Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Rule order bug?

    Scheduled Pinned Locked Moved Firewalling
    27 Posts 6 Posters 1.6k Views 6 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • GertjanG Offline
      Gertjan @fero1233
      last edited by Gertjan

      @fero1233 said in Rule order bug?:

      But this morning, it was all re-arranged again.

      have a look at the "config.xml" file.
      There is a section that start with :
      79cccaff-0db0-4fae-a6f6-2afc8ef9a99d-image.png

      From then on, for every interface (WAN is called WAN, LAN is called LAN, the second LAN is called opt1, etc), in order ( ! ), you rules are listed as they should list in the GUI, and way more important, in the order the firewall rules are listed in 'pf'.

      Having a last "pass all" rule, and then it gets listed at the top, that's a security issue (for me).

      So : question : is the order in the config.xml also changed ?
      If so, that would explain the miss ordering.
      The question now becomes : who/what is saving the config, and what impacts the the firewall rules to be ordered differently ?

      What pfSense packages do you have installed ?

      No "help me" PM's please. Use the forum, the community will thank you.
      Edit : and where are the logs ??

      F 1 Reply Last reply Reply Quote 0
      • F Offline
        fero1233 @Gertjan
        last edited by

        @Gertjan

        In config, it is also wrong order today. It was correct yesterday just after update/reboot/edit/save/apply

        But i found this in config:
        <revision>
        <time>1707220801</time>
        <description><![CDATA[(system): pfBlockerNG: saving DNSBL changes]]></description>
        <username><![CDATA[(system)]]></username>

        And i am using pfblocker. So wondering if it is pfblocker, that changes the firewall(?) I might wanna try disable it.

        Other plugins
        43d0ba4f-4183-486b-8a21-6e33a575a8f5-image.png

        V 1 Reply Last reply Reply Quote 0
        • V Offline
          viragomann @fero1233
          last edited by

          @fero1233 said in Rule order bug?:

          And i am using pfblocker. So wondering if it is pfblocker, that changes the firewall(?) I might wanna try disable it.

          pfBlockerNG creates rules and rearrange the order on each update according due its settings. That's why I asked, if your have manually created the rules in my second question.

          F 1 Reply Last reply Reply Quote 0
          • F Offline
            fero1233 @viragomann
            last edited by

            @viragomann said in Rule order bug?:

            That's why I asked, if your have manually created the rules

            Yes, on this interface all rules are created manually. There are no pfblocker rules at all, on this interface.

            S 1 Reply Last reply Reply Quote 0
            • S Offline
              SteveITS Rebel Alliance @fero1233
              last edited by

              @fero1233 IIRC pfBlocker logs a config change at every cron interval. Is that when the reordering happens? Disable/reschedule its update to double check.

              Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
              When upgrading, allow 10-15 minutes to reboot, or more depending on packages, and device or disk speed.
              Upvote ๐Ÿ‘ helpful posts!

              F 1 Reply Last reply Reply Quote 0
              • F Offline
                fero1233 @SteveITS
                last edited by

                @SteveITS said in Rule order bug?:

                Disable/reschedule its update to double check

                I have completely disabled pfblocker for now, to test.
                Will let it run like this, for a day or so. And if it works, i will try to look in to, if it is posible to disable update on that specific interface.

                JeGrJ 1 Reply Last reply Reply Quote 0
                • JeGrJ Offline
                  JeGr LAYER 8 Moderator @fero1233
                  last edited by

                  @fero1233 said in Rule order bug?:

                  I have completely disabled pfblocker for now, to test.
                  Will let it run like this, for a day or so. And if it works, i will try to look in to, if it is posible to disable update on that specific interface.

                  One thing we cannot see as you cropped the image that way is if that allow any rule is the default allow any from the LAN interface or if it's one you created yourself.
                  So another thing you can try would be to actually create another "pass any any" rule with a custom description so you know which one is which. Then move that below the Blocks and check if only the default/old allow is getting pushed up or if the blocks are actually pushed down to the bottom.

                  Rule order switching is a thing I've only ever seen with pfBlocker moving rules to the top/bottom when creating automatic rules, but normally it only touches rules with "pfB_xy" aliases in them. So that would be weird. Also one thing you could check is the "Backup & Restore" / Config History Tab in case something is rolling back your configuration because of an error or something (or if someone/-thing commits a new config) - that should show who/what changes the config and why.

                  Cheers

                  Don't forget to upvote ๐Ÿ‘ those who kindly offered their time and brainpower to help you!

                  If you're interested, I'm available to discuss details of German-speaking paid support (for companies) if needed.

                  F 1 Reply Last reply Reply Quote 0
                  • F Offline
                    fero1233 @JeGr
                    last edited by

                    @JeGr said in Rule order bug?:

                    One thing we cannot see as you cropped the image that way

                    There is nothing else.

                    This is the full image, after using RFC rule instead

                    fdf3c897-bb79-4cb8-a711-68a6f27d02dc-image.png

                    So i re-enabled pfblocker again, and then removed "Guest" interface from "outbound Firewall Rules" in pfblocker
                    ,as i really only need pfblocker on wan interface - and then it seems to be staying in order.

                    80811ea7-0749-4682-8cff-4e8b05e14f29-image.png

                    So for future refrence: pfblocker is the problem, and the solution is to remove that specific interface from "outbound firewall rules" in pfblocker :)

                    S JeGrJ 2 Replies Last reply Reply Quote 1
                    • S Offline
                      SteveITS Rebel Alliance @fero1233
                      last edited by SteveITS

                      @fero1233 Did you change pfB off the default option? see:
                      74c71bc5-79ae-4162-937a-4283581eee33-image.png

                      Edit: if I ever don't want the default "block on top" I create lists as Alias Native which then allows me to create my own rules however I want.

                      There's not a default allow any rule on networks aside from LAN.

                      Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                      When upgrading, allow 10-15 minutes to reboot, or more depending on packages, and device or disk speed.
                      Upvote ๐Ÿ‘ helpful posts!

                      1 Reply Last reply Reply Quote 0
                      • JeGrJ Offline
                        JeGr LAYER 8 Moderator @fero1233
                        last edited by

                        @fero1233 said in Rule order bug?:

                        So for future refrence: pfblocker is the problem, and the solution is to remove that specific interface from "outbound firewall rules" in pfblocker :)

                        Or even better: Don't use automatic rules at all, as the options are quite limited with the moving around of rules.

                        Just set the IP Lists to "Alias Deny" or "Permit" etc. instead of "Block Deny" and just create your own rules with the pfB_xy Aliases to reject or block or allow traffic as needed. Especially when having larger or more complex rulesets, that's definetly necessary.

                        Cheers

                        Don't forget to upvote ๐Ÿ‘ those who kindly offered their time and brainpower to help you!

                        If you're interested, I'm available to discuss details of German-speaking paid support (for companies) if needed.

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.