https://redmine.pfsense.org/https://redmine.pfsense.org/favicon.ico?16780521162017-02-07T07:37:00ZpfSense bugtrackerpfSense Packages - Bug #7223: IPv4 Rules not working in Inline Modehttps://redmine.pfsense.org/issues/7223?journal_id=311522017-02-07T07:37:00ZKill Bill
<ul></ul><p>Just to be clear here - If you are looking at the Blocks tab, that is NOT the place to look at with the inline mode.</p> pfSense Packages - Bug #7223: IPv4 Rules not working in Inline Modehttps://redmine.pfsense.org/issues/7223?journal_id=311552017-02-07T07:47:39ZJames Webb
<ul></ul><p>Kill Bill wrote:</p>
<blockquote>
<p>Just to be clear here - If you are looking at the Blocks tab, that is NOT the place to look at with the inline mode.</p>
</blockquote>
<p>No we look in the Alerts tab for items highlighted in red. However, no red or black IPv4 alerts are showing because all IPv4 traffic is being allowed through as proven when we tested our rule on our own IP. In Legacy mode traffic from a flagged IPv4 address is blocked and in Inline mode it is allowed through.</p>
<p>James</p> pfSense Packages - Bug #7223: IPv4 Rules not working in Inline Modehttps://redmine.pfsense.org/issues/7223?journal_id=311562017-02-07T07:52:52ZKill Bill
<ul></ul><p>Your own IP as in something from HOME_NET? Not exactly useful test either. In general, taking similar things to the forum before you have a clear bug somewhere is would be suggested.</p> pfSense Packages - Bug #7223: IPv4 Rules not working in Inline Modehttps://redmine.pfsense.org/issues/7223?journal_id=311582017-02-07T07:56:45ZJames Webb
<ul></ul><p>Kill Bill wrote:</p>
<blockquote>
<p>Your own IP as in something from HOME_NET? Not exactly useful test either. In general, taking similar things to the forum before you have a clear bug somewhere is would be suggested.</p>
</blockquote>
<p>No a public facing IPv4 address. Not from HOME_NET. This is a clear bug as IPv6 addresses are being filtered in Inline mode. IPv4 addresses were also filtered until we started testing on the pfSense 2.4 beta. No Suricata configs have changed.</p> pfSense Packages - Bug #7223: IPv4 Rules not working in Inline Modehttps://redmine.pfsense.org/issues/7223?journal_id=311712017-02-07T13:56:02ZJames Webb
<ul></ul><p>James Webb wrote:</p>
<blockquote>
<p>Kill Bill wrote:</p>
<blockquote>
<p>Your own IP as in something from HOME_NET? Not exactly useful test either. In general, taking similar things to the forum before you have a clear bug somewhere is would be suggested.</p>
</blockquote>
<p>No a public facing IPv4 address. Not from HOME_NET. This is a clear bug as IPv6 addresses are being filtered in Inline mode. IPv4 addresses were also filtered until we started testing on the pfSense 2.4 beta. No Suricata configs have changed.</p>
</blockquote> pfSense Packages - Bug #7223: IPv4 Rules not working in Inline Modehttps://redmine.pfsense.org/issues/7223?journal_id=311782017-02-07T15:57:15ZJoe Cordon
<ul></ul><p>James Webb wrote:</p>
<blockquote>
<p>James Webb wrote:</p>
<blockquote>
<p>Kill Bill wrote:</p>
<blockquote>
<p>Your own IP as in something from HOME_NET? Not exactly useful test either. In general, taking similar things to the forum before you have a clear bug somewhere is would be suggested.</p>
</blockquote>
<p>No a public facing IPv4 address. Not from HOME_NET. This is a clear bug as IPv6 addresses are being filtered in Inline mode. IPv4 addresses were also filtered until we started testing on the pfSense 2.4 beta. No Suricata configs have changed.</p>
</blockquote></blockquote>
<p>Looks like you accidentally quoted a message without putting anything in the body there!</p>
<p>Just made an account to add that I've also experienced the same problem recently with my hardware, but decided to refrain from making a bug report as I assumed it was my inexperience mis-setting up the system, and not to mention but the pf-sense release was still beta. However, given the confusion above I've decided to make an account to document my experiences. I started with all default configs as far as I'm aware on the latest 2.4 BETA.<br />Upon adding a similar rule:</p>
<p><code>drop ip 79.140.192.0 any -> $HOME_NET any (msg:"BLOCKED Test Connection";)</code></p>
<p>I have found the same behaviour as James. Just to be clear, the address blocked is from a VPN that is completely independent of all local addresses encompassed in $HOME_NET.</p>
<p>I'm finding that on <strong>legacy mode</strong> I have Suricata working as expecting, blocking test connections from the VPN. In addition to this singular test address, other random botnets/probing connections (both IPv4 and v6) are dropped, as configured in the default rules.</p>
<p>However when switching to <strong>inline mode</strong>, I also experience that the above testing address is not blocked at all and connection attempts from it are allowed. In addition, regular IPv6 addresses are also blocked just like in legacy mode, however - be it coincidence or not - no IPv4 blocks are being shown on the log. It seems unlikely to me that this is because no rogue IPv4 connections are made to the server, as they were detected fairly frequently in Legacy mode. Thus, I suspect that these are not being picked up.</p>
<p>I imagine, as James mentioned, that the problem may revolve around this (being no IPv4 traffic being blocked), or as issue in default configurations. However as I said, I have little experience with Suricata, the little I have is only from testing it in the recent past. Therefore the problem may be more subtle, or James and I have fallen into the same trap whilst configuration so I am merely speculating.</p> pfSense Packages - Bug #7223: IPv4 Rules not working in Inline Modehttps://redmine.pfsense.org/issues/7223?journal_id=311802017-02-07T16:15:38ZJames Webb
<ul></ul><p>That's very interesting to know that we are having similar issues Joe!</p>
<p>I hope that either this can be resolved or we can work together to find out what exactly is going on here.<br />I've updated to the latest builds tonight and still the issue persists. I thought I had fixed it by tweaking some settings, but it was in fact blocks from legacy mode still being present in the firewall ruleset prior to switching back to inline mode.</p>
<p>James</p> pfSense Packages - Bug #7223: IPv4 Rules not working in Inline Modehttps://redmine.pfsense.org/issues/7223?journal_id=318472017-02-28T11:57:43ZJim Thompsonjim@netgate.com
<ul><li><strong>Priority</strong> changed from <i>High</i> to <i>Normal</i></li></ul> pfSense Packages - Bug #7223: IPv4 Rules not working in Inline Modehttps://redmine.pfsense.org/issues/7223?journal_id=366732018-06-07T11:08:19ZSteve Y
<ul></ul><p>Hi all, is this still an issue with the spring 2018 updates to Suricata? There was a forum discussion about it that I seem to have misplaced but overall my understanding is the default detection of networks over-detected, and essentially whitelisted traffic to/from the router, which is of course everything.</p> pfSense Packages - Bug #7223: IPv4 Rules not working in Inline Modehttps://redmine.pfsense.org/issues/7223?journal_id=424612019-09-25T14:20:48ZBill Meeks
<ul></ul><p>This issue can be closed as "RESOLVED". It was caused by an overly broad automatic pass list mechanism that was initially added to Suricata on pfSense using Inline IPS Mode. Once it was discovered the automatic generation of PASS rules to simulate the default pass list used in Legacy Blocking Mode was overly broad, the automatic PASS rule generation feature was removed.</p>
<p>Bill</p> pfSense Packages - Bug #7223: IPv4 Rules not working in Inline Modehttps://redmine.pfsense.org/issues/7223?journal_id=424642019-09-25T14:27:17ZJim Pingle
<ul><li><strong>Status</strong> changed from <i>New</i> to <i>Resolved</i></li></ul>