Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Captive Portal breaks policy routing for bypassed MAC addresses after upgrade to 22.05 [fixed]

    Scheduled Pinned Locked Moved Captive Portal
    41 Posts 11 Posters 7.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • bitrotB
      bitrot @TurnTheTerribleTank
      last edited by

      @turntheterribletank Did you try the patch?

      1 Reply Last reply Reply Quote 0
      • B
        backlash619 @TurnTheTerribleTank
        last edited by

        @turntheterribletank Mine can even authenticate to radius... does the patch resolve this?

        bitrotB 1 Reply Last reply Reply Quote 0
        • bitrotB
          bitrot @backlash619
          last edited by

          @backlash619 I don't know if the patch fixes your issue. Not sure if what you're facing is related. I don't use RADIUS authentication on my Captive Portal, so I'm not able to answer that. It's simple enough to apply the patch to test it out though. You can always disable the patch afterward if it doesn't solve your issue although I would apply it anyway because it does fix a problem.

          1 Reply Last reply Reply Quote 0
          • T
            TurnTheTerribleTank @TurnTheTerribleTank
            last edited by TurnTheTerribleTank

            This is a backup router, so I'm interested in a fixed release and not necessarily looking to patch. No issues with radius, etc. That's all fine.
            Production and backup are both 7100 1u. The ability to roll these back will be nice.

            bitrotB 1 Reply Last reply Reply Quote 0
            • bitrotB
              bitrot @TurnTheTerribleTank
              last edited by

              @turntheterribletank I have no issue applying an official patch that will go into the next official release, so I can have an important fix today. But you do you :)

              T L 2 Replies Last reply Reply Quote 0
              • T
                TurnTheTerribleTank @bitrot
                last edited by

                @bitrot Yep. We won't be updating to 22.05 and patching. We'll wait.

                1 Reply Last reply Reply Quote 0
                • L
                  Luca De Andreis @bitrot
                  last edited by Luca De Andreis

                  @bitrot Sorry..

                  the patch file 13323.patch is different from patch https://github.com/pfsense/pfsense/commit/add6447b9dc801144141bb24f8c264e03a0e7cae

                  8ec460ba-8f35-470e-a1e0-524584ac49d2-immagine.png

                  and in the patch file:

                  4bb3a0b9-af95-46d3-aacf-89b10e99b860-immagine.png

                  Luca

                  bitrotB 1 Reply Last reply Reply Quote 0
                  • bitrotB
                    bitrot @Luca De Andreis
                    last edited by

                    @luca-de-andreis

                    Don't upload the file. Enter the patch URL instead.

                    86f504b6-ede3-4a5f-b8e3-3bb084e94bc6-image.png

                    L 1 Reply Last reply Reply Quote 0
                    • L
                      Luca De Andreis @bitrot
                      last edited by

                      @bitrot OK applied https://github.com/pfsense/pfsense/commit/add6447b9dc801144141bb24f8c264e03a0e7cae

                      but before authentication it is not possible to reach the DNS (the firewall itself that acts as a resolver). The same configuration with version 22.01 worked correctly.

                      In addition, the console displays:

                      125521b2-866e-4ff4-b875-92be5ef76053-immagine.png

                      bitrotB 1 Reply Last reply Reply Quote 0
                      • bitrotB
                        bitrot @Luca De Andreis
                        last edited by

                        @luca-de-andreis
                        I think your other two issues are unrelated.
                        Here's the bug report for the dummynet message in your console: Bug 13290

                        L 1 Reply Last reply Reply Quote 0
                        • L
                          Luca De Andreis @bitrot
                          last edited by

                          @bitrot The criticality is that if the captive portal is active, the client correctly acquires IP, GW and DNS, but does not have DNS resolution, consequently it cannot proceed with authentication via the captive portal.
                          The same configuration worked perfectly with previous releases, nothing was touched.

                          GertjanG 1 Reply Last reply Reply Quote 0
                          • GertjanG
                            Gertjan @Luca De Andreis
                            last edited by

                            @luca-de-andreis said in Captive Portal breaks policy routing for bypassed MAC addresses after upgrade to 22.05 [fixed]:

                            but does not have DNS resolution, consequently it cannot proceed with authentication via the captive portal.

                            The hidden 'pf' captive firewall rules are allowing TCP/UDP incoming traffic on port 53 on its interface. A working DNS is mandatory for a working portal.

                            What are your GUI firewall rules on the captive portal interface ?

                            When you connect to the captive portal, without logging in, you should be able to dig, nslookup etc.
                            When logged in, run the ifconfig or ipconfig /all command and check your IP, mask, gateway and DNS. The last two should be the IP of the captive portal.

                            Also check and double check that the resolver unbound is actually listening on the captive portal's interface. A command on pfSense like :

                            sockstat -4 | grep ':53'
                            

                            should say :

                            unbound  unbound    18042 3  udp4   *:53                  *:*
                            unbound  unbound    18042 4  tcp4   *:53                  *:*
                            

                            which means unbound is listing on every existing ( == 'All') interface on pfSense.

                            No "help me" PM's please. Use the forum, the community will thank you.
                            Edit : and where are the logs ??

                            L 1 Reply Last reply Reply Quote 0
                            • L
                              Luca De Andreis @Gertjan
                              last edited by

                              @gertjan Thanks for the detailed explanation ...

                              Look ... I'm done talking to TOC support now, call code 1006603521.

                              I am truly speechless.

                              Yesterday I updated PfSense I tried the captive portal and it worked, shortly after it stopped working and I left it disabled (after restarting the service several times) so that users could still use that network segment.

                              Now I get TOC support into the system, enable the captive portal and ... IT WORKS.

                              Tried with disposable code, tried with whitelisted MAC, it works as expected ... and I haven't touched a comma if it doesn't enable / disable.

                              I left the ticket pending, let's see how it behaves. Really, I have no words, thank you!

                              bitrotB 1 Reply Last reply Reply Quote 1
                              • bitrotB
                                bitrot @Luca De Andreis
                                last edited by

                                @luca-de-andreis
                                I understand you are upset about this problem but why are you hijacking my post with your issue that is completely unrelated instead of creating your own post and/or bug report?

                                L 1 Reply Last reply Reply Quote 0
                                • L
                                  Luca De Andreis @bitrot
                                  last edited by

                                  @bitrot you're right, I thought of doing it, but then for the hurry and thinking about the same problem (at least yesterday) I wrote here, sorry.

                                  1 Reply Last reply Reply Quote 1
                                  • P
                                    Pieter_SA
                                    last edited by

                                    Wow pfSense! The last working version of pfSense with Captive Portal is still 2.5.2!

                                    This was the fifth time that I tried to upgrade my pfsense, and Captive Portal is still broken.
                                    You should maybe fix it before going enterprise with Netgate payments.

                                    Does anyone know if this works on opensense?
                                    It may be time to move on now.

                                    GertjanG bitrotB 2 Replies Last reply Reply Quote 0
                                    • GertjanG
                                      Gertjan @Pieter_SA
                                      last edited by Gertjan

                                      @pieter_sa said in Captive Portal breaks policy routing for bypassed MAC addresses after upgrade to 22.05 [fixed]:

                                      Wow pfSense! The last working version of pfSense with Captive Portal is still 2.5.2!

                                      What ?
                                      Let me check ...... no, you check me : please visit this link.

                                      It works. I was using all the versions up until 2.6.0, and now 22.05.

                                      I can't afford to shut down of have issues with our captive portal, it's used for a hotel, and we have tourists here, not the most patient type of portal users.
                                      True, 2.6.0 had an issue, but was patchable very quickly. It was a two click solution.

                                      The issue

                                      Captive Portal breaks policy routing for bypassed MAC addresses after upgrade to 22.05 [fixed]
                                      is marked fixed, I'm not sure if there was even an issue.

                                      @pieter_sa said in Captive Portal breaks policy routing for bypassed MAC addresses after upgrade to 22.05 [fixed]:

                                      You should maybe fix it

                                      Can you give more details ? Fix what ? Bug report ?

                                      @pieter_sa said in Captive Portal breaks policy routing for bypassed MAC addresses after upgrade to 22.05 [fixed]:

                                      Does anyone know if this works on opensense?

                                      If you - and me, and others, don't know what the issue is, then no one can tell.
                                      It takes a couple of minutes to find out ... ;)

                                      No "help me" PM's please. Use the forum, the community will thank you.
                                      Edit : and where are the logs ??

                                      P 1 Reply Last reply Reply Quote 0
                                      • P
                                        Pieter_SA @Gertjan
                                        last edited by

                                        @gertjan The frustration with this thing is getting to me.
                                        I am on 22.05 with Captive Portal and Suricata.
                                        So the moment I enable Captive Portal, the "Dummynet: bad switch 21!" messages start popping up in console.

                                        Earlier today my internet connection dropped, with pfsense showing my WAN as down. I checked the router, rebooted it for good measure, problem persists, then I rebooted pfSense, and everything came up again.
                                        The logs showed this:
                                        Jul 26 12:14:05 kernel sonewconn: pcb 0xfffff800b1b20300: Listen queue overflow: 2 already in queue awaiting acceptance (2 occurrences)
                                        And a bunch of:
                                        Jul 26 12:14:47 kernel ovpnc1: link state changed to DOWN
                                        Jul 26 12:14:38 kernel dummynet: bad switch 21!
                                        Jul 26 12:14:29 kernel dummynet: bad switch 21!
                                        Jul 26 12:14:19 kernel dummynet: bad switch 21!

                                        Captive Portal sort of works with MAC filtering and vouchers, except that it gives random connection issues on Wifi, and the Interface statistics show "Errors Out" 5 for WIFI.
                                        I get mostly problems with UDP, but I have also seen issues opening a web page over WIFI with Captive Portal enabled.

                                        I don't know how to further fault find this issue, and I am again looking at doing a clean install of 2.5.2 to get it working.

                                        1 Reply Last reply Reply Quote 0
                                        • bitrotB
                                          bitrot @Pieter_SA
                                          last edited by

                                          @pieter_sa The issue with Captive Portal mentioned in this thread has been resolved with a patch you can apply to your system. If you have other issues with Captive Portal I suggest you be much, much more specific and also open a separate thread and maybe create a bug report.

                                          P 1 Reply Last reply Reply Quote 0
                                          • P
                                            Pieter_SA @bitrot
                                            last edited by

                                            @bitrot You marked this as fixed, so others, like me, will also go through the entire journey of registering for pfsense+ and updating all the way up to 22.05 just to see the same old Captive Portal issues.

                                            bitrotB 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.