Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    pfSense 25.11RC does not like IPv6 turned off?

    Scheduled Pinned Locked Moved Problems Installing or Upgrading pfSense Software
    21 Posts 6 Posters 483 Views 5 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • gnitingG Offline
      gniting @stephenw10
      last edited by

      @stephenw10 said in pfSense 25.11RC does not like IPv6 turned off?:

      Hmm, can't replicate that so far.

      Unsetting that doesn't disable IPv6 in the kernel. It just removes the default IPv6 rules that pass traffic.

      Can you see exactly what rule is generating that?

      How do I go about that? Also, I am assuming you are recommending I turn off "Allow IPv6" and then try to hunt down the rule?

      1 Reply Last reply Reply Quote 0
      • stephenw10S Offline
        stephenw10 Netgate Administrator
        last edited by

        Yes, if you can replicate it in 25.11RC by simply disabling allow IPv6. Look at the system logs for errors. Try running Status > Filter Reload and see where it errors.

        I still can't generate that error here even on systems with NAT64. So it seems likely you have some other unusual rule.

        Are you able to upload your ruleset to us for testing? If so please upload the /tmp/rules.debug file here: https://nc.netgate.com/nextcloud/s/cFFWNHnLdm3rXtQ

        luckman212L gnitingG 2 Replies Last reply Reply Quote 0
        • luckman212L Offline
          luckman212 LAYER 8 @stephenw10
          last edited by luckman212

          @stephenw10 I'm getting this too on a 3100 running 25.07.1

          I've skimmed over the rules.debug but don't see anything that jumps out. Also tried disabling Allow IPv6 on Advanced settings but it had no effect, the error still presented.

          My settings...
          d1a082f9-2b67-4481-8557-3c21cf09b8e8-image.png

          ddf3a8ce-5fb7-4e25-a709-d56c5b4276e1-image.png

          I uploaded the rules.debug to the same drop:

          b8435162-4101-429e-a636-5857f45d9dd6-image.png

          (Happy Thanksgiving)

          stephenw10S 1 Reply Last reply Reply Quote 1
          • gnitingG Offline
            gniting @stephenw10
            last edited by gniting

            @stephenw10 said in pfSense 25.11RC does not like IPv6 turned off?:

            Yes, if you can replicate it in 25.11RC by simply disabling allow IPv6. Look at the system logs for errors. Try running Status > Filter Reload and see where it errors.

            I still can't generate that error here even on systems with NAT64. So it seems likely you have some other unusual rule.

            Are you able to upload your ruleset to us for testing? If so please upload the /tmp/rules.debug file here: https://nc.netgate.com/nextcloud/s/cFFWNHnLdm3rXtQ

            Disabled "Allow IPv6" and rebooted.

            All is well! I am stumped now.

            1 Reply Last reply Reply Quote 0
            • stephenw10S Offline
              stephenw10 Netgate Administrator @luckman212
              last edited by

              @luckman212 Does it throw the same error against that file if you try to load it at the CLI?
              pfctl -f /tmp/rulesdebug

              luckman212L 2 Replies Last reply Reply Quote 0
              • luckman212L Offline
                luckman212 LAYER 8 @stephenw10
                last edited by

                @stephenw10 Yes, it does.

                Interestingly, when run with the dry-run (-n) flag, it does not error at all.

                1 Reply Last reply Reply Quote 1
                • luckman212L Offline
                  luckman212 LAYER 8 @stephenw10
                  last edited by luckman212

                  @stephenw10 I can't figure this one out. Any advice?

                  I posted the rules.debug from this unit (which is running 25.07.1) to a gist

                  Again, it's odd that dry run reports no issues but trying to actuate the rules results in the DIOCADDRULE error and an empty resultant ruleset.

                  [25.07.1-RELEASE][root@r1.lan]/root: pfctl -n -f /tmp/rules.debug
                  (no error)
                  
                  [25.07.1-RELEASE][root@r1.lan]/root: pfctl -f /tmp/rules.debug
                  pfctl: DIOCADDRULE: Protocol family not supported
                  
                  [25.07.1-RELEASE][root@r1.lan]/root: pfctl -vvsr
                  (empty)
                  
                  K 1 Reply Last reply Reply Quote 0
                  • K Offline
                    kprovost @luckman212
                    last edited by

                    No luck reproducing that here, and to make it even more fun this error (EPFNOSUPPORT) is an error code pf simply doesn't use in 25.07.01 (and in later versions only if something is wrong with a nat64 rule).

                    Run this dtrace command while you're trying to set the failing ruleset:
                    dtrace -n 'fbt::pf_ioctl_addrule:return { printf("=> %d (@%#x)", arg1, arg0); }' -n 'pf:ioctl:function:error { printf("function %s Line %d error %d", stringof(arg0), arg2, arg1); }'
                    (Terminate with Ctrl+C after you've run pfctl -f /tmp/rules.debug)

                    That'll at least let us confirm that we really are getting that error from the kernel, and might give us a hint about where it's coming from.

                    luckman212L 1 Reply Last reply Reply Quote 0
                    • luckman212L Offline
                      luckman212 LAYER 8 @kprovost
                      last edited by

                      @kprovost Interesting. Ok, here it is

                      # dtrace -n 'fbt::pf_ioctl_addrule:return { printf("=> %d (@%#x)", arg1, arg0); }' -n 'pf:ioctl:function:error { printf("function %s Line %d error %d", stringof(arg0), arg2, arg1); }'
                      dtrace: description 'fbt::pf_ioctl_addrule:return ' matched 1 probe
                      dtrace: description 'pf:ioctl:function:error ' matched 1 probe
                      CPU     ID                    FUNCTION:NAME
                        1  28362          pf_ioctl_addrule:return => 3241561984 (@0xf84)
                        1  28362          pf_ioctl_addrule:return => 0 (@0x164)
                        1  28362          pf_ioctl_addrule:return => 3241561984 (@0xf84)
                        1  28362          pf_ioctl_addrule:return => 0 (@0x164)
                        0  31078                   function:error function pf_ioctl_addrule Line 2177 error 46
                        0  28362          pf_ioctl_addrule:return => 0 (@0x106c)
                        0  28362          pf_ioctl_addrule:return => 46 (@0x164)
                      
                      K 1 Reply Last reply Reply Quote 0
                      • K Offline
                        kprovost @luckman212
                        last edited by

                        @luckman212 And that's on 25.11, right?

                        luckman212L 1 Reply Last reply Reply Quote 0
                        • luckman212L Offline
                          luckman212 LAYER 8 @kprovost
                          last edited by

                          @kprovost No, this affected unit is still on 25.07.1. Do you want me to update to 25.11 and re-test?

                          K 1 Reply Last reply Reply Quote 0
                          • K Offline
                            kprovost @luckman212
                            last edited by

                            @luckman212 Run uname -a on that machine for me.

                            That error line matches perfectly on 25.11, and doesn't make any sense at all on 25.07.
                            I suspect you've wound up with a 25.11 kernel and a 25.07 user land. Which might also explain your actual problem. The kernel is supposed to be backwards compatible with userspace, but clearly not perfectly so.

                            luckman212L 1 Reply Last reply Reply Quote 0
                            • luckman212L Offline
                              luckman212 LAYER 8 @kprovost
                              last edited by luckman212

                              @kprovost Well I'll be damned. You're right! (disclaimer: this is a system I don't manage myself. So I didn't even think to check this) But, alas...

                              # freebsd-version -ku
                              16.0-CURRENT
                              15.0-CURRENT
                              
                              # uname -K
                              1600001
                              # uname -U
                              1500029
                              
                              # uname -a
                              FreeBSD r1.lan 16.0-CURRENT FreeBSD 16.0-CURRENT #34 plus-RELENG_25_11-n256497-084b5f7b7bcd: Tue Nov 18 17:24:40 UTC 2025     root@pfsense-build-release-aarch64-1.eng.atx.netgate.com:/var/jenkins/workspace/pfSense-Plus-snapshots-25_11-main/obj/armv7/JG6bvqZ0/var/jenkins/workspace/pfSense-Plus-snapshots-25_11-main/sources/FreeBSD-src-plus-RELENG_25_11/arm.armv7/sys/pfSense-3100 arm
                              

                              Now I've definitely got some questions for the admin who asked me for help on this one! sheesh...

                              luckman212L 1 Reply Last reply Reply Quote 2
                              • luckman212L Offline
                                luckman212 LAYER 8 @luckman212
                                last edited by

                                @kprovost just circling back to thank you for the help. Updated the unit to 25.11RC and all is well again. The dtrace wizardry you used to debug this is quite impressive!

                                1 Reply Last reply Reply Quote 1
                                • JonathanLeeJ Offline
                                  JonathanLee
                                  last edited by

                                  IPv6 is far more widespread today than many people realize—often hiding in plain sight. For example, Apple devices use utun interfaces, which are IPv6-based containers that support features like Private Relay and iCloud. These services even run iMask DNS over DoH inside those tunnels. In short, IPv6 is much more prevalent in modern systems than most people think.

                                  Make sure to upvote

                                  1 Reply Last reply Reply Quote 0
                                  • First post
                                    Last post
                                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.