Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Unresolvable source alias after upgrade to 23.09

    Scheduled Pinned Locked Moved Firewalling
    27 Posts 9 Posters 3.6k Views 10 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • C Offline
      csardoss
      last edited by

      I am also having simaler problem after updating. I have created a Custom Alias called Huntress and use the below URL to pull URl's from my GitHub. I get an error that says "Unresolvable destination alias 'Huntress' for rule 'Huntress Allow'". This rule was working before I upgraded (Previous v23.05.1).

      https://raw.githubusercontent.com/csardoss/pflist/main/huntrss.io_list.txt

      Screenshot 2023-11-06 at 6.24.21 PM.png

      M 1 Reply Last reply Reply Quote 1
      • S Offline
        SteveITS Rebel Alliance @SteveITS
        last edited by

        re: ZFS filling the drive:
        https://forum.netgate.com/topic/181961/netgate-4100-out-of-disk

        bectl list
        bectl destroy auto-default-20230629155043

        after freeing space, one can revert and re-upgrade:
        https://docs.netgate.com/pfsense/en/latest/backup/zfsbe/loader.html

        Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
        When upgrading, allow 10-15 minutes to reboot, or more depending on packages, and device or disk speed.
        Upvote 👍 helpful posts!

        1 Reply Last reply Reply Quote 1
        • M Offline
          monsen
          last edited by monsen

          Don't want to hijack the troubleshooting here, but just wanted to chime in that the exact same thing happened on my device after doing the upgrade to 23.09 as well. I get the error on all my regular url aliases, but not on my url table ones. Seems like this is happening to multiple people. (No pfBlockerNG here either). The aliases themselves update just fine, seems like it is just the firewall not able to get them properly.

          1 Reply Last reply Reply Quote 1
          • S Offline
            SteveITS Rebel Alliance @LinkP
            last edited by SteveITS

            @LinkP said in Unresolvable source alias after upgrade to 23.09:

            Unresolvable source alias

            FWIW they have four fixes for aliases:
            https://docs.netgate.com/pfsense/en/latest/releases/23-09.html#aliases-tables

            ¯\_(ツ)_/¯

            Edit: meaning the code changed, may have broken something

            Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
            When upgrading, allow 10-15 minutes to reboot, or more depending on packages, and device or disk speed.
            Upvote 👍 helpful posts!

            S 1 Reply Last reply Reply Quote 2
            • S Offline
              SteveITS Rebel Alliance @SteveITS
              last edited by

              Someone with this can file a report at redmine.pfsense.org

              Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
              When upgrading, allow 10-15 minutes to reboot, or more depending on packages, and device or disk speed.
              Upvote 👍 helpful posts!

              M 1 Reply Last reply Reply Quote 2
              • M Offline
                MoonKnight @csardoss
                last edited by MoonKnight

                @csardoss said in Unresolvable source alias after upgrade to 23.09:

                I am also having simaler problem after updating. I have created a Custom Alias called Huntress and use the below URL to pull URl's from my GitHub. I get an error that says "Unresolvable destination alias 'Huntress' for rule 'Huntress Allow'". This rule was working before I upgraded (Previous v23.05.1).

                https://raw.githubusercontent.com/csardoss/pflist/main/huntrss.io_list.txt

                Screenshot 2023-11-06 at 6.24.21 PM.png

                Got the same error when my Alias was using URL (IPs). Then I change TYPE from URL (IPs) to URL Tables (IPs) and error gone.

                --- 25.07 ---
                Intel(R) Xeon(R) CPU D-1518 @ 2.20GHz
                Kingston DDR4 2666MHz 16GB ECC
                2 x HyperX Fury SSD 120GB (ZFS-mirror)
                2 x Intel i210 (ports)
                4 x Intel i350 (ports)

                1 Reply Last reply Reply Quote 0
                • M Offline
                  monsen @SteveITS
                  last edited by monsen

                  Reported here: https://redmine.pfsense.org/issues/14947

                  1 Reply Last reply Reply Quote 3
                  • S SteveITS referenced this topic on
                  • L Offline
                    LegsAJimbo
                    last edited by LegsAJimbo

                    Same issue here. URL Aliases can no longer be selected when creating a NAT rule, but can be selected when creating a firewall rule.

                    We had a NAT rule allowing only Cloudflare to access our on-prem webserver, which was broken by the update. In the meantime we have created a new alias with the IP's entered manually rather than pulling from https://www.cloudflare.com/ips-v4

                    Please could this be added to breaking changes here: https://docs.netgate.com/pfsense/en/latest/releases/23-09.html

                    bfe08d84-6417-400e-80d9-22292dedf7e2-image.png

                    S 1 Reply Last reply Reply Quote 1
                    • M Offline
                      MoonKnight
                      last edited by MoonKnight

                      Hi,
                      I don't have any problems like that on any of my Alias.
                      What is the different between "URL (IPs)" and "URL Table (IPs) in the Alias on the TYPE?

                      This is an example of my Cloudflare Alias I use.
                      4797850e-fb5e-49d6-ae72-08491229daf4-image.png

                      EDIT: Found it :)

                      ff67be66-c103-47ad-8556-5b482623ed7a-image.png

                      --- 25.07 ---
                      Intel(R) Xeon(R) CPU D-1518 @ 2.20GHz
                      Kingston DDR4 2666MHz 16GB ECC
                      2 x HyperX Fury SSD 120GB (ZFS-mirror)
                      2 x Intel i210 (ports)
                      4 x Intel i350 (ports)

                      L 1 Reply Last reply Reply Quote 0
                      • L Offline
                        LegsAJimbo @MoonKnight
                        last edited by

                        @MoonKnight Ah, yes! URL Table(IPs) work, URL (IPs) does not!

                        Difference is explained here: https://docs.netgate.com/pfsense/en/latest/firewall/aliases.html#url-aliases

                        That's a much better workaround, thanks!

                        1 Reply Last reply Reply Quote 1
                        • S Offline
                          SteveITS Rebel Alliance @LegsAJimbo
                          last edited by

                          There's a patch in the above redmine so someone can test this by using System Patches and the ID in the redmine, a6cf534d0fa0297547f1e587a12729f9d7066bae.

                          Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                          When upgrading, allow 10-15 minutes to reboot, or more depending on packages, and device or disk speed.
                          Upvote 👍 helpful posts!

                          C 1 Reply Last reply Reply Quote 3
                          • C Offline
                            csardoss @SteveITS
                            last edited by

                            @SteveITS This patch worked for me. Thank you

                            1 Reply Last reply Reply Quote 0
                            • LinkPL Offline
                              LinkP
                              last edited by

                              The patch works for me, too. Thanks for the quick turnaround.

                              S I 2 Replies Last reply Reply Quote 0
                              • S Offline
                                SteveITS Rebel Alliance @LinkP
                                last edited by

                                I would think it would show up in a System Patches package update in the next week or two. Another reason I wait a week or two to upgrade... 😁 Jim usually posts in https://forum.netgate.com/category/16/pfsense-packages.

                                I didn't have anything to do with the patch, I just posted it for y'all. If you set up a redmine account you can Watch an open case for updates.

                                re: table aliases, they also can have over 3000 entries.

                                Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                                When upgrading, allow 10-15 minutes to reboot, or more depending on packages, and device or disk speed.
                                Upvote 👍 helpful posts!

                                1 Reply Last reply Reply Quote 0
                                • I Offline
                                  infamousbug @LinkP
                                  last edited by infamousbug

                                  @LinkP How do you apply the patch using System Patches? I added the url https://redmine.pfsense.org/projects/pfsense/repository/2/revisions/a6cf534d0fa0297547f1e587a12729f9d7066bae to a custom patch, but it fails. What am I missing?

                                  4e7803c6-641d-424c-967a-65abcda63323-image.png

                                  S 1 Reply Last reply Reply Quote 0
                                  • S Offline
                                    SteveITS Rebel Alliance @infamousbug
                                    last edited by

                                    @infamousbug Just use the ID there: a6cf534d0fa0297547f1e587a12729f9d7066bae

                                    There's a URL for the actual patch file somewhere in Github but it's easier to use the ID.

                                    Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                                    When upgrading, allow 10-15 minutes to reboot, or more depending on packages, and device or disk speed.
                                    Upvote 👍 helpful posts!

                                    LinkPL I 2 Replies Last reply Reply Quote 2
                                    • LinkPL Offline
                                      LinkP @SteveITS
                                      last edited by

                                      @infamousbug, as @SteveITS has pointed out, you only need use the commit ID. The patch system knows to use the correct Github repo.

                                      I added a description of Support URL IP aliases in alias_expand() that I gleaned from the commit and enabled the Auto Apply checkbox before I saved it.

                                      Once you have fetched and applied the patch, you will need to reload the firewall. I disabled and re-enabled my rule that used the affected alias to trigger the Apply Changes button to appear.

                                      1 Reply Last reply Reply Quote 1
                                      • I Offline
                                        infamousbug @SteveITS
                                        last edited by

                                        @SteveITS said in Unresolvable source alias after upgrade to 23.09:

                                        @infamousbug Just use the ID there: a6cf534d0fa0297547f1e587a12729f9d7066bae

                                        There's a URL for the actual patch file somewhere in Github but it's easier to use the ID.

                                        @SteveITS @LinkP I got it, thanks for the quick reply!

                                        1 Reply Last reply Reply Quote 1
                                        • First post
                                          Last post
                                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.