Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    How to silence logging for packets dropped due to IP options?

    Scheduled Pinned Locked Moved Firewalling
    33 Posts 5 Posters 1.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      SteveITS Galactic Empire @beatvjiking
      last edited by

      @beatvjiking You mentioned doing the filter reload, but that didn't show an error?

      Is the rule shown in /tmp/rules.debug per:
      https://docs.netgate.com/pfsense/en/latest/troubleshooting/firewall.html#ruleset-failing-to-load

      Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
      When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
      Upvote ๐Ÿ‘ helpful posts!

      B 1 Reply Last reply Reply Quote 1
      • B
        beatvjiking @SteveITS
        last edited by beatvjiking

        @SteveITS the rule is shown there, and there are no errors thrown by the filter reload.

        block  quick inet proto igmp  from any to any ridentifier 1721162300 label "USER_RULE: Silent IGMP drop" label "id:1721162300"
        block  quick inet from any to 224.0.0.0/24 ridentifier 1721162354 label "USER_RULE: Silent local multicast drop" label "id:1721162354"
        

        Interestingly, the first 1000000101 rule isn't the default allow. It's:

        # block IPv4 link-local. Per RFC 3927, link local "MUST NOT" be forwarded by a routing device,
        # and clients "MUST NOT" send such packets to a router. FreeBSD won't route 169.254./16, but
        # route-to can override that, causing problems such as in redmine #2073
        block in  quick from 169.254.0.0/16 to any ridentifier 1000000101 label "Block IPv4 link-local"
        

        Another point of interest:

        pass  in  quick  on $LAN inet from $LAN__NETWORK to any ridentifier 0100000101 keep state ( max-src-states 8192  ) label "USER_RULE: Default allow LAN to any rule" label "id:0100000101"
        

        Where the labeling doesn't align with the logs. I did try clearing the logs, and the mislabeling persists.

        johnpozJ 1 Reply Last reply Reply Quote 0
        • johnpozJ
          johnpoz LAYER 8 Global Moderator @beatvjiking
          last edited by

          @beatvjiking

          hmmm

          # and clients "MUST NOT" send such packets to a router. FreeBSD won't route 169.254./16, but
          block in  quick from 169.254.0.0/16 to any ridentifier 1000000101 label "Block IPv4 link-local"
          block in  quick from any to 169.254.0.0/16 ridentifier 1000000102 label "Block IPv4 link-local"
          
          pass  in  quick  on $LAN inet from $LAN__NETWORK to any ridentifier 0100000101 keep state label "USER_RULE: Default allow LAN to any rule" label "id:0100000101"
          

          The rules seem fine to me.. notice the 169.254 rules are 100, where the default lan is 010

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.8, 24.11

          B 1 Reply Last reply Reply Quote 1
          • B
            beatvjiking @johnpoz
            last edited by

            @johnpoz ah yes, I missed that... looked right too quickly :) But yeah, as far as I can tell, everything seems okay. I exported a config backup and scanned the XML by eye and didn't see anything that seemed amiss. I'm not sure why the logging subsystem is identifying the rule as "(@4294967295)," let alone why the blocks keep getting logged. There's no item 4294967295 in the rules.debug file.

            johnpozJ 1 Reply Last reply Reply Quote 0
            • johnpozJ
              johnpoz LAYER 8 Global Moderator @beatvjiking
              last edited by johnpoz

              @beatvjiking I recall something in the past with that number I think..Are you running pfblocker with auto rules? I will have to search but pretty sure there was some other thread(s) where that ID came up in the discussion.

              Your not running UPnP are you?

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              B 1 Reply Last reply Reply Quote 1
              • B
                beatvjiking @johnpoz
                last edited by

                @johnpoz No pfblocker or UPnP. We have one URL alias rule that pulls in the emerging threats list and quickdrops anything bound to those IPs, but we also have that same rule in other locations that don't have this problem.

                Come to think of it, (@4294967295) would indicate an overflow in a 32-bit value, right?

                johnpozJ 1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator @beatvjiking
                  last edited by

                  @beatvjiking seems something like that yeah.

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  1 Reply Last reply Reply Quote 0
                  • E
                    ex1580
                    last edited by

                    Thanks for posting this! I was seeing some IGMP packets at one of my clients sites and created a rule to suppress the logging. Then I came here to see if anyone else was seeing this. I still think it's odd that a rule with logging tuned off can still log. Anyway, problem solved.

                    S 1 Reply Last reply Reply Quote 0
                    • S
                      SteveITS Galactic Empire @ex1580
                      last edited by SteveITS

                      @ex1580 said in How to silence logging for packets dropped due to IP options?:

                      still think it's odd that a rule with logging tuned off can still log.

                      It's a "feature" added in 24.03 I believe.
                      https://docs.netgate.com/pfsense/en/latest/troubleshooting/log-filter-blocked.html#packets-with-ip-options

                      Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                      When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                      Upvote ๐Ÿ‘ helpful posts!

                      E 1 Reply Last reply Reply Quote 0
                      • E
                        ex1580 @SteveITS
                        last edited by ex1580

                        @SteveITS said in How to silence logging for packets dropped due to IP options?:

                        https://docs.netgate.com/pfsense/en/latest/troubleshooting/log-filter-blocked.html#packets-with-ip-options

                        Thanks for the link Steve! I normally expect a packet that doesn't match an allow rule to be passed on to the next rule. I suppose in this instance it "kinda" matches (source/destination match but the IP Option is not allowed).

                        I have not come across a reason to need to allow IP Options at the firewall on any of my networks so I guess the rule to block those packets will end up in my standard configuration less the firewall log get filled with garbage. ๐Ÿ˜ƒ

                        S 1 Reply Last reply Reply Quote 0
                        • S
                          SteveITS Galactic Empire @ex1580
                          last edited by

                          @ex1580 I suppose, if it didn't match the allow, it would fall through to the default block rule which could also be confusing because one might expect it to match the allow rule. Not logging a block might also be confusing. Adding a block rule to every interface on every router by default is probably also not great. I would guess, there wasn't a great solution.

                          We have also started adding the rule as we upgrade client routers.

                          Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                          When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                          Upvote ๐Ÿ‘ helpful posts!

                          johnpozJ 1 Reply Last reply Reply Quote 1
                          • johnpozJ
                            johnpoz LAYER 8 Global Moderator @SteveITS
                            last edited by

                            What sort of devices are generating this traffic? I had to craft specific igmp traffic to see this rule kick in.. But yeah with @SteveITS not sure what other sort of way to do this that would be better.

                            Blocking the traffic that has IP options set unless specifically allowed is a good thing.. But how to show that in the log that wouldn't confuse the typical user is the hard part.

                            The only thing that might be an improvement.. Is a check box in the logging setup, you know where you can disable logging of say the default deny, rfc and bogon rules, etc. They could add say add a don't log block of igmp that has IP options set, or something like that.

                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                            If you get confused: Listen to the Music Play
                            Please don't Chat/PM me for help, unless mod related
                            SG-4860 24.11 | Lab VMs 2.8, 24.11

                            S ahking19A B 3 Replies Last reply Reply Quote 1
                            • S
                              SteveITS Galactic Empire @johnpoz
                              last edited by

                              @johnpoz said in How to silence logging for packets dropped due to IP options?:

                              What sort of devices are generating this traffic?

                              I have not tried to track it down, tbh, but it's on every network so far, that is on 24.03.

                              A checkbox would be handy. I think, it would always need to be the last rule? And/or hidden. And/or made clear it doesn't affect logging of not-the-last-rule rules.

                              The down side to all this is, the constant logging on eMMC storage which has a more limited write life than SSD. (which is why we always turn off the default block logging)

                              Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                              When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                              Upvote ๐Ÿ‘ helpful posts!

                              1 Reply Last reply Reply Quote 0
                              • E
                                ex1580
                                last edited by

                                I like the checkbox idea!

                                As for what is causing the traffic I do not know, but I would guess it's some sort of media software similar to bonjour.

                                johnpozJ 1 Reply Last reply Reply Quote 0
                                • johnpozJ
                                  johnpoz LAYER 8 Global Moderator @ex1580
                                  last edited by

                                  Yeah I am not a fan of multicast noise to be honest, I have some stuff that generates it that I can disable it at the device - freaking plex! ;) so I block the noise makers at the switch level. But I don't block that specific igmp traffic - but yeah noise makers can be "noisy" ;)

                                  I don't log default either - I have the rules in place to log what I want to log.. ie syn traffic to my wan for example, common udp ports.. Just because I am curious to see it..

                                  But I would be curious to what is sending out igmp with options - since I don't see any of that on my network.. But yeah I am sure there could be many noise making applications or devices.. I can understand why unwanted things in the logs can be problematic - logs filled with noise make it harder to see the interesting log entries, etc.

                                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                                  If you get confused: Listen to the Music Play
                                  Please don't Chat/PM me for help, unless mod related
                                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                                  1 Reply Last reply Reply Quote 0
                                  • ahking19A
                                    ahking19 @johnpoz
                                    last edited by

                                    @johnpoz I found it on my network coming from my Unifi switch. Specifically the IGMP snooping setting under networks.
                                    network.png

                                    johnpozJ 1 Reply Last reply Reply Quote 0
                                    • johnpozJ
                                      johnpoz LAYER 8 Global Moderator @ahking19
                                      last edited by

                                      @ahking19 ah yeah that would do it ;) Since I don't use any multicast on my network - there is little reason to have switches and or AP be doing any snooping of it ;) heheh

                                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                                      If you get confused: Listen to the Music Play
                                      Please don't Chat/PM me for help, unless mod related
                                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                                      1 Reply Last reply Reply Quote 0
                                      • B
                                        beatvjiking @johnpoz
                                        last edited by

                                        @johnpoz there are lots of bonjour devices that rely on this traffic. We use conference room presentation systems that rely on the traffic for clients to mirror screens wirelessly. Otherwise I'd block it at the switch level and forget about it :)

                                        johnpozJ 1 Reply Last reply Reply Quote 0
                                        • johnpozJ
                                          johnpoz LAYER 8 Global Moderator @beatvjiking
                                          last edited by

                                          @beatvjiking said in How to silence logging for packets dropped due to IP options?:

                                          lots of bonjour devices

                                          Noise bots ;)

                                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                                          If you get confused: Listen to the Music Play
                                          Please don't Chat/PM me for help, unless mod related
                                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                                          1 Reply Last reply Reply Quote 0
                                          • First post
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.