Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    1100 upgrade, 22.05->23.01, high mem usage

    General pfSense Questions
    12
    74
    40.7k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • beerguzzleB
      beerguzzle
      last edited by

      It looks like the /etc/periodic/daily/450.status-security script in turn invokes a bunch of other scripts in /etc/periodic/security and maybe also /usr/local/etc/periodic/security. The real action is in those scripts. The scripts in /etc/periodic/daily all have "copyright 2001 FreeBSD project" in the headers, so I would doubt that they are broken. But they invoke commands like pfctl and ipfw which may be new versions that have bugs...

      Netgate 1100 and Netgate 2100, latest pfsense+ version

      1 Reply Last reply Reply Quote 0
      • J
        jrey @keyser
        last edited by jrey

        @keyser
        "report" on the security of the system.
        all of the various scripts just capture various system status and report on them - a daily summary (point in time mostly) as it were

        Beyond reporting, I'm looking if it does anything else that might be "required" in this version. I don't think there is, after all it is just a reporting mechanism. These are all OS provided items, pfsense has it's own set of daily, weekly, monthly periodic that are handled on a different cron run. it's unlikely there is anything there that would require this to be complete, because both cron (all 6 actually) are scheduled at the same time.

        the 450.status-security script itself just runs whichever scripts are enabled and in the "security" scripts directory - that list is these, (but I need to look at which ones are enabled) or if one of them does something else

        Screen Shot 2023-02-22 at 11.58.02 AM.png

        However, because the reports were previously set to mail on a system that does have the required mail bits, no one would have ever seen the reports anyway.
        I do now because I had changed that to go to a file in one of my previous posts. (and I didn't enable rotation, because well if I didn't get them before, I don't need them now, but there is an entire mechanism to keep and rotate them as well)

        I'm looking at the individual security scripts now, but in the log I grabbed when it was showing entries (they also look pretty boring). if they are all this boring, and 500, 520 or 550 are enabled I guess one of them. If they all look "safe" to run, I'll likely do that in step at some point. 520 clearly dumped the rules that are on the firewall, but I didn't notice anything from 500 or 550 so it MAY or MAY NOT be one of them.

        I logged entries for 100, 110, (not 200), 300, 400, 410, (not 500), 520, (not 550), 700, 800
        so it could also be one of the scripts that didn't seem to log anything if they are enabled.

        also I wanted to wait until 12:00 schedule for my pfB run. It completed and is represented on this by the little down / up in free on the right side ... so it's not pfB in my configuration. no real change in memory, and it gave it back.

        Screen Shot 2023-02-22 at 12.06.22 PM.png

        For now, I'm going to run with the report disabled, and I'm not concerned with doing that at this point.

        Edit - there is also a 450 under the weekly, monthly that at this point I have not disabled, for testing I've only disabled under daily for now.

        Edit 2 - looks like they are all enabled in the conf (including like the other daily batch, some scripts that don't exist)

        JR

        1 Reply Last reply Reply Quote 0
        • J
          jrey
          last edited by jrey

          Screen Shot 2023-02-22 at 1.22.31 PM.png

          So the first small change is running 100, 110
          from there it flat lined for most of the additional logs.
          then the huge drop, here are the steps

          security scripts all are enabled per conf
          100 small impact
          110 additional small impact
          let it display flat line it did just to confirm
          200 no impact (but no output either)
          still flat lined
          300 no impact
          still flat lined
          400 no impact
          still flat lined
          410 no impact
          still flat lined
          500 no impact (no output)
          still flat lined
          520 no impact (no output)
          still flat lined
          550 no impact
          still flat lined
          700 no impact
          still flat lined
          800 no impact
          all these we are now at the 3:14 time stamp where the memory now shows the huge change

          I did this because in the log file from earlier there are activities logged immediately after the output from 800 that did not appear when it finished on this test.

          so I ran the entire process as "periodic security" and there it is

          the additional checks that are performed and logged outside of the individual scripts are logged shown below when doing the periodic security repeated all of the output I had just witnessed from running the scripts individually and then added this

          it was immediately after 800 logged login failures that memory disappeared. (these additional items are likely handled in the base script, I haven't checked yet) it looks like these specific checks are the culprit.

          [23.01-RELEASE][ .... ]/etc/periodic/security: ./800.loginfail

          login failures:
          [23.01-RELEASE][ .... ]/etc/periodic/security: periodic security
          .... output same as all individual scripts up to this point
          picking up in periodic security with this line and remainder of output

          login failures:

          Checking for security vulnerabilities in base (userland & kernel):
          Database fetched: Wed Feb 22 08:27:08 EST 2023
          0 problem(s) in 0 installed package(s) found.
          0 problem(s) in 0 installed package(s) found.

          Checking for packages with security vulnerabilities:
          Database fetched: Wed Feb 22 08:27:08 EST 2023
          curl-7.85.0

          Checking for packages with mismatched checksums:

          -- End of security output --

          EDIT:
          running
          periodic security weekly
          and
          periodic security monthly
          produces no different output, and does not add additional from that above after running daily (so the change is a one time impact.)
          The output is not really anything of interest so for now I have also disabled the 450 report in both weekly and monthly sections. of conf.

          1 Reply Last reply Reply Quote 0
          • J
            jrey @SteveITS
            last edited by jrey

            @steveits

            Yup I went a little further in testing, and pin pointed the exact step.

            But I also then just disabled the 450.status-security in the config.
            as it was configured out of box as (mail root) no one would ever see the output anyway.
            following through I also sent the output to log files so in case I might like to look at it one day (NOT)

            this thread details all the steps I took and at what point it breaks, the settings quoted on the reference thread will do the same as disabling 450.status-security
            there is nothing to see there anyway, especially as configured out of box.

            security_status_baseaudit_enable="NO"
            security_status_pkg_checksum_enable="NO"
            security_status_pkgaudit_enable="NO"

            DefenderLLCD 1 Reply Last reply Reply Quote 0
            • DefenderLLCD
              DefenderLLC @jrey
              last edited by

              @jrey said in 1100 upgrade, 22.05->23.01, high mem usage:

              @steveits

              Yup I went a little further in testing, and pin pointed the exact step.

              But I also then just disabled the 450.status-security in the config.
              as it was configured out of box as (mail root) no one would ever see the output anyway.
              following through I also sent the output to log files so in case I might like to look at it one day (NOT)

              this thread details all the steps I took and at what point it breaks, the settings quoted on the reference thread will do the same as disabling 450.status-security
              there is nothing to see there anyway, especially as configured out of box.

              security_status_baseaudit_enable="NO"
              security_status_pkg_checksum_enable="NO"
              security_status_pkgaudit_enable="NO"

              I am active on that other thread too, but have not had a chance to perform those steps yet. Did it resolve the issue when you force the daily periodical post reboot?

              J 1 Reply Last reply Reply Quote 0
              • J
                jrey @DefenderLLC
                last edited by

                @defenderllc

                Short answer = yes 100%

                Long answer, why I disabled the whole thing

                I used the disable the entire 450.status-security enabled "NO"
                and yes all three cases with 100% after with no loss, one of the posts here shows/comments on that.
                then I started to break it again to narrow down which specific step was causing it.

                at the end I just disable the entire security report, unless you make the other changes I documented earlier there is really nothing to see ;-)
                have to change from "YES" to "NO"

                daily_status_security_enable="NO"
                weekly_status_security_enable="NO"
                monthly_status_security_enable="NO"

                but the changes in the other thread should also work as well, but they only disable specifically the base audit, pkg checksum and pkgaudit
                ie the rest of the security report will still generate, and effectively go nowhere (you'll never see it) in the out of box config unless you also change the logging options as I documented earlier.

                honestly in the current state, the system security report is of little value.
                For example, one of the checks it run is for "login failures:" and it hasn't picked up a single one. (and I've fat fingered my password more than once today.) My NAS picks up the log in failure from the syslog and notifies me almost instantly (within seconds that I can't spell my password) I've often got the email telling me about that before I've retyped it and actually logged in. LOL

                maybe when FreeBSD 14 goes -RELEASE there may be value. But for now the value is keeping the memory footprint under 20% (it not a real goal, it's just where I flat lined before the upgrade) I support 40-50 devices LAN side and memory really never moves much (at 16% right now)

                DefenderLLCD 1 Reply Last reply Reply Quote 1
                • beerguzzleB
                  beerguzzle
                  last edited by

                  Personally, I'm reluctant to muck with crontab scripts at the moment, especially since Netgate has withdrawn release of 23.01 for smaller boxes. While they didn't actually say it, they seem to acknowledge that there is a real bug out there that they need to corner. So, I'm hoping that a 23.02 release might come out soon and solve this issue.

                  BTW, I just noticed that a new version of pfblockerng has appeared in System/Package Manager/Installed Packages. I have pfblockerng version 3.2.0_2, I will apply the update and see what happens.

                  Netgate 1100 and Netgate 2100, latest pfsense+ version

                  J 2 Replies Last reply Reply Quote 0
                  • J
                    jrey @beerguzzle
                    last edited by jrey

                    @beerguzzle

                    Fair enough, I'm on a 2100 and no other issues

                    (well except it still does show as registered, but TAC told me that was a backend issue that would correct itself, when they fix the backend "shortly" that was last week, so I don't know how long "shortly" is. Not a panic at this point because they also told me it shows as registered on their side and is seeing the correct repo's and package availability etc. Sure they are swamped. The joy of releasing new stuff, been there, done that.

                    Cheers

                    1 Reply Last reply Reply Quote 0
                    • DefenderLLCD
                      DefenderLLC @jrey
                      last edited by

                      @jrey said in 1100 upgrade, 22.05->23.01, high mem usage:

                      @defenderllc

                      Short answer = yes 100%

                      Long answer, why I disabled the whole thing

                      I used the disable the entire 450.status-security enabled "NO"
                      and yes all three cases with 100% after with no loss, one of the posts here shows/comments on that.
                      then I started to break it again to narrow down which specific step was causing it.

                      at the end I just disable the entire security report, unless you make the other changes I documented earlier there is really nothing to see ;-)
                      have to change from "YES" to "NO"

                      daily_status_security_enable="NO"
                      weekly_status_security_enable="NO"
                      monthly_status_security_enable="NO"

                      but the changes in the other thread should also work as well, but they only disable specifically the base audit, pkg checksum and pkgaudit
                      ie the rest of the security report will still generate, and effectively go nowhere (you'll never see it) in the out of box config unless you also change the logging options as I documented earlier.

                      honestly in the current state, the system security report is of little value.
                      For example, one of the checks it run is for "login failures:" and it hasn't picked up a single one. (and I've fat fingered my password more than once today.) My NAS picks up the log in failure from the syslog and notifies me almost instantly (within seconds that I can't spell my password) I've often got the email telling me about that before I've retyped it and actually logged in. LOL

                      maybe when FreeBSD 14 goes -RELEASE there may be value. But for now the value is keeping the memory footprint under 20% (it not a real goal, it's just where I flat lined before the upgrade) I support 40-50 devices LAN side and memory really never moves much (at 16% right now)

                      Netgate suggested commenting out the 3 periodic lines in the /etc/crontab file. @jimp mentioned that those were not enabled in 22.05. I just made the edits and rebooted. We will know for sure tomorrow morning!

                      S 1 Reply Last reply Reply Quote 0
                      • J
                        jrey @beerguzzle
                        last edited by jrey

                        @beerguzzle said in 1100 upgrade, 22.05->23.01, high mem usage:

                        I have pfblockerng version 3.2.0_2, I will apply the update and see what happens.

                        it won't change the static memory loss caused by the security reports running, but it certainly has some great features.
                        I actually did the troubleshooting on the cron issue that is fixed in there. That was a fun weekend ;-). but all around that is a very good update they have done an excellent job pulling it all together so quickly.

                        1 Reply Last reply Reply Quote 0
                        • S
                          SteveITS Galactic Empire @DefenderLLC
                          last edited by SteveITS

                          @defenderllc said in 1100 upgrade, 22.05->23.01, high mem usage:

                          Netgate suggested commenting out the 3 periodic lines

                          He made a patch already.

                          @beerguzzle said in 1100 upgrade, 22.05->23.01, high mem usage:

                          Netgate has withdrawn release of 23.01 for smaller boxes. While they didn't actually say it, they seem to acknowledge that there is a real bug

                          There were threads about it like this one. Early models of 1100/2100 had a small EFI partition, and the issue is an "out of space" copying to it. I'm not clear myself if that means "all sold with UFS" or just early models. I have a 2100 that had an 800K partition and had the problem. New installs and newer devices have ZFS and a 200 MB EFI partition so aren't affected. Per that thread Netgate was unable to duplicate the issue, at least as of this weekend, but stopped the updates anyway. A new install will use ZFS and the new file system layout so is unaffected. One can still request the 23.01 image file and reinstall fine.

                          I would normally have waited longer myself, knowing they skipped a FreeBSD version and jumped to PHP 8 with lots of coding changes, but was testing the 2100.

                          Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                          When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                          Upvote 👍 helpful posts!

                          J 1 Reply Last reply Reply Quote 0
                          • J
                            jrey @SteveITS
                            last edited by

                            @steveits

                            i saw that too, was sure, because I couldn't remember if it was enable in prior version or not.
                            @jimp suggests none of it was not enabled in prior version

                            The change to crontab will for sure stop it and all the other reports it runs too.
                            again out of the box the way it was configured no one would have seen them anyway ..

                            There are 3 fixes that will alleviate the problem caused by the security reports.
                            Dealers choice at this point.

                            crontab is likely the best final solution since they say there is nothing else needed.

                            All good. Cheers

                            1 Reply Last reply Reply Quote 0
                            • beerguzzleB
                              beerguzzle
                              last edited by

                              I just applied patch ff715efce5e6c65b3d49dc2da7e1bdc437ecbf12 that was put out by the Netgate crew, see https://redmine.pfsense.org/issues/14016, and rebooted. Also see the discussion in the thread "23.1 using more RAM" about this patch.

                              After reboot, wired mem dropped from 55% to 33% on my 1100. I'll check it in the morning to see what happened at 3 AM.

                              Netgate 1100 and Netgate 2100, latest pfsense+ version

                              MachasaChairaM 1 Reply Last reply Reply Quote 4
                              • MachasaChairaM
                                MachasaChaira @beerguzzle
                                last edited by

                                @beerguzzle Hello, my first comment here. Same situation, SG-1100 with 85% memory in constant use. I applied that patch and Memory usage dropped to 35% after rebooting.

                                J 1 Reply Last reply Reply Quote 1
                                • beerguzzleB
                                  beerguzzle
                                  last edited by

                                  Checking my system this morning after applying patch ff715efce5e6c65b3d49dc2da7e1bdc437ecbf12 and rebooting yesterday... Bliss! Nothing happened at 3 AM and my wired mem usage remains at about 35%. I consider this problem solved.

                                  Screenshot 2023-02-23 at 7.49.39 AM.png

                                  Netgate 1100 and Netgate 2100, latest pfsense+ version

                                  R 1 Reply Last reply Reply Quote 3
                                  • R
                                    rpsmith @beerguzzle
                                    last edited by

                                    Patch "ff715efce5e6c65b3d49dc2da7e1bdc437ecbf12" has completely resolved my SG-1100 memory problems!

                                    F 1 Reply Last reply Reply Quote 1
                                    • F
                                      FSC830 @rpsmith
                                      last edited by

                                      @rpsmith said in 1100 upgrade, 22.05->23.01, high mem usage:

                                      Patch "ff715efce5e6c65b3d49dc2da7e1bdc437ecbf12" has completely resolved my SG-1100 memory problems!

                                      +1
                                      😊
                                      Applied patch and rebootet yesterday at 8:00pm

                                      f6556b8f-56be-4a04-bd61-5ca50ebae3ee-grafik.png

                                      Regards

                                      M 1 Reply Last reply Reply Quote 1
                                      • M
                                        mcury @FSC830
                                        last edited by

                                        @fsc830 Applied this patch in my SG-3100, everything OK, memory usage didn't change at night.
                                        Thanks

                                        dead on arrival, nowhere to be found.

                                        1 Reply Last reply Reply Quote 1
                                        • S SteveITS referenced this topic on
                                        • J
                                          JMV43 0 @MachasaChaira
                                          last edited by

                                          @machasachaira How do we apply the patch?

                                          JMV

                                          S 1 Reply Last reply Reply Quote 0
                                          • S
                                            SteveITS Galactic Empire @JMV43 0
                                            last edited by SteveITS

                                            @jmv43-0 Install the System Patches package and use the patch ID.
                                            https://docs.netgate.com/pfsense/en/latest/development/system-patches.html

                                            Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                                            When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                                            Upvote 👍 helpful posts!

                                            MachasaChairaM J 2 Replies Last reply Reply Quote 1
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.