Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    (SOLVED)A possible idea/solution to pfSense Bug #9977

    Scheduled Pinned Locked Moved Development
    9 Posts 4 Posters 832 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • T
      tman904
      last edited by tman904

      Hi.

      I apologize if this is the wrong place to post this.

      From looking over the notes in redmine that pertain to the connectivity dropping when captive portal is enabled. Specifically IPFW being the culprit. I'm wondering if the issue isn't simply

      1. IPFW dropping packets that aren't part of existing connections?
        or
      2. pf.ko and ipfw.ko can't interoperate when looking at packets from the tcp/ip stack.

      2 would most likely be harder to fix.
      But as far as 1 goes couldn't pf be used for the captive portal as well? Especially since it already has all the active states in RAM.

      I may have to take a look around on FreeBSD's forums. But I'm not sure pf.ko and ipfw.ko can interoperate, when looking at packets from the tcp/ip stack at the same time. Also because two processes are reading potentially the same mbufs it seems like that could result in some type of lock in the network stack. Or the socket that captive portal is listening on.

      I'm no expert just thought I could provide some help in the matter.

      GertjanG 1 Reply Last reply Reply Quote 0
      • GertjanG
        Gertjan @tman904
        last edited by Gertjan

        @tman904 said in A possible idea/solution to pfSense Bug #9977:

        But as far as 1 goes couldn't pf be used for the captive portal as well? Especially since it already has all the active states in RAM

        Hi,

        The captive portal uses ipfw and pf.
        ipfw : is used for the implementation of the captive portal login page redirection, and hadling the devices authorized by MAC and/or IP. You can see them using this.
        pf : is being used for the firewall rules entered in the GUI - the interface on which the captive portal is running.

        I don't know if pfSense (Netgate) modifies (the source of) these core FreeBSD programmes / libraries (ko files).
        I guess your question belongs upstream (FreeBSD itself).

        No "help me" PM's please. Use the forum, the community will thank you.
        Edit : and where are the logs ??

        1 Reply Last reply Reply Quote 1
        • T
          tman904
          last edited by

          I wasn't aware that it used both but thank you for explaining it. Anyway I suppose the captive portal is working in 2.4.4? That must mean this problem isn't related to the OS at all.

          All things considered it seems my idea is counter productive.

          GertjanG 1 Reply Last reply Reply Quote 0
          • GertjanG
            Gertjan @tman904
            last edited by

            @tman904 said in A possible idea/solution to pfSense Bug #9977:

            captive portal is working in 2.4.4?

            It rocks on 2.4.4-p3.

            No "help me" PM's please. Use the forum, the community will thank you.
            Edit : and where are the logs ??

            1 Reply Last reply Reply Quote 1
            • T
              tman904
              last edited by

              Good to hear. I'll have to find a way to utilize it. I just haven't found a need to at the moment.

              1 Reply Last reply Reply Quote 0
              • stephenw10S
                stephenw10 Netgate Administrator
                last edited by

                We have to use ipfw in the captive portal to filter at layer 2 initially (by MAC). pf is a layer 3 (and higher) filter only.

                Steve

                1 Reply Last reply Reply Quote 1
                • T
                  tman904
                  last edited by

                  I forgot that IPFW can filter at layer 2. Thanks Steve that helps clear up my confusion about the issue. I couldn't understand why both were being used at once but now I do.

                  Sorry for taking up everyone's time with a silly post.

                  Tyler.

                  1 Reply Last reply Reply Quote 0
                  • jimpJ
                    jimp Rebel Alliance Developer Netgate
                    last edited by

                    #9977 is a regression which only affects pfSense 2.4.5 snapshots. It's not a fundamental incompatibility problem, but something that changed in the FreeBSD source which we need to adjust our code to work with.

                    Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                    Need help fast? Netgate Global Support!

                    Do not Chat/PM for help!

                    1 Reply Last reply Reply Quote 1
                    • T
                      tman904
                      last edited by

                      When I read the notes I wasn't sure what was wrong. I had thought it was just a ruleset issue or something similar. Not a code base change... My bad.

                      Thank you guys for all the work you put into pfSense and FreeBSD.

                      Tyler.

                      1 Reply Last reply Reply Quote 0
                      • First post
                        Last post
                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.