Quote from: CJ on September 30, 2023, 02:32:46 pmAre you still using LAN as the parent of all of the VLANs?Yes.However, I come across this question couple of times now. Is that not how we supposed to do it?
Are you still using LAN as the parent of all of the VLANs?
Quote from: newjohn on September 30, 2023, 02:39:12 pmQuote from: CJ on September 30, 2023, 02:32:46 pmAre you still using LAN as the parent of all of the VLANs?Yes.However, I come across this question couple of times now. Is that not how we supposed to do it?The default LAN rule allows all. I know there is a recommendation not to mix tagged and untagged traffic on the same interface but I forget the exact details for why. If you change your VLANs to use something other than LAN as the parent, you may see things work as you expect.That all said, why not try testing with separate interfaces and no VLANs. That way you eliminate all of the variables of incorrect VLAN setup, etc. It will help isolate if the problem is truly OPNSense or not.
I know there is a recommendation not to mix tagged and untagged traffic on the same interface but I forget the exact details for why.
ge-0/0/0 { unit 0 { family ethernet-switching { port-mode trunk; vlan members [ RED BLUE ]; } }}
ge-0/0/0 { unit 0 { family ethernet-switching { port-mode trunk; vlan members [ RED BLUE ]; native-vlan-id 100; } }}
ge-0/0/0 { unit 0 { family ethernet-switching { port-mode trunk; vlan members [ BLUE ]; native-vlan-id 100; } }}
Quote from: newjohn on September 28, 2023, 12:55:44 amWhats is your take on this please?Please see the attached screenshot.I explained my take extensivily in previous post:- Go back to the drawing board- Simplify your setup- From here proof your initial statement that "Automatically generated rules" allows traffic that isn't expected to be allowed (ICMP or whatever.)So a default install, 1 WAN, 1 LAN and 1 OPT interface, no VLAN's, no manual config except for 3 interface IP configs. If in this setup you can proof your statement many people are willing to look into your issue. Should take you less time than posting screenshoits of state reset buttons.For me, I'm too old to look into virtualised infra's with VLAN trunk ports without a detailed low level design and not knowing if basic network skills are in place.
Whats is your take on this please?Please see the attached screenshot.
VM1 192.168.2.3 <----> OPT1 192.168.2.1/24 OPNSENSE 192.168.1.1/24 LAN <----> 192.168.1.101 VM2
root@pc07:/home/administrator# ip a2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen 1000 link/ether 00:15:5d:00:c9:76 brd ff:ff:ff:ff:ff:ff inet 192.168.1.101/24 metric 100 brd 192.168.1.255 scope global dynamic eth0 valid_lft 4933sec preferred_lft 4933sec inet6 fe80::215:5dff:fe00:c976/64 scope link valid_lft forever preferred_lft foreverroot@pc07:/home/administrator# ping 192.168.2.3PING 192.168.2.3 (192.168.2.3) 56(84) bytes of data.64 bytes from 192.168.2.3: icmp_seq=1 ttl=63 time=0.653 ms64 bytes from 192.168.2.3: icmp_seq=2 ttl=63 time=0.602 ms64 bytes from 192.168.2.3: icmp_seq=3 ttl=63 time=0.666 ms64 bytes from 192.168.2.3: icmp_seq=4 ttl=63 time=1.01 ms64 bytes from 192.168.2.3: icmp_seq=5 ttl=63 time=0.673 ms64 bytes from 192.168.2.3: icmp_seq=6 ttl=63 time=1.38 ms^C--- 192.168.2.3 ping statistics ---6 packets transmitted, 6 received, 0% packet loss, time 5085msrtt min/avg/max/mdev = 0.602/0.829/1.377/0.278 msroot@pc07:/home/administrator# tcpdump -i any proto ICMP -ntcpdump: data link type LINUX_SLL2tcpdump: verbose output suppressed, use -v[v]... for full protocol decodelistening on any, link-type LINUX_SLL2 (Linux cooked v2), snapshot length 262144 bytes08:32:25.001798 eth0 Out IP 192.168.1.101 > 192.168.2.3: ICMP echo request, id 8, seq 1, length 6408:32:25.002434 eth0 In IP 192.168.2.3 > 192.168.1.101: ICMP echo reply, id 8, seq 1, length 6408:32:26.012412 eth0 In IP 192.168.2.3 > 192.168.1.101: ICMP echo request, id 8, seq 5, length 6408:32:26.012453 eth0 Out IP 192.168.1.101 > 192.168.2.3: ICMP echo reply, id 8, seq 5, length 6408:32:26.022547 eth0 Out IP 192.168.1.101 > 192.168.2.3: ICMP echo request, id 8, seq 2, length 6408:32:26.023114 eth0 In IP 192.168.2.3 > 192.168.1.101: ICMP echo reply, id 8, seq 2, length 6408:32:27.036417 eth0 In IP 192.168.2.3 > 192.168.1.101: ICMP echo request, id 8, seq 6, length 6408:32:27.036456 eth0 Out IP 192.168.1.101 > 192.168.2.3: ICMP echo reply, id 8, seq 6, length 6408:32:27.046642 eth0 Out IP 192.168.1.101 > 192.168.2.3: ICMP echo request, id 8, seq 3, length 6408:32:27.047275 eth0 In IP 192.168.2.3 > 192.168.1.101: ICMP echo reply, id 8, seq 3, length 6408:32:28.060402 eth0 In IP 192.168.2.3 > 192.168.1.101: ICMP echo request, id 8, seq 7, length 6408:32:28.060440 eth0 Out IP 192.168.1.101 > 192.168.2.3: ICMP echo reply, id 8, seq 7, length 6408:32:28.070543 eth0 Out IP 192.168.1.101 > 192.168.2.3: ICMP echo request, id 8, seq 4, length 6408:32:28.071518 eth0 In IP 192.168.2.3 > 192.168.1.101: ICMP echo reply, id 8, seq 4, length 6408:32:29.071726 eth0 Out IP 192.168.1.101 > 192.168.2.3: ICMP echo request, id 8, seq 5, length 6408:32:29.072363 eth0 In IP 192.168.2.3 > 192.168.1.101: ICMP echo reply, id 8, seq 5, length 6408:32:29.084260 eth0 In IP 192.168.2.3 > 192.168.1.101: ICMP echo request, id 8, seq 8, length 6408:32:29.084279 eth0 Out IP 192.168.1.101 > 192.168.2.3: ICMP echo reply, id 8, seq 8, length 6408:32:30.086534 eth0 Out IP 192.168.1.101 > 192.168.2.3: ICMP echo request, id 8, seq 6, length 6408:32:30.087880 eth0 In IP 192.168.2.3 > 192.168.1.101: ICMP echo reply, id 8, seq 6, length 6408:32:30.108482 eth0 In IP 192.168.2.3 > 192.168.1.101: ICMP echo request, id 8, seq 9, length 6408:32:30.108501 eth0 Out IP 192.168.1.101 > 192.168.2.3: ICMP echo reply, id 8, seq 9, length 6408:32:31.132446 eth0 In IP 192.168.2.3 > 192.168.1.101: ICMP echo request, id 8, seq 10, length 6408:32:31.132479 eth0 Out IP 192.168.1.101 > 192.168.2.3: ICMP echo reply, id 8, seq 10, length 64root@pc08:/home/administrator# ip a2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen 1000 link/ether 00:15:5d:00:c9:77 brd ff:ff:ff:ff:ff:ff inet 192.168.2.3/24 metric 100 brd 192.168.2.255 scope global dynamic eth0 valid_lft 5305sec preferred_lft 5305sec inet6 fe80::215:5dff:fe00:c977/64 scope link valid_lft forever preferred_lft foreverroot@pc08:/home/administrator# ping 192.168.1.101PING 192.168.1.101 (192.168.1.101) 56(84) bytes of data.64 bytes from 192.168.1.101: icmp_seq=5 ttl=63 time=0.736 ms64 bytes from 192.168.1.101: icmp_seq=6 ttl=63 time=0.777 ms64 bytes from 192.168.1.101: icmp_seq=7 ttl=63 time=0.713 ms64 bytes from 192.168.1.101: icmp_seq=8 ttl=63 time=0.500 ms64 bytes from 192.168.1.101: icmp_seq=9 ttl=63 time=0.706 ms64 bytes from 192.168.1.101: icmp_seq=10 ttl=63 time=0.717 ms^C--- 192.168.1.101 ping statistics ---10 packets transmitted, 6 received, 40% packet loss, time 9211msrtt min/avg/max/mdev = 0.500/0.691/0.777/0.088 msroot@pc08:/home/administrator# tcpdump -i any proto ICMPtcpdump: data link type LINUX_SLL2tcpdump: verbose output suppressed, use -v[v]... for full protocol decodelistening on any, link-type LINUX_SLL2 (Linux cooked v2), snapshot length 262144 bytes08:32:21.920856 eth0 Out IP 192.168.2.3 > 192.168.1.101: ICMP echo request, id 8, seq 1, length 6408:32:22.940118 eth0 Out IP 192.168.2.3 > 192.168.1.101: ICMP echo request, id 8, seq 2, length 6408:32:23.964114 eth0 Out IP 192.168.2.3 > 192.168.1.101: ICMP echo request, id 8, seq 3, length 6408:32:24.988127 eth0 Out IP 192.168.2.3 > 192.168.1.101: ICMP echo request, id 8, seq 4, length 6408:32:25.002180 eth0 In IP 192.168.1.101 > 192.168.2.3: ICMP echo request, id 8, seq 1, length 6408:32:25.002212 eth0 Out IP 192.168.2.3 > 192.168.1.101: ICMP echo reply, id 8, seq 1, length 6408:32:26.012097 eth0 Out IP 192.168.2.3 > 192.168.1.101: ICMP echo request, id 8, seq 5, length 6408:32:26.012802 eth0 In IP 192.168.1.101 > 192.168.2.3: ICMP echo reply, id 8, seq 5, length 6408:32:26.022956 eth0 In IP 192.168.1.101 > 192.168.2.3: ICMP echo request, id 8, seq 2, length 6408:32:26.022974 eth0 Out IP 192.168.2.3 > 192.168.1.101: ICMP echo reply, id 8, seq 2, length 6408:32:27.036133 eth0 Out IP 192.168.2.3 > 192.168.1.101: ICMP echo request, id 8, seq 6, length 6408:32:27.036881 eth0 In IP 192.168.1.101 > 192.168.2.3: ICMP echo reply, id 8, seq 6, length 6408:32:27.047092 eth0 In IP 192.168.1.101 > 192.168.2.3: ICMP echo request, id 8, seq 3, length 6408:32:27.047108 eth0 Out IP 192.168.2.3 > 192.168.1.101: ICMP echo reply, id 8, seq 3, length 6408:32:28.060130 eth0 Out IP 192.168.2.3 > 192.168.1.101: ICMP echo request, id 8, seq 7, length 6408:32:28.060810 eth0 In IP 192.168.1.101 > 192.168.2.3: ICMP echo reply, id 8, seq 7, length 6408:32:28.071295 eth0 In IP 192.168.1.101 > 192.168.2.3: ICMP echo request, id 8, seq 4, length 6408:32:28.071311 eth0 Out IP 192.168.2.3 > 192.168.1.101: ICMP echo reply, id 8, seq 4, length 6408:32:29.072085 eth0 In IP 192.168.1.101 > 192.168.2.3: ICMP echo request, id 8, seq 5, length 6408:32:29.072121 eth0 Out IP 192.168.2.3 > 192.168.1.101: ICMP echo reply, id 8, seq 5, length 6408:32:29.084096 eth0 Out IP 192.168.2.3 > 192.168.1.101: ICMP echo request, id 8, seq 8, length 6408:32:29.084573 eth0 In IP 192.168.1.101 > 192.168.2.3: ICMP echo reply, id 8, seq 8, length 64
As they say in the famous movie "Houston we have a problem"I kept drilling down as I kept getting replies to my pings. In the end to remove any middleman issues and confirm once and for all this is opnsense issue, I removed the switch, the virtualization and went baremetal.Testing env: Two baremetal win11 PCs.4 port fresly installed Opnsense.PCs: Both baremetal:PC1 - connected directly to LAN port on the opnsense firewall = IP add 10.1.1.1PC2 - connected directly to OPT1 port on the opnsense firewall = IP add 10.2.2.2Opnsense:Fresh install, the only config I added was to enable OPT1 and assing IP Address 10.2.2.254. Nothing else changed.Test result, I still get a response to the ping.Steps:Issued the ping command form PC2, at first dont get a responseHowever, as soon as you issue the ping command on PC1, both PCs can ping each other.Please see the screenshots.Note: The system due to the size does not allow me to attach all the screenshots in one go. I will add them one by one.
Quote from: newjohn on October 01, 2023, 08:58:25 amAs they say in the famous movie "Houston we have a problem"I kept drilling down as I kept getting replies to my pings. In the end to remove any middleman issues and confirm once and for all this is opnsense issue, I removed the switch, the virtualization and went baremetal.Testing env: Two baremetal win11 PCs.4 port fresly installed Opnsense.PCs: Both baremetal:PC1 - connected directly to LAN port on the opnsense firewall = IP add 10.1.1.1PC2 - connected directly to OPT1 port on the opnsense firewall = IP add 10.2.2.2Opnsense:Fresh install, the only config I added was to enable OPT1 and assing IP Address 10.2.2.254. Nothing else changed.Test result, I still get a response to the ping.Steps:Issued the ping command form PC2, at first dont get a responseHowever, as soon as you issue the ping command on PC1, both PCs can ping each other.Please see the screenshots.Note: The system due to the size does not allow me to attach all the screenshots in one go. I will add them one by one.Isn't this just ICMP hole punching? https://en.wikipedia.org/wiki/ICMP_hole_punchingThe ping was correctly blocked until you opened up the return by starting from the other way. It's the whole way a lot of zero config apps work.
I dont think its a security risk because you can simply mitigate it by not allowing the ICMP protocol if you don't need it in your network.
If or of not ICMP (v4) is a security issue is widely discussed.
Quote from: Monviech on October 01, 2023, 05:08:51 pmI dont think its a security risk because you can simply mitigate it by not allowing the ICMP protocol if you don't need it in your network.Nein, Nein, Nein!!! Please don't be "security aware" by disabling ICMP, there are many good reasons why this protocol exists next to UDP/TCP. You allow ICMP in general or filtering it down to _at_ least Destination Unreachable, Time Exceeded and Parameter Problem and NDP. There are things like PMTU discovery and IPv6 to name a few.