• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Growing states table, some leak?

Scheduled Pinned Locked Moved Plus 23.09 Development Snapshots (Retired)
41 Posts 7 Posters 7.2k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • W
    w0w
    last edited by Aug 26, 2023, 11:06 AM

    7279f62e-7ef6-41e8-9e42-c4bb3c3daf06-image.png
    after some time it becomes full and firewall starts spamming console with “pf states limit reached” as a result no internet and no GUI accessible.

    J 1 Reply Last reply Aug 26, 2023, 12:32 PM Reply Quote 0
    • J
      johnpoz LAYER 8 Global Moderator @w0w
      last edited by Aug 26, 2023, 12:32 PM

      @w0w that is a lot of states.. How many clients? Do you have a bunch of devices doing p2p or something?

      You typically run at 50% cpu? how much traffic is being moved.. What sort of traffic?

      Do you have something or somethings creating lots of states faster then they expire? What makes up the majority of states - is it normal clients talking to some website(s).. Typical internet sort of traffic - or do you have something like p2p running where client might be talking to 1000's of devices in the torrent cloud, etc.

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.8, 24.11

      W 1 Reply Last reply Aug 26, 2023, 2:15 PM Reply Quote 0
      • W
        w0w @johnpoz
        last edited by Aug 26, 2023, 2:15 PM

        @johnpoz
        Nothing changed, only 23.09 is installed. No changes in clients or traffic. CPU usage was random I think. May be some pfBlocker update or whatever.
        f48fcc3a-3dfc-48ed-892f-7e6e4a93a622-image.png
        I don't think it is real states, it looks like something went wrong. Because what you see on the first screenshot I did right after states are cleared using
        7c01616a-4145-49dc-8f4b-9d26910af4f0-image.png

        1 Reply Last reply Reply Quote 0
        • J
          jimp Rebel Alliance Developer Netgate
          last edited by Aug 28, 2023, 3:40 PM

          I'm not seeing anything out of the ordinary here in my lab or on my edge running 23.09. My edge is hovering around ~1100 states and the states graph shows it going up/down as expected/when expected.

          If you look under Status > Monitoring at the System / States graph it should show you a bit about what is happening.

          If you look at the dump of states yourself (e.g. pfctl -ss or pfctl -vvss) you might also see a pattern going on that explains it, like some sort of traffic looping or a local device making lots of connections.

          With a table that large the States Summary would probably not load since it wouldn't have enough RAM, but it might be worth trying at least.

          Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

          Need help fast? Netgate Global Support!

          Do not Chat/PM for help!

          W 1 Reply Last reply Aug 28, 2023, 6:26 PM Reply Quote 1
          • W
            w0w @jimp
            last edited by Aug 28, 2023, 6:26 PM

            @jimp
            330904f8-1185-4587-88af-ef984b77799b-image.png
            What does this button do then?
            I am asking because it has no effect on the table size. I can even say that it was not reset until I rebooted firewall. In fact, reroot does not helpm only reboot.
            I will try suggested :

            @jimp said in Growing states table, some leak?:

            pfctl -ss or pfctl -vvss

            Just switched again to this firewall, will see ...

            1 Reply Last reply Reply Quote 0
            • R
              Raul Ramos
              last edited by Aug 28, 2023, 6:46 PM

              Hi,

              This happens to me on a Backup pfSense Box. I though was something wrong with HA Settings.
              My normal state table is 20 000, and the thing was already in 200 000.

              pfSense:
              ASRock -> Wolfdale1333-D667 (2GB TeamElite Ram)
              Marvell 88SA8040 Sata to CF(Sandisk 4GB) Controller
              NIC's: RTL8100E (Internal ) and Intel® PRO/1000 PT Dual (Intel 82571GB)

              W 1 Reply Last reply Aug 30, 2023, 9:14 AM Reply Quote 0
              • D
                Dobby_
                last edited by Aug 28, 2023, 7:16 PM

                You should may be change the "State Table size" to another amount, a higher
                I mean here. If you have enough RAM installed that should be not that problem.

                Something is doing there a "mass scan" in your network? You are a gamer
                and scan much for good game server connections?

                If you high up the state table size it will be using much more RAM, but if you
                own or inserted enough of it, you may be better of to march this way here.

                System > Advanced Settings > Firewall & NAT RAM

                State table size2.jpg

                You should have a look inside and what amount is written there in.
                You may be double the amount and monitor the RAM usage again.

                If you are sorted only with small RAM option, 2 GB or 4 GB soldered onboard
                you may be able to set up the "swap" partition to 4 GB or better 8 GB if you
                will be able to realize it.

                #~. @Dobby

                Turris Omnia - 4 Ports - 2 GB RAM / TurrisOS 7 Release (Btrfs)
                PC Engines APU4D4 - 4 Ports - 4 GB RAM / pfSense CE 2.7.2 Release (ZFS)
                PC Engines APU6B4 - 4 Ports - 4 GB RAM / pfSense+ (Plus) 24.03_1 Release (ZFS)

                W 1 Reply Last reply Aug 28, 2023, 8:23 PM Reply Quote 0
                • W
                  w0w @Dobby_
                  last edited by Aug 28, 2023, 8:23 PM

                  @Dobby_
                  There is going nothing. No ip/port scan, no p2p, spambots ddos, whatever. Nothing can generate so much entries in the table in my network. This is definitely some software bug.
                  Btw this is also secondary fw in CARP. Twice it growed when main firewall was in maintenance mode, so it was master.
                  When this happened for the second time, I looked to the Diagnostic -States and did not find those over million states showed on the main page, I saw less then several thousand entries. Then I did reset to states in the GUI, see screenshot above. Nothing changed. This is not the question of table size. I can put there billion state size, this just takes more time to fill it until it full again 🤭

                  1 Reply Last reply Reply Quote 1
                  • W
                    w0w
                    last edited by w0w Aug 29, 2023, 4:48 AM Aug 29, 2023, 4:47 AM

                    9a9e16d6-a9c4-430c-bbbf-cb0b6c0d7e79-image.png
                    at the same time
                    f43da337-7f14-48d3-987e-58ba398795e2-image.png

                    pfctl -ss>/root/dump.txt produces the file with 3441 lines not 1000213 as it theoretically should be. So what are those “ghost” states, @jimp?

                    1 Reply Last reply Reply Quote 0
                    • J
                      jimp Rebel Alliance Developer Netgate
                      last edited by Aug 29, 2023, 12:10 PM

                      Interesting that it doesn't line up. I checked two HA pairs in my lab (one Plus, one CE) and neither of them show that kind of behavior on either node.

                      What does pfctl -si show in its data for states? What about other info there?

                      That's the kind of weirdness I might expect to see if somehow the world and kernel don't match up, like either the kernel isn't being updated and it's running an older kernel, or the kernel updated but the base system didn't.

                      Check the output of pkg -x pfSense and uname -a and see what the output shows on there.

                      Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                      Need help fast? Netgate Global Support!

                      Do not Chat/PM for help!

                      W 2 Replies Last reply Aug 29, 2023, 2:53 PM Reply Quote 0
                      • W
                        w0w @jimp
                        last edited by w0w Aug 29, 2023, 2:57 PM Aug 29, 2023, 2:53 PM

                        @jimp said in Growing states table, some leak?:

                        pfctl -si

                        7db4f057-59da-499c-b3b6-9acfe7ce40e3-image.png

                        @jimp said in Growing states table, some leak?:

                        pkg -x pfSense

                        pkg info? -x does not recognized as command

                        af08d0c9-9174-4725-98a5-4d8819c25981-image.png

                        @jimp said in Growing states table, some leak?:

                        uname -a

                        14.0-ALPHA2 FreeBSD 14.0-ALPHA2 amd64 1400094 #1 plus-devel-main-n256131-b9588f9fb62: Sat Aug 26 18:08:03 UTC 2023     root@freebsd:/var/jenkins/workspace/pfSense-Plus-snapshots-master-main/obj/amd64/iYn5SZ87/var/jenkins/workspace/pfSense-Plus-snapshots-master-main/sources/FreeBSD-src-plus-devel-main/amd64.amd64/sys/pfSense amd64
                        

                        @jimp said in Growing states table, some leak?:

                        Interesting that it doesn't line up.

                        I switched from primary to secondary by putting primary into maintenance mode. May be I did it several times. At the same time I have fatal traps sometimes, it's on the other topic. And there is PPPoE on the WAN1, WAN2 is DHCP. MultiWAN gateway is used

                        1 Reply Last reply Reply Quote 0
                        • W
                          w0w @jimp
                          last edited by Aug 29, 2023, 2:56 PM

                          This post is deleted!
                          1 Reply Last reply Reply Quote 0
                          • J
                            jimp Rebel Alliance Developer Netgate
                            last edited by Aug 29, 2023, 3:49 PM

                            Hmm, a lot of the info in pfctl -si looks suspiciously large.

                            Maintenance mode shouldn't have had any effect on pfsync / state data.

                            The base and kernel seem to match up, though.

                            All that said, PPPoE isn't supported with HA, nor is DHCP, so we don't do any testing in that regard. It's designed for, and only suitable for, static WANs, so who knows what kind of unpredictable results you might have.

                            Doing state sync is worthless in your case without a proper static WAN setup so you may as well disable and see if things stabilize. Without static WANs and proper CARP VIPs on all WANs there is no hope of seamless connection failover so pfsync is just complicating matters.

                            Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                            Need help fast? Netgate Global Support!

                            Do not Chat/PM for help!

                            W 1 Reply Last reply Aug 29, 2023, 4:22 PM Reply Quote 0
                            • W
                              w0w @jimp
                              last edited by Aug 29, 2023, 4:22 PM

                              @jimp said in Growing states table, some leak?:

                              All that said, PPPoE isn't supported with HA, nor is DHCP, so we don't do any testing in that regard. It's designed for, and only suitable for, static WANs, so who knows what kind of unpredictable results you might have.

                              Yes, I know that PPPoE is not supported. I don't use it in CARP anyway. It is controlled by script, when firewall is not primary it just put it down and vise versa, my ISP also bans if I use more than 1 session for a long time.
                              WAN2 is used in CARP. Actually, those DHCPs means static lease on upstream router, so it actually the same all the way. So yes, I use WAN2 CARP IP, this configuration works fine since 2.6 alpha… So what next? Try to disable WAN2 CARP?

                              1 Reply Last reply Reply Quote 0
                              • J
                                jimp Rebel Alliance Developer Netgate
                                last edited by Aug 29, 2023, 7:44 PM

                                Not sure what to suggest since even if they are static in DHCP that's still not a supported configuration. No dynamic WANs are supported.

                                If it worked, consider yourself lucky as it worked by pure luck.

                                The top suspect would be any custom scripts and PPPoE since those are very far from standard.

                                Ideally if anyone else could reproduce it you could find something in common and track down how to reproduce it from a bare minimum configuration. Without more leads, it's difficult to speculate about what might be happening.

                                Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                                Need help fast? Netgate Global Support!

                                Do not Chat/PM for help!

                                W 1 Reply Last reply Aug 30, 2023, 4:21 AM Reply Quote 0
                                • W
                                  w0w @jimp
                                  last edited by Aug 30, 2023, 4:21 AM

                                  @jimp
                                  Ok. Already changed to static. Will try to stop the script also.

                                  1 Reply Last reply Reply Quote 0
                                  • W
                                    w0w @Raul Ramos
                                    last edited by w0w Aug 30, 2023, 9:15 AM Aug 30, 2023, 9:14 AM

                                    @Raul-Ramos
                                    What HA configuration are you using? Do you have some custom scripts enabled?

                                    R 1 Reply Last reply Aug 30, 2023, 7:15 PM Reply Quote 0
                                    • R
                                      Raul Ramos @w0w
                                      last edited by Raul Ramos Aug 30, 2023, 7:17 PM Aug 30, 2023, 7:15 PM

                                      @w0w I do not have any custom scripts. Some packages: HAproxy, FreeRadius, acme, zabbix, wiregard, more two or three, nothing fancy.

                                      My systems are not standard: Two virtualized instances of Proxmox, diferente boxes, similar hardware, each one have dedicated raw device networks (one em(0/1) other igb(0/1)) with 4 or five Vlans.
                                      HA is configured to use Multicast on a VLANs created for SYNC, I tested using a IP but states continue to grow until nothin is usable.

                                      At this moment the main instance is on the 23.05.1, backup is on the 23.09, all good, don't know if the stats are synced correctly, backup instance is 7000 down in stats count.

                                      I change WAN setting to static. I'll test it later.

                                      pfSense:
                                      ASRock -> Wolfdale1333-D667 (2GB TeamElite Ram)
                                      Marvell 88SA8040 Sata to CF(Sandisk 4GB) Controller
                                      NIC's: RTL8100E (Internal ) and Intel® PRO/1000 PT Dual (Intel 82571GB)

                                      R 1 Reply Last reply Sep 1, 2023, 9:16 PM Reply Quote 1
                                      • W
                                        w0w
                                        last edited by w0w Aug 31, 2023, 3:32 AM Aug 31, 2023, 3:31 AM

                                        CARP is configured to use static IPs, custom script is disabled. States are keep growing and NOT cleaned by
                                        c9f283ee-600c-4766-a5eb-1bb9695ecba6-1693246957966-330904f8-1185-4587-88af-ef984b77799b-image.png
                                        it does not log anything also.
                                        If I do

                                        pfctl -F states
                                        

                                        Then it clears a few thousands of states ex 4300, but GUI shows that overall states is 48000 currently. This is happening on both firewalls. Even if it is lower than critical limit.

                                        1 Reply Last reply Reply Quote 0
                                        • M
                                          marcosm Netgate
                                          last edited by marcosm Sep 1, 2023, 10:33 PM Sep 1, 2023, 7:06 PM

                                          Have you tried to reproduce this with a clean install / minimal config? pfctl not clearing all of the states is certainly unexpected.

                                          W 1 Reply Last reply Sep 2, 2023, 9:06 AM Reply Quote 0
                                          6 out of 41
                                          • First post
                                            6/41
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                                            This community forum collects and processes your personal information.
                                            consent.not_received