Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Rules + Schedules Ineffective?

    Scheduled Pinned Locked Moved Firewalling
    53 Posts 25 Posters 27.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • P
      pere
      last edited by

      @phil.davis:

      Does it also work without the "Allow_Internet" rule?
      Without the "Allow_Internet" rule, traffic will be allowed by the ordinary "allow all on LAN" rule at times when it is not blocked. But maybe in that case the system will not know which are the states that need to be "switched off" when the block rule comes into effect.
      Would be interesting to know - I should try it myself  ;)

      I tried it without that ""Allow_internet" rule and then open states remain open…. somehow.

      Also I noticed that some states from floating rules remain open (sometimes) with that both allow and stop rules active.

      Thinking of moving those allow-stop rules to floating or wan area to see  what will happen.

      1 Reply Last reply Reply Quote 0
      • D
        Derf
        last edited by

        @podilarius:

        There is a cron scheduler, I wander if you could setup a state flush just a minute after your block rule goes into effect.

        Well, that's exactly what I did!

        My solution is as follows:

        • Create an alias with all the IPs that should be blocked. Be also sure that you defined the corresponding static mappings in your DHCP server configuration. Let's call this alias 'Children'

        • Create a schedule named 'AccessDenied' and define it to whatever you need. In my case it's 22:00 - 07:00, each and every day.

        • Create a rule on your WAN interface like this: Action Block / Protocol Any / Source Any / Destination 'Children' / Schedule 'AccessDenied'

        • Create the reverse rule on you LAN interface: Action Reject / Protocol Any / Source 'Children' / Destination Any / Schedule 'AccessDenied'

        • As some of you already noted it, these rules will only block/reject new connections but won't kill existing one. This is because pfSense is doing 'statefull packet inspection (SPI)'. This means that, to determine if a packet should pass thru, it will first look at the existing states and then look at the firewall rules. If states shows that the packet is an answer to a previously authorized packet, it will pass thru, regardless any rule.

        So, in addition of the rules we already put in place, we also need to kill all the states from any IP belonging to the 'Children' list.
        I wrote the following (quick and dirty) script to do the job…

        
        for i in `pfctl -t Children -Ts`
        do
        	echo "Killing states from/to $i"
        	pfctl -k $i
        done
        
        

        … and put in /etc as pf_KillStates. (be also sure to chmod it with the value 777)

        • Finally, create a new cron job to launch /etc/pf_KillStates every day at 22:01 (1 minute after the beginning of the 'AccessDenied' schedule).

        Note that it seems that the command```
        pfctl -t Children -Ts

        pfctl: Table does not exist.

        
        Hope this will help some dads  ;)
        
        PS: You may have a useful look at the pfctl manpage (as I did!)
        http://www.openbsd.org/cgi-bin/man.cgi?query=pfctl
        1 Reply Last reply Reply Quote 0
        • P
          phil.davis
          last edited by

          • Create a rule on your WAN interface like this: Action Block / Protocol Any / Source Any / Destination 'Children' / Schedule 'AccessDenied'

          Note: This rule is not needed in any normal installation. The WAN will already have a general block at all times, and in any case there will be no traffic initiated from the real public internet with destination IPs in 'Children', because 'Children' is a bunch of private IP addresses in the LAN behind pfSense.

          As the Greek philosopher Isosceles used to say, "There are 3 sides to every triangle."
          If I helped you, then help someone else - buy someone a gift from the INF catalog http://secure.inf.org/gifts/usd/

          1 Reply Last reply Reply Quote 0
          • D
            Derf
            last edited by

            Thanks for your precision Phil.
            It will help me to simplify my ruleset a bit.

            Merry X-Mas  :)

            1 Reply Last reply Reply Quote 0
            • O
              OzRattler
              last edited by

              @podilarius:

              There is a cron scheduler, I wander if you could setup a state flush just a minute after your block rule goes into effect.

              Hello One and All,

              That was how I got around the drama.  Downside is that when holidays arrive, I forgot to remove the cron scheduler to kill all states.  Unhappy son (and me as well at times) until I woke up.

              I am relieved that the thread I started was not just me being dull or failing "to see the forest for the trees" and glad it has triggered some discussion.

              @derf, I am about to upgrade from 2.0.3 to the latest and once that is complete, I will then go through your steps. I also understand phil.davis remark about the WAN element.

              Nonetheless, does anyone know whether or not this part of pfSense will be (or has been) addressed?  As for the latter part of that question, I will soon find out. …....upgrading in 5 minutes.  Wish me luck!

              Hope we all had a fab Christmas and may 2014 be superb!!!


              …insanity is so confusing...

              1 Reply Last reply Reply Quote 0
              • C
                craigjl77
                last edited by

                Good Luck OzRattler, may all your overs be wicket maidens…. ;-)

                1 Reply Last reply Reply Quote 0
                • P
                  podilarius
                  last edited by

                  I would like to see that in the base code of a rule with a schedule.
                  I have used this and it works great. Thanks.

                  Phil.Davis, this was not to block incoming, but to block outgoing once the block schedule was in place. While it is true it is not needed in normal rule sets, but any rule that has a schedule on it, needs to have the states killed once it is supposed to be blocking. Or at least an option to kill the states. I can think of a situation where the rule should not drop states. This would be in a rule sending traffic to another shaping queue. This might help make sure the correct traffic shaping is used, but would interrupt the current session, which is probably unwanted.

                  1 Reply Last reply Reply Quote 0
                  • M
                    MindfulCoyote
                    last edited by

                    @pere:

                    I tried it without that ""Allow_internet" rule and then open states remain open…. somehow.
                    Also I noticed that some states from floating rules remain open (sometimes) with that both allow and stop rules active.
                    Thinking of moving those allow-stop rules to floating or wan area to see  what will happen.

                    Pere, did you make any headway with your workaround for the "Schedule States" bug? I thought I'd re-invented your solution, but it only worked in testing. When I dropped my rules into a live environment they are failing to remove active states. I feel that I will need to hardcode a crontab script to call pcftl.

                    On a side note… can anyone point me to the documentation for pfSense's version of the pfctl command?

                    Err

                    –
                    Erreu Gedmon

                    Firewalls are hard...
                    but the book makes it easier: https://portal.pfsense.org/book/

                    1 Reply Last reply Reply Quote 0
                    • N
                      NotAnAlias
                      last edited by

                      I'm on 2.1.5 and the issue still persists. At 8pm I want the connections to be passed over to a 2nd vpn since the first vpn gets very slow at night.

                      It correctly works if I turn a machine on past 8pm, the connection goes through the 2nd vpn. However for computers already on, they don't move over.

                      Is there a fix without using cron?

                      1 Reply Last reply Reply Quote 0
                      • D
                        doktornotor Banned
                        last edited by

                        @NotAnAlias:

                        Is there a fix without using cron?

                        Use 2.2

                        https://redmine.pfsense.org/issues/3558

                        1 Reply Last reply Reply Quote 0
                        • N
                          NotAnAlias
                          last edited by

                          Schedules do work properly with no hassle on 2.2 release.
                          Thanks pfsense devs  :D

                          1 Reply Last reply Reply Quote 0
                          • D
                            dunc
                            last edited by

                            They still don't work quite right for me in 2.2-RELEASE. I set up a schedule for 5pm to 10pm, then created two rules: one passes TCP packets, the other passes UDP packets. Outside the scheduled time the rules don't exist and the default block rule drops packets. When 10pm rolled around, the TCP rule took effect, the TCP states were reset, and further TCP connections were blocked. But the UDP states continued operating and the game the rule was intended to disable continued running.

                            I ran pfctl -s rules from the console and the pass rules for both TCP and UDP are gone, so it's apparently just that the existing UDP states were not reset when the schedule expired.

                            1 Reply Last reply Reply Quote 0
                            • O
                              OzRattler
                              last edited by

                              Updating that I have today moved across to 2.2 and just fixing other minor issues - such as the Console won't display options etc.

                              I will be watching how the Schedules go especially since I toughened them up via CRON and flushing ALL states after the start time of any set schedule.

                              Finger's are crossed!!!!

                              Oz


                              …insanity is so confusing...

                              1 Reply Last reply Reply Quote 0
                              • J
                                jdusablon
                                last edited by

                                I'm on 2.2.6 and behavior persists with certain state types. I understand the logic behind the handling of states, but the schedule should work.

                                Have a son who has learned to use betternet vpn, which keeps a state open, unfortunately. In turn, this allows him full internet access after he's supposed to have it.

                                EDIT:
                                The bug supposed to address this (will find number and add to this post) seems not to have addressed the issue at all.

                                In System - advanced - misc: (which BTW is a stupid place to bury this option) the option "schedule states" shows an unchecked checkbox by default.  According to the explanation:

                                "By default, when a schedule expires, connections permitted by that schedule are killed. This option overrides that behavior by not clearing states for existing connections"

                                The default behaviour of schedules should be as explained, but active states remain persistent after schedule block occurs.

                                Is this a reopen bug issue? I don't think the bug should be closed.

                                1 Reply Last reply Reply Quote 0
                                • J
                                  Joelcento
                                  last edited by

                                  pfsense - 2.2.6

                                  I've removed the default allow rule and setup allow rules permitting access.

                                  Works great for all but UDP.

                                  There appears to be no solution so I'm now going to play with placing the default allow back in and utilising the traffic shaper to kill data flow between certain times.
                                  I have my Fingers crossed.

                                  If there's a thread that I've missed with a solution (apart from the cron job) please let me know!

                                  Thank you!

                                  1 Reply Last reply Reply Quote 0
                                  • T
                                    thecableguy
                                    last edited by

                                    Has this been fixed or has someone found a reliable work-around?

                                    1 Reply Last reply Reply Quote 0
                                    • G
                                      gbreadman
                                      last edited by

                                      I'm on 2.2.6 and still experiencing this issue.. : https://forum.pfsense.org/index.php?topic=108943.0
                                      Waiting for a solution..

                                      1 Reply Last reply Reply Quote 0
                                      • T
                                        thecableguy
                                        last edited by

                                        Any updates?

                                        I am having an issue using a scheduled block on Steam ports -states not clearing automatically..

                                        1 Reply Last reply Reply Quote 0
                                        • T
                                          thecableguy
                                          last edited by

                                          Could someone please have a look at my LAN rules?

                                          I have Steam ports as an alias ' Steam' on 2x different schedules..

                                          The goal is to block Steam at a scheduled time however, the states do not flush ?

                                          Am I doing something wrong?

                                          Rules.JPG
                                          Rules.JPG_thumb

                                          1 Reply Last reply Reply Quote 0
                                          • T
                                            thecableguy
                                            last edited by

                                            Anyone?  :o

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.