• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Captive Portal bypass issue

General pfSense Questions
5
49
7.3k
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • G
    Gertjan @michmoor
    last edited by Dec 19, 2022, 6:16 AM

    @michmoor

    The pfSense captive portal, the firewall, doesn't handle MAC "pass" as it does MAC "block".
    "pass" MACs are in the frrewall - "block" are not.
    But, when the user authenticates, at that moment, it's IP is known, and also it's MAC.
    After posting the login and password, this this is done :
    https://github.com/pfsense/pfsense/blob/db6dd2d2d288fdd64b9e741db0900c5eb15ba9fb/src/usr/local/captiveportal/index.php#L181

    and if the test is 'true', the MAC of that is user is in the blocked list, the message "This MAC address has been blocked" is shown.

    Take note : the code I've shown in redmine, still contains the bug : the variable $macfilter is never set to a value like 'true', so that test always fails, so blocked MACs are not blocked.

    No "help me" PM's please. Use the forum, the community will thank you.
    Edit : and where are the logs ??

    M 1 Reply Last reply Dec 19, 2022, 3:34 PM Reply Quote 0
    • M
      michmoor LAYER 8 Rebel Alliance @Gertjan
      last edited by Dec 19, 2022, 3:34 PM

      @gertjan yep I see what your talking about. Thanks for the detailed input.
      Is it resolved in beta?

      Firewall: NetGate,Palo Alto-VM,Juniper SRX
      Routing: Juniper, Arista, Cisco
      Switching: Juniper, Arista, Cisco
      Wireless: Unifi, Aruba IAP
      JNCIP,CCNP Enterprise

      G 1 Reply Last reply Dec 19, 2022, 3:40 PM Reply Quote 0
      • G
        Gertjan @michmoor
        last edited by Dec 19, 2022, 3:40 PM

        @michmoor said in Captive Portal bypass issue:

        Is it resolved in beta?

        I'm not sure.

        This is github master : https://github.com/pfsense/pfsense/blob/master)/src/usr/local/captiveportal/index.php

        That file still has the issue.

        No "help me" PM's please. Use the forum, the community will thank you.
        Edit : and where are the logs ??

        1 Reply Last reply Reply Quote 1
        • S
          stephenw10 Netgate Administrator
          last edited by Dec 19, 2022, 7:21 PM

          I can replicate this easily. I set the bug to confirmed: https://redmine.pfsense.org/issues/13747

          M 1 Reply Last reply Dec 19, 2022, 7:51 PM Reply Quote 1
          • M
            michmoor LAYER 8 Rebel Alliance @stephenw10
            last edited by Dec 19, 2022, 7:51 PM

            @stephenw10 So im confused. I know you tested prior you stated you couldnt replicate but now you can? So its not fixed in 23.01 ?
            So my original post was that MACs added to bypass can cross vlans - i can reproduce on my end.
            Then it went into MACs on the bypass set to deny are still allowed to access the portal - this is reproducible by you Stephen.
            Overall, there seems to be a fault just in general with the MAC bypass ability in the captive portal but it seems this shouldn't be used in prod at the moment unless im not understanding the other details here.

            Firewall: NetGate,Palo Alto-VM,Juniper SRX
            Routing: Juniper, Arista, Cisco
            Switching: Juniper, Arista, Cisco
            Wireless: Unifi, Aruba IAP
            JNCIP,CCNP Enterprise

            1 Reply Last reply Reply Quote 0
            • S
              stephenw10 Netgate Administrator
              last edited by stephenw10 Dec 19, 2022, 10:44 PM Dec 19, 2022, 8:00 PM

              I can't reproduce the issue you reported with adding pass MACs.

              When I tested that the host passes the portal but is still filtered by the layer3 pf rules on the interface as expected. That was in 23.01 but @Gertjan tested it in 22.05 and also couldn't replicate it.

              I can reproduce the issue will add block MAC entries. That appears to do nothing currently in 23.01.

              Steve

              1 Reply Last reply Reply Quote 1
              • M
                marcosm Netgate
                last edited by Dec 19, 2022, 10:29 PM

                Regarding the original issue that we have not been able to reproduce:

                So my original post was that MACs added to bypass can cross vlans - i can reproduce on my end.

                You can determine what rule created the state that is incorrectly passing the traffic - this should help narrow down the issue. Using the previous screenshots/states as an example:
                Find the relevant open state:
                pfctl -vvss | grep -A4 '192.168.11.28'

                Look at the rule <number> part of the relevant state and check it (e.g. rule is 123):
                pfctl -vvsr | grep -A3 '@123'

                M 2 Replies Last reply Dec 19, 2022, 11:16 PM Reply Quote 2
                • M
                  michmoor LAYER 8 Rebel Alliance @marcosm
                  last edited by Dec 19, 2022, 11:16 PM

                  @marcosm understood. Will follow up tonight and respond back here.

                  Firewall: NetGate,Palo Alto-VM,Juniper SRX
                  Routing: Juniper, Arista, Cisco
                  Switching: Juniper, Arista, Cisco
                  Wireless: Unifi, Aruba IAP
                  JNCIP,CCNP Enterprise

                  M 1 Reply Last reply Dec 20, 2022, 2:40 AM Reply Quote 0
                  • M
                    michmoor LAYER 8 Rebel Alliance @michmoor
                    last edited by michmoor Dec 20, 2022, 2:40 AM Dec 20, 2022, 2:40 AM

                    @michmoor Well cant reproduce my issue. I truly dont get it. The things i tried tonight.

                    1. Radius auth as always. MAC bypass with PASS. Unable to browse other vlans. Internet access is fine.
                    2. Radius auth as always. MAC bypass with block. Still able to sign-in but unable to browse other vlans. Internet access is fine.
                    3. No auth. MAC bypass with block. Still able to sign-in but unable to browse other vlans. Internet access is fine.

                    The only significant change made from when the issue was reported to now is that pfblockerNG is set up for bypass for the whole /24 Guest range. I dont think pfblcoker is in anyway related but wanted to be transparent with what changed for the guest vlan.
                    Other than that, i cant explain why the rules are working now but they were not working before as i shown in the pictures above. I will continue to test with different devices.

                    Firewall: NetGate,Palo Alto-VM,Juniper SRX
                    Routing: Juniper, Arista, Cisco
                    Switching: Juniper, Arista, Cisco
                    Wireless: Unifi, Aruba IAP
                    JNCIP,CCNP Enterprise

                    G 1 Reply Last reply Dec 20, 2022, 8:17 AM Reply Quote 1
                    • G
                      Gertjan @michmoor
                      last edited by Dec 20, 2022, 8:17 AM

                      These two :

                      @michmoor said in Captive Portal bypass issue:

                      Radius auth as always. MAC bypass with block. Still able to sign-in but unable to browse other vlans. Internet access is fine.
                      No auth. MAC bypass with block. Still able to sign-in but unable to browse other vlans. Internet access is fine.

                      That is the "MAC block" not working issue. You are using 22.05 ?

                      No "help me" PM's please. Use the forum, the community will thank you.
                      Edit : and where are the logs ??

                      1 Reply Last reply Reply Quote 0
                      • M
                        michmoor LAYER 8 Rebel Alliance @marcosm
                        last edited by Dec 20, 2022, 3:38 PM

                        @marcosm I will say i am getting these messages in my syslog in abundance now.

                        login-to-view

                        Checking the last 30 days it hasnt been as present but a huge uptick since last night testing.

                        login-to-view

                        @Gertjan I am on 22.05

                        Firewall: NetGate,Palo Alto-VM,Juniper SRX
                        Routing: Juniper, Arista, Cisco
                        Switching: Juniper, Arista, Cisco
                        Wireless: Unifi, Aruba IAP
                        JNCIP,CCNP Enterprise

                        1 Reply Last reply Reply Quote 0
                        • S
                          stephenw10 Netgate Administrator
                          last edited by Dec 20, 2022, 3:50 PM

                          That is IPv6 traffic hitting the IPv4 Limiters

                          It's fixed in 23.01: https://redmine.pfsense.org/issues/13290

                          M 1 Reply Last reply Dec 20, 2022, 4:34 PM Reply Quote 1
                          • M
                            michmoor LAYER 8 Rebel Alliance @stephenw10
                            last edited by Dec 20, 2022, 4:34 PM

                            @stephenw10 Confirmed. Kicked off a iPhone client on the captive portal and those messages are gone.

                            Firewall: NetGate,Palo Alto-VM,Juniper SRX
                            Routing: Juniper, Arista, Cisco
                            Switching: Juniper, Arista, Cisco
                            Wireless: Unifi, Aruba IAP
                            JNCIP,CCNP Enterprise

                            1 Reply Last reply Reply Quote 0
                            • T
                              the other
                              last edited by Dec 20, 2022, 4:50 PM

                              sorry for being kinda offtopic:
                              just wanted to say thanks for you guys/girls(?)...
                              ...a) pointing out this "problem"
                              ...b) having a discussion about it
                              ...c) trying to reproduce the issue
                              ...d) helping me getting my peace of mind back

                              :)
                              Seriously: thanx for your ongoing support and (my personal opinion) the good work with pfsense so far...hope Santa has you on his list.

                              the other

                              pure amateur home user, no business or professional background
                              please excuse poor english skills and typpoz :)

                              1 Reply Last reply Reply Quote 2
                              • S
                                stephenw10 Netgate Administrator
                                last edited by Dec 20, 2022, 7:24 PM

                                The MAC address block entries now work as expected with the newly added patch.
                                https://redmine.pfsense.org/issues/13747#note-11
                                Please test and let us know.

                                Steve

                                M 1 Reply Last reply Dec 20, 2022, 8:38 PM Reply Quote 1
                                • M
                                  michmoor LAYER 8 Rebel Alliance @stephenw10
                                  last edited by Dec 20, 2022, 8:38 PM

                                  @stephenw10 How do i apply the patch?

                                  https://github.com/pfsense/pfsense/blob/483512b3a3226132b7b249f7ea3e2146d3829c23/src/usr/local/captiveportal/index.php#L181

                                  Firewall: NetGate,Palo Alto-VM,Juniper SRX
                                  Routing: Juniper, Arista, Cisco
                                  Switching: Juniper, Arista, Cisco
                                  Wireless: Unifi, Aruba IAP
                                  JNCIP,CCNP Enterprise

                                  M 1 Reply Last reply Dec 20, 2022, 9:00 PM Reply Quote 0
                                  • M
                                    marcosm Netgate @michmoor
                                    last edited by Dec 20, 2022, 9:00 PM

                                    You may use the commit ID 7e5dbbfca68179fd29a685363625c810d4da6417 in the System Patches package - see here: https://docs.netgate.com/pfsense/en/latest/development/system-patches.html

                                    1 Reply Last reply Reply Quote 0
                                    • S
                                      stephenw10 Netgate Administrator
                                      last edited by Dec 20, 2022, 9:12 PM

                                      Just add the commit ID in the patches package:

                                      login-to-view

                                      7e5dbbfca68179fd29a685363625c810d4da6417

                                      M 1 Reply Last reply Dec 20, 2022, 9:40 PM Reply Quote 0
                                      • M
                                        michmoor LAYER 8 Rebel Alliance @stephenw10
                                        last edited by Dec 20, 2022, 9:40 PM

                                        @stephenw10 @marcosm
                                        Thanks gents. I couldnt find the commitID.
                                        I can confirm that this is fixed. The mac addresses not only cannot get on the network but there is a message indicating to the client that they are blocked.

                                        Also syslogs confirms block

                                        login-to-view

                                        I really dont know what to say but this has been a journey in troubleshooting and talking to the netgate team. Truly appreciate it.

                                        Time to whip out the old wallet for that TAC sub 😉

                                        Firewall: NetGate,Palo Alto-VM,Juniper SRX
                                        Routing: Juniper, Arista, Cisco
                                        Switching: Juniper, Arista, Cisco
                                        Wireless: Unifi, Aruba IAP
                                        JNCIP,CCNP Enterprise

                                        G 1 Reply Last reply Dec 21, 2022, 9:04 AM Reply Quote 1
                                        • G
                                          Gertjan @michmoor
                                          last edited by Dec 21, 2022, 9:04 AM

                                          @michmoor said in Captive Portal bypass issue:

                                          talking to the netgate team

                                          Euh .... the solution was already on the forum.
                                          13747 went from Not a bug, to Duplicate, to Bug again to get solved. I guess it's a question of finding the right words when writing feedback.

                                          The official patch, as always, is much nicer : why adding a line if removing something does the job 😊

                                          And be careful : https://redmine.pfsense.org/issues/13784 was added on the fly : A MAC can (23.01) be blocked the soft way, the user will see the message that his MAC is blocked. You can chose bewteen an error message, or a MAC block portal page to be uploaded. See here for info and example how to implement that.
                                          Or : new, see 13784 : totally rejected : the MAC becomes part of the pf rules that block any interaction with the captive portal interface. I guess the user would be able to get a DHCP lease sorted out, and that's it, nothing more.

                                          No "help me" PM's please. Use the forum, the community will thank you.
                                          Edit : and where are the logs ??

                                          1 Reply Last reply Reply Quote 1
                                          39 out of 49
                                          • First post
                                            39/49
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.