Project

General

Profile

Actions

Bug #9615

closed

Connections permitted by a schedule are not killed when that schedule expires.

Added by Victor Rodriguez almost 5 years ago. Updated over 3 years ago.

Status:
Duplicate
Priority:
Normal
Assignee:
-
Category:
Rules / NAT
Target version:
-
Start date:
07/05/2019
Due date:
% Done:

0%

Estimated time:
Plus Target Version:
Release Notes:
Affected Version:
2.4.4-p3
Affected Architecture:

Description

On the /system_advanced_misc.php page, under Schedule States it states that "By default, when a schedule expires, connections permitted by that schedule are killed. This option overrides that behavior by not clearing states for existing connections." This is definitely NOT HAPPENING, and it has not been happening for quite some time judging from the research I've done.

I have an alias for each of my kids. I have all of their respective devices covered by each of their respective aliases. I have a reject everything rule for each of their respective aliases, and I have a pass rule for each of their respective aliases above each of their respective reject rules. Each of their pass rules is associated with a schedule with more than one block of time defined. I can assure you that the aforementioned default behavior, whereby connections permitted by a schedule are killed when a schedule expires IS NOT HAPPENING. Pre-established connections are not interrupted, such as iMessages, Facetime, and other connections that I have yet to determine. The iOS devices are definitely able to continue to reach out to the internet when their are supposed to be blocked.


Files

Screen Shot 2019-07-08 at 08.51.27.png (173 KB) Screen Shot 2019-07-08 at 08.51.27.png Screenshot of Rules Victor Rodriguez, 07/08/2019 09:52 AM
NAT Rules-Redacted.txt (6.09 KB) NAT Rules-Redacted.txt NAT rules (verbose) Benjamin Lee, 04/24/2020 01:03 PM
FW-Rules-Redacted.txt (27.8 KB) FW-Rules-Redacted.txt Firewall rules (verbose) Benjamin Lee, 04/24/2020 01:03 PM
UDP States - Before and After-Redacted.txt (1.79 KB) UDP States - Before and After-Redacted.txt UDP states before and after for example host Benjamin Lee, 04/24/2020 01:04 PM
Actions #2

Updated by Victor Rodriguez almost 5 years ago

UPDATE: The wifi router is behind the pfSense firewall. All devices on the network (including the wifi router) get their IP addresses and DNS from the pfSense firewall and not from the wifi router.

Actions #3

Updated by Jim Pingle over 4 years ago

  • Category set to Rules / NAT
Actions #4

Updated by Benjamin Lee about 4 years ago

To whom it may concern,

I have also encountered this bug as documented in this NetGate forum thread:

"https://forum.netgate.com/topic/152824/sg-5100-udp-states-still-alive-after-schedule-expires-2-4-5-release-amd64"

The information I present on that thread shows that LAN side states spawned under the user created pass by schedule rule ARE terminated when the schedule ends, but the matching state on the WAN side (outbound to the internet) does not.

Then the firewall itself creates a matching state into the LAN from the WAN side so that traffic continues to flow both directions for that set of states.

This is not expected and in my opinion very bad behavior. If the matching state on the WAN side is manually deleted (or deleted via a cron task), then as expected the traffic ceases for that LAN state.

Attached are a series of files that should show the issue.

The UDP states show clearly that the WAN side state was spawned by a rule outside the pass by schedule user rule and survives the expiration. What is unexpected is the spawning of a new state from the WAN to the LAN by a Firewall rule.

In my opinion, when the schedule expires, the states spawned by the rule and their counterpart on the WAN interface should be killed.

Please contact me if you need further information.

Phizix

Actions #5

Updated by Jim Pingle over 3 years ago

  • Status changed from New to Duplicate
  • Priority changed from High to Normal

Duplicate of #8820

Actions

Also available in: Atom PDF