mostly captive portal.

                            It's not related to that package and the duplicated negate_networks table is unlikely to be a problem.

                            Steve

                            1 Reply Last reply Reply Quote 0
                            • T
                              turrican64
                              last edited by turrican64

                              Thank you Steve for the info.

                              I've read through the topic mentioned in the ticket.
                              Someone wrote that he changed the OpenVPN config then the issue has started.
                              Actually, besides the mtr installation, I also changed the OpenVPN config, nearly at the same time, therefore yes, might be not the mtr installation, but the OpenVPN changes triggered the issue.

                              1 Reply Last reply Reply Quote 0
                              • stephenw10S
                                stephenw10 Netgate Administrator
                                last edited by

                                As far as I'm aware it should only happen with Layer 2 type rules which wouldn't normally appear in an OpenVPN config.
                                Are you running the captive portal?

                                1 Reply Last reply Reply Quote 0
                                • T
                                  turrican64
                                  last edited by

                                  I don’t use captive portal.
                                  The topic mentioned in the ticket states that only captive portal incorporates layer 2 rules, however at least 3 people are saying that they don’t use captive portal at all.

                                  1 Reply Last reply Reply Quote 0
                                  • stephenw10S
                                    stephenw10 Netgate Administrator
                                    last edited by

                                    For most users who see that it clears at reboot. Is that the case here or is it now persistent since you made the OpenVPN change?
                                    Can you roll back that config change as a test?

                                    1 Reply Last reply Reply Quote 0
                                    • T
                                      turrican64
                                      last edited by

                                      I haven't rebooted the box just in case further debugging is needed, therefore the issue is still present.
                                      The firewall is forwarding some traffic, but because of this error I assume not all rules are applied. I've read that reboot made situation worse for someone, therefore this was also against the reboot, and I was thinking to leave it as it is for now.

                                      Since the reboot likely clears the issue, therefore is the goal to restore the previous configuration without reboot and see if no more error messages will be printed? Do I understand correctly? If yes I am happy to visit the firewall in the evening and restore the config.
                                      Do I need to have a USB drive with the 22.05 image handy? :)

                                      1 Reply Last reply Reply Quote 0
                                      • stephenw10S
                                        stephenw10 Netgate Administrator
                                        last edited by

                                        If you somehow create an invalid ruleset the packet filter will refuse to load it and continue with the existing ruleset. That can be confusing because it appears as though any new firewall rules you add are not being respected. In that situation if you reboot the invalid ruleset cannot be loaded at boot and you may end up with no rules. Generally bad!

                                        However this error is not due to a bad ruleset. It happens when the code gets stuck loading a layer 2 rule as I understand it.

                                        Check your /tmp/rules.debug file for any layer 2 (ether) rules like:

                                        # Captive Portal
                                        ether pass on { ix2  } tag "cpzoneid_2_rdr"
                                        ether anchor "cpzoneid_2_auth/*" on { ix2  }
                                        ether anchor "cpzoneid_2_passthrumac/*" on { ix2  }
                                        ether anchor "cpzoneid_2_allowedhosts/*" on { ix2  }
                                        

                                        Steve

                                        1 Reply Last reply Reply Quote 0
                                        • T
                                          turrican64
                                          last edited by

                                          [22.05-RELEASE][root@g.localdomain]/root: grep ether  /tmp/rules.debug
                                          [22.05-RELEASE][root@g.localdomain]/root:
                                          

                                          It seems there are no Layer 2 rules

                                          1 Reply Last reply Reply Quote 0
                                          • stephenw10S
                                            stephenw10 Netgate Administrator
                                            last edited by

                                            Hmm, in that case it's unclear what might have caused that....unless you might have had ether rules at some point?

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.