• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

[SOLVED] 2.4.3 - /rc.filter_configure_sync: cannot define table bogonsv6

Scheduled Pinned Locked Moved Problems Installing or Upgrading pfSense Software
52 Posts 22 Posters 21.0k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • C
    cybrnook
    last edited by Apr 3, 2018, 2:31 AM

    I did a filter reload as well after changing to 400k. Just to make sure all rules were loaded properly.

    1 Reply Last reply Reply Quote 0
    • R
      rkillcrazy
      last edited by Apr 3, 2018, 11:38 AM

      @cybrnook:

      I did a filter reload as well after changing to 400k. Just to make sure all rules were loaded properly.

      Care to share with others the steps you took to accomplish this?

      1 Reply Last reply Reply Quote 0
      • C
        cybrnook
        last edited by Apr 3, 2018, 12:41 PM

        @rkillcrazy:

        @cybrnook:

        I did a filter reload as well after changing to 400k. Just to make sure all rules were loaded properly.

        Care to share with others the steps you took to accomplish this?

        Sure

        System > Advanced > Firewall & NAT > Firewall Maximum Table Entries > 400000
        Status > Filter Reload > Reload Filter

        1 Reply Last reply Reply Quote 0
        • C
          corvey
          last edited by Apr 3, 2018, 6:03 PM

          Fresh install of pfSense 2.4.3  introduces these errors while configuring my interfaces for the first time:

          –---------------------------------------------------------------------------------
              There were error(s) loading the rules: /tmp/rules.debug:18: cannot define table bogonsv6: Cannot allocate memory - The line in question reads [18]: table <bogonsv6> persist file "/etc/bogonsv6"
              @ 2018-04-03 13:46:06
              There were error(s) loading the rules: /tmp/rules.debug:19: cannot define table bogonsv6: Cannot allocate memory - The line in question reads [19]: table <bogonsv6> persist file "/etc/bogonsv6"
              @ 2018-04-03 13:47:12
              There were error(s) loading the rules: /tmp/rules.debug:20: cannot define table bogonsv6: Cannot allocate memory - The line in question reads [20]: table <bogonsv6> persist file "/etc/bogonsv6"
              @ 2018-04-03 13:48:04
              There were error(s) loading the rules: /tmp/rules.debug:20: cannot define table bogonsv6: Cannot allocate memory - The line in question reads [20]: table <bogonsv6> persist file "/etc/bogonsv6"
              @ 2018-04-03 13:49:17
              There were error(s) loading the rules: /tmp/rules.debug:21: cannot define table bogonsv6: Cannot allocate memory - The line in question reads [21]: table <bogonsv6> persist file "/etc/bogonsv6"
              @ 2018-04-03 13:49:36
              There were error(s) loading the rules: /tmp/rules.debug:21: cannot define table bogonsv6: Cannot allocate memory - The line in question reads [21]: table <bogonsv6> persist file "/etc/bogonsv6"
              @ 2018-04-03 13:49:37
              There were error(s) loading the rules: /tmp/rules.debug:21: cannot define table bogonsv6: Cannot allocate memory - The line in question reads [21]: table <bogonsv6> persist file "/etc/bogonsv6"
              @ 2018-04-03 13:49:40
              There were error(s) loading the rules: /tmp/rules.debug:22: cannot define table bogonsv6: Cannot allocate memory - The line in question reads [22]: table <bogonsv6> persist file "/etc/bogonsv6"
              @ 2018-04-03 13:50:22
              There were error(s) loading the rules: /tmp/rules.debug:22: cannot define table bogonsv6: Cannot allocate memory - The line in question reads [22]: table <bogonsv6> persist file "/etc/bogonsv6"
              @ 2018-04-03 13:50:23
              There were error(s) loading the rules: /tmp/rules.debug:22: cannot define table bogonsv6: Cannot allocate memory - The line in question reads [22]: table <bogonsv6> persist file "/etc/bogonsv6"
              @ 2018-04-03 13:50:26
              There were error(s) loading the rules: /tmp/rules.debug:23: cannot define table bogonsv6: Cannot allocate memory - The line in question reads [23]: table <bogonsv6> persist file "/etc/bogonsv6"
              @ 2018-04-03 13:50:55
              There were error(s) loading the rules: /tmp/rules.debug:23: cannot define table bogonsv6: Cannot allocate memory - The line in question reads [23]: table <bogonsv6> persist file "/etc/bogonsv6"
              @ 2018-04-03 13:50:56
              There were error(s) loading the rules: /tmp/rules.debug:23: cannot define table bogonsv6: Cannot allocate memory - The line in question reads [23]: table <bogonsv6> persist file "/etc/bogonsv6"
              @ 2018-04-03 13:51:00
              There were error(s) loading the rules: /tmp/rules.debug:24: cannot define table bogonsv6: Cannot allocate memory - The line in question reads [24]: table <bogonsv6> persist file "/etc/bogonsv6"
              @ 2018-04-03 13:51:37
              There were error(s) loading the rules: /tmp/rules.debug:24: cannot define table bogonsv6: Cannot allocate memory - The line in question reads [24]: table <bogonsv6> persist file "/etc/bogonsv6"
              @ 2018-04-03 13:51:38
          –----------------------------------------------------------------------------------

          I'm guessing the final solution in this thread is to increase the Firewall Maximum Table Entries to 800000 will be enough to cure the problem problem for awhile without any ill effects.  This is a new error in this release I haven't encountered before.

          pfSensational™

          1 Reply Last reply Reply Quote 0
          • C
            cybrnook
            last edited by Apr 3, 2018, 6:21 PM Apr 3, 2018, 6:14 PM

            400000 is more than enough for today. As we are right now, the bogon file and our firewall add up to about 95000~ entries. When it reloads this table, it doubles in size before the old entries are dropped. Many of us just break that 200000 limit that is default today 95000*2 + whatever else, pushing us over the 200k limit….

            The new default will be 400000 in the next release. I am using that value, and it works fine, giving you about an additional 100000 buffer (since it's X * 2 = Y, 200000 Bogon list for example would burp to 400000 on reload. but it's only at about 95000 now all-in, so you have 100000 to go, which is a lot).

            People are also seeing it in 2.4.2+ as well, so not just a 2.4.3 thing. But pops up soon after the install/upgrade, triggering the error message.

            1 Reply Last reply Reply Quote 0
            • H
              humps
              last edited by Apr 3, 2018, 7:12 PM

              @cybrnook:

              People are also seeing it in 2.4.2+ as well, so not just a 2.4.3 thing. But pops up soon after the install/upgrade, triggering the error message.

              Yes Confirmed.
              I'm Running Pfsense 2.4.2 (X64) and these errors showed up in my logs yesterday (April 2, 2018).
              I haven't seen none since today but i have upend my entries to 500000 to prevent a re occurrence.

              Regards

              1 Reply Last reply Reply Quote 0
              • C
                cybrnook
                last edited by Apr 3, 2018, 7:28 PM

                I assume what's happening is the monthly cron job that downloads and installs the latest bogons file is slowly working it's way through the community. So regardless of version, people will start popping in here one by one with the issue over the next ~25 - 30 days.

                I assume what's likely happening on new installs (and likely upgrades), is that part of the post processing setup is to download the latest file, then schedule it to download again in 30 days time. That's why I think I am seeing it on fresh installs, right after initial setup wizard.

                1 Reply Last reply Reply Quote 0
                • K
                  karlfife
                  last edited by Apr 4, 2018, 2:39 AM

                  April 3 2018 bogons:  100,001 rows

                  ipv6 bogon prefixes 95,997
                  ipv4 bogon prefixes 4004

                  bogon table size: 100,001 rows

                  If 2x are required to reload the table, then 200K seems slightly too small  ;)

                  I now notice that my 2.4.2 systems are choking the same way as my freshly updated 2.4.3 systems if I both update bogons and reload the filter.

                  1 Reply Last reply Reply Quote 0
                  • V
                    vMAC
                    last edited by Apr 4, 2018, 3:02 PM

                    New to pfSense and after installing 2.4.3 on a new install this popped up in my alerts.
                    Unfortunately until I resolved this issue none of my port forwards would work at all.

                    I bumped up the number of entries to 500,000 and my port forwards started working immediately.

                    This is just an FYI in case you can't get your port forwards to work to anyone else who is very new to pfSense.

                    1 Reply Last reply Reply Quote 0
                    • B
                      Bili_boy
                      last edited by Apr 4, 2018, 10:12 PM

                      The thing I don't understand is why it was 200K for you by default in the first place. I'm still on 2.3.4 and my default for "Firewall Maximum Table Entries" is 2M. (2 000 000). Did they reduce the default on purpose ?

                      1 Reply Last reply Reply Quote 0
                      • C
                        cybrnook
                        last edited by Apr 4, 2018, 11:37 PM

                        Without going through the git revisions, I would say yes that somewhere between your release and the 2.4 releases it got changed to two hundred thousand 200,000. If you look at the link in the op for the bug ticket to get it fixed, the wording reads of changing the old default value of 200k to 400k. Letting you know that yes, 200k was the current default.

                        What I am also thinking is that maybe some add on packages, like pfblocker or snort etc., change this default value to a higher number based off the nature of what new rules they will likely need. This is purely speculative.

                        1 Reply Last reply Reply Quote 0
                        • J
                          jdeloach
                          last edited by Apr 5, 2018, 12:53 AM

                          @Bili_boy:

                          The thing I don't understand is why it was 200K for you by default in the first place. I'm still on 2.3.4 and my default for "Firewall Maximum Table Entries" is 2M. (2 000 000). Did they reduce the default on purpose ?

                          I've wondered the same thing.  I'm on 2.4.3 and the default for "Firewall Maximum Table Entries" is 2M (2,000,000) on my system.  I upgraded from 2.4.2 p1 but I don't remember what it was then and I don't remember ever changing it.  Not sure where all these people are getting that their system has 200K as default.

                          1 Reply Last reply Reply Quote 0
                          • C
                            cybrnook
                            last edited by Apr 5, 2018, 1:00 AM

                            @jdeloach:

                            @Bili_boy:

                            The thing I don't understand is why it was 200K for you by default in the first place. I'm still on 2.3.4 and my default for "Firewall Maximum Table Entries" is 2M. (2 000 000). Did they reduce the default on purpose ?

                            I've wondered the same thing.  I'm on 2.4.3 and the default for "Firewall Maximum Table Entries" is 2M (2,000,000) on my system.  I upgraded from 2.4.2 p1 but I don't remember what it was then and I don't remember ever changing it.  Not sure where all these people are getting that their system has 200K as default.

                            what additional packages do you have installed?

                            1 Reply Last reply Reply Quote 0
                            • J
                              jdeloach
                              last edited by Apr 5, 2018, 1:14 AM

                              @cybrnook:

                              @jdeloach:

                              @Bili_boy:

                              The thing I don't understand is why it was 200K for you by default in the first place. I'm still on 2.3.4 and my default for "Firewall Maximum Table Entries" is 2M. (2 000 000). Did they reduce the default on purpose ?

                              I've wondered the same thing.  I'm on 2.4.3 and the default for "Firewall Maximum Table Entries" is 2M (2,000,000) on my system.  I upgraded from 2.4.2 p1 but I don't remember what it was then and I don't remember ever changing it.  Not sure where all these people are getting that their system has 200K as default.

                              what additional packages do you have installed?

                              I only have the APC UPS Daemon package installed.  Everything else is just the default install.  I don't have any of the other packages like PfBlockerNG, Squid or Squidguard installed.

                              1 Reply Last reply Reply Quote 0
                              • C
                                cybrnook
                                last edited by Apr 5, 2018, 2:04 AM

                                @jdeloach:

                                @cybrnook:

                                @jdeloach:

                                @Bili_boy:

                                The thing I don't understand is why it was 200K for you by default in the first place. I'm still on 2.3.4 and my default for "Firewall Maximum Table Entries" is 2M. (2 000 000). Did they reduce the default on purpose ?

                                I've wondered the same thing.  I'm on 2.4.3 and the default for "Firewall Maximum Table Entries" is 2M (2,000,000) on my system.  I upgraded from 2.4.2 p1 but I don't remember what it was then and I don't remember ever changing it.  Not sure where all these people are getting that their system has 200K as default.

                                what additional packages do you have installed?

                                I only have the APC UPS Daemon package installed.  Everything else is just the default install.  I don't have any of the other packages like PfBlockerNG, Squid or Squidguard installed.

                                interesting. My install was just a vanilla 2.4.3. as soon as the config wizard was done, the error was already there.

                                1 Reply Last reply Reply Quote 0
                                • K
                                  karlfife
                                  last edited by Apr 5, 2018, 3:45 AM

                                  Am I losing my mind?

                                  I just updated another 2.4.2 system to 2.4.3, but noticed the new default is 400,000 entries whereas this thread started because the default was 200,000 entries just yesterday.  "Ah, they did a minor point-release and updated the default" I reasoned.

                                  However, when I went to the machines that I'd manually overridden from 200,000 to 400,000 I noticed that their defaults had also changed, even though they have not been updated (i.e. via point-release).  Huh?  Aren't the defaults hard-coded into the release?

                                  What I've seen here would be more consistent with the defaults being periodically fetched from somewhere.    Is that true?

                                  1 Reply Last reply Reply Quote 0
                                  • D
                                    Derelict LAYER 8 Netgate
                                    last edited by Apr 5, 2018, 3:59 AM

                                    I haven't looked at the code but I think there is a logic problem in that "the system default is X." I think it just says whatever the field is set to instead of actually computing what the default would actually be.

                                    For instance, I didn't see this overrun on bogonsv6 because mine was set to 2,000,000 by something/someone/probablyme. It said "the default on this system is 2,000,000"

                                    Chattanooga, Tennessee, USA
                                    A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                    DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                    Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                    1 Reply Last reply Reply Quote 0
                                    • K
                                      karlfife
                                      last edited by Apr 5, 2018, 4:08 AM

                                      LOL.

                                      By george you're right.  Looks like on my system, the "system default" looks a an awful lot like Pi, but I've overridden it to 400,000  ;)

                                      piStatesCapture.PNG
                                      piStatesCapture.PNG_thumb

                                      1 Reply Last reply Reply Quote 0
                                      • P
                                        pfAmateur
                                        last edited by Apr 5, 2018, 3:54 PM

                                        As a beginner, thank you very much for your explanation!
                                        I have set entries to 500K

                                        500k.JPG
                                        500k.JPG_thumb

                                        1 Reply Last reply Reply Quote 0
                                        • P
                                          prbecker
                                          last edited by Apr 8, 2018, 11:02 PM

                                          I'd like to thank you all as well for explaining this! Very helpful in resolving this issue.

                                          1 Reply Last reply Reply Quote 0
                                          33 out of 52
                                          • First post
                                            33/52
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                                            This community forum collects and processes your personal information.
                                            consent.not_received