• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

2.1: bogons vs DHCP

Scheduled Pinned Locked Moved Problems Installing or Upgrading pfSense Software
10 Posts 8 Posters 3.1k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • S
    senser
    last edited by Sep 17, 2013, 5:09 PM

    In 2.1, when "deny bogons" is enabled on an interface DHCP traffic is blocked as well:

    
    # block bogon networks
    # http://www.cymru.com/Documents/bogon-bn-nonagg.txt
    # http://www.team-cymru.org/Services/Bogons/fullbogons-ipv6.txt
    block in log quick on $BRIDGE0 from <bogons>to any label "block bogon IPv4 networks from BRIDGE0"
    antispoof for bridge0
    # allow access to DHCP server on BRIDGE0
    pass in quick on $BRIDGE0 proto udp from any port = 68 to 255.255.255.255 port = 67 label "allow access to DHCP server"
    pass in quick on $BRIDGE0 proto udp from any port = 68 to 10.1.0.1 port = 67 label "allow access to DHCP server"
    pass out quick on $BRIDGE0 proto udp from 10.1.0.1 port = 67 to any port = 68 label "allow access to DHCP server"
    antispoof for vr1</bogons> 
    

    I am not 100% sure, but I think in 2.0.x it was the other way around: The rule to allow DHCP traffic came first. So you could block bogons and still have DHCP working. Is this new behaviour intentional? Thanks

    We use the mighty pf, we cannot be fooled.

    1 Reply Last reply Reply Quote 0
    • S
      stephenw10 Netgate Administrator
      last edited by Sep 17, 2013, 6:59 PM

      Hmm, has the bogon list included private networks?

      Steve

      1 Reply Last reply Reply Quote 0
      • D
        doktornotor Banned
        last edited by Sep 17, 2013, 7:03 PM

        The bogonv6 list still includes the stupid 8000::/1 entry which kills fe80 for IPv6. As for IPv4, no, not really, none RFC1918 IPs included.

        1 Reply Last reply Reply Quote 0
        • S
          senser
          last edited by Sep 17, 2013, 7:12 PM

          To be more specific:
          <bogons>includes 0.0.0.0/8 so this DHCP traffic is blocked

          proto udp from any port = 68 to 255.255.255.255 port = 67
          

          by

          block in log quick on $BRIDGE0 from <bogons> to any</bogons>
          ```</bogons>

          We use the mighty pf, we cannot be fooled.

          1 Reply Last reply Reply Quote 0
          • M
            mhab12
            last edited by Sep 20, 2013, 6:18 PM

            Could this be the reason that I am seeing disconnects related to the WAN DHCP lease for my cable modem?

            Before I upgraded to 2.1 I never had any connectivity issues.  Now I am finding that I have lost connectivity seemingly at random over the past few days since the upgrade.  When I check out the status/interfaces page the WAN only shows an IPv6 IP beginning with fe80 but no IPv4 address.  Once I release/renew I see the IPv4 address again and regain connectivity.  Possibly related or should I start a new thread?

            1 Reply Last reply Reply Quote 0
            • S
              stephenw10 Netgate Administrator
              last edited by Sep 20, 2013, 6:52 PM

              Remove 'block bogons' from the WAN interface. That will tell you straight away if it's related. You may have to reset the firewall states or reboot.

              Steve

              1 Reply Last reply Reply Quote 0
              • M
                mikeisfly
                last edited by Sep 29, 2013, 12:41 PM

                Any update on this? Since upgrading to 2.1 Release I have been seeing random internet drops as well. I haven't really had the time to really trouble shoot the issue although sometimes I have released and renewed the WAN IP and that fixed the issue. Sometimes the GUI has become unresponsive so I SSH into my box and reboot the system which fixes the problem 100% of the time. Sorry for the limited details I was just looking around to see if others where having the same issue. I have setup PfSense (Green Field Install) for a friend on 2.1 Release 64bit and he has had to reset a couple of times over the past two weeks as well. My uncle who is on 2.1-RC0  (i386)
                built on Thu May 23 19:52:31 EDT 2013 has not experienced any issues what so ever. When I was on the 64 bit build of this firmware I have had no issues as well. So far I have unchecked State Killing on Gateway Failure to see if this resolves the issue. If not then I will check it back and try unchecking block bogon networks. I should know in a week if the problem has been resolved.

                1 Reply Last reply Reply Quote 0
                • N
                  NOYB
                  last edited by Sep 29, 2013, 8:04 PM Sep 29, 2013, 7:55 PM

                  @doktornotor:

                  The bogonv6 list still includes the stupid 8000::/1 entry which kills fe80 for IPv6. As for IPv4, no, not really, none RFC1918 IPs included.

                  The bogons code strips out some of the entries that are in the list before it's applied.  Don't recall off top of my head which ones.

                  See /etc/rc.update_bogons.sh lines 122 and 130.

                  1 Reply Last reply Reply Quote 0
                  • P
                    phil.davis
                    last edited by Sep 30, 2013, 1:52 AM

                    /etc/rc.update_bogons.sh
                    IPv4:

                    egrep -v "^192.168.0.0/16|^172.16.0.0/12|^10.0.0.0/8" /tmp/bogons > /etc/bogons
                    

                    IPv6:

                    egrep -iv "^fc00::/7" /tmp/bogonsv6 > /etc/bogonsv6
                    

                    http://tools.ietf.org/html/rfc5735

                    0.0.0.0/8 - Addresses in this block refer to source hosts on "this"
                    network.  Address 0.0.0.0/32 may be used as a source address for this
                    host on this network; other addresses within 0.0.0.0/8 may be used to
                    refer to specified hosts on this network ([RFC1122], Section
                    3.2.1.3).

                    Protocols like DHCP (where the source [client] is trying to find out its IP address) need to put something in the source IP field. 0.0.0.0 is a good choice.

                    So, there is an argument that 0.0.0.0/8 (or at least some of it) is "link-local" IPv4 address space. So it is not appropriate to consider it "bogon", as it is used legitimately on any local link by whatever protocol has the need.

                    As the Greek philosopher Isosceles used to say, "There are 3 sides to every triangle."
                    If I helped you, then help someone else - buy someone a gift from the INF catalog http://secure.inf.org/gifts/usd/

                    1 Reply Last reply Reply Quote 0
                    • K
                      kaipanoi
                      last edited by Oct 1, 2013, 11:55 PM

                      This was a very frustrating bug. Thanks to every here for sorting it out.

                      @phil.davis:

                      /etc/rc.update_bogons.sh
                      IPv4:

                      egrep -v "^192.168.0.0/16|^172.16.0.0/12|^10.0.0.0/8" /tmp/bogons > /etc/bogons
                      

                      IPv6:

                      egrep -iv "^fc00::/7" /tmp/bogonsv6 > /etc/bogonsv6
                      

                      http://tools.ietf.org/html/rfc5735

                      0.0.0.0/8 - Addresses in this block refer to source hosts on "this"
                      network.  Address 0.0.0.0/32 may be used as a source address for this
                      host on this network; other addresses within 0.0.0.0/8 may be used to
                      refer to specified hosts on this network ([RFC1122], Section
                      3.2.1.3).

                      Protocols like DHCP (where the source [client] is trying to find out its IP address) need to put something in the source IP field. 0.0.0.0 is a good choice.

                      So, there is an argument that 0.0.0.0/8 (or at least some of it) is "link-local" IPv4 address space. So it is not appropriate to consider it "bogon", as it is used legitimately on any local link by whatever protocol has the need.

                      1 Reply Last reply Reply Quote 0
                      • First post
                        Last post
                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                        This community forum collects and processes your personal information.
                        consent.not_received