Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    No IPv6 after upgrade to 23.01

    Scheduled Pinned Locked Moved IPv6
    88 Posts 19 Posters 49.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • maverickwsM
      maverickws @mhillmann
      last edited by maverickws

      @mhillmann hi there,

      based on your answer I thought of applying this to our setup and see how it would go.

      The approach was slightly different, before when working I knew what was the GW address assigned to the IPv6.

      So I simply added a new gateway on the routing tab, used that GW address and selected it as gateway.

      So this did change something as now I can ping google ipv6 from Diagnostics > Ping

      16 bytes from 2a00:1450:4003:806::200e, icmp_seq=0 hlim=59 time=15.372 ms
      16 bytes from 2a00:1450:4003:806::200e, icmp_seq=1 hlim=59 time=15.177 ms
      16 bytes from 2a00:1450:4003:806::200e, icmp_seq=2 hlim=59 time=15.382 ms
      16 bytes from 2a00:1450:4003:806::200e, icmp_seq=3 hlim=59 time=22.012 ms
      16 bytes from 2a00:1450:4003:806::200e, icmp_seq=4 hlim=59 time=15.506 ms
      
      --- ipv6.l.google.com ping6 statistics ---
      5 packets transmitted, 5 packets received, 0.0% packet loss
      round-trip min/avg/max/std-dev = 15.328/18.726/30.600/5.971 ms
      

      My issue now is that, for some reason, I don't get IPv6 connectivity on local machines. I get IPv6 address but no route.

      On my machine netstat gives me a default v6 gateway which is fe80::abcd:ef01:fe03:bd10 being that this is my pfSense LAN interface local-link address. So I can't really figure out now why I have connectivity on the pfSense LAN interface but not on local hosts.

      If I ping that GW my machine has configured:

      # ping6 fe80::abcd:ef01:fe03:bd10%en0
      PING6(56=40+8+8 bytes) fe80::8af:1f71:bffc:afc1%en0 --> fe80::abcd:ef01:fe03:bd10%en0
      16 bytes from fe80::abcd:ef01:fe03:bd10%en0, icmp_seq=0 hlim=64 time=1.323 ms
      16 bytes from fe80::abcd:ef01:fe03:bd10%en0, icmp_seq=1 hlim=64 time=1.381 ms
      16 bytes from fe80::abcd:ef01:fe03:bd10%en0, icmp_seq=2 hlim=64 time=1.302 ms
      16 bytes from fe80::abcd:ef01:fe03:bd10%en0, icmp_seq=3 hlim=64 time=1.269 ms
      16 bytes from fe80::abcd:ef01:fe03:bd10%en0, icmp_seq=4 hlim=64 time=2.170 ms
      16 bytes from fe80::abcd:ef01:fe03:bd10%en0, icmp_seq=5 hlim=64 time=2.981 ms
      ^C
      --- fe80::abcd:ef01:fe03:bd10%en0 ping6 statistics ---
      6 packets transmitted, 6 packets received, 0.0% packet loss
      round-trip min/avg/max/std-dev = 1.269/1.738/2.981/0.638 ms
      

      EDIT: This is a temporary (not totally working still) fix not a solution.
      DHCP6 should take care of this without the need of having to find out the GW for the next hop and adding static gateways.

      I am appalled how no one from Netgate is getting involved in this. This was a breaking change as MANY ISP's (and I mean many) will have similar setups and hardware.
      Sweep it under the rug, don't talk about it, and it's gone, is that it?

      @jimp @Derelict

      DerelictD M 2 Replies Last reply Reply Quote 0
      • S
        SteveITS Galactic Empire @mhillmann
        last edited by

        @maverickws Is the mask correct? There was another post recently where the person was saying devices were getting a /128 mask not /64.

        IPv6 is working fine here.

        Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
        When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
        Upvote 👍 helpful posts!

        maverickwsM 1 Reply Last reply Reply Quote 0
        • maverickwsM
          maverickws @SteveITS
          last edited by maverickws

          @steveits I'm attributed a /56 prefix;

          WAN configured as DHCP6
          LAN, IoT and DOM (all local networks, IoT and DOM are VLANS) configured as tracking WAN interface for IPv6

          Each interface gets a /64 prefix delegation size.

          This is the same configuration (exactly the same configuration) that has been working for years with IPv6.

          The IPv6 addresses are correctly attributed to all the internal interfaces. Actually, on the above test (after creating a static gateway as suggested) pinging ipv6.google.com you can see the pfSense pinging from its IPv6 LAN address.

          I would refer to Mr. @mhillmann 's post here: https://forum.netgate.com/post/1088842

          As this seems the most on point explanation of what might be happening.

          S J 2 Replies Last reply Reply Quote 1
          • S
            SteveITS Galactic Empire @maverickws
            last edited by SteveITS

            @maverickws If it can be replicated (seems so), I suggest opening an issue at redmine.pfsense.org, with the details and any logs, referencing this thread.

            And/or ask the ISP, if they are not following an RFC. Is everyone with this issue using the same ISP?

            23.01 skipped from FreeBSD 12 to 14 so it's likely a lot of internal things changed.

            Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
            When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
            Upvote 👍 helpful posts!

            1 Reply Last reply Reply Quote 0
            • DerelictD
              Derelict LAYER 8 Netgate @maverickws
              last edited by Derelict

              @maverickws said in No IPv6 after upgrade to 23.01:

              DHCP6 should take care of this without the need of having to find out the GW for the next hop and adding static gateways.

              IPv6 does not get its default next-hop from DHCP[6] like IPv4 does. It relies on router advertisements. To reiterate, there is nothing built into DHCP6 to propagate a next-hop gateway. It must be in an acceptable router advertisement.

              If the router advertisements are non-standard then the problem is at the ISP.

              I, personally, find it pretty appalling that an ISP would deploy IPv6 in such a manner, breaking customer routers that adhere to the standards and locking customers into ISP gear that works around the non-standard behavior.

              Chattanooga, Tennessee, USA
              A comprehensive network diagram is worth 10,000 words and 15 conference calls.
              DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
              Do Not Chat For Help! NO_WAN_EGRESS(TM)

              maverickwsM 1 Reply Last reply Reply Quote 0
              • maverickwsM
                maverickws @Derelict
                last edited by maverickws

                @derelict The ISP you're talking about is actually the #1 ISP around here, with the biggest fibre optics infrastructure, most clients, both in the B2C as B2B.

                They work with all kinds of OEMs: Cisco, Huawei, Ericsson/Alcatel and others.

                The way they implement their solution worked before the update. It still works for all customers who do not use this solution, which will likely be over 95% of the customers. So yeah you can find it appalling, I'd say it isn't them (the ISP) but the OEM's yet many customers around the world will face these issues, but never enough to force them.

                If I plug a Cisco where the pfSense is now, will IPv6 work? [YES, it does].

                Now, what do you think it will happen? An infinitely small percentage of the customers will make the OEM's and the ISP's to change, or people will just move to something that works?

                I believe you know the answer. It's not even a matter of personal opinion, it's a very simple business decision.

                N 1 Reply Last reply Reply Quote 0
                • N
                  nighthawk1967 @maverickws
                  last edited by

                  @maverickws This ipv6 problem started a few updates ago and before that everything worked for years now its just problems .

                  1 Reply Last reply Reply Quote 0
                  • M
                    mhillmann @maverickws
                    last edited by

                    @maverickws
                    If you only define a fixed gateway and don't use DHCPv6 for prefix delegation too, the ISP's GW probably will answer pings from pfSense, but as it has no associaton between the delegated internal prefix and the routing address of the pfSense appliance it refuses to route anything else coming from the public address of your router. This is the whole point of keeping the DHCPV6 configuration (even if it doesn't work correctly): IA-NA to IA-PD binding. The routing infrastructure of your ISP must know which is YOUR local GUA that has the delegated prefix behind itself for the packets to get there...
                    This gets even worse if the particular ISP does not keep the delegated prefix fixed (as in our case) changing it randomly when our router issues a DHCP REFRESH message. To resolve this latter issue we use ULA + NPt for our internal network, with the added benefit of easy IPv6 gateway failover (we use several ISP's on the same router) without mandatory internal renumbering of hosts as the prefix changes. Such a configuration mimicks NAT of IPv4 but only changing the first 64 bits of your local host to the public delegated prefix on the pfSense router.

                    1 Reply Last reply Reply Quote 0
                    • T Tzvia referenced this topic on
                    • jimpJ
                      jimp Rebel Alliance Developer Netgate
                      last edited by

                      https://redmine.pfsense.org/issues/14072

                      Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                      Need help fast? Netgate Global Support!

                      Do not Chat/PM for help!

                      maverickwsM M 3 Replies Last reply Reply Quote 5
                      • maverickwsM
                        maverickws @jimp
                        last edited by

                        @jimp I really appreciate the report, thank you. 🙏 You guys address the issue description way better than me.

                        1 Reply Last reply Reply Quote 0
                        • M
                          mhillmann @jimp
                          last edited by

                          @jimp We have another twist to the already acknowledged regression: our ISP refuses to delegate a prefix shorter than a /64, but grants as many(?) /64 prefix delegations as we request as long as the IA-PD identifier is unique. This gives roughly the same result as requesting a shorter PD and splitting it up on the track interface, but regrettably there is no way to inform unique IAID´s from the IA-PD request to individual track interfaces in order to create an association between the granted PD and the local interfaces onto which these PD´s should be assigned. The implied logic in pfSense is that we only get one PD of a certain length and associate it to the routing interface via its name, not the IAID. It might be useful to consider this use case too, as I have read somewhere that even ATT has this use policy.
                          The following should be possible and not restricted/blocked by the pfSense configuration (0 and 1 are the IAID's):
                          interface ix2 {
                          send ia-na 0;
                          send ia-pd 0;
                          send ia-pd 1;
                          script "/var/etc/dhcp6c_opt13_script.sh";
                          };
                          id-assoc na 0 { };
                          id-assoc pd 0 {
                          prefix-interface ix2.666 {
                          sla-id 0;
                          sla-len 0;
                          };
                          };
                          id-assoc pd 1 {
                          prefix-interface ix2.667 {
                          sla-id 0;
                          sla-len 0;
                          };
                          };

                          1 Reply Last reply Reply Quote 0
                          • jimpJ
                            jimp Rebel Alliance Developer Netgate
                            last edited by

                            That is completely unrelated to the problem here and wouldn't have changed in 23.01. It belongs in a separate thread.

                            Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                            Need help fast? Netgate Global Support!

                            Do not Chat/PM for help!

                            M 1 Reply Last reply Reply Quote 0
                            • M
                              mhillmann @jimp
                              last edited by

                              @jimp sorry, my mistake. I´ve started a new thread already.

                              1 Reply Last reply Reply Quote 0
                              • maverickwsM
                                maverickws @jimp
                                last edited by maverickws

                                @jimp said in No IPv6 after upgrade to 23.01:

                                https://redmine.pfsense.org/issues/14072

                                I was thinking as a solution, what about having an option that when selected executes the script even if the ISP doesn't have a correct config, and when unselected has the supposed to be correct behaviour? Would that work?

                                M 1 Reply Last reply Reply Quote 0
                                • M
                                  mhillmann @maverickws
                                  last edited by

                                  @maverickws I believe this would be equivalent to always run the script, as it uses the same script for both flags already.

                                  maverickwsM 1 Reply Last reply Reply Quote 0
                                  • maverickwsM
                                    maverickws @mhillmann
                                    last edited by

                                    @mhillmann yeah but I mean if we assume the current behaviour is the correct behaviour and by default should be so, it would make sense, imo, the option to override the default behaviour and then run the script regardless. (so when that option is selected, always run the script)

                                    M 1 Reply Last reply Reply Quote 0
                                    • M
                                      mhillmann @maverickws
                                      last edited by

                                      @maverickws I agree, this may be the best option.

                                      1 Reply Last reply Reply Quote 0
                                      • D
                                        ddbnj @maverickws
                                        last edited by

                                        @maverickws said in No IPv6 after upgrade to 23.01:

                                        https://forum.netgate.com/post/1088842

                                        Well, it took me 22 days to realize that ipv6 is no longer working since upgrading.

                                        It seems that a problem has been identified. Has a workaround been proposed? All of my google home devices (which use SLAAC) are no longer working reliably. If I turn off IPV6 on that VLAN, it works.

                                        Thanks,

                                        Devan

                                        1 Reply Last reply Reply Quote 0
                                        • J
                                          jpwoodbu
                                          last edited by

                                          Take with a grain of salt... I was suffering from this issue and enabled the DHCPv6 server on my LAN interface and that seemed to fix it.

                                          I thought I had the DHCPv6 server enabled on my LAN interface before upgrading to 23.01, but I found it not enabled when troubleshooting this issue.

                                          Just thought I would share in case this helps anyone.

                                          D 1 Reply Last reply Reply Quote 0
                                          • D
                                            ddbnj @jpwoodbu
                                            last edited by

                                            @jpwoodbu
                                            Thanks.

                                            I checked on DSL reports and a few NJ users are reporting IPv6 outages. I just removed all traces of IPv6 from pfsense and called it a day. I'll try again in a year. IPv6 really didn't offer any noticeable benefits but introduced much more instability, mostly from Verizon.

                                            compuguyC 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.