Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    States

    Scheduled Pinned Locked Moved Firewalling
    25 Posts 5 Posters 2.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DerelictD
      Derelict LAYER 8 Netgate
      last edited by

      By default, a UDP state is automatically removed after 60 seconds of inactivity. Setting the firewall to Conservative in System > Advanced, Firewall & NAT increases that to 15 minutes. pfctl -st will show you the current timeouts.

      You would likely need two rules to pass the UDP traffic without creating any states:

      INSIDE (LAN) Pass UDP source BIND_SERVER dest any port 53 State: No
      OUTSIDE (WAN) Pass UDP source any dest BIND_SERVER port 53 State: No

      And I think the following will work for TCP:

      INSIDE (LAN) Pass TCP source BIND_SERVER dest any port 53 TCP Flags any State: No
      OUTSIDE (WAN) Pass TCP source any dest BIND_SERVER port 53 TCP flags any state: No

      You probably also need floating rules that match these in the outbound direction on the other interface to keep states from being created there too.

      Really hard to believe you're doing 100K DNS queries a minute though. I'd fix that instead.

      Chattanooga, Tennessee, USA
      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
      Do Not Chat For Help! NO_WAN_EGRESS(TM)

      1 Reply Last reply Reply Quote 0
      • O
        OutbackMatt
        last edited by OutbackMatt

        The thing is that I really am NOT doing 100000 DNS checks a minute.
        I just did another 'pfctl -F states' - the previous one was 16 to 18 hours ago, and 165109 states were cleared.

        I doubt that I have done even half that number of DNS checks in that same 18 or so hours.
        My mailserver isn't very busy, I handle maybe 500 messages per day, and there should be about 20 DNS lookups for each of those, and perhaps a DNS check for some other incoming connection attempts (to see where the connection is from) for those accessing my websites, or trying to connect IMAP or POP (eg users and hackers). I have only about 80 or so users, and I block say six or seven hacking attempts per day.

        This just doesn't match the number of states at all. It is really hard to see how I could get to 200 000 states per day, even if most of them are duplicated, but for different interfaces.

        It is like all of the states are remembered and none are dropped at all. I was thinking if I didn't record states for port 53, that it would lighten the load and I may get more than 24 hours without having to manually force the dropping of all states.

        I can't check the web based GUI for states as the GUI times out when the states table is large, the states display doesn't show created time anyway. I have many tens of thousands of states that show NO_TRAFFIC:SINGLE or SINGLE:NO_TRAFFIC, not all of these are port 53, but many are.

        There is clearly a problem in my setup, but I have no idea on how to track it down.
        My entire rule set is three NAT Port forward auto generated rules.
        #1 forwards mail ports to my mailserver
        #2 forwards web server ports to my web server
        #3 custom RDP port forward to my desktop

        This isn't a fancy setup.
        This is intended to protect my home office from outside attack, and safeguard my teenagers while they web surf.

        What could be causing the states to be persistent?
        This seems to have started with 2.4.4

        1 Reply Last reply Reply Quote 0
        • DerelictD
          Derelict LAYER 8 Netgate
          last edited by

          Really hard to say based on what has been shown. pfctl -vvss | grep -A3 _some_criteria_ where _some_criteria is something like a remote DNS server that gets used all the time and has a bunch of states but is manageable to work with. Something to narrow it down.

          That will show you when the state was created, when it last passed traffic, etc.

          NO_TRAFFIC:SINGLE should drop off fairly quickly by default.

          Chattanooga, Tennessee, USA
          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
          Do Not Chat For Help! NO_WAN_EGRESS(TM)

          1 Reply Last reply Reply Quote 0
          • O
            OutbackMatt
            last edited by

            running 'pftcl --vvss | grep -A3 8.8.8.8:53 >/tmp/output.txt creates an output file that starts like this (37855 lines in total!!)

            0_1543199174870_04f31338-43b3-4c1e-82d8-0dd05b5624a6-image.png

            8.8.8.8:53 is Google DNS server which is queried reasonably frequently it seems from my BIND9
            Does that first one look to be 28 hours, 18 minutes and 40 seconds old, and already expired?
            Whiteout is my public IP address
            Red-out is other public IP addresses

            1 Reply Last reply Reply Quote 0
            • O
              OutbackMatt
              last edited by OutbackMatt

              This post is deleted!
              1 Reply Last reply Reply Quote 0
              • DerelictD
                Derelict LAYER 8 Netgate
                last edited by

                All of those expires in 00:00:00 are very very strange.

                It's like your states aren't expiring out of the state table when they should. I've never seen anything like that before.

                I would completely revisit anything you have done to try to solve this problem. Custom rules, state timeouts, etc.

                Chattanooga, Tennessee, USA
                A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                Do Not Chat For Help! NO_WAN_EGRESS(TM)

                1 Reply Last reply Reply Quote 0
                • DerelictD
                  Derelict LAYER 8 Netgate
                  last edited by

                  What is the output of pfctl -st ??

                  Chattanooga, Tennessee, USA
                  A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                  DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                  Do Not Chat For Help! NO_WAN_EGRESS(TM)

                  1 Reply Last reply Reply Quote 0
                  • O
                    OutbackMatt
                    last edited by

                    0_1543202637949_b8a2823e-190b-4d02-ad97-21e867f773cb-image.png

                    1 Reply Last reply Reply Quote 0
                    • DerelictD
                      Derelict LAYER 8 Netgate
                      last edited by

                      Those expired states should be being purged every 10 seconds based on interval.

                      I would undo everything you have done to try to solve this. All adjusted timeouts, adaptive settings, etc.

                      These are the defaults for mode Normal:

                      tcp.first                   120s
                      tcp.opening                  30s
                      tcp.established           86400s
                      tcp.closing                 900s
                      tcp.finwait                  45s
                      tcp.closed                   90s
                      tcp.tsdiff                   30s
                      udp.first                    60s
                      udp.single                   30s
                      udp.multiple                 60s
                      icmp.first                   20s
                      icmp.error                   10s
                      other.first                  60s
                      other.single                 30s
                      other.multiple               60s
                      frag                         30s
                      interval                     10s
                      src.track                     0s
                      

                      This points to something with the clock as has been mentioned before:

                      https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=222126

                      Chattanooga, Tennessee, USA
                      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                      Do Not Chat For Help! NO_WAN_EGRESS(TM)

                      1 Reply Last reply Reply Quote 0
                      • O
                        OutbackMatt
                        last edited by

                        Reading the link that you provided, the suggested 'fix' (last post) is to upgrade to FreeBSD 12

                        which isn't general release yet, although it is getting close (perhaps weeks away)

                        I created a new PFsense VM on my hyperV server running 2.3.5-Release, and already it seems that my internet is MUCH smoother and the states tables is NOT growing outlandishly, and my traffic graphs display nicely.

                        Problem is that I can't install any packages (mail reports, snort etc) unless I 'upgrade' to the newest version of PFSense.

                        I'm open to suggestions.
                        I'll probably try 2.4.1 as that is the next upgrade and I will see what happens

                        1 Reply Last reply Reply Quote 0
                        • O
                          OutbackMatt
                          last edited by OutbackMatt

                          Looking quickly at the release notes it seems that PFsense 2.4.0 was the first to use FreeBSD 11.x

                          And the instant that I upgrade 2.3.5 to current release the traffic graphs stop being normal, and the states table grows etc
                          (another observation I made is that while the newer release is booting on the VM, the Caps light on the keyboard toggles on/off hundreds of times per second)

                          I'll run up another 2.3.5 and use that without the extra packages for the time being

                          1 Reply Last reply Reply Quote 0
                          • O
                            OutbackMatt
                            last edited by

                            Just a followup

                            2.4.x continues to have this problem
                            2.3 was working, but of course there are issues with using an old build, including the lack of packages.

                            I have installed a clean install of the latest 2.5 build, and it is works as well or better than the 2.3 that I have been running.
                            2.5 is based on FreeBSD 12.

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.