I tested this scenario with Pfsense as well and got the same results. I have not tested other firewalls.
But two firewalls behaving in the same way kind of support the idea that this is normal.
Quote from: newjohn on October 02, 2023, 11:18:43 amI tested this scenario with Pfsense as well and got the same results. I have not tested other firewalls. Well, that's rather funny don't you think, looking at your initial statement QuoteBut two firewalls behaving in the same way kind of support the idea that this is normal.That's because the underlaying issue is still there (it's _not_ normal), did you test with hardware offloading disabled as mentioned in my last post ?
Also, if this is not normal and confirmed by more than one user, isnt this a priority issue?
Adding my problems to here...
...and suspecting that automatically rules are plays to deny the traffic...
I'm using opnsense as vm on kvm.
Hi Team,Adding my problems to here, that every opnsense action such as route , interface or rules edits gives gui/ping loss and suspecting that automatically rules are plays to deny the traffic. Therefore post pfctl -d cmd execute that allow to another changes.Is any one help here that why every action on opnsense trigger pf enables and loss the gui/pings drops. Is there way to delete the automatically rules from opnsense.I'm using opnsense as vm on kvm.Thanks,Athisesan
Quote from: netnut on September 27, 2023, 12:01:03 amQuote from: newjohn on September 26, 2023, 11:11:09 pmTherefore althought its always a possiility due to misconfiguration i think its unlikely?Only one statement CAN be true: You discovered a major security bug/flaw in PF and/or OPNSense OR you have issues in your virtual environment, network topology, firewall config etc. Because your issue is quite simple, allowing ICMP echo request / reply between two interfaces, I suggest you create a more simple setup to debug and report on with a basic and easy to understand topology and ruleset. Your virtual so deploying an extra VM should be an easy task for such a potential high impact security bug/flaw (not only impacting OPNSense).So a default setup with LAN + WAN and after that creating an extra OPT interface to introduce a second LAN segment. Keep EVERYTHING default just configure the interface IP's and DO NOTHING else. To make it super transparent, don't mess with VLAN interfaces YET. If you need just create static mappings between your OPNSense interfaces and your existing VLANs by creating VLAN port groups in vSphere VDS or Open vSwitch on KVM or whatever you are using.Now if you can confirm that in this DEFAULT setup you can ping from a host in the OPT network to a host in the LAN network it's time to get scared. The other way around, ping from _DEFAULT_ LAN network to OPT network, will work as explained in previous posts.I couldn't bother to plow through your ruleset (too much noise), but I did check your statement at a system here with ten's of raw interfaces, bridges and VLANs (both LAGG and non-LAGG) and couldn't reproduce it on any.From my perspective a misconfiguration is VERY likely, but I'm eager to hear about the issues you find in the above "test" setup.I agree it would be good to get to the bottom of this.Really busy day at work so have not had the chance to do the test you asked yet. But I did some thinkering and think I figured it out. I need another pair of eyes to confirm if this is the case.VLAN190 has permit all ruleVLAN160 has NO ruleIf i start the ping from vlan190 to vlan160 (vlan190 has permit all statement) it works ok (as expected).If i reboot both PCs and the firewall so there is no established connection as far as the firewall is concerned and try to ping from vlan160 (which does not have any firewall statements), it fails (as expected). So far the firewall does what its expected.However, the point it gets unexpected is as follows:After the reboot all connections states is cleared. so if i start the ping from vlan160 to vlan190, it fails as expected.However, I noticed the second i start pinging from vlan190 back to vlan160 naturally vlan190 works ok, but because the firewall now has established an open state between this two IP Addresses it allows vlan160 to ping back vlan190.if i stop the ping from vlan190 and reset the state table the ping stops which supports my findings?Whats is your take on this please?Please see the attached screenshot.
Quote from: newjohn on September 26, 2023, 11:11:09 pmTherefore althought its always a possiility due to misconfiguration i think its unlikely?Only one statement CAN be true: You discovered a major security bug/flaw in PF and/or OPNSense OR you have issues in your virtual environment, network topology, firewall config etc. Because your issue is quite simple, allowing ICMP echo request / reply between two interfaces, I suggest you create a more simple setup to debug and report on with a basic and easy to understand topology and ruleset. Your virtual so deploying an extra VM should be an easy task for such a potential high impact security bug/flaw (not only impacting OPNSense).So a default setup with LAN + WAN and after that creating an extra OPT interface to introduce a second LAN segment. Keep EVERYTHING default just configure the interface IP's and DO NOTHING else. To make it super transparent, don't mess with VLAN interfaces YET. If you need just create static mappings between your OPNSense interfaces and your existing VLANs by creating VLAN port groups in vSphere VDS or Open vSwitch on KVM or whatever you are using.Now if you can confirm that in this DEFAULT setup you can ping from a host in the OPT network to a host in the LAN network it's time to get scared. The other way around, ping from _DEFAULT_ LAN network to OPT network, will work as explained in previous posts.I couldn't bother to plow through your ruleset (too much noise), but I did check your statement at a system here with ten's of raw interfaces, bridges and VLANs (both LAGG and non-LAGG) and couldn't reproduce it on any.From my perspective a misconfiguration is VERY likely, but I'm eager to hear about the issues you find in the above "test" setup.
Therefore althought its always a possiility due to misconfiguration i think its unlikely?
I wonder if it is possible to get this information to the developers as it seems like a bug or security hole
Quote from: GrilliIAL on June 18, 2024, 04:39:59 pmI wonder if it is possible to get this information to the developers as it seems like a bug or security holeNo it isn't, as already explained in this thread. No need to cross post this...
I do not agree.