Just a quick update - since disabling IDS/IPS in my last post, the firewall has not crashed again as of this reply.
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts MenuQuote from: franco on August 15, 2022, 08:15:36 PMYeah, never had this problem on 22.1 before. I disabled IPS/IDS entirely and it seems to have greatly helped the stability - it was crashing multiple times a day today and yesterday and since turning off Intrustion Detection in services, it hasn't crashed again (yet).
For readability:db:0:kdb.enter.default> show pcpu
cpuid = 0
dynamic pcpu = 0xfc0f40
curthread = 0xfffffe0138c28720: pid 3489 tid 102014 critnest 1 "pfctl"
curpcb = 0xfffffe0138c28c30
fpcurthread = 0xfffffe0138c28720: pid 3489 "pfctl"
idlethread = 0xfffffe00207933a0: tid 100003 "idle: cpu0"
self = 0xffffffff82c10000
curpmap = 0xfffffe011668f518
tssp = 0xffffffff82c10384
rsp0 = 0xfffffe0118fea000
kcr3 = 0x351ae2000
ucr3 = 0x16fe6d000
scr3 = 0x16fe6d000
gs32p = 0xffffffff82c10404
ldt = 0xffffffff82c10444
tss = 0xffffffff82c10434
curvnet = 0xfffff80001202dc0
db:0:kdb.enter.default> bt
Tracing pid 3489 tid 102014 td 0xfffffe0138c28720
kdb_enter() at kdb_enter+0x37/frame 0xfffffe0118fe93c0
vpanic() at vpanic+0x1b0/frame 0xfffffe0118fe9410
panic() at panic+0x43/frame 0xfffffe0118fe9470
trap_fatal() at trap_fatal+0x385/frame 0xfffffe0118fe94d0
trap_pfault() at trap_pfault+0x4f/frame 0xfffffe0118fe9530
calltrap() at calltrap+0x8/frame 0xfffffe0118fe9530
--- trap 0xc, rip = 0xffffffff80debe14, rsp = 0xfffffe0118fe9600, rbp = 0xfffffe0118fe9620 ---
rn_walktree() at rn_walktree+0x64/frame 0xfffffe0118fe9620
pfr_get_addrs() at pfr_get_addrs+0x219/frame 0xfffffe0118fe9680
pfioctl() at pfioctl+0x23be/frame 0xfffffe0118fe9b50
devfs_ioctl() at devfs_ioctl+0xc6/frame 0xfffffe0118fe9ba0
vn_ioctl() at vn_ioctl+0x1a4/frame 0xfffffe0118fe9cb0
devfs_ioctl_f() at devfs_ioctl_f+0x1e/frame 0xfffffe0118fe9cd0
kern_ioctl() at kern_ioctl+0x25b/frame 0xfffffe0118fe9d40
sys_ioctl() at sys_ioctl+0xf1/frame 0xfffffe0118fe9e00
amd64_syscall() at amd64_syscall+0x10c/frame 0xfffffe0118fe9f30
fast_syscall_common() at fast_syscall_common+0xf8/frame 0xfffffe0118fe9f30
--- syscall (54, FreeBSD ELF64, sys_ioctl), rip = 0x8012446da, rsp = 0x7fffffffdc38, rbp = 0x7fffffffe0d0 ---
I haven't seen this before but if it doesn't happen on 22.1 it should be easy to find the bad commit.
This is new for 22.7, right?
Cheers,
Franco
Quote from: axsdenied on August 15, 2022, 05:29:10 PMJust the defaults... IDS was enabled in IPS mode but with no rules downloaded. I did not modify any of those settings from the base install.
Looks like the panic was caused by "pfctl". You doing packet inspection of any kind? Perhaps chocking session states?
Quote from: mimugmail on August 02, 2018, 05:54:23 PMHow much more "high end" do you need to get with an edge firewall than an x86 box with 8-16GB of RAM? Again, it doesn't even get to 100% RAM usage before crashing out.
I talked with the author, there will come many more rules, so I think using this list is only for high end hardware. Probably abuse.ch will stop this ruleset.
Quote from: mimugmail on August 02, 2018, 05:58:23 AMUnfortunately I don't have UDIMMs around that I can do that with... quite expensive for a home user :P
You can only check If you double the size and see if it happens again.
Quote from: franco on August 01, 2018, 09:55:47 PMOh brother... what a bunch of mooks. This kind of behavior just further cements my unwillingness to recommend pfsense in any sort of professional capacity.
Just to let you guys know, we are back to stalking and harassment now from the user called "htilonom" who was allegedly causing the deletion of our Wikipedia page and involved in creating opnsense.com in the first place [1]
This topic now especially caught the spotlight:
https://www.reddit.com/r/OPNscammed/comments/93pmyk/opnsense_called_out_for_changing_roadmap_a_day/
I am sure this is just coincidental and there is no reason why anyone would focus on this. Especially not Netgate, its owner Jim Thompson, pfSense mastermind, right?
https://twitter.com/gonzopancho/status/1024493145415929856
Consider this a setup and tainted discussion from the start. At this point these attempts are petty at best as if they haven't learned from the opnsense.com debacle and I guess the downwards trend will continue. ;)
[1] https://forum.opnsense.org/index.php?topic=6466.0
Quote from: mimugmail on July 27, 2018, 05:52:01 AMYes. I refresh it several times over the course of a couple of minutes and watch the memory usage grow to about 2.8-3GB before it crashes. Once it crashes, memory usage goes back to a more normal number like 750MB-1GB depending on usage.
Can you watch the memory Bar in the Dashboard shortly after enabling Suricata?
Quote from: mimugmail on July 26, 2018, 06:01:51 AMThe only thing that shows up in the logs is Suricata crashing.
So you get an error in the logs? If not perhaps the ruleset is too big for you system?