Hi Greg,

Nothing weird i could spot.. Besides that most wifi rules are kinda duplicated. (Some with 'S/SA' others without.) It doesn't explain why it 'should?' under some circumstance change the rules. If that's what happened in the first place.. I guess we will not know for sure anytime soon. :/

Regards,
PiBa-NL

Op 21-8-2017 om 21:40 schreef greg whynott:
Hi PiBa,

- The rules are applied inbound from wifi zone on the pfs interface.
- inside is defined by an alias which describes all our internal RFC1918 networks.  Without the use of an exclusion operator. - transparent http proxy is configured for the wifi network. As mentioned,  while it was experiencing the issue, it was passing all IP,  including ICMP at the time to inside destinations,  I don't think squid is in the way here.  No other application proxies are configured.

Below is a dump of the rules on the interface.  The Alias are correct and describe our internal networks.


The policy was working originally and again post reboot.  I don't think its a rule definition issue.   Beyond extra services being added to the 'guest policy' alias group, there have been no changes in relation to the wifi zone.         I was logging to the splunk server but sadly I see my trial license has expired,  I'll come back to that another time..


[2.3.4-RELEASE][root@tor-net-fw1]/root: pfctl -sr | grep igb2
scrub on igb2 all fragment reassemble
block drop in log on ! igb2 inet from 10.101.133.0/24 <http://10.101.133.0/24> to any
block drop in log on igb2 inet6 from fe80::a236:9fff:fe05:56a8 to any
pass in quick on igb2 inet proto udp from any port = bootpc to 255.255.255.255 port = bootps keep state label "allow access to DHCP server" pass in quick on igb2 inet proto udp from any port = bootpc to 10.101.133.1 port = bootps keep state label "allow access to DHCP server" pass out quick on igb2 inet proto udp from 10.101.133.1 port = bootps to any port = bootpc keep state label "allow access to DHCP server" pass in quick on igb2 inet proto tcp from any to <WebMail_Inside> port = http flags S/SA keep state label "USER_RULE: HTTP on WebMail" pass in quick on igb2 inet proto tcp from any to <WebMail_Inside> port = https flags S/SA keep state label "USER_RULE: HTTPS on WebMail" block drop in quick on igb2 inet from any to <INSIDE_Netblock> label "USER_RULE: Block traffic to inside networks." pass in quick on igb2 inet proto tcp from any to any port = pop3 flags S/SA keep state label "USER_RULE: Default Guest Policy For WIFI" pass in quick on igb2 inet proto tcp from any to any port = 8080 flags S/SA keep state label "USER_RULE: Default Guest Policy For WIFI" pass in quick on igb2 inet proto tcp from any to any port = imap flags S/SA keep state label "USER_RULE: Default Guest Policy For WIFI" pass in quick on igb2 inet proto tcp from any to any port = nntp flags S/SA keep state label "USER_RULE: Default Guest Policy For WIFI" pass in quick on igb2 inet proto tcp from any to any port = 3689 flags S/SA keep state label "USER_RULE: Default Guest Policy For WIFI" pass in quick on igb2 inet proto tcp from any to any port = ssh flags S/SA keep state label "USER_RULE: Default Guest Policy For WIFI" pass in quick on igb2 inet proto tcp from any to any port = http flags S/SA keep state label "USER_RULE: Default Guest Policy For WIFI" pass in quick on igb2 inet proto tcp from any to any port = https flags S/SA keep state label "USER_RULE: Default Guest Policy For WIFI" pass in quick on igb2 inet proto tcp from any to any port = imaps flags S/SA keep state label "USER_RULE: Default Guest Policy For WIFI" pass in quick on igb2 inet proto tcp from any to any port = smtps flags S/SA keep state label "USER_RULE: Default Guest Policy For WIFI" pass in quick on igb2 inet proto tcp from any to any port = domain flags S/SA keep state label "USER_RULE: Default Guest Policy For WIFI" pass in quick on igb2 inet proto tcp from any to any port = pop3s flags S/SA keep state label "USER_RULE: Default Guest Policy For WIFI" pass in quick on igb2 inet proto tcp from any to any port = 9339 flags S/SA keep state label "USER_RULE: Default Guest Policy For WIFI" pass in quick on igb2 inet proto tcp from any to any port = isakmp flags S/SA keep state label "USER_RULE: Default Guest Policy For WIFI" pass in quick on igb2 inet proto tcp from any to any port = ntp flags S/SA keep state label "USER_RULE: Default Guest Policy For WIFI" pass in quick on igb2 inet proto tcp from any to any port = sip flags S/SA keep state label "USER_RULE: Default Guest Policy For WIFI" pass in quick on igb2 inet proto tcp from any to any port = time flags S/SA keep state label "USER_RULE: Default Guest Policy For WIFI" pass in quick on igb2 inet proto tcp from any to any port = sae-urn flags S/SA keep state label "USER_RULE: Default Guest Policy For WIFI" pass in quick on igb2 inet proto udp from any to any port = pop3 keep state label "USER_RULE: Default Guest Policy For WIFI" pass in quick on igb2 inet proto udp from any to any port = 8080 keep state label "USER_RULE: Default Guest Policy For WIFI" pass in quick on igb2 inet proto udp from any to any port = imap keep state label "USER_RULE: Default Guest Policy For WIFI" pass in quick on igb2 inet proto udp from any to any port = nntp keep state label "USER_RULE: Default Guest Policy For WIFI" pass in quick on igb2 inet proto udp from any to any port = 3689 keep state label "USER_RULE: Default Guest Policy For WIFI" pass in quick on igb2 inet proto udp from any to any port = http keep state label "USER_RULE: Default Guest Policy For WIFI" pass in quick on igb2 inet proto udp from any to any port = https keep state label "USER_RULE: Default Guest Policy For WIFI" pass in quick on igb2 inet proto udp from any to any port = imaps keep state label "USER_RULE: Default Guest Policy For WIFI" pass in quick on igb2 inet proto udp from any to any port = smtps keep state label "USER_RULE: Default Guest Policy For WIFI" pass in quick on igb2 inet proto udp from any to any port = domain keep state label "USER_RULE: Default Guest Policy For WIFI" pass in quick on igb2 inet proto udp from any to any port = pop3s keep state label "USER_RULE: Default Guest Policy For WIFI" pass in quick on igb2 inet proto udp from any to any port = 9339 keep state label "USER_RULE: Default Guest Policy For WIFI" pass in quick on igb2 inet proto udp from any to any port = isakmp keep state label "USER_RULE: Default Guest Policy For WIFI" pass in quick on igb2 inet proto udp from any to any port = ntp keep state label "USER_RULE: Default Guest Policy For WIFI" pass in quick on igb2 inet proto udp from any to any port = sip keep state label "USER_RULE: Default Guest Policy For WIFI" pass in quick on igb2 inet proto udp from any to any port = time keep state label "USER_RULE: Default Guest Policy For WIFI" pass in quick on igb2 inet proto udp from any to any port = sae-urn keep state label "USER_RULE: Default Guest Policy For WIFI" pass in quick on igb2 inet proto icmp all keep state label "USER_RULE: ICMP Out" pass in quick on igb2 proto tcp from any to (igb2) port = 3128 flags S/SA keep state pass in quick on igb2 proto tcp from any to (igb2) port = 3129 flags S/SA keep state
[2.3.4-RELEASE][root@tor-net-fw1.]/root:

thanks,
greg




On Mon, Aug 21, 2017 at 1:46 PM, PiBa <[email protected] <mailto:[email protected]>> wrote:

    Hi,
    As you probably know pfSense rules don't apply to 'zones' as some
    firewalls do..
    So I'm wondering what is the actual rules set for the
    configuration of these 3 items on wifi?

    1. Allow from wifi to inside webmail server on port 443/80.
    2. Block all from wifi to inside any any.
    3. Allow from wifi to internet any any.

    Okay first one is easy, its a simple pass rule with a specific
    destination.
    The second one, is a bit more interesting, how is 'inside' defined?
    And then the third could be most prone to mistake, how did you
    define 'to internet' ? Like 'destination NOT 192.168/16' or
    something similar?
    Also are any proxy's or other gateway/advanced configurations used?
    Though only reason i think something might 'disapear' or change
    kinda spontaneous is if the rules have a gateway defined that went
    down.

    Can you describe the rules in detail?

    Regards
    PiBa-NL

    Op 21-8-2017 om 19:20 schreef greg whynott:

        First time for me as well.  I want to believe it was induced
        by human,  but
        there is no evidence of on the surface.   Perhaps there is
        something in the
        logs which would indicate what happened,  but I'm not sure for
        how long
        those rules went dark.

          I'm deploying an instance of zabbix in the wifi zone to test
        inward
        readability,  the DMZ's already have zabbix hosts so will
        configure those
        to do so as well.    I failed to mention in OP,   this issue
        was only
        related to the wifi zone.  The DMZ/inside/outside policies
        were functioning
        as expected.

        -greg




        On Mon, Aug 21, 2017 at 12:45 PM, Moshe Katz <[email protected]
        <mailto:[email protected]>> wrote:

            I know that negative experience isn't so helpful to
            diagnose an issue, but
            we have a very similar setup that's been in place for over
            10 years, and
            we've never seen such a thing.

            Moshe



            On Mon, Aug 21, 2017 at 12:09 PM, greg whynott
            <[email protected] <mailto:[email protected]>>
            wrote:

                I'm not seeking help but rather thought I'd share an
                experience we had

            last

                week which has caused quite a hit on the confidence
                levels of pfSense.

                I tried to find where it may of been human error but
                seen no evidence of
                such.  Happy to upload logs to any member of the team
                should they care to
                investigate for their own reasons.



                We have pfsense with 5 zones connected to the internet
                via gigabit, all
                physical interfaces.  From time to time we'll saturate
                the line for days

            at

                a time,  keeping pfsense busy (media co).

                Zones:
                Inside
                Outside
                WiFi
                DMZ1
                DMZ2



                The zone of concern is the WiFI zone.   Its rule set
                is very simple.

                1. Allow from wifi to inside webmail server on port
                443/80.
                2. Block all from wifi to inside any any.
                3. Allow from wifi to internet any any.


                This was tested when the policy was put into place
                last winter and
                functioned as expected.     Fast forward,  140 days
                up-time at this

            point.


                Helpdesk staff informs me people on the wifi are able
                to mount internal
                CIFS shares and browse internal web resources.

                I look at it,  verify this is the case using tcpdump
                on the wifi
                interface.

                look at the rules,  disable and re-enable them,
                nothing changes.

                There is an update waiting to be applied.  We apply
                the update and

            reboot.

                (in hind sight, wish we didn't but were getting the
                "fix asap!!" message)

                when it comes up again,  all is back to "normal".
                Policy is being
                respected.


                It seems as if at some point the policy stopped
                working,  even a

            flip/flop

                of the rule set didn't help.  No one has made changes
                in that zone since
                the device was deployed.


                As you can imagine this is a cause of huge concern for
                us.  I've been

            using

                pfSense for about 11 years and this was quite the
                blow..  I hope it was
                something we did,  but I can't think of how things
                could become so broken
                that disabling the rule then re enabling it did
                nothing to correct...


                Has anyone else experienced policy 'failing' after a
                period of time?

                take care,
                greg
                _______________________________________________
                pfSense mailing list
                https://lists.pfsense.org/mailman/listinfo/list
                <https://lists.pfsense.org/mailman/listinfo/list>
                Support the project with Gold! https://pfsense.org/gold

            _______________________________________________
            pfSense mailing list
            https://lists.pfsense.org/mailman/listinfo/list
            <https://lists.pfsense.org/mailman/listinfo/list>
            Support the project with Gold! https://pfsense.org/gold

        _______________________________________________
        pfSense mailing list
        https://lists.pfsense.org/mailman/listinfo/list
        <https://lists.pfsense.org/mailman/listinfo/list>
        Support the project with Gold! https://pfsense.org/gold




_______________________________________________
pfSense mailing list
https://lists.pfsense.org/mailman/listinfo/list
Support the project with Gold! https://pfsense.org/gold

Reply via email to