Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Captive Portal Allowed IP Addresses/Hostnames not working

    Scheduled Pinned Locked Moved 2.1 Snapshot Feedback and Problems - RETIRED
    17 Posts 5 Posters 6.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B Offline
      bardelot
      last edited by

      Did some test and noticed that that behavior is also seen on recent i386 builds. The "Allowed IP addresses" rules are never matched except for when I use an IP address such as 128.0.0.0/1 which seems to match all.

      1 Reply Last reply Reply Quote 0
      • M Offline
        mdmogren
        last edited by

        This is a very important feature for me as I use an external captive portal login page.

        I am currently stuck using a build from November at several locations. As far as I can tell this is the only remaining captive portal issue that is stopping me from updating.

        Can anyone offer any insight? Any help is much appreciated.

        1 Reply Last reply Reply Quote 0
        • E Offline
          eri--
          last edited by

          Can you show me a sysctl -a | grep pfil

          1 Reply Last reply Reply Quote 0
          • B Offline
            bardelot
            last edited by

            $ sysctl -a | grep pfil
            net.inet.ip.pfil.inbound: pf, ipfw*
            net.inet.ip.pfil.outbound: pf, ipfw*
            net.link.bridge.pfil_local_phys: 0
            net.link.bridge.pfil_member: 1
            net.link.bridge.pfil_bridge: 0
            net.link.bridge.pfil_onlyip: 0
            net.inet6.ip6.pfil.inbound: pf, ipfw*
            net.inet6.ip6.pfil.outbound: pf, ipfw*
            
            $ ipfw -x guest table all list
            ---table(3)---
            66.219.34.171/32 2002 0 0
            ---table(4)---
            66.219.34.171/32 2003 0 0
            
            $ ipfw pipe show
            02002: unlimited         0 ms burst 0
            q133074 100 sl. 0 flows (1 buckets) sched 67538 weight 0 lmax 0 pri 0 droptail
             sched 67538 type FIFO flags 0x0 16 buckets 0 active
            02003: unlimited         0 ms burst 0
            q133075 100 sl. 0 flows (1 buckets) sched 67539 weight 0 lmax 0 pri 0 droptail
             sched 67539 type FIFO flags 0x0 16 buckets 0 active
            
            $ ipfw -x guest show
            65291   0     0 allow pfsync from any to any
            65292   0     0 allow carp from any to any
            65301  26  1034 allow ip from any to any layer2 mac-type 0x0806,0x8035
            65302   0     0 allow ip from any to any layer2 mac-type 0x888e,0x88c7
            65303   0     0 allow ip from any to any layer2 mac-type 0x8863,0x8864
            65307   0     0 deny ip from any to any layer2 not mac-type 0x0800,0x86dd
            65310  97 10724 allow ip from any to { 255.255.255.255 or 192.168.10.1 } in
            65311 100 40071 allow ip from { 255.255.255.255 or 192.168.10.1 } to any out
            65312   0     0 allow icmp from { 255.255.255.255 or 192.168.10.1 } to any out icmptypes 0
            65313   0     0 allow icmp from any to { 255.255.255.255 or 192.168.10.1 } in icmptypes 8
            65314   0     0 pipe tablearg ip from table(3) to any in
            65315   0     0 pipe tablearg ip from any to table(4) out
            65316   0     0 pipe tablearg ip from table(1) to any in
            65317   0     0 pipe tablearg ip from any to table(2) out
            65532  55  5271 fwd 127.0.0.1,8000 tcp from any to any dst-port 80 in
            65533  55  7285 allow tcp from any to any out
            65534 110  9050 deny ip from any to any
            65535   0     0 allow ip from any to any
            
            
            
            $ kldstat
            Id Refs Address    Size     Name
             1   13 0xc0400000 103b9b4  kernel
             2    1 0xc4ca0000 5000     glxsb.ko
             3    1 0xc5e2a000 12000    ipfw.ko
             4    1 0xc5e45000 e000     dummynet.ko
            
            1 Reply Last reply Reply Quote 0
            • M Offline
              mdmogren
              last edited by

              sysctl -a | grep pfil

              net.inet.ip.pfil.inbound: pf, ipfw*
              net.inet.ip.pfil.outbound: pf, ipfw*
              net.link.bridge.pfil_local_phys: 0
              net.link.bridge.pfil_member: 1
              net.link.bridge.pfil_bridge: 0
              net.link.bridge.pfil_onlyip: 0
              net.inet6.ip6.pfil.inbound: pf, ipfw*
              net.inet6.ip6.pfil.outbound: pf, ipfw*
              
              
              1 Reply Last reply Reply Quote 0
              • E Offline
                eri--
                last edited by

                Can you try with a newer snapshot and see if that works better?
                Need to do a full-upgrade due to binary changes.

                1 Reply Last reply Reply Quote 0
                • B Offline
                  bardelot
                  last edited by

                  @ermal:

                  Can you try with a newer snapshot and see if that works better?
                  Need to do a full-upgrade due to binary changes.

                  Unfortunately there is no change with the new snapshot, same behavior and output. Neither "Allowed IP addresses" nor "Allowed Hostnames" are working.

                  1 Reply Last reply Reply Quote 0
                  • M Offline
                    mdmogren
                    last edited by

                    @ermal:

                    Can you try with a newer snapshot and see if that works better?
                    Need to do a full-upgrade due to binary changes.

                    What do you mean by full upgrade? How is that different than upgrading from the GUI?

                    1 Reply Last reply Reply Quote 0
                    • C Offline
                      cmb
                      last edited by

                      Full upgrade just means don't gitsync

                      1 Reply Last reply Reply Quote 0
                      • M Offline
                        mdmogren
                        last edited by

                        Just upgraded to the 2/14 AMD64 snapshot, allowed hostnames still not working.

                        1 Reply Last reply Reply Quote 0
                        • M Offline
                          m4st3rc1p0
                          last edited by

                          same here, im downloading the latest update hope the issue resolve with the latest snapshot

                          1 Reply Last reply Reply Quote 0
                          • M Offline
                            mdmogren
                            last edited by

                            Still not working in 2.1-BETA1 (amd64) built on Mon Feb 18 22:59:54 EST 2013

                            1 Reply Last reply Reply Quote 0
                            • M Offline
                              mdmogren
                              last edited by

                              Still broken in 2.1-BETA1 (amd64) built on Sat Feb 23 22:58:00 EST 2013.
                              Is anyone working on this? Would a bounty help?

                              1 Reply Last reply Reply Quote 0
                              • M Offline
                                m4st3rc1p0
                                last edited by

                                any updates on this issues ?

                                1 Reply Last reply Reply Quote 0
                                • B Offline
                                  bardelot
                                  last edited by

                                  Should be fixed.
                                  http://redmine.pfsense.org/issues/2780

                                  1 Reply Last reply Reply Quote 0
                                  • M Offline
                                    mdmogren
                                    last edited by

                                    Confirmed fixed :)

                                    Big thanks to everyone who worked on it.

                                    1 Reply Last reply Reply Quote 0
                                    • First post
                                      Last post
                                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.