Menu

Show posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Show posts Menu

Messages - daygle

#1
Quote from: Monviech (Cedrik) on January 27, 2026, 01:38:30 PMHello thanks for the report we are looking into it.

Thank you.

Also related, the migration firewall rules import failed due to the same issue. Export of old firewall rules produced alias names rather than uuids. The only way I was able to import was to remove the overload table alias names from the csv.
#2
After upgrading to OPNsense 26.1, PF is refusing to load the ruleset whenever a firewall rule uses rate‑limit / max‑src‑conn‑rate options.
The overload table names appear to be UUIDs, which exceed PF's maximum table‑name length.
This results in PF rejecting the entire ruleset.

Error output:
There were error(s) loading the rules: /tmp/rules.debug:317:
table name 'cc63f2df-3dc0-4fe5-a002-b8e7a2d5ade1' too long

The line in question reads [317]:
pass in quick on igc0 inet proto tcp from {any} to $ssh_ipv4 port {22}
keep state ( max 100 max-src-nodes 50 max-src-conn 20 max-src-states 3
tcp.established 300 max-src-conn-rate 2 /60,
overload <cc63f2df-3dc0-4fe5-a002-b8e7a2d5ade1> flush global )
label "4622edd3-7c20-497c-ba73-8c044b3cfcca" # SSH/RL/IPv4

Multiple similar UUID‑style table names are generated for other rules with rate‑limit settings, and PF rejects all of them.

Steps to reproduce
1. Create a firewall rule (e.g., SSH on WAN)
2. Open Advanced Options
3. Enable - Max src‑conn‑rate and Overload table alias.
4. Apply changes
5. PF fails to load ruleset with "table name too long"

For those who have the same issue - you can remove the overload alias from the rule until a fix has been applied.
#3
Just letting you know that the recent OPNsense 25.7.3 upgrade appears to have broken the 'Intrusion Detection' - 'Download' tab view. I understand that there was improvements to table views.

See attached screenshot.
#4
24.1, 24.4 Legacy Series / Re: Kea DHCP IPv6?
November 08, 2024, 02:37:08 PM
Quote from: franco on November 08, 2024, 08:01:13 AM
https://kasiviswanathanblog.wordpress.com/2017/06/04/dnsmasq-a-simple-dhcpv6-server-for-embedded-devices/

FWIW, Dnsmasq rework moves further into 2025 territory. Just too much other priorities at the moment.


Cheers,
Franco

Thanks @franco.

So given the findings would you suggest reverting back to ISC DHCPv4 and ISC DHCPv6 until further changes are made in 2025?
#5
24.1, 24.4 Legacy Series / Re: Kea DHCP IPv6?
November 07, 2024, 05:40:53 AM
Quote from: franco on September 26, 2024, 08:46:48 PM
No. The idea is:

* DNSmasq DHCP becomes the default DHCP
* ISC DHCP moves to plugins
* Kea DHCP will gain DHCPv6 eventually

The mere fact that Kea is the only maintained effort for HA features will make it stick to the core, but honestly we do not like to see it become the default.


Cheers,
Franco

Am I correct in assuming that DNSmasq only supports IPv4? I am currently using a mix of KEA for IPv4 and ISC DHCPv6.

I guess what I am trying to understand is what will the default for DHCPv6 be? KEA or DNSmasq?
#6
I wanted to reach out suggesting a much needed enhancment to OPNsense and the 'Alerts' section under 'Intrusion Detection'. I am surprised that there is no option to filter logs.

Would love to see this option added. Adding such option would allow users to filter blocked or alerts within the log.
#7
24.1, 24.4 Legacy Series / Re: Kea DHCP IPv6?
February 01, 2024, 10:45:44 PM
Quote from: franco on February 01, 2024, 05:20:22 PM
Yes, maybe 24.7 if all goes well. We will discuss roadmap stuff in two weeks.


Cheers,
Franco

Excellent, look forward to it. Thanks Franco :)
#8
24.1, 24.4 Legacy Series / Kea DHCP IPv6?
February 01, 2024, 01:28:57 PM
With the implementation of Kea DHCP for IPv4 I was wondering if there was plans to implement Kea DHCP IPv6?
#9
24.1, 24.4 Legacy Series / Re: 24.1 IDS breaks internet
January 31, 2024, 12:52:15 AM
Same issue with me.

Disabling IDS OPNsense started working again. Hope a fix is developed soon.