Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    How to silence logging for packets dropped due to IP options?

    Scheduled Pinned Locked Moved Firewalling
    33 Posts 5 Posters 1.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B
      beatvjiking
      last edited by

      Re: [Pass firewall rules are logged blocking packets](even after deleting the rule)

      I'm glad I found this previous thread about the cause of what's going on with the logs, but I've got a bit of the opposite problem - I'm now dropping these packets early in the ruleset, but they're still getting through to the default allow rule and getting dropped/logged due to the options.
      506b0ca8-e27c-409e-b98f-cedeb8902a0f-image.png
      413529c6-645a-431a-8062-92ebae3ece18-image.png

      My question is this: what's the best way to drop these packets silently? I don't want to allow them through (these are not routable, but I don't want to blanket allow options and let routable packets with options through), and I don't want to log them (these IGMP/multicast drops are just log spam). I had hoped simply dropping them early in the rule list was enough, but that doesn't seem to be the case. I can't drop multicast at the edge within the network because people are using it legitimately, but I don't need the firewall to log it all the time either.

      S 1 Reply Last reply Reply Quote 0
      • S
        SteveITS Galactic Empire @beatvjiking
        last edited by

        @beatvjiking You can add a rule on LAN that has logging disabled. We used IGMP as the protocol, as opposed to by IP:

        aa522977-e396-4f70-804a-4f4ad3f198d4-image.png

        Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
        When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
        Upvote ๐Ÿ‘ helpful posts!

        B 1 Reply Last reply Reply Quote 1
        • B
          beatvjiking @SteveITS
          last edited by

          @SteveITS Thanks, but we've got that rule in place already (see 2nd rule in the ruleset). I actually added the rule above it blocking destination 224.0.0.0/24 since I figured it was a glitch before I started searching the internet for solutions. Both these rules are definitely dropping packets, at least according to their counters, but... Packets are still getting logged.

          S 1 Reply Last reply Reply Quote 0
          • S
            SteveITS Galactic Empire @beatvjiking
            last edited by

            @beatvjiking D'oh! I read them in order and stopped at the first, like one should with firewall rules. ;)

            I double checked, and found that we'd set up the block only on LAN and not our LAB interface. The latter was logging the IGMP drops, and when I copied the rule there, it stopped.

            Open states?
            What if you create it as IPv4 IGMP, without IPv6?

            Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
            When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
            Upvote ๐Ÿ‘ helpful posts!

            B 2 Replies Last reply Reply Quote 1
            • B
              beatvjiking @SteveITS
              last edited by

              @SteveITS No worries, that's how it's supposed to work :)

              I tried creating it as an IPv4 IGMP rule initially, in case someone was doing something weird, but even after switching it back to IPv4 only it's still logging. I also did go in and do a manual filter reload after the change, just in case.

              Good call on the open states question, but the mystery deepens - I killed all the IGMP states that were open, but... then new ones opened. Considering these are supposed to be dropped by a total of three rules, each for a different reason, how are these states getting opened in the first place?
              dcc1679e-0625-4a47-8e2b-77607c3ce2c9-image.png

              S 1 Reply Last reply Reply Quote 0
              • B
                beatvjiking @SteveITS
                last edited by

                @SteveITS also, this is part of a failover cluster, but I did kill the states with the other firewall mid-reboot to ensure I was really, truly killing the states, and they reappeared.

                johnpozJ 1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator @beatvjiking
                  last edited by johnpoz

                  @beatvjiking I can not duplicate this... I don't normally have any igmp traffic on my network... But I generated some just to test.

                  So as you can see, it was logging traffic I generated..

                  I then created firewall rule not to log, and nothing more seen in my logs, but via packet capture I do see my traffic hitting my lan interface.

                  igmp.jpg

                  You sure your rules are being applied, you mention ha cluster.. Sure the rules are syncing to whatever actual interface the traffic is hitting your cluster?

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  B 1 Reply Last reply Reply Quote 1
                  • S
                    SteveITS Galactic Empire @beatvjiking
                    last edited by

                    @beatvjiking said in How to silence logging for packets dropped due to IP options?:

                    manual filter reload

                    ...and no errors there?
                    https://docs.netgate.com/pfsense/en/latest/troubleshooting/firewall.html#new-rules-are-not-applied

                    (I mean you didn't say there were, but thought I'd ask)

                    Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                    When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                    Upvote ๐Ÿ‘ helpful posts!

                    1 Reply Last reply Reply Quote 1
                    • B
                      beatvjiking @johnpoz
                      last edited by

                      @johnpoz I did doublecheck, and the rules are syncing to the interface that hits the cluster - it's the LAN interface on each, and the rules are in the LAN set.

                      @SteveITS no errors on filter reload, although after rebooting both cluster nodes, the rule ID got renumbered and had an @ added before it - and now I can't filter on or against that ID:
                      ee447715-b748-47a5-919f-647adee0c021-image.png
                      8922e0f5-ff08-4aef-8234-a7de7b8fd1a6-image.png

                      Looking up above, that default LAN allow rule was 100000101. I hadn't made a change. Not sure where that's coming from... Could this be symptomatic of a different issue, or is it just a cosmetic thing?

                      johnpozJ 1 Reply Last reply Reply Quote 0
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator @beatvjiking
                        last edited by johnpoz

                        @beatvjiking the default lan rule should always have that same ID.. you got something going on.

                        Notice in my log, its the same 101 rule ID.

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                        B 2 Replies Last reply Reply Quote 1
                        • B
                          beatvjiking @johnpoz
                          last edited by

                          @johnpoz any tips on how to troubleshoot that? I pulled a backup and the XML file shows it as 101 still. I'm not seeing any weird formatting or other red flags in the backup, and the filesystem on these units is ZFS so filesystem/file damage seem quite unlikely.

                          1 Reply Last reply Reply Quote 0
                          • B
                            beatvjiking @johnpoz
                            last edited by

                            @johnpoz looks like the secondary has the same issue, and the weird rule ID matches. Whatever it is, it's on both units.

                            B 1 Reply Last reply Reply Quote 0
                            • B
                              beatvjiking @beatvjiking
                              last edited by

                              @beatvjiking I tried adding floating rules to see if that would fix the issue... nope.
                              6afb50f6-5132-4193-8d2b-992db9bc7e55-image.png

                              Logs still pouring in.

                              B 1 Reply Last reply Reply Quote 0
                              • B
                                beatvjiking @beatvjiking
                                last edited by

                                So I tried some rules in deployments beyond this one, and they seem to work. Specifically, I set up floating rules that block IGMP any>any and configured quick match. In this environment, they didn't work, but everywhere else, they seem to, so it's gotta be something on these machines that's screwing things up.

                                Thanks @johnpoz and @SteveITS for your help and suggestions. If anyone has ideas on how to find the source of the config issue I'm all ears, I'd rather not rebuild these from bare metal if I can avoid it :)

                                S 1 Reply Last reply Reply Quote 0
                                • S
                                  SteveITS Galactic Empire @beatvjiking
                                  last edited by

                                  @beatvjiking You mentioned doing the filter reload, but that didn't show an error?

                                  Is the rule shown in /tmp/rules.debug per:
                                  https://docs.netgate.com/pfsense/en/latest/troubleshooting/firewall.html#ruleset-failing-to-load

                                  Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                                  When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                                  Upvote ๐Ÿ‘ helpful posts!

                                  B 1 Reply Last reply Reply Quote 1
                                  • B
                                    beatvjiking @SteveITS
                                    last edited by beatvjiking

                                    @SteveITS the rule is shown there, and there are no errors thrown by the filter reload.

                                    block  quick inet proto igmp  from any to any ridentifier 1721162300 label "USER_RULE: Silent IGMP drop" label "id:1721162300"
                                    block  quick inet from any to 224.0.0.0/24 ridentifier 1721162354 label "USER_RULE: Silent local multicast drop" label "id:1721162354"
                                    

                                    Interestingly, the first 1000000101 rule isn't the default allow. It's:

                                    # block IPv4 link-local. Per RFC 3927, link local "MUST NOT" be forwarded by a routing device,
                                    # and clients "MUST NOT" send such packets to a router. FreeBSD won't route 169.254./16, but
                                    # route-to can override that, causing problems such as in redmine #2073
                                    block in  quick from 169.254.0.0/16 to any ridentifier 1000000101 label "Block IPv4 link-local"
                                    

                                    Another point of interest:

                                    pass  in  quick  on $LAN inet from $LAN__NETWORK to any ridentifier 0100000101 keep state ( max-src-states 8192  ) label "USER_RULE: Default allow LAN to any rule" label "id:0100000101"
                                    

                                    Where the labeling doesn't align with the logs. I did try clearing the logs, and the mislabeling persists.

                                    johnpozJ 1 Reply Last reply Reply Quote 0
                                    • johnpozJ
                                      johnpoz LAYER 8 Global Moderator @beatvjiking
                                      last edited by

                                      @beatvjiking

                                      hmmm

                                      # and clients "MUST NOT" send such packets to a router. FreeBSD won't route 169.254./16, but
                                      block in  quick from 169.254.0.0/16 to any ridentifier 1000000101 label "Block IPv4 link-local"
                                      block in  quick from any to 169.254.0.0/16 ridentifier 1000000102 label "Block IPv4 link-local"
                                      
                                      pass  in  quick  on $LAN inet from $LAN__NETWORK to any ridentifier 0100000101 keep state label "USER_RULE: Default allow LAN to any rule" label "id:0100000101"
                                      

                                      The rules seem fine to me.. notice the 169.254 rules are 100, where the default lan is 010

                                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                                      If you get confused: Listen to the Music Play
                                      Please don't Chat/PM me for help, unless mod related
                                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                                      B 1 Reply Last reply Reply Quote 1
                                      • B
                                        beatvjiking @johnpoz
                                        last edited by

                                        @johnpoz ah yes, I missed that... looked right too quickly :) But yeah, as far as I can tell, everything seems okay. I exported a config backup and scanned the XML by eye and didn't see anything that seemed amiss. I'm not sure why the logging subsystem is identifying the rule as "(@4294967295)," let alone why the blocks keep getting logged. There's no item 4294967295 in the rules.debug file.

                                        johnpozJ 1 Reply Last reply Reply Quote 0
                                        • johnpozJ
                                          johnpoz LAYER 8 Global Moderator @beatvjiking
                                          last edited by johnpoz

                                          @beatvjiking I recall something in the past with that number I think..Are you running pfblocker with auto rules? I will have to search but pretty sure there was some other thread(s) where that ID came up in the discussion.

                                          Your not running UPnP are you?

                                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                                          If you get confused: Listen to the Music Play
                                          Please don't Chat/PM me for help, unless mod related
                                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                                          B 1 Reply Last reply Reply Quote 1
                                          • B
                                            beatvjiking @johnpoz
                                            last edited by

                                            @johnpoz No pfblocker or UPnP. We have one URL alias rule that pulls in the emerging threats list and quickdrops anything bound to those IPs, but we also have that same rule in other locations that don't have this problem.

                                            Come to think of it, (@4294967295) would indicate an overflow in a 32-bit value, right?

                                            johnpozJ 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.