Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Unresolvable source alias after upgrade to 23.09

    Scheduled Pinned Locked Moved Firewalling
    27 Posts 9 Posters 2.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • Bob.DigB
      Bob.Dig LAYER 8 @LinkP
      last edited by

      @LinkP With pfBlocker I see no problems with that alias source.

      LinkPL 1 Reply Last reply Reply Quote 0
      • LinkPL
        LinkP @Bob.Dig
        last edited by

        @Bob-Dig This is just a standard firewall rule, not pfBlocker.

        In /tmp/rules.debug in the 23.05.1 node, I see the expected rule generated, but in the 23.09 node I see # Unresolvable source alias 'UptimeRobot' for rule 'Allow Uptime Robot pings' label "USER_RULE: Allow Uptime Robot pings" where the generated rule should be.

        Example rules (with redacted IPs) from working 23.05.1 node:

        pass  in  quick  on {  vtnet0  } reply-to ( vtnet0 X.X.X.X ) inet proto icmp  from $UptimeRobot to (self) icmp-type echoreq ridentifier 1560989549 keep state label "USER_RULE: Allow Uptime Robot pings" label "id:1560989549"
        pass  in  quick  on {  vtnet0  } reply-to ( vtnet0 fe80::dead:beef:1%vtnet0 ) inet6 proto ipv6-icmp  from $UptimeRobot to (self) icmp6-type echoreq ridentifier 1560989549 keep state label "USER_RULE: Allow Uptime Robot pings" label "id:1560989549"
        
        M 1 Reply Last reply Reply Quote 0
        • M
          mcury @LinkP
          last edited by

          @LinkP Try to force an update in pfblockerNG

          dead on arrival, nowhere to be found.

          LinkPL 1 Reply Last reply Reply Quote 0
          • LinkPL
            LinkP @mcury
            last edited by

            @mcury What does pfBlockerNG have to do with this? This a regular firewall rule, not a pfBlocker rule.

            The problem is now present in the other node following an upgrade from 23.05.1 to 23.09.

            M M 2 Replies Last reply Reply Quote 0
            • M
              MoonKnight @LinkP
              last edited by

              @LinkP said in Unresolvable source alias after upgrade to 23.09:

              @mcury What does pfBlockerNG have to do with this? This a regular firewall rule, not a pfBlocker rule.

              The problem is now present in the other node following an upgrade from 23.05.1 to 23.09.

              Hi,
              Did you try to make the Alias like this:
              eca105fb-296f-4d97-952d-67ee690dc3a9-image.png

              --- 24.11 ---
              Intel(R) Xeon(R) CPU D-1518 @ 2.20GHz
              Kingston DDR4 2666MHz 16GB ECC
              2 x HyperX Fury SSD 120GB (ZFS-mirror)
              2 x Intel i210 (ports)
              4 x Intel i350 (ports)

              1 Reply Last reply Reply Quote 0
              • M
                mcury @LinkP
                last edited by

                @LinkP said in Unresolvable source alias after upgrade to 23.09:

                What does pfBlockerNG have to do with this?

                I thought that this alias was created by pfblockerNG, my mistake.

                dead on arrival, nowhere to be found.

                LinkPL 1 Reply Last reply Reply Quote 0
                • LinkPL
                  LinkP @mcury
                  last edited by LinkP

                  I have put a pin in this as I have a much bigger problem now. The other node appears to have lost track of 85% of its disk and is only showing a 1.5GB volume mounted at / and is completely full.

                  I should not have been so enthusiastic about upgrading to 23.09.

                  Edited to update: The disk issue was related to ZFS Boot Environments

                  H/T to @SteveITS for pointing me to these posts:
                  https://forum.netgate.com/post/1132635
                  https://forum.netgate.com/post/1118798

                  S 1 Reply Last reply Reply Quote 0
                  • S
                    SteveITS Galactic Empire @LinkP
                    last edited by SteveITS

                    @LinkP said in Unresolvable source alias after upgrade to 23.09:

                    I have put a pin in this a I have a much bigger problem now. The other node appears to have lost track of 85% of its disk and is only showing a 1.5GB volume mounted at / and is completely full.

                    Hi Link. :)

                    If this is Netgate hardware pfSense Plus it may have leftover boot environments.
                    https://docs.netgate.com/pfsense/en/latest/backup/zfsbe/space.html
                    https://docs.netgate.com/pfsense/en/latest/troubleshooting/filesystem-shrink.html

                    I don't know if pfSense is supposed to be cleaning up old ones, and if so at what interval, but I've seen a few posts where it seems not to...

                    @LinkP said in Unresolvable source alias after upgrade to 23.09:

                    Unresolvable source alias 'UptimeRobot'

                    Does Diagnostics/Tables show it?

                    Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                    When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                    Upvote 👍 helpful posts!

                    S 1 Reply Last reply Reply Quote 1
                    • C
                      csardoss
                      last edited by

                      I am also having simaler problem after updating. I have created a Custom Alias called Huntress and use the below URL to pull URl's from my GitHub. I get an error that says "Unresolvable destination alias 'Huntress' for rule 'Huntress Allow'". This rule was working before I upgraded (Previous v23.05.1).

                      https://raw.githubusercontent.com/csardoss/pflist/main/huntrss.io_list.txt

                      Screenshot 2023-11-06 at 6.24.21 PM.png

                      M 1 Reply Last reply Reply Quote 1
                      • S
                        SteveITS Galactic Empire @SteveITS
                        last edited by

                        re: ZFS filling the drive:
                        https://forum.netgate.com/topic/181961/netgate-4100-out-of-disk

                        bectl list
                        bectl destroy auto-default-20230629155043

                        after freeing space, one can revert and re-upgrade:
                        https://docs.netgate.com/pfsense/en/latest/backup/zfsbe/loader.html

                        Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                        When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                        Upvote 👍 helpful posts!

                        1 Reply Last reply Reply Quote 1
                        • M
                          monsen
                          last edited by monsen

                          Don't want to hijack the troubleshooting here, but just wanted to chime in that the exact same thing happened on my device after doing the upgrade to 23.09 as well. I get the error on all my regular url aliases, but not on my url table ones. Seems like this is happening to multiple people. (No pfBlockerNG here either). The aliases themselves update just fine, seems like it is just the firewall not able to get them properly.

                          1 Reply Last reply Reply Quote 1
                          • S
                            SteveITS Galactic Empire @LinkP
                            last edited by SteveITS

                            @LinkP said in Unresolvable source alias after upgrade to 23.09:

                            Unresolvable source alias

                            FWIW they have four fixes for aliases:
                            https://docs.netgate.com/pfsense/en/latest/releases/23-09.html#aliases-tables

                            ¯\_(ツ)_/¯

                            Edit: meaning the code changed, may have broken something

                            Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                            When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                            Upvote 👍 helpful posts!

                            S 1 Reply Last reply Reply Quote 2
                            • S
                              SteveITS Galactic Empire @SteveITS
                              last edited by

                              Someone with this can file a report at redmine.pfsense.org

                              Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                              When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                              Upvote 👍 helpful posts!

                              M 1 Reply Last reply Reply Quote 2
                              • M
                                MoonKnight @csardoss
                                last edited by MoonKnight

                                @csardoss said in Unresolvable source alias after upgrade to 23.09:

                                I am also having simaler problem after updating. I have created a Custom Alias called Huntress and use the below URL to pull URl's from my GitHub. I get an error that says "Unresolvable destination alias 'Huntress' for rule 'Huntress Allow'". This rule was working before I upgraded (Previous v23.05.1).

                                https://raw.githubusercontent.com/csardoss/pflist/main/huntrss.io_list.txt

                                Screenshot 2023-11-06 at 6.24.21 PM.png

                                Got the same error when my Alias was using URL (IPs). Then I change TYPE from URL (IPs) to URL Tables (IPs) and error gone.

                                --- 24.11 ---
                                Intel(R) Xeon(R) CPU D-1518 @ 2.20GHz
                                Kingston DDR4 2666MHz 16GB ECC
                                2 x HyperX Fury SSD 120GB (ZFS-mirror)
                                2 x Intel i210 (ports)
                                4 x Intel i350 (ports)

                                1 Reply Last reply Reply Quote 0
                                • M
                                  monsen @SteveITS
                                  last edited by monsen

                                  Reported here: https://redmine.pfsense.org/issues/14947

                                  1 Reply Last reply Reply Quote 3
                                  • S SteveITS referenced this topic on
                                  • L
                                    LegsAJimbo
                                    last edited by LegsAJimbo

                                    Same issue here. URL Aliases can no longer be selected when creating a NAT rule, but can be selected when creating a firewall rule.

                                    We had a NAT rule allowing only Cloudflare to access our on-prem webserver, which was broken by the update. In the meantime we have created a new alias with the IP's entered manually rather than pulling from https://www.cloudflare.com/ips-v4

                                    Please could this be added to breaking changes here: https://docs.netgate.com/pfsense/en/latest/releases/23-09.html

                                    bfe08d84-6417-400e-80d9-22292dedf7e2-image.png

                                    S 1 Reply Last reply Reply Quote 1
                                    • M
                                      MoonKnight
                                      last edited by MoonKnight

                                      Hi,
                                      I don't have any problems like that on any of my Alias.
                                      What is the different between "URL (IPs)" and "URL Table (IPs) in the Alias on the TYPE?

                                      This is an example of my Cloudflare Alias I use.
                                      4797850e-fb5e-49d6-ae72-08491229daf4-image.png

                                      EDIT: Found it :)

                                      ff67be66-c103-47ad-8556-5b482623ed7a-image.png

                                      --- 24.11 ---
                                      Intel(R) Xeon(R) CPU D-1518 @ 2.20GHz
                                      Kingston DDR4 2666MHz 16GB ECC
                                      2 x HyperX Fury SSD 120GB (ZFS-mirror)
                                      2 x Intel i210 (ports)
                                      4 x Intel i350 (ports)

                                      L 1 Reply Last reply Reply Quote 0
                                      • L
                                        LegsAJimbo @MoonKnight
                                        last edited by

                                        @MoonKnight Ah, yes! URL Table(IPs) work, URL (IPs) does not!

                                        Difference is explained here: https://docs.netgate.com/pfsense/en/latest/firewall/aliases.html#url-aliases

                                        That's a much better workaround, thanks!

                                        1 Reply Last reply Reply Quote 1
                                        • S
                                          SteveITS Galactic Empire @LegsAJimbo
                                          last edited by

                                          There's a patch in the above redmine so someone can test this by using System Patches and the ID in the redmine, a6cf534d0fa0297547f1e587a12729f9d7066bae.

                                          Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                                          When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                                          Upvote 👍 helpful posts!

                                          C 1 Reply Last reply Reply Quote 3
                                          • C
                                            csardoss @SteveITS
                                            last edited by

                                            @SteveITS This patch worked for me. Thank you

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.