OPNsense Forum

English Forums => General Discussion => Topic started by: foss-johnny on November 11, 2025, 10:05:00 PM

Title: Default deny rule being hit, even though ALL traffic is allowed.
Post by: foss-johnny on November 11, 2025, 10:05:00 PM
Hi,

I'm looking in the Live Firewall logs for my LAN interface, and I can see that the default deny rule is periodically blocking 443 traffic, even though my firewall policy for that interface has a rule that allows all ports and protocols.

How can I track down what is causing this?
Is there a way to run a debug trace, and see what object in OPNsense is triggering this and determine why it's not being allowed out based on the interface rule?

Most tcp 443 traffic is being allowed, just randomly some of it is being blocked. It's also happening on other ports too, not just tcp 443.

Thanks!
Title: Re: Default deny rule being hit, even though ALL itraffic is allowed.
Post by: Patrick M. Hausen on November 11, 2025, 10:08:53 PM
Click on the details for one of those blocking incidents and post them.

The most common cause of unexpected "default deny" is asymmetric routing. So a diagram of your network would also be helpful.
Title: Re: Default deny rule being hit, even though ALL itraffic is allowed.
Post by: Patrick M. Hausen on November 11, 2025, 10:30:11 PM
Please attach here. I categorically block so called "image hosting services".
Title: Re: Default deny rule being hit, even though ALL itraffic is allowed.
Post by: foss-johnny on November 11, 2025, 10:46:16 PM
Quote from: Patrick M. Hausen on November 11, 2025, 10:30:11 PMPlease attach here. I categorically block so called "image hosting services".
Title: Re: Default deny rule being hit, even though ALL itraffic is allowed.
Post by: foss-johnny on November 11, 2025, 11:34:27 PM
Quote from: Patrick M. Hausen on November 11, 2025, 10:08:53 PMClick on the details for one of those blocking incidents and post them.

The most common cause of unexpected "default deny" is asymmetric routing. So a diagram of your network would also be helpful.

Here's a basic network diagram:

Title: Re: Default deny rule being hit, even though ALL itraffic is allowed.
Post by: foss-johnny on November 12, 2025, 01:01:26 AM
Just checked the details of the log file, and can see it's for protocol 6, which is IPv6.

I added in a specific interface rule for IPv6, however I'm still seeing traffic being blocked in the Live Logs.

Do I need to setup IPv6 somewhere else as well?

What's strange is that the source address is in IPv4 format, not IPv6.

Title: Re: Default deny rule being hit, even though ALL itraffic is allowed.
Post by: meyergru on November 12, 2025, 01:52:43 AM
Do you actually see blocked websites or are these just random log entries? One that you posted is from Google and it has a FIN-ACK state.

Therefore, potentially, you see artifacts from QUIC traffic - I see those, too.

You can test if you allow HTTP3/QUIC traffic (https://cloudflare-quic.com/) and see if the test triggers those log entries. Wait a bit, it may be that the TCP stream must be closed to cause a log entry.
Title: Re: Default deny rule being hit, even though ALL itraffic is allowed.
Post by: foss-johnny on November 12, 2025, 04:29:24 AM
Quote from: meyergru on November 12, 2025, 01:52:43 AMDo you actually see blocked websites or are these just random log entries? One that you posted is from Google and it has a FIN-ACK state.

Therefore, potentially, you see artifacts from QUIC traffic - I see those, too.

You can test if you allow HTTP3/QUIC traffic (https://cloudflare-quic.com/) and see if the test triggers those log entries. Wait a bit, it may be that the TCP stream must be closed to cause a log entry.

Thanks for your suggestion. I was able to browse to the cloudflare page without issues. Looking in the live view log, I don't see a blocked entry for it either.

It's prodominately tcp 443, but have noticed other ports too; 5223 and 6159.

I haven't put my finger on anything that is not working that I can consistently use as a test. Everything seems to be working.

I'm seeing the blocked traffic originate from multiple different clients.



Title: Re: Default deny rule being hit, even though ALL traffic is allowed.
Post by: pfry on November 12, 2025, 09:59:40 AM
Quote from: foss-johnny on November 12, 2025, 01:01:26 AMJust checked the details of the log file, and can see it's for protocol 6, which is IPv6. [...]

In this case it's referring to TCP. HTTPS protocol over TCP protocol over IPv4 protocol, so to speak.

Quote from: meyergru on November 12, 2025, 01:52:43 AM[...] One that you posted is from Google and it has a FIN-ACK state. [...]

An over-aggressive session timeout or lost ACKs could cause this, but either would seem highly unusual.

The direction seems odd, but it's been a while since I watched enough TCP streams. Does the server normally close the TCP session?

I don't see any "FA" logs on my firewall (",FA," in "Firewall: Log Files: Plain View"). Offhand - I didn't care to wait for a full search. I do use QUIC, as I listen to YT in the morning.