Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    IPv6 PPPoE MSS incorrect

    Scheduled Pinned Locked Moved IPv6
    25 Posts 5 Posters 5.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B
      BM118 @msmith100
      last edited by

      @msmith100 said in IPv6 PPPoE MSS incorrect:

      @bm118 Looking through the raw rules in pfsense, I see this:

      pass quick inet6 proto ipv6-icmp all icmp6-type unreach keep state
      pass quick inet6 proto ipv6-icmp all icmp6-type toobig keep state
      pass quick inet6 proto ipv6-icmp all icmp6-type neighbrsol keep state
      pass quick inet6 proto ipv6-icmp all icmp6-type neighbradv keep state
      

      These are not anything I created, and I believe part of the default pfsense rules. If I understand them correctly, they mean that by default pfsense will pass along "packet too big" messages without issue. I also allow pings with one of my own rules, and I pass the IPv6-test.com tests no problem. Doesn't help me on other sites though, as I think some sites like yahoo.com don't do PMTUD properly. Even for sites that do, the delay while it figures out the proper size is very noticeable and undesirable.

      Thanks for this, I actually wasn’t aware that PFSense had any rules for ICMPv6 built-in. I wouldn’t expect to see NeighbourSolicit and NeighbourAdvertise through a WAN interface though, however to the interface may be another thing. I believe there are some types missing from that list that are commonly accepted to be essential.

      I would recommend having a look through this article if you are so inclined as it details a bit about the types of messages that must be allowed, generally should be allowed and ones that don’t matter.

      https://tools.ietf.org/html/rfc4890#page-14

      JKnottJ viktor_gV 2 Replies Last reply Reply Quote 0
      • JKnottJ
        JKnott @BM118
        last edited by

        @bm118 said in IPv6 PPPoE MSS incorrect:

        I wouldn’t expect to see NeighbourSolicit and NeighbourAdvertise through a WAN interface though

        I certainly see them here. IPv6 can't work without them.

        PfSense running on Qotom mini PC
        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
        UniFi AC-Lite access point

        I haven't lost my mind. It's around here...somewhere...

        B 1 Reply Last reply Reply Quote 0
        • viktor_gV
          viktor_g Netgate @BM118
          last edited by

          @bm118 see https://redmine.pfsense.org/issues/9167

          1 Reply Last reply Reply Quote 0
          • B
            BM118 @JKnott
            last edited by

            @jknott said in IPv6 PPPoE MSS incorrect:

            @bm118 said in IPv6 PPPoE MSS incorrect:

            I wouldn’t expect to see NeighbourSolicit and NeighbourAdvertise through a WAN interface though

            I certainly see them here. IPv6 can't work without them.

            I might be going on a tangent here, and while I 100% agree you need NS and NA for IPv6 to work, I still don't believe that the packets need to be allowed to transit through the WAN interface or any L3 interface for that matter. Should the packets be allowed to the interface of the Firewall, and to the Multicast address block, sure, but I don't see why they need to be allowed through them.

            In the grand scheme of things, a routed NS/NA will likely be dropped anyway.

            NS and NA messages are purely for local link management, and as such if you have an L2/Bridge setup then it makes sense to allow them through the interface.

            1 Reply Last reply Reply Quote 0
            • B
              BM118 @viktor_g
              last edited by

              @viktor_g said in IPv6 PPPoE MSS incorrect:

              @bm118

              Could you test this patch: 135.diff

              You need to install System Patches pkg:
              https://docs.netgate.com/pfsense/en/latest/development/system-patches.html

              Works a treat, thank you very much!

              1 Reply Last reply Reply Quote 0
              • First post
                Last post
              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.