Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Logging my daily changing WAN-address

    Scheduled Pinned Locked Moved General pfSense Questions
    41 Posts 7 Posters 2.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • fireodoF
      fireodo
      last edited by fireodo

      Hi,

      i found a solution everybody interested is invited to try :-)

      I made a shell script file called "logip" with following content:

      #!/bin/sh
      
      # IP-Logging
      cat /tmp/pppoe0_ip >> /root/iplog/iplog.log
      date >> /root/iplog/iplog.log
      
      

      and placed in "/root/bin/" and made it executable.

      After that I modified (attention - this is a original pfsense file!!!) the file "/etc/rc.newwanip" attaching at the end (before the "?>" this line of code:

      shell_exec('/root/bin/logip');
      

      The rc.newwanip is executed each time the system gets a new WAN IP so it should work. (I tested here and it works).
      The "bad" thing is that the "rc.newwanip" has to be edited each time the system gets an upgrade/update ...
      If someone gets a more "elegant" solution I'am open to it :-)

      Regards,
      fireodo

      Kettop Mi4300YL CPU: i5-4300Y @ 1.60GHz RAM: 8GB Ethernet Ports: 4
      SSD: SanDisk pSSD-S2 16GB (ZFS) WiFi: WLE200NX
      pfsense 2.8.0 CE
      Packages: Apcupsd, Cron, Iftop, Iperf, LCDproc, Nmap, pfBlockerNG, RRD_Summary, Shellcmd, Snort, Speedtest, System_Patches.

      1 Reply Last reply Reply Quote 2
      • stephenw10S
        stephenw10 Netgate Administrator
        last edited by

        You could create a patch that adds that line to rc.newwanip and set it to auto-apply.

        fireodoF 1 Reply Last reply Reply Quote 2
        • fireodoF
          fireodo @stephenw10
          last edited by fireodo

          @stephenw10 said in [somewhat solved] Easy solution for logging my daily changing WAN-address:

          You could create a patch that adds that line to rc.newwanip and set it to auto-apply.

          Yes that would be an option!

          But now I found a new "problem": Snort cannot handle the pppoe0 interface (with if_pppoe) and exits with this error:
          "FATAL ERROR: Cannot decode data link type 51"
          so there is more work to do 😉 I switched back to "mpd" because i need Snort working ... 🤓

          Kettop Mi4300YL CPU: i5-4300Y @ 1.60GHz RAM: 8GB Ethernet Ports: 4
          SSD: SanDisk pSSD-S2 16GB (ZFS) WiFi: WLE200NX
          pfsense 2.8.0 CE
          Packages: Apcupsd, Cron, Iftop, Iperf, LCDproc, Nmap, pfBlockerNG, RRD_Summary, Shellcmd, Snort, Speedtest, System_Patches.

          1 Reply Last reply Reply Quote 0
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by

            Hmm, using in-line mode?

            fireodoF 1 Reply Last reply Reply Quote 0
            • fireodoF
              fireodo @stephenw10
              last edited by

              @stephenw10 said in [somewhat solved] Easy solution for logging my daily changing WAN-address:

              Hmm, using in-line mode?

              No, legacy mode ...

              Kettop Mi4300YL CPU: i5-4300Y @ 1.60GHz RAM: 8GB Ethernet Ports: 4
              SSD: SanDisk pSSD-S2 16GB (ZFS) WiFi: WLE200NX
              pfsense 2.8.0 CE
              Packages: Apcupsd, Cron, Iftop, Iperf, LCDproc, Nmap, pfBlockerNG, RRD_Summary, Shellcmd, Snort, Speedtest, System_Patches.

              1 Reply Last reply Reply Quote 0
              • stephenw10S
                stephenw10 Netgate Administrator
                last edited by

                OK digging....

                fireodoF 1 Reply Last reply Reply Quote 1
                • fireodoF
                  fireodo @stephenw10
                  last edited by

                  @stephenw10 said in [somewhat solved] Easy solution for logging my daily changing WAN-address:

                  OK digging....

                  I have post a question also in IDS/IPS adressed to Bill Meeks

                  Kettop Mi4300YL CPU: i5-4300Y @ 1.60GHz RAM: 8GB Ethernet Ports: 4
                  SSD: SanDisk pSSD-S2 16GB (ZFS) WiFi: WLE200NX
                  pfsense 2.8.0 CE
                  Packages: Apcupsd, Cron, Iftop, Iperf, LCDproc, Nmap, pfBlockerNG, RRD_Summary, Shellcmd, Snort, Speedtest, System_Patches.

                  1 Reply Last reply Reply Quote 0
                  • stephenw10S
                    stephenw10 Netgate Administrator
                    last edited by

                    Yup replicated it here. Digging deeper...

                    bmeeksB 1 Reply Last reply Reply Quote 1
                    • bmeeksB
                      bmeeks @stephenw10
                      last edited by bmeeks

                      @stephenw10 said in Logging my daily changing WAN-address:

                      Yup replicated it here. Digging deeper...

                      The problem is within the Snort binary package. The new if_pppoe driver apparently returns a datalink type of DLT_PPP_ETHER (which is integer code '51'). But the Snort C source code is only looking for DLT_PPP (which is integer code '9'). Because the switch...case logic does not match on DLT_PPP_ETHER, the default statement at line 3257 prevails and Snort executes a fatal error and terminates.

                      The code in question is within snort.c beginning at line 3118. Here is the module source code:

                      /*
                       * Function: SetPktProcessor()
                       *
                       * Purpose:  Set root decoder based on datalink
                       */
                      // TBD add GetDecoder(dlt) to decode module and hide all
                      // protocol decoder functions.
                      static int SetPktProcessor(void)
                      {
                          const char* slink = NULL;
                          const char* extra = NULL;
                          int dlt = DAQ_GetBaseProtocol();
                      
                          switch ( dlt )
                          {
                              case DLT_EN10MB:
                                  slink = "Ethernet";
                                  grinder = DecodeEthPkt;
                                  break;
                      
                      #ifdef DLT_LOOP
                              case DLT_LOOP:
                      #endif
                              case DLT_NULL:
                                  /* loopback and stuff.. you wouldn't perform intrusion detection
                                   * on it, but it's ok for testing. */
                                  slink = "LoopBack";
                                  extra = "Data link layer header parsing for this network type "
                                          "isn't implemented yet";
                                  grinder = DecodeNullPkt;
                                  break;
                      
                              case DLT_RAW:
                              case DLT_IPV4:
                                  slink = "Raw IP4";
                                  extra = "There's no second layer header available for this datalink";
                                  grinder = DecodeRawPkt;
                                  break;
                      
                              case DLT_IPV6:
                                  slink = "Raw IP6";
                                  extra = "There's no second layer header available for this datalink";
                                  grinder = DecodeRawPkt6;
                                  break;
                      
                      #ifdef DLT_I4L_IP
                              case DLT_I4L_IP:
                                  slink = "I4L-ip";
                                  grinder = DecodeEthPkt;
                                  break;
                      #endif
                      
                      #ifndef NO_NON_ETHER_DECODER
                      #ifdef DLT_I4L_CISCOHDLC
                              case DLT_I4L_CISCOHDLC:
                                  slink = "I4L-cisco-h";
                                  grinder = DecodeI4LCiscoIPPkt;
                                  break;
                      #endif
                      
                              case DLT_PPP:
                                  slink = "PPP";
                                  extra = "Second layer header parsing for this datalink "
                                          "isn't implemented yet";
                                  grinder = DecodePppPkt;
                                  break;
                      
                      #ifdef DLT_I4L_RAWIP
                              case DLT_I4L_RAWIP:
                                  // you need the I4L modified version of libpcap to get this stuff
                                  // working
                                  slink = "I4L-rawip";
                                  grinder = DecodeI4LRawIPPkt;
                                  break;
                      #endif
                      
                      #ifdef DLT_IEEE802_11
                              case DLT_IEEE802_11:
                                  slink = "IEEE 802.11";
                                  grinder = DecodeIEEE80211Pkt;
                                  break;
                      #endif
                      #ifdef DLT_ENC
                              case DLT_ENC:
                                  slink = "Encapsulated data";
                                  grinder = DecodeEncPkt;
                                  break;
                      
                      #else
                              case 13:
                      #endif /* DLT_ENC */
                              case DLT_IEEE802:
                                  slink = "Token Ring";
                                  grinder = DecodeTRPkt;
                                  break;
                      
                              case DLT_FDDI:
                                  slink = "FDDI";
                                  grinder = DecodeFDDIPkt;
                                  break;
                      
                      #ifdef DLT_CHDLC
                              case DLT_CHDLC:
                                  slink = "Cisco HDLC";
                                  grinder = DecodeChdlcPkt;
                                  break;
                      #endif
                      
                              case DLT_SLIP:
                                  slink = "SLIP";
                                  extra = "Second layer header parsing for this datalink "
                                          "isn't implemented yet\n";
                                  grinder = DecodeSlipPkt;
                                  break;
                      
                      #ifdef DLT_PPP_SERIAL
                              case DLT_PPP_SERIAL:         /* PPP with full HDLC header*/
                                  slink = "PPP Serial";
                                  extra = "Second layer header parsing for this datalink "
                                          " isn't implemented yet";
                                  grinder = DecodePppSerialPkt;
                                  break;
                      #endif
                      
                      #ifdef DLT_LINUX_SLL
                              case DLT_LINUX_SLL:
                                  slink = "Linux SLL";
                                  grinder = DecodeLinuxSLLPkt;
                                  break;
                      #endif
                      
                      #ifdef DLT_PFLOG
                              case DLT_PFLOG:
                                  slink = "OpenBSD PF log";
                                  grinder = DecodePflog;
                                  break;
                      #endif
                      
                      #ifdef DLT_OLDPFLOG
                              case DLT_OLDPFLOG:
                                  slink = "Old OpenBSD PF log";
                                  grinder = DecodeOldPflog;
                                  break;
                      #endif
                      #endif  // NO_NON_ETHER_DECODER
                      
                              default:
                                  /* oops, don't know how to handle this one */
                                  FatalError("Cannot decode data link type %d\n", dlt);
                                  break;
                          }
                      
                          if ( !ScReadMode() || ScPcapShow() )
                          {
                              LogMessage("Decoding %s\n", slink);
                          }
                          if (extra && ScOutputDataLink())
                          {
                              LogMessage("%s\n", extra);
                              snort_conf->output_flags &= ~OUTPUT_FLAG__SHOW_DATA_LINK;
                          }
                      #ifdef ACTIVE_RESPONSE
                          Encode_Init();
                      #endif
                          return 0;
                      }
                      

                      The fix might be as simple as adding this additional code to the switch...case test, but that assumes the raw PPP data is exactly same between the old mpd driver and the new if_pppoe driver:

                      case DLT_PPP_ETHER:
                                 slink = "PPP";
                                 extra = "Second layer header parsing for this datalink "
                                         "isn't implemented yet";
                                 grinder = DecodePppPkt;
                                 break;
                      
                      1 Reply Last reply Reply Quote 2
                      • bmeeksB bmeeks referenced this topic
                      • stephenw10S
                        stephenw10 Netgate Administrator
                        last edited by

                        Yup, that's exactly what we thought. Just waiting for a build to test....

                        bmeeksB 1 Reply Last reply Reply Quote 1
                        • stephenw10S
                          stephenw10 Netgate Administrator
                          last edited by

                          Opened a bug to track: https://redmine.pfsense.org/issues/16229

                          1 Reply Last reply Reply Quote 2
                          • bmeeksB
                            bmeeks @stephenw10
                            last edited by

                            @stephenw10 said in Logging my daily changing WAN-address:

                            Yup, that's exactly what we thought. Just waiting for a build to test....

                            Note that Suricata likely has the same issue. See my comment in this thread for the relevant section of source code: https://forum.netgate.com/topic/197701/error-on-snort-with-if_pppoe/8.

                            1 Reply Last reply Reply Quote 1
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.