Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Firewall Rule "please match the requested format"

    Scheduled Pinned Locked Moved General pfSense Questions
    17 Posts 10 Posters 10.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DerelictD
      Derelict LAYER 8 Netgate
      last edited by

      https://forum.pfsense.org/index.php?topic=84679.0

      You are on a shrinking island with sharks everywhere.

      Chattanooga, Tennessee, USA
      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
      Do Not Chat For Help! NO_WAN_EGRESS(TM)

      1 Reply Last reply Reply Quote 0
      • C
        cmb
        last edited by

        @Derelict:

        You are on a shrinking island with sharks everywhere.

        Indeed. And it's absolutely not true that 32 bit is more stable. In the past couple years, 32 bit has had issues that 64 bit hasn't, and the reverse hasn't been true at all. It also doesn't matter you only have 2 GB RAM, there are reasons 64 bit is better other than more addressable memory.

        But I doubt this is architecture-specific, because the "please match the requested format" comes from the client browser via javascript, which is the same either way. You probably have a stray space in there, or some other character other than numbers and periods.

        1 Reply Last reply Reply Quote 0
        • B
          binhvq
          last edited by

          I have checked again with IE, then the issue is not exist anymore. However I had re-installed with 64bit version as your recommendation. Thanks

          1 Reply Last reply Reply Quote 0
          • B
            bbrendon
            last edited by

            I've started having this problem lately. I'm not sure why. Was there ever a solution?

            It seems that chrome is the problem? I was able to get around it with IE.

            1 Reply Last reply Reply Quote 0
            • X
              X505
              last edited by

              @bbrendon:

              I've started having this problem lately. I'm not sure why. Was there ever a solution?

              It seems that chrome is the problem? I was able to get around it with IE.

              Just got the same issue with chrome, solved with firefox

              1 Reply Last reply Reply Quote 0
              • B
                bbrendon
                last edited by

                I found a link to a patch on github in another thread. I'm guessing it'll be iNcluded in the next release.

                1 Reply Last reply Reply Quote 0
                • jimpJ
                  jimp Rebel Alliance Developer Netgate
                  last edited by

                  • Navigate to System > Package Manager, Available Packages tab
                  • Install the System Patches package
                  • Navigate to System > Patches
                  • Click + Add New Patch
                  • Enter the Description: Chrome Bug Workaround
                  • Enter the URL/Commit ID: 83469e50681bf1ab0388e5cb756d5198b7f705f4
                  • Click Save
                  • Click Fetch
                  • Click Apply

                  Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                  Need help fast? Netgate Global Support!

                  Do not Chat/PM for help!

                  1 Reply Last reply Reply Quote 0
                  • Z
                    Zimeon
                    last edited by

                    The fix worked! Thank you :)

                    1 Reply Last reply Reply Quote 0
                    • O
                      Optimaximal
                      last edited by

                      I tried applying the patch and PFsense blocked it because it cannot be applied cleanly.

                      /usr/bin/patch --directory=/ -t -p2 -i /var/patches/57e90407624ac.patch --check --forward --ignore-whitespace
                      
                      Hmm...  Looks like a unified diff to me...
                      The text leading up to this was:
                      --------------------------
                      |From 83469e50681bf1ab0388e5cb756d5198b7f705f4 Mon Sep 17 00:00:00 2001
                      |From: PiBa-NL 
                      |Date: Fri, 2 Sep 2016 00:59:52 +0200
                      |Subject: [PATCH] Input boxes with setPattern validation should not contain
                      | escape characters as they are already properly considered 'lists of
                      | characters' even when not escaped.
                      |
                      |(cherry picked from commit 8ea3fd0569ac2b1681de5ba3fbc2a2cc20981ad6)
                      |---
                      | src/usr/local/www/firewall_nat_1to1_edit.php               | 4 ++--
                      | src/usr/local/www/firewall_nat_out_edit.php                | 4 ++--
                      | src/usr/local/www/firewall_rules_edit.php                  | 2 +-
                      | src/usr/local/www/services_igmpproxy_edit.php              | 2 +-
                      | src/usr/local/www/services_router_advertisements.php       | 2 +-
                      | src/usr/local/www/services_unbound_domainoverride_edit.php | 2 +-
                      | 6 files changed, 8 insertions(+), 8 deletions(-)
                      |
                      |diff --git a/src/usr/local/www/firewall_nat_1to1_edit.php b/src/usr/local/www/firewall_nat_1to1_edit.php
                      |index aa25ff4..b0f1d02 100644
                      |--- a/src/usr/local/www/firewall_nat_1to1_edit.php
                      |+++ b/src/usr/local/www/firewall_nat_1to1_edit.php
                      --------------------------
                      Patching file usr/local/www/firewall_nat_1to1_edit.php using Plan A...
                      Hunk #1 succeeded at 472 (offset 1 line).
                      Hunk #2 succeeded at 499 (offset 1 line).
                      Hmm...  The next patch looks like a unified diff to me...
                      The text leading up to this was:
                      --------------------------
                      |diff --git a/src/usr/local/www/firewall_nat_out_edit.php b/src/usr/local/www/firewall_nat_out_edit.php
                      |index 6b5d076..1fc3a62 100644
                      |--- a/src/usr/local/www/firewall_nat_out_edit.php
                      |+++ b/src/usr/local/www/firewall_nat_out_edit.php
                      --------------------------
                      Patching file usr/local/www/firewall_nat_out_edit.php using Plan A...
                      Hunk #1 succeeded at 514 (offset -2 lines).
                      Hunk #2 succeeded at 538 (offset -2 lines).
                      Hmm...  The next patch looks like a unified diff to me...
                      The text leading up to this was:
                      --------------------------
                      |diff --git a/src/usr/local/www/firewall_rules_edit.php b/src/usr/local/www/firewall_rules_edit.php
                      |index d1f1858..7a4862e 100644
                      |--- a/src/usr/local/www/firewall_rules_edit.php
                      |+++ b/src/usr/local/www/firewall_rules_edit.php
                      --------------------------
                      Patching file usr/local/www/firewall_rules_edit.php using Plan A...
                      Hunk #1 succeeded at 1356 (offset 1 line).
                      Hmm...  The next patch looks like a unified diff to me...
                      The text leading up to this was:
                      --------------------------
                      |diff --git a/src/usr/local/www/services_igmpproxy_edit.php b/src/usr/local/www/services_igmpproxy_edit.php
                      |index 44628a7..3513369 100644
                      |--- a/src/usr/local/www/services_igmpproxy_edit.php
                      |+++ b/src/usr/local/www/services_igmpproxy_edit.php
                      --------------------------
                      Patching file usr/local/www/services_igmpproxy_edit.php using Plan A...
                      Hunk #1 succeeded at 257 (offset 1 line).
                      Hmm...  The next patch looks like a unified diff to me...
                      The text leading up to this was:
                      --------------------------
                      |diff --git a/src/usr/local/www/services_router_advertisements.php b/src/usr/local/www/services_router_advertisements.php
                      |index 5cd5c7c..bd031e2 100644
                      |--- a/src/usr/local/www/services_router_advertisements.php
                      |+++ b/src/usr/local/www/services_router_advertisements.php
                      --------------------------
                      Patching file usr/local/www/services_router_advertisements.php using Plan A...
                      No such line 467 in input file, ignoring
                      Hunk #1 succeeded at 413 (offset -55 lines).
                      Hmm...  The next patch looks like a unified diff to me...
                      The text leading up to this was:
                      --------------------------
                      |diff --git a/src/usr/local/www/services_unbound_domainoverride_edit.php b/src/usr/local/www/services_unbound_domainoverride_edit.php
                      |index 36be9af..76d25e7 100644
                      |--- a/src/usr/local/www/services_unbound_domainoverride_edit.php
                      |+++ b/src/usr/local/www/services_unbound_domainoverride_edit.php
                      --------------------------
                      Patching file usr/local/www/services_unbound_domainoverride_edit.php using Plan A...
                      Hunk #1 failed at 165.
                      1 out of 1 hunks failed while patching usr/local/www/services_unbound_domainoverride_edit.php
                      done
                      
                      1 Reply Last reply Reply Quote 0
                      • jimpJ
                        jimp Rebel Alliance Developer Netgate
                        last edited by

                        If it doesn't apply cleanly then either you're not on 2.3.2 or something has changed the files it is patching.

                        If you're not on 2.3.2, upgrade. If you have changed something else, then you might have to apply the patch manually. Looks like it was just services_unbound_domainoverride_edit.php – perhaps it was manually edited?

                        Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                        Need help fast? Netgate Global Support!

                        Do not Chat/PM for help!

                        1 Reply Last reply Reply Quote 0
                        • O
                          Optimaximal
                          last edited by

                          @jimp:

                          If it doesn't apply cleanly then either you're not on 2.3.2 or something has changed the files it is patching.

                          If you're not on 2.3.2, upgrade. If you have changed something else, then you might have to apply the patch manually. Looks like it was just services_unbound_domainoverride_edit.php – perhaps it was manually edited?

                          Sorry, just realised i'm still on 2.3-RELEASE. Can't update during the day, so it'll have to wait.

                          1 Reply Last reply Reply Quote 0
                          • U
                            uncleaelfrich
                            last edited by

                            I switched over to Microsoft Edge and it worked fine.

                            1 Reply Last reply Reply Quote 0
                            • JeGrJ
                              JeGr LAYER 8 Moderator
                              last edited by

                              Is that patch/fix en route for 2.3.2_1 or something alike? We normally don't want to include hot patches into our live clusters as the upgrade to a newer version shall be without hitch. On the test cluster it works fine.

                              Don't forget to upvote 👍 those who kindly offered their time and brainpower to help you!

                              If you're interested, I'm available to discuss details of German-speaking paid support (for companies) if needed.

                              1 Reply Last reply Reply Quote 0
                              • jimpJ
                                jimp Rebel Alliance Developer Netgate
                                last edited by

                                It will be in 2.3.2_1.

                                Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                                Need help fast? Netgate Global Support!

                                Do not Chat/PM for help!

                                1 Reply Last reply Reply Quote 0
                                • First post
                                  Last post
                                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.