Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Error saving Admin Access page

    Scheduled Pinned Locked Moved Problems Installing or Upgrading pfSense Software
    13 Posts 5 Posters 1.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • R
      revengineer
      last edited by revengineer

      When saving the System -> Advanced -> Admin Access page, I get the error below. Please advise, thank you.

      Notifications in this message: 1

      21:19:21 There were error(s) loading the rules: /tmp/rules.debug:180: unknown port e - The line in question reads [180]: block in log quick proto tcp from <sshguard> to (self) port e tracker 1000000301 label "sshguard"

      1 Reply Last reply Reply Quote 0
      • jimpJ
        jimp Rebel Alliance Developer Netgate
        last edited by

        https://redmine.pfsense.org/issues/8974 -- We've got a fix in for this already for the next release.

        Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

        Need help fast? Netgate Global Support!

        Do not Chat/PM for help!

        1 Reply Last reply Reply Quote 1
        • LucaTNTL
          LucaTNT
          last edited by

          Is there a way to apply a patch or something before the next release?
          I have to manually edit /tmp/rules.debug to delete that line and then apply the rules with pfctl -f /tmp/rules.debug every time I adjust my firewall.
          Also, if I reboot the firewall NAT rules aren't restored until I manually edit that file and manually apply the rules.
          I happened to suffer from a longer power outage, longer than my UPS can bear, so I lost connectivity until I was able to phisically get home and fix everything.

          1 Reply Last reply Reply Quote 0
          • GrimsonG
            Grimson Banned
            last edited by

            https://www.netgate.com/docs/pfsense/development/system-patches.html

            1 Reply Last reply Reply Quote 0
            • jimpJ
              jimp Rebel Alliance Developer Netgate
              last edited by

              Sure, install the System Patches package and then take the relevant commit IDs from the issue linked above and add them, then fetch and apply them. Then edit the SSH settings to what they should be and save.

              Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

              Need help fast? Netgate Global Support!

              Do not Chat/PM for help!

              1 Reply Last reply Reply Quote 0
              • LucaTNTL
                LucaTNT
                last edited by

                Woah, I totally missed that package!
                I applied commit ec439957ce0f70778d89f57eba9553e2afba874a, saved my SSH settings (which were incorrect after the patch) and voilà, everything back to normal.

                Thanks @Grimson and @jimp!

                1 Reply Last reply Reply Quote 1
                • R
                  revengineer
                  last edited by

                  I finally got around to applying the patch and confirm that it solved the issue.

                  Do I need to remove the patch before the next upgrade, which presumably is 2.4.4_1?

                  1 Reply Last reply Reply Quote 0
                  • DerelictD
                    Derelict LAYER 8 Netgate
                    last edited by

                    After the update that includes that fix is installed you can go back and remove the patch. But it also will not hurt anything if you don't.

                    Chattanooga, Tennessee, USA
                    A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                    DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                    Do Not Chat For Help! NO_WAN_EGRESS(TM)

                    R 1 Reply Last reply Reply Quote 1
                    • R
                      revengineer @Derelict
                      last edited by

                      @derelict Thank you. Is it true in general that patches do not need to be reverted before upgrading? I understand that I may have to re-apply a patch after upgrading but I was not sure if not reverting a patch can mess with the upgrade progress to result in an unusable system.

                      1 Reply Last reply Reply Quote 0
                      • DerelictD
                        Derelict LAYER 8 Netgate
                        last edited by

                        Should be fine upgrading with patches applied as long as the patch doesn't break upgrading somehow. None of the official patches should be a problem there.

                        Chattanooga, Tennessee, USA
                        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                        Do Not Chat For Help! NO_WAN_EGRESS(TM)

                        R 1 Reply Last reply Reply Quote 0
                        • R
                          revengineer @Derelict
                          last edited by

                          @derelict Thanks again, that helps for the future.

                          1 Reply Last reply Reply Quote 0
                          • jimpJ
                            jimp Rebel Alliance Developer Netgate
                            last edited by

                            It's safe to upgrade since it doesn't check the files before removing them on upgrade, so the changes are moot. It would do something like this:

                            • Initiate upgrade
                            • Old version of files are removed (most cases) or left as-is (rare but can happen)
                            • New versions of files are put in place / old files left as-is are replaced with new versions
                            • Obsolete files are removed if still left around

                            If, and only if, you had a patch set to auto-apply would it come back after an upgrade. And in most cases patches would fail to apply since the changes are already present in the new code. I say "most cases" as there are rare changes that might possibly apply twice, but such situations are rare, especially with bug fixes.

                            tl;dr: It's safe to leave patched files/patch entries on upgrade, at worst double check that you do not have them set to auto-apply.

                            Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                            Need help fast? Netgate Global Support!

                            Do not Chat/PM for help!

                            R 1 Reply Last reply Reply Quote 2
                            • R
                              revengineer @jimp
                              last edited by

                              @jimp Perfect, thank you for the details. My patch is set up to not auto re-apply after upgrading. So I am set this time. (In the past, I once reinstalled pfsense for good measures after forgetting to revert a patch because I was not sure about these details.)

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.