Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Firewall time out of sync. 7 hours ahead of actual system time

    Scheduled Pinned Locked Moved Firewalling
    10 Posts 3 Posters 802 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • T
      themadsalvi
      last edited by

      As the title states, when I check the firewall in the system logs, it will always be 7 hours ahead of the system time. All of the other logs time corresponds exactly to the system time on the main page. I feel that this is what may be causing another issue that I have, which is that all of my firewall blocklists can't resolve their respective urls with cURL code 6. This only seems to not only affecting the IP firewall logs, as I am also seeing the time discrepency when the system does a sync during a check_reload_status. Local time was 9:53 PM on may 11th when this screenshots was taken
      df739fa8-9e22-4139-90d2-bd530bb4a4dd-image.png

      527d57da-cc20-4d02-811e-9a40ad5f53f0-image.png

      1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator
        last edited by johnpoz

        So you changed time zones? Have you rebooted since you changed the time zone?
        https://forum.netgate.com/topic/142407/timestamp-in-firewall-logs-is-wrong

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.7.2, 24.11

        1 Reply Last reply Reply Quote 0
        • T
          themadsalvi
          last edited by themadsalvi

          well, how embarassing. that fixed the hour issue. The only thing remaining is the cURL code 6 and the lists not updating due to them not resolving

          d3bcaaf9-ac6c-49b8-9d90-d7d5a0111636-image.png

          I whitelisted the domains, just in case, and put the lists in FLEX vs ON mode, but still the issue persists.

          I can get to the websites just fine through a browser, but it will not resolve within pfsense.

          1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator
            last edited by

            what what do you have pfsense pointing to for dns, out of the box it should be pointing to itself and resolving.

            If your browser is pointing to pfsense, and pfsense points to itself then it would be working - so you got some thing not right there.

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.7.2, 24.11

            T 3 Replies Last reply Reply Quote 0
            • T
              themadsalvi @johnpoz
              last edited by themadsalvi

              @johnpoz i have it set up to resolve dns itself. The rules that I have set up for LAN in order to prevent DNS leaks. Maybe something is up with the rules, which is causing this?

              8f023805-0704-46eb-b2e5-183cb4d228b2-image.png
              09ae15f0-b7c8-45f3-aa73-0be5946b573f-image.png

              Below are the DNS resolver logs

              0746c143-0ebf-4fe9-98af-e41edc11cbcd-image.png

              1 Reply Last reply Reply Quote 0
              • T
                themadsalvi @johnpoz
                last edited by

                @johnpoz How can I find out why these simple hosts will not resolve?

                af8eda19-1aca-4372-9896-81e0181890ce-image.png

                1 Reply Last reply Reply Quote 0
                • T
                  themadsalvi @johnpoz
                  last edited by

                  @johnpoz It appears that Pfsense is unable to resolve anything itself

                  d8f7a861-1e5c-4e8f-90b8-4a2987358636-image.png

                  T 1 Reply Last reply Reply Quote 0
                  • T
                    themadsalvi @themadsalvi
                    last edited by

                    @themadsalvi had to reload from a previous config to try and salvage the unbound resolver. Was able to get it to come back up and resolve after that and a restart.

                    1 Reply Last reply Reply Quote 0
                    • GertjanG
                      Gertjan
                      last edited by

                      Hi,

                      6633586f-4e79-4c76-b0c3-ffa86018c68b-image.png

                      This answer came back right away with "not resolved", or did it take some time ?
                      The unbound process was running ? You had a look at the DNS log the same moment that that request was handled by unbound.
                      Etc.

                      c52124fe-2f52-447d-9bf0-f16c460e0abb-image.png

                      That's a PTR lookup - a reverse lookup is IP to FQDN.
                      It should answer :

                      6e1e6e2f-9070-4b1a-bf07-208f76cb0a07-image.png

                      Btw : the first 2 images, at the top of the thread, are your LAN and WAN (interface names are curt of, so the rules have no meaning at worst, tend to confusing at least) ?
                      Well .... what to say : looks messy.

                      Several identical UDP/VPN /1194 NAT (?) rules on WAN.
                      Several identical rules on LAN - but DNS traffic comes in from the LAN clients (forced to use pfSense as a DNS, that part seems ok).

                      No "help me" PM's please. Use the forum, the community will thank you.
                      Edit : and where are the logs ??

                      1 Reply Last reply Reply Quote 0
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator
                        last edited by johnpoz

                        Yeah those rules are a MESS... In what scenario is pfsense running plex? You have a rule that says ok to hit your lan address on 32400..

                        Then you have a rule on your wan with lan address is source??? WTF? Clearly you do not understand how the rules are evaluated.. It would be impossible for your wan to see lan address source.

                        You have a any rule on your wan for whitelist... This HORRIBLE!!! Have brought this up in another thread... pfblocker allowing this to happen is HORRIBLE!!! Security issue for sure..

                        Your resolving - and your worried about dns leak? You understand that every dns query will come directly from your wan IP right? That is how resolving works.

                        What I would suggest is start freaking over!!! Validate that pfsense is working out of the box with the default setup, no pfblocker.. No nonsense rules with redirecting dns, etc.. Then if you want to stop clients from using other dns then do that..

                        Also 8.8.8.8. with the period on the end like that is now asking it to resolve that as name.. not as a ptr..

                        Host "8.8.8.8." could not be resolved.

                        Would be what you should get..

                        Your also asking those 2 other dns.. In your other when you get host google.com could not be resolved... This would point to maybe dns manipulation, or dnssec failing, etc...

                        Lets start from a clean slate and figure out why you can not resolve... From your log there when you asked for that arpa you got a NX... Which is correct I get NX for that as well.

                        $ dig -x 185.216.34.228
                        
                        ; <<>> DiG 9.14.1 <<>> -x 185.216.34.228
                        ;; global options: +cmd
                        ;; Got answer:
                        ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57661
                        ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
                        
                        ;; OPT PSEUDOSECTION:
                        ; EDNS: version: 0, flags:; udp: 4096
                        ;; QUESTION SECTION:
                        ;228.34.216.185.in-addr.arpa.   IN      PTR
                        
                        ;; AUTHORITY SECTION:
                        185.in-addr.arpa.       3600    IN      SOA     pri.authdns.ripe.net. dns.ripe.net. 1557734757 3600 600 864000 3600
                        
                        ;; Query time: 548 msec
                        ;; SERVER: 192.168.3.10#53(192.168.3.10)
                        ;; WHEN: Mon May 13 03:59:55 Central Daylight Time 2019
                        ;; MSG SIZE  rcvd: 116
                        

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.