• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

can't update pfsense or install packages

General pfSense Questions
9
148
27.1k
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • M
    mrrobot @stephenw10
    last edited by Jun 21, 2023, 2:14 PM

    @stephenw10 i see no 12001 role in /tmp/rules.debug

    [2.6.0-RELEASE][admin@pfSense.xxx.local]/root: grep '12001' /tmp/rules.debug
    [2.6.0-RELEASE][admin@pfSense.xxx.local]/root:

    M 1 Reply Last reply Jun 21, 2023, 2:17 PM Reply Quote 0
    • M
      mrrobot @mrrobot
      last edited by Jun 21, 2023, 2:17 PM

      @mrrobot i see a icmpv6 section thought, can't see icmp v4

      .# Allow only bare essential icmpv6 packets (NS, NA, and RA, echoreq, echorep)
      pass out quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type {129,133,134,135,136} ridentifier 1000000108 keep state
      pass out quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type {129,133,134,135,136} ridentifier 1000000109 keep state
      pass in quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type {128,133,134,135,136} ridentifier 1000000110 keep state
      pass in quick inet6 proto ipv6-icmp from ff02::/16 to fe80::/10 icmp6-type {128,133,134,135,136} ridentifier 1000000111 keep state
      pass in quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type {128,133,134,135,136} ridentifier 1000000112 keep state
      pass in quick inet6 proto ipv6-icmp from :: to ff02::/16 icmp6-type {128,133,134,135,136} ridentifier 1000000113 keep state
      .# We use the mighty pf, we cannot be fooled.
      block log quick inet proto { tcp, udp } from any port = 0 to any ridentifier 1000000114 label "Block traffic from port 0"
      block log quick inet proto { tcp, udp } from any to any port = 0 ridentifier 1000000115 label "Block traffic to port 0"
      block log quick inet6 proto { tcp, udp } from any port = 0 to any ridentifier 1000000116 label "Block traffic from port 0"
      block log quick inet6 proto { tcp, udp } from any to any port = 0 ridentifier 1000000117 label "Block traffic to port 0"

      1 Reply Last reply Reply Quote 0
      • S
        stephenw10 Netgate Administrator
        last edited by Jun 21, 2023, 2:43 PM

        Ok try this. Click on the red X in the firewall log. What rule does it show has blocked that?

        M 1 Reply Last reply Jun 21, 2023, 3:01 PM Reply Quote 0
        • M
          mrrobot @stephenw10
          last edited by Jun 21, 2023, 3:01 PM

          @stephenw10 [2.6.0-RELEASE][admin@pfSense.xxx.local]/root: grep '1000000103' /tmp/rules.debug
          block in log inet all ridentifier 1000000103 label "Default deny rule IPv4"
          [2.6.0-RELEASE][admin@pfSense.xxx.local]/root:

          1 Reply Last reply Reply Quote 0
          • S
            stephenw10 Netgate Administrator
            last edited by Jun 21, 2023, 4:27 PM

            You see that on the rule that's marked '12001'?

            You would expect to see traffic blocked inbound by the default rule but not what shows in the log there.

            It could be something upstream sending back the permission denied response. You have active filtering on the gateway device?

            M 2 Replies Last reply Jun 21, 2023, 4:32 PM Reply Quote 0
            • M
              mrrobot @stephenw10
              last edited by Jun 21, 2023, 4:32 PM

              @stephenw10 said in can't update pfsense or install packages:

              You see that on the rule that's marked '12001'?

              i see it on rule 1000000103

              1 Reply Last reply Reply Quote 0
              • M
                mrrobot @stephenw10
                last edited by Jun 21, 2023, 4:36 PM

                @stephenw10 said in can't update pfsense or install packages:

                You have active filtering on the gateway device?

                how can i check that ?

                1 Reply Last reply Reply Quote 0
                • S
                  stephenw10 Netgate Administrator
                  last edited by Jun 21, 2023, 4:58 PM

                  Ok, so seeing traffic blocked by the default rule on WAN, like that IGMP traffic in your screenshot, is expected and not an issue. Unrelated to whatever is blocking outgoing requests here.

                  What is the gateway device here?

                  Try looking for states to 208.123.73.X when you try to run the update. In Diag > States filter by 208.123.73

                  You should see states there unless something is blocking it on the firewall itself.

                  M 1 Reply Last reply Jun 21, 2023, 6:08 PM Reply Quote 0
                  • M
                    mrrobot @stephenw10
                    last edited by Jun 21, 2023, 6:08 PM

                    @stephenw10 running pfsense on protectli vault fw4b

                    🔒 Log in to view

                    1 Reply Last reply Reply Quote 0
                    • S
                      stephenw10 Netgate Administrator
                      last edited by Jun 21, 2023, 7:46 PM

                      Those are only states from LAN side clients to our subnet on https. So probably you connecting to the forum.

                      Were you running pkg update when you checked that? I expect to see a state for that on WAN only without NAT.

                      Try running a port test to it:

                      🔒 Log in to view

                      M 2 Replies Last reply Jun 21, 2023, 7:48 PM Reply Quote 0
                      • M
                        mrrobot @stephenw10
                        last edited by Jun 21, 2023, 7:48 PM

                        @stephenw10 said in can't update pfsense or install packages:

                        ere you running pkg update when you checked that?

                        yes

                        1 Reply Last reply Reply Quote 0
                        • M
                          mrrobot @stephenw10
                          last edited by Jun 21, 2023, 8:01 PM

                          @stephenw10 said in can't update pfsense or install packages:

                          Try running a port test to it:

                          both pkg00-atx.netgate.com & pkg01-atx.netgate.com show failed

                          🔒 Log in to view

                          1 Reply Last reply Reply Quote 0
                          • S
                            stephenw10 Netgate Administrator
                            last edited by Jun 21, 2023, 8:12 PM

                            Do you see states created when running that test?

                            M 1 Reply Last reply Jun 21, 2023, 8:15 PM Reply Quote 0
                            • M
                              mrrobot @stephenw10
                              last edited by Jun 21, 2023, 8:15 PM

                              @stephenw10 you mean from Diag -> states ?

                              i got this when i filter 208.123.73 on WAN interface 🔒 Log in to view

                              1 Reply Last reply Reply Quote 0
                              • S
                                stephenw10 Netgate Administrator
                                last edited by Jun 21, 2023, 9:34 PM

                                So still no states. Something is preventing it open states locally.

                                Do you have captive portal running?

                                M 1 Reply Last reply Jun 22, 2023, 4:54 PM Reply Quote 0
                                • M
                                  mrrobot @stephenw10
                                  last edited by Jun 22, 2023, 4:54 PM

                                  @stephenw10 sorry for the late respond ! no captive portal is not active

                                  1 Reply Last reply Reply Quote 0
                                  • S
                                    stephenw10 Netgate Administrator
                                    last edited by Jun 22, 2023, 5:36 PM

                                    To confirm you are looking at the states correctly try running a port test against something else and then looking for those states.
                                    For example 1.1.1.1:
                                    🔒 Log in to view

                                    🔒 Log in to view

                                    M 1 Reply Last reply Jun 22, 2023, 6:46 PM Reply Quote 0
                                    • M
                                      mrrobot @stephenw10
                                      last edited by Jun 22, 2023, 6:46 PM

                                      @stephenw10 here are the results

                                      🔒 Log in to view

                                      🔒 Log in to view

                                      1 Reply Last reply Reply Quote 0
                                      • J
                                        jimp Rebel Alliance Developer Netgate
                                        last edited by Jun 22, 2023, 6:56 PM

                                        From a shell prompt or Diag > Command (preferably a shell prompt), try running the following commands:

                                        $ host pkg00-atx.netgate.com
                                        $ route -n get pkg00-atx.netgate.com
                                        $ route -n -4 get pkg00-atx.netgate.com
                                        $ route -n -6 get pkg00-atx.netgate.com
                                        $ nc -vz pkg00-atx.netgate.com 443
                                        $ nc -vz4 pkg00-atx.netgate.com 443
                                        $ nc -vz6 pkg00-atx.netgate.com 443
                                        

                                        On a working system with IPv4 and IPv6 connectivity, I'd expect to see the following output:

                                        $ host pkg00-atx.netgate.com
                                        pkg00-atx.netgate.com has address 208.123.73.207
                                        pkg00-atx.netgate.com has IPv6 address 2610:160:11:18::207
                                        $ route -n get pkg00-atx.netgate.com
                                           route to: 208.123.73.207
                                        destination: 0.0.0.0
                                               mask: 0.0.0.0
                                            gateway: x.x.x.1
                                                fib: 0
                                          interface: ix3
                                              flags: <UP,GATEWAY,DONE,STATIC>
                                         recvpipe  sendpipe  ssthresh  rtt,msec    mtu        weight    expire
                                               0         0         0         0      1500         1         0
                                        $ route -n -4 get pkg00-atx.netgate.com
                                           route to: 208.123.73.207
                                        destination: 0.0.0.0
                                               mask: 0.0.0.0
                                            gateway: x.x.x.1
                                                fib: 0
                                          interface: ix3
                                              flags: <UP,GATEWAY,DONE,STATIC>
                                         recvpipe  sendpipe  ssthresh  rtt,msec    mtu        weight    expire
                                               0         0         0         0      1500         1         0
                                        $ route -n -6 get pkg00-atx.netgate.com
                                           route to: 2610:160:11:18::207
                                        destination: ::
                                               mask: ::
                                            gateway: 2xxx:xxxx:xxxx:xxxx::1
                                                fib: 0
                                          interface: gif0
                                              flags: <UP,GATEWAY,DONE,STATIC>
                                         recvpipe  sendpipe  ssthresh  rtt,msec    mtu        weight    expire
                                               0         0         0         0      1480         1         0
                                        $ nc -vz pkg00-atx.netgate.com 443
                                        Connection to pkg00-atx.netgate.com 443 port [tcp/https] succeeded!
                                        $ nc -vz4 pkg00-atx.netgate.com 443
                                        Connection to pkg00-atx.netgate.com 443 port [tcp/https] succeeded!
                                        $ nc -vz6 pkg00-atx.netgate.com 443
                                        Connection to pkg00-atx.netgate.com 443 port [tcp/https] succeeded!
                                        

                                        Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                                        Need help fast? Netgate Global Support!

                                        Do not Chat/PM for help!

                                        M 1 Reply Last reply Jun 22, 2023, 7:02 PM Reply Quote 0
                                        • M
                                          mrrobot @jimp
                                          last edited by Jun 22, 2023, 7:02 PM

                                          @jimp the first 3 cmds respond the same way as working system

                                          the rest is below

                                          
                                          
                                          
                                          
                                          
                                          $route -n -6 get pkg00-atx.netgate.com
                                          	route: route has not been found
                                          $nc -vz pkg00-atx.netgate.com 443
                                          	nc: connect to pkg00-atx.netgate.com port 443 (tcp) failed: Permission denied
                                          	nc: connect to pkg00-atx.netgate.com port 443 (tcp) failed: No route to host
                                          $nc -vz4 pkg00-atx.netgate.com 443
                                          	nc: connect to pkg00-atx.netgate.com port 443 (tcp) failed: Permission denied
                                          $nc -vz6 pkg00-atx.netgate.com 443
                                          	nc: connect to pkg00-atx.netgate.com port 443 (tcp) failed: No route to host
                                          
                                          
                                          
                                          1 Reply Last reply Reply Quote 0
                                          51 out of 148
                                          • First post
                                            51/148
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.