Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    ["solved"] IGMP w options blocked on lo0 interface, filling the log, can't be silenced

    Scheduled Pinned Locked Moved Plus 25.07 Develoment Snapshots
    38 Posts 5 Posters 1.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • L
      louis2 @stephenw10
      last edited by

      @stephenw10

      No, I had it only enable on the PCLAN, since it is still in an experimental stage. However I see the behavoir on multiple vlans including the PCLAN.

      I did add the rule now to the guest vlan and my privileged vlan as well. To keep them equal, not that I expect it to change something.

      1 Reply Last reply Reply Quote 0
      • stephenw10S
        stephenw10 Netgate Administrator
        last edited by

        Are you adding it as a floating rule? It doesn't look like that but...

        1 Reply Last reply Reply Quote 0
        • dennypageD
          dennypage
          last edited by

          The rule to allow IGMP must come before the default rule you have at the end of the interface. The log entries you posted show that this is not the case.

          You can either use a floating rule with quick, or you can use Local. Try what I showed above. You can tighten it up later if you feel the need, but get it working first.

          L 1 Reply Last reply Reply Quote 0
          • L
            louis2 @dennypage
            last edited by

            @dennypage @stephenw10

            To answer your questions

            Floating
            No it am not using floating rules here. In short I only use floating for reasons of security or high performance.

            Rule position
            There are a couple of things which determs the order I place rules. In short

            • security
            • performance
            • logic

            Below the first part of my rule set as related to my PCLAN

            3fca7c78-0a26-4ae9-865c-5a6add82f1ce-image.png

            dennypageD 1 Reply Last reply Reply Quote 0
            • dennypageD
              dennypage @louis2
              last edited by

              @louis2 have you tried the simple Local rule that I posted?

              L 1 Reply Last reply Reply Quote 0
              • L
                louis2 @dennypage
                last edited by

                @dennypage

                Do you refer to
                ^suggest an “Allow” from all rule for IPv4/IPv6 and protocol IGMP on the “Local” interface.^

                No I did not yet but that rule is much wider than I like, and why should that make a difference !!???

                Never the less I will add the rule for now for the PC-lan. However what ever the result is, I will remove it later on !! 🙄

                a4ec691f-c694-45b3-bde6-7099bd31496d-image.png

                1 Reply Last reply Reply Quote 0
                • dennypageD
                  dennypage
                  last edited by

                  Yea, there really is no need/reason to restrict IGMP in the local network. Especially if you are actually using IGMPv3.

                  Btw, your comments indicate IGMPv3, but are you actually using v3? And joining toward a specific source? IGMPv2 is much more common as a default, and many devices and software do not implement v3 correctly. FWIW, unless you really know what you are doing with multicast, and really need v3 due to the number of available/conflicting sources, you should stick with v2.

                  YMMV.

                  L 1 Reply Last reply Reply Quote 0
                  • L
                    louis2 @dennypage
                    last edited by

                    @dennypage

                    NOP ! 😖 😖

                    2b6655ad-0579-4a77-a70a-fbd1811df842-image.png

                    1 Reply Last reply Reply Quote 0
                    • dennypageD
                      dennypage
                      last edited by dennypage

                      Please show the entire page on the Floating tab, and the entire page on the Local tab which includes the rule above.

                      L 1 Reply Last reply Reply Quote 0
                      • stephenw10S
                        stephenw10 Netgate Administrator
                        last edited by

                        Mmm, for some reason that's not matching.

                        Make sure that rule is actually loaded: pfctl -vsr | grep IGMP

                        Then grab a packet in a pcap and compare that with the running rule.

                        L 1 Reply Last reply Reply Quote 0
                        • L
                          louis2 @dennypage
                          last edited by

                          @dennypage

                          Denny, I really see no reason to do so. I all ready published the relevant part of the PCLAN and I do have not any floating rule related to IGMP.

                          If a reason to publish more, OK but I do not see any at the moment

                          dennypageD 1 Reply Last reply Reply Quote 0
                          • L
                            louis2 @stephenw10
                            last edited by louis2

                            @stephenw10 said in ["solved"] IGMP w options blocked on lo0 interface, filling the log, can't be silenced:

                            pfctl -vsr | grep IGMP

                            stephen here the actual rules as associated with IGMP

                            [25.03-BETA][admin@pfSense.lan]/root: pfctl -vsr | grep IGMP
                            pass in quick on GRF_Privileged inet proto igmp from any to <MulticastMediaServer> keep state (if-bound) allow-opts label "USER_RULE: Allow IGMP3 (Twonky)" label "id:1750076107" ridentifier 1750076107
                            pass in quick on mlxen0.16 inet proto igmp all keep state (if-bound) allow-opts label "USER_RULE: TEST TEST Allow IGMP3 (Twonky)" label "id:1750102422" ridentifier 1750102422
                            pass in quick on mlxen0.16 inet6 proto igmp all keep state (if-bound) allow-opts label "USER_RULE: TEST TEST Allow IGMP3 (Twonky)" label "id:1750102422" ridentifier 1750102422
                            pass in quick on mlxen0.16 inet proto igmp from any to <MulticastMediaServer> keep state (if-bound) allow-opts label "USER_RULE: Allow IGMP3 (Twonky)" label "id:1747646074" ridentifier 1747646074
                            pass in quick on mlxen0.26 inet proto igmp from any to <MulticastMediaServer> keep state (if-bound) allow-opts label "USER_RULE: Allow IGMP3 (Twonky)" label "id:1750076219" ridentifier 1750076219
                            pass in quick on lagg0.100 inet proto igmp from any to <MulticastMediaServer> keep state (if-bound) allow-opts label "USER_RULE: Allow IGMP3 (Twonky)" label "id:1750075686" ridentifier 1750075686

                            Note that PCLAN is NOT a member of GRF_Privileged
                            PCLAN10G is.

                            mlxen0.16= PCLAN
                            mlxen0.26= GUESTS
                            lagg0.100= Virtual Machines among them Twonky media server

                            1 Reply Last reply Reply Quote 0
                            • dennypageD
                              dennypage @louis2
                              last edited by dennypage

                              @louis2 said in ["solved"] IGMP w options blocked on lo0 interface, filling the log, can't be silenced:

                              @dennypage

                              I really see no reason to do so.

                              Oh, okay.

                              Here an explanation of the reason to do so:

                              Using the rule I gave you above should prevent any of the rules on any of your local interfaces from seeing IGMP traffic. That you indicate that they (PCLAN/PRIV10G) do still see the IGMP traffic does not add up.

                              I can think of 5 possible causes for this:

                              1. The rule was not input correctly.
                              2. The changes were not applied.
                              3. The interfaces, PCLAN & PRIV10G, are not actually local interfaces. I.E. they have gateways on them.
                              4. A bug in pfSense.
                              5. A bug in the kernel.

                              It makes sense to eliminate 1-3 prior to considering 4 or 5. They are the most likely explanations, otherwise many others, including myself, would be experiencing problems with IGMP.

                              The request to provide a complete posting of the Local tab was to provide concrete verification that neither 1 & 2 are the case. I had assumed that #3 is not the case, or you would have raised this when I asked you to put a Local rule in. However, maybe I should not have assumed that... Are PCLAN and PRIV10G local interfaces?

                              You have come here for help. But you are only providing select snippets of information. Things you consider relevant. But it just hasn't been enough. It's very likely that something you do not consider to be relevant is in fact very relevant. I don't understand why you are being so unwilling to provide information, but it actively getting in the way of us helping you.

                              L 1 Reply Last reply Reply Quote 1
                              • L
                                louis2 @dennypage
                                last edited by

                                @dennypage

                                Note that I do not like the whole IGMP behavoir at all as it is now, even it hopefully works ... a bit.

                                But apart of all the alarms terrible, I have to recompile pimd to be sure if there is yes or no next to the rule and messages problem there is a further issue to pfSense.

                                I need to find an opportunity to recompile pimd (the perfectly good working beta at least on freebsd 14) and do testing

                                1 Reply Last reply Reply Quote 0
                                • stephenw10S
                                  stephenw10 Netgate Administrator
                                  last edited by

                                  Hmm, well the rule looks good.

                                  Can we see a pcap of the traffic that's triggering it?

                                  1 Reply Last reply Reply Quote 0
                                  • stephenw10S
                                    stephenw10 Netgate Administrator
                                    last edited by

                                    Also check: pfctl -vsr | grep -A 3 IGMP so you can see the state/evaluations on each rule.

                                    Check the actual rule number and tracker ID of the rule triggering the log by mousing over the red X in the log.

                                    L 1 Reply Last reply Reply Quote 0
                                    • L
                                      louis2 @stephenw10
                                      last edited by

                                      @stephenw10

                                      Sorry, I can do that now. However I know the rule which did cause the logging a couple of weeks ago.

                                      306aeb8b-723e-46b1-821e-d3a9716bc38a-image.png

                                      I am very restricted at this moment because I have guests which makes it very hard to test things and I am also very busy.

                                      I plan to recompile pimd packages (based of what is formally a beta, however which is working perfectly (I used it for years)) as soon as possible, however that will not be this week perhaps next one.

                                      1 Reply Last reply Reply Quote 0
                                      • stephenw10S
                                        stephenw10 Netgate Administrator
                                        last edited by

                                        If you mouse over the rule you can check the actual rule number and tracker ID and then compare that with the output from pfctl -vsr:

                                        Screenshot from 2025-06-18 12-56-07.jpg

                                        1 Reply Last reply Reply Quote 0
                                        • First post
                                          Last post
                                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.