Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Error(s) loading the rules // after yesterdays update // 2.0-RC2 (i386) // 26.05

    Scheduled Pinned Locked Moved 2.0-RC Snapshot Feedback and Problems - RETIRED
    13 Posts 5 Posters 4.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • E
      eri--
      last edited by

      Upgrade to a new one.
      Just unlucky and got a snapshot with some wrong code that was committed and fixed after.

      1 Reply Last reply Reply Quote 0
      • M
        mxx
        last edited by

        Hi,

        I've got the exact same problem.
        Just did an upgrade 2 hours ago to the latest snapshot (i386,full).

        scrub in on $WAN all    fragment reassemble
        scrub in on $LAN all    fragment reassemble
        scrub in on $AON all    fragment reassemble
        scrub in on $ all    fragment reassemble

        #System aliases

        loopback = "{ lo0 }"
        WAN = "{ pppoe0 }"
        LAN = "{ em0 }"
        AON = "{ em1 }"
        = "{  }"
        OpenVPN = "{ openvpn }"

        I then reverted back snapshot by snapshot and found the latest one that works for me is 20110524-1226. The problem starts with 20110524-1717 and isn't fixed by the snapshot which was the latest one 2 hours ago (20110527-0112)

        1 Reply Last reply Reply Quote 0
        • jimpJ
          jimp Rebel Alliance Developer Netgate
          last edited by

          When that file is correct, what shows up on that line?

          Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

          Need help fast? Netgate Global Support!

          Do not Chat/PM for help!

          1 Reply Last reply Reply Quote 0
          • M
            mxx
            last edited by

            loopback = "{ lo0 }"
            WAN = "{ pppoe0 }"
            LAN = "{ em0 }"
            AON = "{ em1 }"
            OpenVPN = "{ openvpn }"

            ..

            scrub in on $WAN all    fragment reassemble
            scrub in on $LAN all    fragment reassemble
            scrub in on $AON all    fragment reassemble

            so.. nothing ;)

            1 Reply Last reply Reply Quote 0
            • jimpJ
              jimp Rebel Alliance Developer Netgate
              last edited by

              If someone is still getting this, we'll need to see the output of this then:

              
              global $FilterIflist;
              include "filter.inc";
              include "shaper.inc";
              filter_generate_optcfg_array();
              var_dump($FilterIflist);
              

              You can paste that into the PHP execute box under Diagnostics > Command.

              Somehow an empty entry must be sneaking in there, would be nice to know what it is in order to track it down.

              Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

              Need help fast? Netgate Global Support!

              Do not Chat/PM for help!

              1 Reply Last reply Reply Quote 0
              • jimpJ
                jimp Rebel Alliance Developer Netgate
                last edited by

                It would also help to know if you have any of the following enabled: PPTP server, L2TP server, PPPoE server, or IPsec.

                Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                Need help fast? Netgate Global Support!

                Do not Chat/PM for help!

                1 Reply Last reply Reply Quote 0
                • M
                  mxx
                  last edited by

                  Here it is:

                  array(5) {
                    ["wan"]=>
                    array(14) {
                      ["if"]=>
                      string(6) "pppoe0"
                      ["ip"]=>
                      string(13) "[PubIP_ofWAN]"
                      ["type"]=>
                      string(5) "pppoe"
                      ["sn"]=>
                      int(32)
                      ["mtu"]=>
                      string(4) "1492"
                      ["mss"]=>
                      string(0) ""
                      ["descr"]=>
                      string(3) "WAN"
                      ["sa"]=>
                      string(13) "[PubIP_ofWAN]"
                      ["nonat"]=>
                      NULL
                      ["alias-address"]=>
                      string(0) ""
                      ["alias-subnet"]=>
                      string(2) "32"
                      ["gateway"]=>
                      NULL
                      ["spoofcheck"]=>
                      string(3) "yes"
                      ["bridge"]=>
                      NULL
                    }
                    ["lan"]=>
                    array(13) {
                      ["if"]=>
                      string(3) "em0"
                      ["ip"]=>
                      string(11) "192.168.1.1"
                      ["sn"]=>
                      int(24)
                      ["mtu"]=>
                      int(1500)
                      ["mss"]=>
                      string(0) ""
                      ["descr"]=>
                      string(3) "LAN"
                      ["sa"]=>
                      string(11) "192.168.1.0"
                      ["nonat"]=>
                      NULL
                      ["alias-address"]=>
                      NULL
                      ["alias-subnet"]=>
                      NULL
                      ["gateway"]=>
                      NULL
                      ["spoofcheck"]=>
                      string(3) "yes"
                      ["bridge"]=>
                      NULL
                    }
                    ["opt1"]=>
                    array(13) {
                      ["if"]=>
                      string(3) "em1"
                      ["ip"]=>
                      string(14) "[PubIP_ofOpt1]"
                      ["sn"]=>
                      int(30)
                      ["mtu"]=>
                      int(1500)
                      ["mss"]=>
                      string(0) ""
                      ["descr"]=>
                      string(3) "AON"
                      ["sa"]=>
                      string(14) "[IPofNETAddressofOpt1]"
                      ["nonat"]=>
                      NULL
                      ["alias-address"]=>
                      NULL
                      ["alias-subnet"]=>
                      NULL
                      ["gateway"]=>
                      string(5) "AONGW"
                      ["spoofcheck"]=>
                      string(3) "yes"
                      ["bridge"]=>
                      NULL
                    }
                    ["pppoe"]=>
                    array(0) {
                    }
                    ["openvpn"]=>
                    array(4) {
                      ["if"]=>
                      string(7) "openvpn"
                      ["descr"]=>
                      string(7) "OpenVPN"
                      ["type"]=>
                      string(4) "none"
                      ["virtual"]=>
                      bool(true)
                    }
                  }
                  
                  

                  I have an ipsec tunnel configured, but it's inactive (enable ipsec is not checked)

                  1 Reply Last reply Reply Quote 0
                  • jimpJ
                    jimp Rebel Alliance Developer Netgate
                    last edited by

                    Looks like you have a pppoe server entry that's empty.

                    I added some protections against that just now. Should be fixed in the next snapshot, or you can gitsync now and pull in the change

                    https://github.com/bsdperimeter/pfsense/compare/a1b86994a0…f40a03a45c

                    Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                    Need help fast? Netgate Global Support!

                    Do not Chat/PM for help!

                    1 Reply Last reply Reply Quote 0
                    • M
                      mxx
                      last edited by

                      Very strange.. never set one up.

                      I'll gitsync and report back

                      thank you very much :)

                      1 Reply Last reply Reply Quote 0
                      • M
                        mxx
                        last edited by

                        GREAT!
                        Your commit did it ;)

                        Thank you very much!

                        1 Reply Last reply Reply Quote 0
                        • jimpJ
                          jimp Rebel Alliance Developer Netgate
                          last edited by

                          new snap is building now that has those commits in it, so it should be OK once it uploads later this evening.

                          Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                          Need help fast? Netgate Global Support!

                          Do not Chat/PM for help!

                          1 Reply Last reply Reply Quote 0
                          • P
                            px
                            last edited by

                            @jimp:

                            new snap is building now that has those commits in it, so it should be OK once it uploads later this evening.

                            Awesome, thanks!
                            This issue creeped up on me Monday's daily build.  Decided to come post about it today. Been trying new dailies all week waiting for a fix. Each time after a rule change, manually editing out the empty or erred rules in /tmp/rules.debug
                            and reloading the rules from the shell.

                            pfctl -f /tmp/rules.debug
                            
                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.