Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    IPv6 firewall rules with logging disabled still generating logs

    Scheduled Pinned Locked Moved General pfSense Questions
    12 Posts 3 Posters 257 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • P
      plicplic
      last edited by

      Description:

      I'm running pfSense 2.8.0-RELEASE and experiencing an issue where IPv6 traffic continues to be logged despite having explicit Block rules with logging disabled.

      Here is my config:

      • Both LAN and WAN interfaces have IPv6 Block rules configured
      • Action: Block
      • Address Family: IPv6
      • Protocol: Any
      • Source: Any (LAN subnets for LAN rule)
      • Destination: Any
      • Log: UNCHECKED (logging explicitly disabled)
      • Rules are positioned at the top of their respective interface rule lists (but for LAN, there is an ipv4 rule which always put this on position 2, not counting the anti-lockout rule, see picture below and for WAN, there is at the top the rules for private network and bogon networks which are not "surpassable")

      Issue:
      Despite these rules, IPv6 traffic continues to appear in /var/log/filter.log (picture below)

      What I've tried:

      • Verified rules are properly configured (Block + Log unchecked)
      • Placed IPv6 block rules at top of interface rule lists (with exceptions mentionned supra)
      • Applied changes and restarted pfSense
      • Removed IPv6 gateways
      • No floating rules interfering
      • Rules show as active and correctly configured in WebGUI

      Question:
      Are there system-level IPv6 logging rules that override custom interface rules? How can I completely disable IPv6 logging when I have explicit Block rules with logging disabled? For the time being, I don't use IPv6 at all

      Any insight would be appreciated.
      Plicplic

      LAN firewall rules.png extract from filter.png

      1 Reply Last reply Reply Quote 0
      • stephenw10S
        stephenw10 Netgate Administrator
        last edited by

        The traffic you see logged is sourced from some clients link-local address which is not in the LAN subnet. So your rule doesn't match it.

        Try changing the rule to any source.

        1 Reply Last reply Reply Quote 0
        • P
          plicplic
          last edited by

          I will try that right now, thanks Stephen!

          1 Reply Last reply Reply Quote 0
          • P
            plicplic
            last edited by

            Follow-up: Even after changing Source to "Any" and disabling all IPv6 services, the issue persists.

            Additional steps taken:

            • Changed LAN rule Source from "LAN subnets" to "Any"
            • Disabled DHCP6 on WAN interface (set to None)
            • Disabled IPv6 Track Interface on LAN (set to None)
            • Rebooted pfSense completely

            Current status:
            IPv6 traffic continues to be logged on both interfaces despite Block rules with logging explicitly disabled:

            Here, some examples:

            Capture d’écran 2025-07-10 à 18.04.28.png

            Both WAN and LAN rules are configured as:

            • Action: Block
            • Address Family: IPv6
            • Protocol: Any
            • Source: Any
            • Destination: Any
            • Log: UNCHECKED

            Question: Is there a system-level IPv6 logging mechanism in pfSense that overrides custom firewall rules? The traffic is being blocked correctly but continues to generate logs despite logging being disabled in the rules.

            Additional guidance would be appreciated!

            1 Reply Last reply Reply Quote 0
            • stephenw10S
              stephenw10 Netgate Administrator
              last edited by

              You can see that it's matching the default IPv6 block rule there. Which implies it's not matching your custom rule. It's much easier to see that in the gui log.

              Which interface is WAN there?

              The second log looks like it has IP Options so you would need a rule with that set to match it.

              P 1 Reply Last reply Reply Quote 0
              • P
                plicplic @stephenw10
                last edited by plicplic

                @stephenw10

                You're right - here's the GUI log analysis:
                All entries show my custom rules "Block all IPv6 (1000000003/4)" - NOT default rules.

                And em0 is the Wan interface.

                Main issue: My IPv6 Block rules have "Log: UNCHECKED" but continue logging anyway.

                IP Options question: Should I configure specific IP Options settings for IPv6 rules? Currently using Protocol: Any with default options.

                This looks like IPv6 logging ignores the disable setting in 2.8.0.

                1 Reply Last reply Reply Quote 0
                • stephenw10S
                  stephenw10 Netgate Administrator
                  last edited by

                  You will need block rules for both to match traffic with and without IP Options for that I believe.

                  How does that actually appear in the GUI though? If it's matching the rule I'd expect it not to log. Though there have been some changes to the behaviour of IP Options in pf.

                  P 1 Reply Last reply Reply Quote 0
                  • P
                    plicplic @stephenw10
                    last edited by

                    After extensive testing, I suspect this is a possible pfSense bug and not a configuration issue. But of course, I'm no specialist and will comply with any further test You could propose!

                    Complete test sequence performed:

                    1. Initial setup: IPv6 Block rules on both WAN and LAN interfaces with "Log: UNCHECKED"
                    2. Applied stephenw10's suggestion: Changed LAN rule Source from "LAN subnets" to "Any"
                    3. Created separate IP Options rules: Added distinct rules for traffic with and without IP Options as recommended
                    4. Tested pfBlockerNG theory: pfBlockerNG automatically repositioned itself above our rules after cron updates
                    5. Final isolation test: Completely disabled pfBlockerNG service to eliminate any interference

                    Results:

                    Throughout ALL tests, IPv6 traffic continues logging with identical behavior:

                    • Same rule IDs (1000000003/1000000004) matching in GUI logs
                    • Same traffic patterns (ICMPv6 Neighbor Discovery, mDNS on port 5353)
                    • Same logging frequency on both em0 (WAN) and em1 (LAN) interfaces

                    Current status with pfBlockerNG disabled:

                    Capture d’écran 2025-07-11 à 11.47.43.png

                    Conclusion:

                    IPv6 Block rules ignore the "Log packets that are handled by this rule" UNCHECKED setting. The rules correctly match and block traffic but continue generating logs despite logging being explicitly disabled.

                    Configuration is correct, pfBlockerNG is not the cause, and the issue persists across multiple rule variations and system restarts.

                    Is this a known issue with IPv6 logging in pfSense 2.8.0?

                    1 Reply Last reply Reply Quote 0
                    • stephenw10S
                      stephenw10 Netgate Administrator
                      last edited by

                      It's probably this: https://redmine.pfsense.org/issues/16068

                      But I can't see from the raw log output if you are seeing it on traffic with IP Options. It looks like you haven't. And it's UDP and ICMP which normally wouldn't so that's confusing.

                      Try this. Go to Status > Filter Reload and reload the ruleset. Make sure it's actually loading without errors.

                      Then at the CLI run: pfctl -vsr

                      Check the actual running rules for 1000000003/4.

                      P 1 Reply Last reply Reply Quote 0
                      • P
                        plicplic @stephenw10
                        last edited by

                        1. Filter reload shows no error while reloading.

                        2. pfctl -vsr | grep -A 5 -B 5 "1000000003"

                        Capture d’écran 2025-07-13 à 13.54.24.png

                        Log is unchecked in every rule for Wan and LAN in the firewall rules

                        1. I found this in Status --> System.logs --> Settings (and changed some checks)

                        Capture d’écran 2025-07-13 à 13.57.17.png

                        And now filter.log is only populated with ipv4

                        Capture d’écran 2025-07-13 à 13.58.57.png

                        johnpozJ 1 Reply Last reply Reply Quote 0
                        • johnpozJ
                          johnpoz LAYER 8 Global Moderator @plicplic
                          last edited by

                          @plicplic yeah when you block all IPv6 it creates those hidden block all IPv6 rules. And yeah most likely going to create a lot of noise in the logs.

                          Those blocks your still seeing to to 224.0.0.22 are multicast with ip-option set but not allowed - you could change your rules to either create one that blocks but doesn't log, or your allow rule to allow ip-option being set

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                          1 Reply Last reply Reply Quote 1
                          • stephenw10S
                            stephenw10 Netgate Administrator
                            last edited by

                            Yup, what I missed here is that whilst it's not hitting the default block rule it's in fact also not hitting your custom rules. It's actually the hidden block all v6 rules that are added when you unset 'allow IPv6'.

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.