Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    No DHCPv6 on internal net, radvd issue: "sendmsg: Permission denied"

    2.1 Snapshot Feedback and Problems - RETIRED
    4
    22
    13.1k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D
      doktornotor Banned
      last edited by

      1/ In Windows world, IPv6 has been enabled and preferred by default protocol since Vista. You'll get LAN IPv6 traffic no matter whether tunnel is enabled or not. Further, Windows will attempt to use Teredo if no other IPv6 connectivity is available to get IPv6 working on internet as well.
      2/ Yes, absolutely what you see with the fragmented packets blocked issue. If you look at firewall logs, you'll recognize the problem very clearly by flood of FRAG log entries.

      P.S. https://redmine.pfsense.org/issues/2762

      1 Reply Last reply Reply Quote 0
      • K
        kejianshi
        last edited by

        Cool….  I plan to present this info to the guy in question as if its my own research to make myself look smarter than I am and won't mention you at all.  (kidding).

        That problem has been a real pain to diagnose.  So?  Whats the fix?  Any?

        1 Reply Last reply Reply Quote 0
        • D
          doktornotor Banned
          last edited by

          Try - where you have the IPv6 "catchall" allow rule enabled, edit -> Advanced Options - tick the checkbox with the above nondescriptive description (This allows packets with IP options to pass. Otherwise they are blocked by default. This is usually only seen with multicast traffic.) - Save - Apply. See if it helps.

          1 Reply Last reply Reply Quote 0
          • K
            kejianshi
            last edited by

            And this IPV6 ICMP….

            http://imgur.com/1cgaMr5

            But IPV6 is off.

            1 Reply Last reply Reply Quote 0
            • D
              doktornotor Banned
              last edited by

              546/547 is DHCPv6. It would go away if you enabled DHCPv6 Relay on the interface. Why is it blocked by default with the black magic in behind - no idea. For ICMP - this is all the local traffic. Allow ICMPv6 in floating rules, useless log noise gone. ICMPv6 is required for proper IPv6 working anyway.

              1 Reply Last reply Reply Quote 0
              • K
                kejianshi
                last edited by

                OK.  I plagiarized you with cut and paste…  And am thinking of charging to worsen the crime.
                We will see how it goes.

                1 Reply Last reply Reply Quote 0
                • M
                  MarkusK
                  last edited by

                  well guys - that was not my main problem
                  Nevertheles I changed the MTU on both sides of the tunnel to 1460. So I'm behind a DSL-line with a NAT-box. So I think the MTU on line is somewhat 1500 bytes. So there are 1500bytes - 6 bytes PPPoE - 2 bytes PPP-ID 20 bytes IPv4 header size - 0 bytes 6in4 = 1472 bytes. So 1460 bytes should be fine to work without fragmentation.

                  But my problem is that the internal DHCPv6 server and the radvd seem not to work correctly. So some time after reboot it works for 10? minutes and then all stateful IPv6-adresses are gone. I changed the RA to assisted. So my clients get stateful and statless adresses - but after powersafe on my OSX notebook all IPv6 adresses are gone. I have a IPv6 capable printer. It keeps the stateless adress but forgets about the statful. Further I have a Synology-NAS. it never gets a stateful adress but a stateless.

                  It seems to me that the DHCPv6-server in in combination with the radvd only work after reboot and then no RS and no RA are handled anymore.

                  -Markus

                  [EDIT] I never saw this issue: http://forum.pfsense.org/index.php/topic,59996.0.html

                  1 Reply Last reply Reply Quote 0
                  • D
                    doktornotor Banned
                    last edited by

                    As for Synology, it probably does not support DHCPv6 at all. QNAP for sure does not, tested here. I'd again like to point out that you should NOT use anything smaller than /64 for these purposes.

                    1 Reply Last reply Reply Quote 0
                    • M
                      MarkusK
                      last edited by

                      Sorry I forgot: I changed the subnet size to /64. It does not work either.

                      -Markus

                      1 Reply Last reply Reply Quote 0
                      • M
                        MarkusK
                        last edited by

                        I tried to get some usable information about what goes wrong. I started a tcpdump on the client and on the internal if of pfsense. I saw router solicitation packets from the client on both dumps-but no answer. Dhcpd was up and running. So I killed dhcpd and started it from the command line in debug mode. Seeing the RS packets in tcpdump - nothing happened in dhcpd. So I switched off the firewall via Advanced->Network/Firewall.
                        Now I see the RS packets, an reaction from dhcpd but no RA in dhcpd. So I think DHCPv6 Link local traffic seems o be blocked.
                        So I think it's a bug in the definition of the internal rules because I have an any-any-pass rule on the firewall defined.
                        Do you agree?

                        -Markus

                        1 Reply Last reply Reply Quote 0
                        • D
                          doktornotor Banned
                          last edited by

                          @ermal:

                          Can you put the rule with advanced option to allow ip-options?
                          Seems you are having fragments from the tunnel.

                          Well, except that you'd need the above done via "default accept" rule on WAN, which just defeats the whole purpose of the firewall… Setting this on any of the internal interfaces is useless, just tested myself. Still getting flood of blocked fragmented packets with this forum, and other pfsense.org sites.  :-X >:(

                          No go without fixing the default rules.

                          1 Reply Last reply Reply Quote 0
                          • E
                            eri--
                            last edited by

                            You can override the default rules through the floating rules.
                            First lets see if this works than lets fix the problem.

                            So can you confirm that the issue is fixed by allowing fragments?

                            1 Reply Last reply Reply Quote 0
                            • D
                              doktornotor Banned
                              last edited by

                              Unfortunately no - since I cannot see how to create such rule in the first place without nuking firewall functionality. Floating rule for what? Creating the rule with allowopts on LAN has no effect as the traffic gets blocked on the tunnel WAN interface. I obviously do NOT want to create "allow any" IPv6 rules on WAN.

                              1 Reply Last reply Reply Quote 0
                              • M
                                MarkusK
                                last edited by

                                Finally I solved my problem.
                                Disabeling the captive portal blocks dhcpv6.

                                Background:
                                I use a captive portal with freeradius2 auth and accounting (for the kids) with some VIP users (my wife). Because freeradius2 has a very long startup-time on my hardware the captive portal is disabled until freeradius2 is started. In this time it worked for me. Once freeradius2 is started the captive portal stops (almost) all dhcpv6 traffic.

                                I think this is a bug on 2.1. Where to report?

                                -Markus

                                1 Reply Last reply Reply Quote 0
                                • E
                                  eri--
                                  last edited by

                                  CP + IPv6 is not in the 2.1 roadmap.
                                  For 2.2 probably yes.

                                  So we know about it but not for 2.1

                                  1 Reply Last reply Reply Quote 0
                                  • K
                                    kejianshi
                                    last edited by

                                    I hope so.

                                    I wouldn't want my choices to be "IPV4 + features" or "IPV6 - features".

                                    1 Reply Last reply Reply Quote 0
                                    • M
                                      MarkusK
                                      last edited by

                                      So I'd wish that CP was IPv6 aware. Even the CP doesn't support IPv6 enabeling it shouldn't break the DHCPv6 server.
                                      At least it is worth a note on the config page.
                                      -Markus

                                      1 Reply Last reply Reply Quote 0
                                      • D
                                        doktornotor Banned
                                        last edited by

                                        @doktornotor:

                                        Unfortunately no - since I cannot see how to create such rule in the first place without nuking firewall functionality. Floating rule for what? Creating the rule with allowopts on LAN has no effect as the traffic gets blocked on the tunnel WAN interface. I obviously do NOT want to create "allow any" IPv6 rules on WAN.

                                        I'd really appreciate some ideas on how to prevent pf from dropping totally legit traffic…

                                        1 Reply Last reply Reply Quote 0
                                        • First post
                                          Last post
                                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.