Hi all,
Update from core 184 to core 185 problem. No WUI or SSH access.
Update hangs, have left for hours (previous updates have hung, but after a reboot all was well)
Boot messages all look normal. I can ping the machine, and the network seems to be working fine. I can access WUI and SSH from openVPN.
Just no LAN access.
I have tried different browsers, clearing cache, reverted to core 184 and set SSH to port 22 with password authentification; tried cli update same results; logged in via console, restarted apache, ssh, still no joy.
Pakfire log ends with:
Generating grub configuration file …
Found background: /boot/grub/splash.png
Found linux image: /boot/vmlinuz-6.6.15-ipfire
Found initrd image: /boot/initramfs-6.6.15-ipfire.img
Adding boot menu entry for UEFI Firmware Settings …
done
This is stange. If the WUI is accessible via OpenVPN Apache is running and it should also be via LAN. Any clues in /var/log/messages or suricata alerts?
Apache was running fine
/etc/init.d/apache status
httpd is running with Process ID(s) 7505
Thanks for the direction; /var/log/messages contained drops from the LAN computer
May 20 18:14:45 jafx kernel: DROP_NEWNOTSYN IN=green0 OUT= MAC=02 SRC=172.25.25.100 DST=172.25.25.20 LEN=532 TOS=0x00 PREC=0x00 TTL=64 ID=29384 DF PROTO=TCP SPT=60706 DPT=444 WINDOW=501 RES=0x00 ACK PSH URGP=0
May 20 18:14:45 jafx kernel: DROP_NEWNOTSYN IN=green0 OUT= MAC=02 SRC=172.25.25.100 DST=172.25.25.20 LEN=532 TOS=0x00 PREC=0x00 TTL=64 ID=22863 DF PROTO=TCP SPT=48568 DPT=444 WINDOW=501 RES=0x00 ACK PSH URGP=0
Testing from openVPN the firewall logs did not show anything being blocked from the LAN computer.
Adding firewall rules to specifically allow the traffic did not work.
Solved the issue by removing my custom /etc/sysconfig/firewall.local rules.
I had created rules to prevent some IoT devices from circumventing the IPFire DNS. These rules worked fine before. But, evidentally something changed.
So the no access issue is solved, however, I would love to hear how to properly redirect these misbehaving IoT devices in such a way as they believe they are reaching 8.8.8.8, but are actually going through proper DNS.
Thank you very much for your attention. Great people here.
I implemented this years ago www.ipfire.org - Force clients to use IPFire DNS Server, however the IoT devices still showed connections to non-IPFire DNS servers. After the changes to firewall.local, these connections ceased.
I’ll have to revisit that.
Thank you.
As this seems to have skewed off topic (my bad), I’m marking this as solved.
The solution was to remove the custom rules in /etc/sysconfig/firewall.local