-
Notifications
You must be signed in to change notification settings - Fork 647
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
net/frr: ospfd generated rules should be extended #346
Comments
|
I added a dev branch to the repository with an additional firewall rule for unicast: You can see the diff here: https://github.com/opnsense/plugins/compare/quagga_fw_rule?expand=1 If it works, I will merge it to master and it will go to stable soon. |
|
@cultcom Please also add some block samples for IPv6 so I can add IPv6 rules too. |
|
@fabianfrz what I am missing is an outgoing rule for the multicast traffic. Here the init state is clearly described as that the process receives hello packets but they do not contain the router id of the host itself: For me that means, that the other routers do not see the hello packets from the opnsense at all. So outgoing packets are dropped somewhere. After applying the patch I see a new pf rule but nothing changes so far. |
Only the interface network addresses on which the ospfd is talking should be allowed here. The network statements are for route summarizations at ABRs when I remember correctly. |
|
yes I do see that rule but something is wrong with it: When I dump packets on the OSPF interface like this: I get correctly looking hello packets: But on another host within the same segment nothing is coming in: When I disable the firewall with "pfctl -d" almost instantly the packets arrive on the peer hosts. For testing I installed a pfSense VM and configured quagga on it and I notice slightly different outgoing rules: So there is definitely something blocking the packets from leaving the VM. Any suggestions on how to debug this further? |
|
@AdSchellevis @fichtner I remember an isse (for forum post) the last days regarding CARP not sending outgoing packets and with |
|
I don't think so, but if it is, the changes to the default config are here https://github.com/opnsense/core/commits/17.7.7/src/etc/config.xml.sample |
|
I'm testing on a freshly installed VM and did not upgrade yet. |
… enable the "Block carp traffic" for opnsense/plugins#346
|
oops, likely opnsense/core@632d887
|
|
nope no change yet. |
|
Great, but doesn't solve this one with proto ospf . |
|
@cultcom this would fix the bug in the Forum ... but we get closer to this one :) |
|
well, I pasted the rule 2 hours ago. That is all I have. |
|
Another fun fact: I have another production VM which is working, but that was upgraded from an earlier version. Maybe that gives you a hint. |
|
Well, that's odd. you probably have to compare both pf rulesets to know for sure what's different there. The "let out anything from firewall host itself" on both machines can't be different, so there must be some other rule causing your issues. |
|
the out rule look exactly the same I do not really believe that it relates to the rules at all? Are there other possibilities like kernel flags or anything? |
|
If it's generating filter log messages, I don't expect so. Can you check the log again for the offending rule (first item in the log line)? then check the details of that rule using
|
|
I recently tried this without success: |
|
Unfortunately I do not see anything logged. I see the hello packets with tcpdump on the test machine but I do not see them arrive on the peers. I do see them with "pfctl -d". |
|
Maybe it's a user defined rule, when logging is enabled it should generate messages for the default rules. With the risk of generating a lot of log traffic, you could add log info to all your rules and see if anything pops out. I can't help you any further here, maybe someone else steps in. |
|
Well, with those two rules that allow everything in and out I don't see the rules involved anymore. Maybe I find time to continue debugging on Friday. I'm happy for every input that might help to find a solution. |
|
Last check, the settings in system_advanced_firewall.php, are they equal for the functional and non functional machine? |
|
And diff /tmp/rules.debug on both machines please ... |
|
funny, both are 17.7.7_1 but the dialogs in system_advanced_firewall.php differ. The working machine has a section "Network Address Translation" between IPv6 and Bogon. But NAT is disabled on both. |
|
any new ideas on this? I compared all the rules up and down, but even with a "pass all" rule it does not work. It has to be something different. |
… enable the "Block carp traffic" for opnsense/plugins#346 (cherry picked from commit 632d887)
|
I recently tried to this with current version 17.7.11 and still have the same issues. I am definitely sure it has nothing to do with the pf rules themselves. The OSPF exchange does not work with pf enabled even in "pass everything" mode. |
|
Today I set up a new 18.7.10_3 VM with OSPF enabled on the WAN side and noticed an issue with the generated rules: As you can see there is a "reply-to" included which stops OSPF sending HELLO packets to 224.0.0.5 Due to the fact that I need a static route before I can setup FRR this is a chicken-egg-problem. So the frr package should always add a generic outgoing rule for OSPF packets, maybe like this: |
|
@cultcom this rules should not be a problem to add those two rules. I can probably get them into the next release. |
|
@cultcom your rules will be released soon. |
|
Did you read my comments on PR #1149 |

The generated rules for OSPF do not include "inet6" rules and do not allow unicast updates between the peers.
As it appears some updates are send directly between the peers by unicast.
The text was updated successfully, but these errors were encountered: