Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Unexpected alias behaviour - two ranges

    Scheduled Pinned Locked Moved General pfSense Questions
    50 Posts 4 Posters 571 Views 4 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • P Offline
      Patch @stephenw10
      last edited by Patch

      @stephenw10 said in Unexpected alias behaviour - two ranges:

      That's until you run filter-reload?

      No.
      Makes no difference to me. Similarly leaving it running for 24 hours makes no difference.

      After some experimentation I can lock up the system immediately if I
      Create the following alias (I have been using random IPv4 addresses but only minor differences occur if sequential IP addresses are used. Creating the Aliases via the bulk import option also makes no difference.)

      • IP_set1 : host type, 50 IPv4 hosts (/32) and at least 1 FQDN
      • IP_set2 : host type, 512 IPv4 hosts (/32) and at least 1 FQDN
      • IP_set3 : host type, 50 IPv4 hosts (/32) and at least 1 FQDN
      • Combined_IP : Host type consisting of the above 3 aliases (IP_set1 IP_set2 IP_set3)

      Then

      • Create a firewall rule which uses the alias Combined_IP
      • Diagnostic -> Tables -> select each of the above aliases and "Empty table"
      • Save the configuration

      To test, Restore the above configuration. My results

      • Diagnostic -> tables -> records: Combined_IP = 256, IP_set1=50, IP_set2=206, IP_set3=0
      • Waiting longer makes no difference, Filter reload makes no difference.
      • Create a new Alias with hosts forum.netgate.com & redmine.pfsense.org -> empty table only generated

      Testing with pfsense v2.7.2 results in similar results

      • Combined_IP = 256, IP_set1=50, IP_set2=156, IP_set3=50

      It appears pfsense alias capacity is way less than 5000 entries if an alias contains other aliases.
      Not sure if this helps localise the issue. The similar Combine_IP size across software versions is interesting but is higher if only two aliasses are combined. Processor load remains trivial.

      @SteveITS said in Unexpected alias behaviour - two ranges:

      some may overlap (laptop goes to an allowed public IP) so I'm wondering if one fails it is removing "both" IPs/entries?
      I'm yet to test this as I have been first focussing on why wide spread alias problems have been occurring.

      It is on my list of things to do as I have a white list alias (containing my home IP and laptops current IP). Losing home access when the laptop leaves home is not desirable but happened recently. I was thinking of using a host over ride to try and simulate this. But the fault could have been caused by something unrelated.

      Edit
      Added the requirement for each IP_set to include at least 1 FQDN

      S 2 Replies Last reply Reply Quote 0
      • S Offline
        SteveITS Galactic Empire @Patch
        last edited by

        @Patch If you run "killall filterdns" and Status>Filter Reload do the tables populate?

        Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
        When upgrading, allow 10-15 minutes to reboot, or more depending on packages, CPU, and/or disk speed.
        Upvote 👍 helpful posts!

        P 2 Replies Last reply Reply Quote 0
        • P Offline
          Patch @SteveITS
          last edited by Patch

          @SteveITS is killall filterdns run from the command line or GUI menu option?

          You do realise the IP_set alias consists almost exclusively of actual IPv4 addresses. I used a spreadsheet random number generator to construct addresses in the format
          222.<random 1-255>. .<random 1-255> .<random 1-255>
          The leading number changed for different aliases
          However I don’t think the actual IP addresses make any difference.

          The issue being the failure varies with number of hosts and number of aliases. The aliases now contain less than 2 FQDN in total now.

          But will try later today

          S 1 Reply Last reply Reply Quote 0
          • S Offline
            SteveITS Galactic Empire @Patch
            last edited by

            @Patch The command should run both places. It just ends the processes. I have run it in the GUI.

            Yeah I'm aware of the difference, I'm just trying to connect dots. Yours may be a totally different issue than mine, but it started to sound similar.

            Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
            When upgrading, allow 10-15 minutes to reboot, or more depending on packages, CPU, and/or disk speed.
            Upvote 👍 helpful posts!

            P 1 Reply Last reply Reply Quote 1
            • stephenw10S Online
              stephenw10 Netgate Administrator
              last edited by

              Yes you should be able to run that in either place. Though I would run it on the real command line if possible in case it does something unexpected.

              1 Reply Last reply Reply Quote 0
              • P Offline
                Patch @SteveITS
                last edited by Patch

                @SteveITS said in Unexpected alias behaviour - two ranges:

                If you run "killall filterdns" and Status>Filter Reload do the tables populate?

                No but I guess this is not the expected response
                70 Killall filterdns.jpg

                btw @stephenw10 what happens when you try to replicate the behaviour?

                While I assume it makes no difference, I'm using a Proxmox VM with 2 GB ram (GUI shows 18% memory usage), a Host type processor (i5-1235U with 2 cores), Hard disk: 8GB SSD, Bios OVMS (UEFI), Machine q35.

                S 1 Reply Last reply Reply Quote 0
                • P Offline
                  Patch @SteveITS
                  last edited by Patch

                  @SteveITS @stephenw10
                  Oops.
                  My test description was wrong.
                  Each IP_set alias needs at least one FQDN for the fault to be shown.

                  • Adding the FQDN results in the table for each IP_set alias being created / viewable
                  • Removing all FQDN results in the Combined_IP being rapidly calculated.

                  Above post edited to include this requirement https://forum.netgate.com/post/1229337

                  1 Reply Last reply Reply Quote 0
                  • S Offline
                    SteveITS Galactic Empire @Patch
                    last edited by

                    @Patch filterdns processes are left running to monitor for updates in hostnames for Aliases/IPsec/etc, one thread per hostname. So, maybe unrelated to my observed problem.

                    But I’d expect some if you had FQDNs to resolve…?

                    Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                    When upgrading, allow 10-15 minutes to reboot, or more depending on packages, CPU, and/or disk speed.
                    Upvote 👍 helpful posts!

                    1 Reply Last reply Reply Quote 0
                    • P Offline
                      Patch @stephenw10
                      last edited by Patch

                      @stephenw10 said in Unexpected alias behaviour - two ranges:

                      Do you see the full alias set shown in the Resolver logs when you add it?

                      More than showing in the alias tables

                      • I can't be sure all entries are shown as display is limited to 2000 entries

                      • IP_set3 table is empty however the log shows the actual 50 IP addresses are added but duplicates of "Adding Action: pf table: IP_set3 host:" but I think all 50 appear.

                      • Similarly "Adding Action: pf table: IP_set2 host: " shows some duplicates. Not all actual IP addresses appear in the 2000 log entires. I was not able to readily tell if all 512 appear at least once in Adding Action: pf table: IP_set2 host:

                      As I have not looked at these logs in the past, I'm not sure what is normal

                      1 Reply Last reply Reply Quote 0
                      • tinfoilmattT Offline
                        tinfoilmatt
                        last edited by

                        I think I agree at this point in some of the most incoherent SQA-masquerading-as-troubleshooting I've ever witnessed that—

                        It's true. The ability to add IP addresses and/or IP ranges to "Host" type aliases should be removed completely (and vice versa) via validation. That this makes no sense whatsoever on its face notwithstanding, it clearly has more than mere potential to lead to all of the above confusion.

                        1 Reply Last reply Reply Quote 0
                        • stephenw10S Online
                          stephenw10 Netgate Administrator
                          last edited by

                          Mmm, you could be right. But that is going to hurt some users. And save some others. Potentially.

                          1 Reply Last reply Reply Quote 0
                          • P Offline
                            Patch @Patch
                            last edited by Patch

                            For those who have missed what is actually trying to be addressed in this thread

                            @Patch said in Unexpected alias behaviour - two ranges:

                            I discovered this behaviour when setting up a port forward for a PBX. Unfortunately the behaviour was not immediately obvious.

                            @Patch said in Unexpected alias behaviour - two ranges:

                            fault detection I suspect was using failure to include specified entries in an alias -> hybrid NAT rule failed -> after firewall restart failure to register of 1 of 4 VoIP suppliers

                            Important features of the bug

                            • the fault results in failure of pfsense packet filtering not just a display error in debugging tools

                            • the error is only revealed when pfsense restarting not after editing and applying an alias change. So not a nice bug to have in a live system.

                            • how it presents in my live system is too complex for anyone else to reproduce or Netgate to fix. As a result substitute test end points and a simplified bug reproduction have been searched for (a process which risk masking the bug root cause or miss appropriating blame).

                            About the testing

                            • Lock up of alias table generation has been used as a substitute marker of packet filter failure of rules which use these aliases.

                            • Increasing the entries in each set or increasing the number of sets combined changes the fault behaviour. At least 1 FQDN is required in each IP_set to trigger the error.

                            • I have not observed an obvious bug effect in having many FQDN in a set but have not directly tested this. No clear difference between ISC DHCP or Kea DHCP. Doubling the VM ram does not make any difference. Entering the alias via import, manually 1 entry at a time, many host in 1 entry, or network expansion all make minimal difference. A double space between items entered in a host type alias is expanded to a blank entry (which can be manually deleted) but otherwise makes no difference I could detect.

                            • Diagnostics -> Tables are useful when the system is working well. It's less clear during fault conditions or as a marker for the bug being investigated in this thread. Double entry in the DNS resolver logs may corresponds to entries missing from these tables. After the primary alias tables stop updating, other aliases table entries is also blocked.

                            • If the alias tables are just a diagnostic aid, which are not used in actual filter creation, so as a result at times not representative. Then it would be useful to support more direct alias content display perhaps, through keactrl or directly displaying the database content used by Kea

                            To state the obvious

                            • I don't like having a production system which stops working for reasons I don't understand so can not reliably avoid. I can configure my systems to keep hierarchical aliases small (combine less than 4 sets with <50 entries) and revert to a higher ram VM allocation, so can avoid triggering this bug in my live systems. Netgate and other users may be less happy to discover it themselves in the future, but I can't speak for them, and my debugging time to support them is finite.

                            • The bug can be triggered by sequential or random sets of IP addresses. So blocking easy creation of sequential IP addresses is irrelevant to this bug.

                            • Summarising many hours of testing results in information dense posts. While these post are not easy to read, doing the underlying testing is more painful. Useful testing results new understanding of system behaviour, reflected in thread history.

                            @stephenw10 said in Unexpected alias behaviour - two ranges:

                            that is going to hurt some users. And save some others. Potentially.

                            We are off topic but blocking entering IP ranges in an alias is a bad idea.

                            • It is sensible to preserve range definition where that optimises resultant filter performance and configuration clarity. As such when a host line is entered which contains a range best left as a range, pfsense could:
                            • Change the alias type to Network or
                            • Leave the alias type as Host but also retain that line(s) subnet prefix length (it appears when a host type alias is displayed pfsense initially displays all host with a subnet prefix length then hides it).
                            S tinfoilmattT 2 Replies Last reply Reply Quote 0
                            • S Offline
                              SteveITS Galactic Empire @Patch
                              last edited by

                              It does sound like a bad bug. A deny rule with a partially filled alias, for example.

                              I am curious, does it matter where the FQDN is, in your alias? Does it stop updating the alias after the FQDN, if it is listed first or last?

                              In my linked thread above it's a rarely used allow rule and I notice it only when I can't connect.

                              Diagnostics -> Tables are useful when the system is working well. It's less clear during fault conditions or as a marker for the bug

                              The tables are an output of what pf is holding in memory so they should always match. "pfctl -T show -t aliasname" will show the table's contents at a command line, if that helps.

                              Per this doc "An alias becomes a table once the firewall loads it into the ruleset."

                              Kea is the DHCP server...? (not clear how that's involved...)

                              Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                              When upgrading, allow 10-15 minutes to reboot, or more depending on packages, CPU, and/or disk speed.
                              Upvote 👍 helpful posts!

                              tinfoilmattT P 2 Replies Last reply Reply Quote 0
                              • tinfoilmattT Offline
                                tinfoilmatt @Patch
                                last edited by

                                @Patch said in Unexpected alias behaviour - two ranges:

                                At least 1 FQDN is required in each IP_set to trigger the error.

                                This is definitely something. It's regarding this exact functionality, from which anything I've attempted to offer this thread stems.

                                @Patch said in Unexpected alias behaviour - two ranges:

                                I can configure my systems to keep hierarchical aliases small

                                [Emphasis added.]

                                I believe what you mean to reference here (and I may be wrong but I think I follow what you're saying)—is more precisely technically referred to as nested aliases. Nested anything—unless prescribed as an absolutely necessary means to accomplish a very particular and limited end—makes anti-kludge warriors and veterans everywhere shudder at the mere idea.

                                Would you be willing to share more about your specific use case of nested aliases?

                                1 Reply Last reply Reply Quote 0
                                • tinfoilmattT Offline
                                  tinfoilmatt @SteveITS
                                  last edited by

                                  @SteveITS What, pray tell, is a "partially filled alias"?

                                  1 Reply Last reply Reply Quote 0
                                  • S Offline
                                    SteveITS Galactic Empire @Patch
                                    last edited by SteveITS

                                    @tinfoilmatt said in Unexpected alias behaviour - two ranges:

                                    What, pray tell, is a "partially filled alias"?

                                    OP says they are not filling completely:

                                    @Patch said in Unexpected alias behaviour - two ranges:

                                    IP_set1 : host type, 50 IPv4 hosts (/32) and at least 1 FQDN
                                    IP_set2 : host type, 512 IPv4 hosts (/32) and at least 1 FQDN
                                    IP_set3 : host type, 50 IPv4 hosts (/32) and at least 1 FQDN

                                    Diagnostic -> tables -> records: Combined_IP = 256, IP_set1=50, IP_set2=206, IP_set3=0

                                    ...should have 612 615, has 256. Which seems like a suspiciously specific number, tbh.

                                    Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                                    When upgrading, allow 10-15 minutes to reboot, or more depending on packages, CPU, and/or disk speed.
                                    Upvote 👍 helpful posts!

                                    tinfoilmattT 2 Replies Last reply Reply Quote 0
                                    • tinfoilmattT Offline
                                      tinfoilmatt @SteveITS
                                      last edited by

                                      @SteveITS said in Unexpected alias behaviour - two ranges:

                                      OP says they are not filling completely:

                                      An alias either is, or is not. When alias creation fails it's either due to parser logic error and/or a user input error. I thought we'd establised the latter as an errant space.

                                      1 Reply Last reply Reply Quote 0
                                      • tinfoilmattT Offline
                                        tinfoilmatt @SteveITS
                                        last edited by

                                        @SteveITS Doing that math also, it would seem that there's an error—not necessarily a software bug—somewhere in there, sure.

                                        Parsing of "IP_set1" has most likely invalidated the FQDN for some reason (is the conclusion requring the least number of assumpions at least). And now all bets are off with the remaining two, and then of course with the "Combined_IP" nested alias too.

                                        If I was being paid to resolve this on behalf of a client, I would establish the end goal intent—and then blow everything out and start over.

                                        1 Reply Last reply Reply Quote 0
                                        • stephenw10S Online
                                          stephenw10 Netgate Administrator
                                          last edited by

                                          A partially populate table is probably a better description here. That's what I saw when I hit it temporarily.

                                          Entering an range of IP addresses as a single line in a host alias is a valid entry. For example: 192.168.1.26-192.168.1.58

                                          What's not expected is multiple subnets as a single line in a host alias like: 192.168.10.0/24 192.168.48.0/24. That's not a range.

                                          But it looks to be possible to hit this using only valid host aliases. There is a bug here IMO it just needs better defining to fix. Working on it....

                                          tinfoilmattT 1 Reply Last reply Reply Quote 0
                                          • tinfoilmattT Offline
                                            tinfoilmatt @stephenw10
                                            last edited by

                                            @stephenw10 said in Unexpected alias behaviour - two ranges:

                                            That's what I saw when I hit it temporarily.

                                            Were/are these the relevant steps?

                                            • Create an Alias (host type).
                                            • Add a FQDN and two /24 networks one of which includes [one of] the FQDN IPv4 address.
                                            • Save and apply.
                                            • Look at the filter reload screen,
                                            • When complete look at the created table for the Alias.
                                            S 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.