Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Malformed wol packets

    Scheduled Pinned Locked Moved Firewalling
    wolwake on lan
    22 Posts 8 Posters 3.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      simon.lock
      last edited by

      Did you get anywhere with this? I'm still experiencing the same problem. I raised a bug with pfsense but it was quickly rejected by Jim Pingle; stating it must be a problem with something on my local environment interfering. Perhaps we are using similar equipment? I'm using a unifi ap and unifi managed switches. However, I also receive corrupted packed when only using pfsense wired directly into my Windows 10 PC which should eliminate my unifi equipment. I think my pfsense may have become corrupt?

      JKnottJ 1 Reply Last reply Reply Quote 0
      • JKnottJ
        JKnott @simon.lock
        last edited by

        @simon-lock

        Try using Packet Capture to see what's being sent. Download the capture, so you can view it in Wireshark.

        PfSense running on Qotom mini PC
        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
        UniFi AC-Lite access point

        I haven't lost my mind. It's around here...somewhere...

        S 1 Reply Last reply Reply Quote 0
        • S
          simon.lock @JKnott
          last edited by

          @JKnott
          Thanks for your reply. I've already used Wireshark and I'm getting the same results as posted by @AceFloof .

          When issuing a wol command from pfsense to a pc running wireshark (directly cabled and not via a switch) the corrupted message received displays the following:

          protocol: ? KNX/IP Unknown service family
          Info: ? Unkown service family

          The same results results are obtained when doing a packet capture from pfsense itself.

          1 Reply Last reply Reply Quote 0
          • NogBadTheBadN
            NogBadTheBad
            last edited by

            Same here but it is waking the remote host.

            Screenshot 2019-12-22 at 11.21.11.png

            Screenshot 2019-12-22 at 11.22.05.png

            packetcapture.cap

            Andy

            1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

            1 Reply Last reply Reply Quote 0
            • NogBadTheBadN
              NogBadTheBad
              last edited by NogBadTheBad

              Disable KNX/IP in Wireshark.

              Screenshot 2019-12-22 at 11.40.02.png

              Screenshot 2019-12-22 at 11.40.48.png

              The ethertype and port would appear to be wrong.

              https://wiki.wireshark.org/WakeOnLAN

              Andy

              1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

              JKnottJ 1 Reply Last reply Reply Quote 1
              • S
                simon.lock
                last edited by

                Thank you so much for your reply. Disabling KNX/IP in Wireshark then revealed correctly formed packets. So I guess my system isn't corrupted. Using the capture feature which is built into pfSense will always show malformed packets.

                1 Reply Last reply Reply Quote 0
                • JKnottJ
                  JKnott @NogBadTheBad
                  last edited by

                  @NogBadTheBad said in Malformed wol packets:

                  The ethertype and port would appear to be wrong.

                  WOL can be either UDP/IP or Ethertype 842. Either way it would use Ethernet II, not 802.3. However, the port is definitly wrong for UDP and wouldn't be used for Ethertype 842.

                  PfSense running on Qotom mini PC
                  i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                  UniFi AC-Lite access point

                  I haven't lost my mind. It's around here...somewhere...

                  NogBadTheBadN 1 Reply Last reply Reply Quote 1
                  • NogBadTheBadN
                    NogBadTheBad @JKnott
                    last edited by

                    @JKnott
                    Oops should have said or as per the wireshark capture filter:-

                    ether proto 0x0842 or udp port 9

                    Andy

                    1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                    1 Reply Last reply Reply Quote 0
                    • A
                      AceFloof
                      last edited by

                      The point is not that I get malformed packages in Wireshark, the point is that I can't wake up my PC with the the pfSense WOL feature. It works with (almost) every random WOL app on my phone, tablet and laptop (which obviously sends some different kind of package than pfSense does). So this is definitely a pfSense problem.

                      JKnottJ 1 Reply Last reply Reply Quote 0
                      • JKnottJ
                        JKnott @AceFloof
                        last edited by

                        @AceFloof

                        What happens with the wol command at the command prompt?

                        PfSense running on Qotom mini PC
                        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                        UniFi AC-Lite access point

                        I haven't lost my mind. It's around here...somewhere...

                        A 2 Replies Last reply Reply Quote 0
                        • A
                          AceFloof @JKnott
                          last edited by

                          @JKnott
                          When I issue "wol -i 192.168.5.255 40:8d:5c:56:e1:24" on my pfsense box I get the exact same packet as shown in my first post.

                          JKnottJ 1 Reply Last reply Reply Quote 0
                          • A
                            AceFloof @JKnott
                            last edited by

                            @JKnott
                            Also, when I issue the "wakeonlan 40:8d:5c:56:e1:24" command on a debian machine I get the following correct packet in wireshark which actually wakes up my PC.
                            5e59c0ef0122f.png

                            N 1 Reply Last reply Reply Quote 0
                            • JKnottJ
                              JKnott @AceFloof
                              last edited by

                              @AceFloof

                              Why are you including the broadcast IP address with the MAC? Whenever I used WoL, I just sent the MAC address. Here's the script I used to wake up a Netfinity server, which I just took to recycling this week.
                              /usr/bin/wol 00:02:55:47:E0:7B

                              BTW, I see you're using display filters in Wireshark, rather than capture filters. You may want to learn about capture filters, as they capture only the traffic of interest, where as display filters are used to select packets from what has been captured. If you don't use capture filters, you capture everything. I rarely use display filters, though I do have one to hide any packets containing the MAC of the computer I'm running Wireshark on. I do that to reduce the clutter.

                              PfSense running on Qotom mini PC
                              i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                              UniFi AC-Lite access point

                              I haven't lost my mind. It's around here...somewhere...

                              A 1 Reply Last reply Reply Quote 0
                              • A
                                alirz
                                last edited by

                                i have no issues using WOL with my pfsense.
                                i have wol working for multiple PCs over LAN and WAN.

                                1 Reply Last reply Reply Quote 0
                                • kiokomanK
                                  kiokoman LAYER 8
                                  last edited by

                                  I haven't said anything so far, but wol work for me too on my pcs, sometimes i turn on my smart tv with that, the only thing that i'm unable to turn on with wol are virtual machine inside esxi. but that is another matter ..i have yet to investigate

                                  ̿' ̿'\̵͇̿̿\з=(◕_◕)=ε/̵͇̿̿/'̿'̿ ̿
                                  Please do not use chat/PM to ask for help
                                  we must focus on silencing this @guest character. we must make up lies and alter the copyrights !
                                  Don't forget to Upvote with the 👍 button for any post you find to be helpful.

                                  1 Reply Last reply Reply Quote 0
                                  • A
                                    AceFloof @JKnott
                                    last edited by

                                    @JKnott
                                    that was just for testing purpose, usually I use the pfSense Webinterface (Services -> Wake-on-Lan) to issue the command but that leads to the same result.
                                    I'm just wondering why my Windows Machine won't turn on when I send the WoL command from the pfSense box when it seems to work for everyone else here.
                                    Also sending it from any other system/device in my network works fine for me (tested with my laptop and android phone). Everything but pfSense seems to be able to turn on my pc via WoL.

                                    Also ty for the info, def. looking into capture filters :)

                                    1 Reply Last reply Reply Quote 0
                                    • N
                                      NRgia @AceFloof
                                      last edited by NRgia

                                      @AceFloof said in Malformed wol packets:

                                      @JKnott
                                      Also, when I issue the "wakeonlan 40:8d:5c:56:e1:24" command on a debian machine I get the following correct packet in wireshark which actually wakes up my PC.
                                      5e59c0ef0122f.png

                                      Hello @AceFloof ,

                                      After trying to find what was 'knx/ip unknown service family' I was redirected to your post.

                                      Currently I'm using pfSense 2.5.0-devel and I have the same problem as you, as you can see:
                                      maqic packet.png

                                      All other devices and applications sends the correct magic packet on the port 9, pfSense sends it on port 40000.

                                      I have sent WOL packets from pfSense to Windows 10 and Manjaro Linux hosts, and none of them will wake up.

                                      I have APs from Unifi and Netgear switches on my Network, among other IOT stuff, and also VLANs.

                                      I'm trying to understand what we have in common, and if you solved the issue?

                                      1 Reply Last reply Reply Quote 0
                                      • johnpozJ
                                        johnpoz LAYER 8 Global Moderator
                                        last edited by johnpoz

                                        I just went over this not that long ago that pfsense sends out on 40k..

                                        https://forum.netgate.com/post/912917

                                        That you don't know how to use wireshark, doesn't mean the packet is malformed ;)

                                        I can tell wireshark anything is what its not and its going to show up as messed up...

                                        the correct magic packet on the port 9, pfSense sends it on port 40000.

                                        Where did you come up with the idea that port 9 is the correct port? Port means NOTHING in a wol packet.. what port it gets sent out in doesn't mean anything.. Sure there are some common ports 0, 7, 9 etc.. 0 is just going to be a security nightmare and wouldn't normally be allowed out from a firewall at all.. 7 and 9 have their own issues because old clients could see those since its sent to broadcast address, etc.

                                        Sure wireshark will see udp on 9 and think oh wol, and then decode it for that.. But again - what wireshark does for dissection of any given packet is ultimately up to the user using it.. If you say a packet is WOL and its NOT then it will show malformed, if you say its X when its Y, again malformed.. Wireshark tries and make a guess to what the data is - it quite often makes mistakes.. For example thinking your wol is knx..

                                        First thing that jumps out at me looking at that sniff - is wtf, they using a /15 mask?? WHY??? Your broadcast is 172.19.255.255 and your coming from a 172.18.0.12 - that is a /15.. Why would you be using that??? My guess why something isn't working is you prob have issues with your mask on your devices..

                                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                                        If you get confused: Listen to the Music Play
                                        Please don't Chat/PM me for help, unless mod related
                                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                                        N 1 Reply Last reply Reply Quote 0
                                        • N
                                          NRgia @johnpoz
                                          last edited by NRgia

                                          @johnpoz said in Malformed wol packets:

                                          I just went over this not that long ago that pfsense sends out on 40k..

                                          https://forum.netgate.com/post/912917

                                          That you don't know how to use wireshark, doesn't mean the packet is malformed ;)

                                          I can tell wireshark anything is what its not and its going to show up as messed up...

                                          the correct magic packet on the port 9, pfSense sends it on port 40000.

                                          Where did you come up with the idea that port 9 is the correct port? Port means NOTHING in a wol packet.. what port it gets sent out in doesn't mean anything.. Sure there are some common ports 0, 7, 9 etc.. 0 is just going to be a security nightmare and wouldn't normally be allowed out from a firewall at all.. 7 and 9 have their own issues because old clients could see those since its sent to broadcast address, etc.

                                          Sure wireshark will see udp on 9 and think oh wol, and then decode it for that.. But again - what wireshark does for dissection of any given packet is ultimately up to the user using it.. If you say a packet is WOL and its NOT then it will show malformed, if you say its X when its Y, again malformed.. Wireshark tries and make a guess to what the data is - it quite often makes mistakes.. For example thinking your wol is knx..
                                          Why on ports 7 and 9 it sees as a correct wol type packet, and it sees wol on packet 40000 ? How me as a user can affect Wireshark dissection? I just listen on my device for any wol packets, sent by pfSense or other applications. The only one that is perceived as malformed is one sent by wake on lan client on pfSense. If this is a wireshark issue, then sure, glad that I learned about it from this thread. As a user you interpret the Wireshark response, and as I refused to believe the application, I have searched the Internet, and found this thread.
                                          Anyways the issue is still present at this time.

                                          First thing that jumps out at me looking at that sniff - is wtf, they using a /15 mask?? WHY??? Your broadcast is 172.19.255.255 and your coming from a 172.18.0.12 - that is a /15.. Why would you be using that??? My guess why something isn't working is you prob have issues with your mask on your devices..

                                          I don't understand what is your concern here...
                                          From here:
                                          https://www.ietf.org/rfc/rfc1918.txt

                                          and here:

                                          http://jodies.de/ipcalc?host=172.18.0.12&mask1=15&mask2=

                                          I use Private Address Space as seen above. Also I can do subnetting or play with the range as it suits my needs.

                                          @johnpoz said in Malformed wol packets:

                                          A /15 makes zero sense to be assigned to any device... Do you have something close to 130K devices on this network? Really? Use something realistic.. How many devices do you have on this network? How many might it grow too?

                                          Such a mask is something you might use on a route summary, or firewall rule with a bunch of downstream networks.. Not anything you would ever use on a single L2..

                                          I read through some of your posts on this forum, and I know you always try to help, and I appreciate your input(really) but in my case I am respecting the standards. Asking someone to re-shape his network for no reason, it's not helpful, sorry to say this.

                                          1 Reply Last reply Reply Quote 0
                                          • johnpozJ
                                            johnpoz LAYER 8 Global Moderator
                                            last edited by

                                            A /15 makes zero sense to be assigned to any device... Do you have something close to 130K devices on this network? Really? Use something realistic.. How many devices do you have on this network? How many might it grow too?

                                            Such a mask is something you might use on a route summary, or firewall rule with a bunch of downstream networks.. Not anything you would ever use on a single L2..

                                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                                            If you get confused: Listen to the Music Play
                                            Please don't Chat/PM me for help, unless mod related
                                            SG-4860 24.11 | Lab VMs 2.8, 24.11

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.