Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Captive Portal Allowed IP Addresses/Hostnames not working

    2.1 Snapshot Feedback and Problems - RETIRED
    5
    17
    6.1k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      mdmogren
      last edited by

      Subject pretty much says it all. Adding an IP or hostname to the allowed list for the captive portal seems to have no effect.

      Using latest snapshot: 2.1-BETA1 (amd64) built on Mon Feb 4 03:47:53 EST 2013

      Just 1 zone defined. Have seen this issue in snapshots for at least the last week.

      1 Reply Last reply Reply Quote 0
      • B
        bardelot
        last edited by

        Did some test and noticed that that behavior is also seen on recent i386 builds. The "Allowed IP addresses" rules are never matched except for when I use an IP address such as 128.0.0.0/1 which seems to match all.

        1 Reply Last reply Reply Quote 0
        • M
          mdmogren
          last edited by

          This is a very important feature for me as I use an external captive portal login page.

          I am currently stuck using a build from November at several locations. As far as I can tell this is the only remaining captive portal issue that is stopping me from updating.

          Can anyone offer any insight? Any help is much appreciated.

          1 Reply Last reply Reply Quote 0
          • E
            eri--
            last edited by

            Can you show me a sysctl -a | grep pfil

            1 Reply Last reply Reply Quote 0
            • B
              bardelot
              last edited by

              $ sysctl -a | grep pfil
              net.inet.ip.pfil.inbound: pf, ipfw*
              net.inet.ip.pfil.outbound: pf, ipfw*
              net.link.bridge.pfil_local_phys: 0
              net.link.bridge.pfil_member: 1
              net.link.bridge.pfil_bridge: 0
              net.link.bridge.pfil_onlyip: 0
              net.inet6.ip6.pfil.inbound: pf, ipfw*
              net.inet6.ip6.pfil.outbound: pf, ipfw*
              
              $ ipfw -x guest table all list
              ---table(3)---
              66.219.34.171/32 2002 0 0
              ---table(4)---
              66.219.34.171/32 2003 0 0
              
              $ ipfw pipe show
              02002: unlimited         0 ms burst 0
              q133074 100 sl. 0 flows (1 buckets) sched 67538 weight 0 lmax 0 pri 0 droptail
               sched 67538 type FIFO flags 0x0 16 buckets 0 active
              02003: unlimited         0 ms burst 0
              q133075 100 sl. 0 flows (1 buckets) sched 67539 weight 0 lmax 0 pri 0 droptail
               sched 67539 type FIFO flags 0x0 16 buckets 0 active
              
              $ ipfw -x guest show
              65291   0     0 allow pfsync from any to any
              65292   0     0 allow carp from any to any
              65301  26  1034 allow ip from any to any layer2 mac-type 0x0806,0x8035
              65302   0     0 allow ip from any to any layer2 mac-type 0x888e,0x88c7
              65303   0     0 allow ip from any to any layer2 mac-type 0x8863,0x8864
              65307   0     0 deny ip from any to any layer2 not mac-type 0x0800,0x86dd
              65310  97 10724 allow ip from any to { 255.255.255.255 or 192.168.10.1 } in
              65311 100 40071 allow ip from { 255.255.255.255 or 192.168.10.1 } to any out
              65312   0     0 allow icmp from { 255.255.255.255 or 192.168.10.1 } to any out icmptypes 0
              65313   0     0 allow icmp from any to { 255.255.255.255 or 192.168.10.1 } in icmptypes 8
              65314   0     0 pipe tablearg ip from table(3) to any in
              65315   0     0 pipe tablearg ip from any to table(4) out
              65316   0     0 pipe tablearg ip from table(1) to any in
              65317   0     0 pipe tablearg ip from any to table(2) out
              65532  55  5271 fwd 127.0.0.1,8000 tcp from any to any dst-port 80 in
              65533  55  7285 allow tcp from any to any out
              65534 110  9050 deny ip from any to any
              65535   0     0 allow ip from any to any
              
              
              
              $ kldstat
              Id Refs Address    Size     Name
               1   13 0xc0400000 103b9b4  kernel
               2    1 0xc4ca0000 5000     glxsb.ko
               3    1 0xc5e2a000 12000    ipfw.ko
               4    1 0xc5e45000 e000     dummynet.ko
              
              1 Reply Last reply Reply Quote 0
              • M
                mdmogren
                last edited by

                sysctl -a | grep pfil

                net.inet.ip.pfil.inbound: pf, ipfw*
                net.inet.ip.pfil.outbound: pf, ipfw*
                net.link.bridge.pfil_local_phys: 0
                net.link.bridge.pfil_member: 1
                net.link.bridge.pfil_bridge: 0
                net.link.bridge.pfil_onlyip: 0
                net.inet6.ip6.pfil.inbound: pf, ipfw*
                net.inet6.ip6.pfil.outbound: pf, ipfw*
                
                
                1 Reply Last reply Reply Quote 0
                • E
                  eri--
                  last edited by

                  Can you try with a newer snapshot and see if that works better?
                  Need to do a full-upgrade due to binary changes.

                  1 Reply Last reply Reply Quote 0
                  • B
                    bardelot
                    last edited by

                    @ermal:

                    Can you try with a newer snapshot and see if that works better?
                    Need to do a full-upgrade due to binary changes.

                    Unfortunately there is no change with the new snapshot, same behavior and output. Neither "Allowed IP addresses" nor "Allowed Hostnames" are working.

                    1 Reply Last reply Reply Quote 0
                    • M
                      mdmogren
                      last edited by

                      @ermal:

                      Can you try with a newer snapshot and see if that works better?
                      Need to do a full-upgrade due to binary changes.

                      What do you mean by full upgrade? How is that different than upgrading from the GUI?

                      1 Reply Last reply Reply Quote 0
                      • C
                        cmb
                        last edited by

                        Full upgrade just means don't gitsync

                        1 Reply Last reply Reply Quote 0
                        • M
                          mdmogren
                          last edited by

                          Just upgraded to the 2/14 AMD64 snapshot, allowed hostnames still not working.

                          1 Reply Last reply Reply Quote 0
                          • M
                            m4st3rc1p0
                            last edited by

                            same here, im downloading the latest update hope the issue resolve with the latest snapshot

                            1 Reply Last reply Reply Quote 0
                            • M
                              mdmogren
                              last edited by

                              Still not working in 2.1-BETA1 (amd64) built on Mon Feb 18 22:59:54 EST 2013

                              1 Reply Last reply Reply Quote 0
                              • M
                                mdmogren
                                last edited by

                                Still broken in 2.1-BETA1 (amd64) built on Sat Feb 23 22:58:00 EST 2013.
                                Is anyone working on this? Would a bounty help?

                                1 Reply Last reply Reply Quote 0
                                • M
                                  m4st3rc1p0
                                  last edited by

                                  any updates on this issues ?

                                  1 Reply Last reply Reply Quote 0
                                  • B
                                    bardelot
                                    last edited by

                                    Should be fixed.
                                    http://redmine.pfsense.org/issues/2780

                                    1 Reply Last reply Reply Quote 0
                                    • M
                                      mdmogren
                                      last edited by

                                      Confirmed fixed :)

                                      Big thanks to everyone who worked on it.

                                      1 Reply Last reply Reply Quote 0
                                      • First post
                                        Last post
                                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.