Intel igb/em Interfaces Broken on 2.6/22.01+ #67

Open
opened 2022-02-15 01:44:30 +05:30 by ChronicledMonocle · 166 comments
ChronicledMonocle commented 2022-02-15 01:44:30 +05:30 (Migrated from github.com)

The dhcp lease for connections is not handed through to the ngeth0 interface properly. There isn't any real "errors" in the logs.

If you try to run the script manually after boot you get "ngctl: send msg: File exists"

Logs from pfatt.log:

2022-02-14 14:36:56 :: [pfatt.sh] :: pfSense + AT&T U-verse Residential Gateway for true bridge mode
2022-02-14 14:36:56 :: [pfatt.sh] :: Configuration:
2022-02-14 14:36:56 :: [pfatt.sh] :: ONT_IF: igb0
2022-02-14 14:36:56 :: [pfatt.sh] :: RG_IF: igb1
2022-02-14 14:36:56 :: [pfatt.sh] :: RG_ETHER_ADDR: [MY MAC HERE]
2022-02-14 14:36:56 :: [pfatt.sh] :: attaching interfaces to ng_ether... OK!
2022-02-14 14:36:56 :: [pfatt.sh] :: building netgraph nodes...
2022-02-14 14:36:56 :: [pfatt.sh] :: creating ng_one2many... 2022-02-14 14:37:00 :: [pfatt.sh] :: pfSense + AT&T U-verse Residential Gateway for true bridge mode

I am not running wpa_supplicant mode.

The dhcp lease for connections is not handed through to the ngeth0 interface properly. There isn't any real "errors" in the logs. If you try to run the script manually after boot you get "ngctl: send msg: File exists" Logs from pfatt.log: 2022-02-14 14:36:56 :: [pfatt.sh] :: pfSense + AT&T U-verse Residential Gateway for true bridge mode 2022-02-14 14:36:56 :: [pfatt.sh] :: Configuration: 2022-02-14 14:36:56 :: [pfatt.sh] :: ONT_IF: igb0 2022-02-14 14:36:56 :: [pfatt.sh] :: RG_IF: igb1 2022-02-14 14:36:56 :: [pfatt.sh] :: RG_ETHER_ADDR: [MY MAC HERE] 2022-02-14 14:36:56 :: [pfatt.sh] :: attaching interfaces to ng_ether... OK! 2022-02-14 14:36:56 :: [pfatt.sh] :: building netgraph nodes... 2022-02-14 14:36:56 :: [pfatt.sh] :: creating ng_one2many... 2022-02-14 14:37:00 :: [pfatt.sh] :: pfSense + AT&T U-verse Residential Gateway for true bridge mode I am not running wpa_supplicant mode.
Grassyloki commented 2022-02-15 03:43:59 +05:30 (Migrated from github.com)

Can confirm its not working after an upgrade. Following the troubleshooting instructions shows that the modules have loaded. PFatt logs dont show anything.

Can confirm its not working after an upgrade. Following the troubleshooting instructions shows that the modules have loaded. PFatt logs dont show anything.
bigjohns97 commented 2022-02-15 05:28:01 +05:30 (Migrated from github.com)

Can confirm it is broken for me as well, running supplicant

Can confirm it is broken for me as well, running supplicant
neydah700 commented 2022-02-15 07:50:43 +05:30 (Migrated from github.com)

Same issue. Not grabbing DHCP.

Edit: I am using the WPA supplicant method.

Same issue. Not grabbing DHCP. Edit: I am using the WPA supplicant method.
ChronicledMonocle commented 2022-02-15 11:44:35 +05:30 (Migrated from github.com)

Want to confirm that reverting to 2.5.2 or 21.05.2 immediately restores internet for me after setting everything back up.

Want to confirm that reverting to 2.5.2 or 21.05.2 immediately restores internet for me after setting everything back up.
neydah700 commented 2022-02-15 11:47:24 +05:30 (Migrated from github.com)

Want to confirm that reverting to 2.5.2 or 21.05.2 immediately restores internet for me after setting everything back up.

Yes, It was an absolute pain in the a**, but restoring to 21.05.2 immediately fixed it for me. IPv6 wouldn't grab for an hour or so but finally started working.

> Want to confirm that reverting to 2.5.2 or 21.05.2 immediately restores internet for me after setting everything back up. Yes, It was an absolute pain in the a**, but restoring to 21.05.2 immediately fixed it for me. IPv6 wouldn't grab for an hour or so but finally started working.
neydah700 commented 2022-02-15 12:17:23 +05:30 (Migrated from github.com)

Also, I posted on the Netgate Forums. If anyone else wants to add anything over there here is the link. https://forum.netgate.com/topic/169882/22-01-2-6-0-upgrade-broke-dhcp-on-wan-interface-with-custom-startup-script

Also, I posted on the Netgate Forums. If anyone else wants to add anything over there here is the link. https://forum.netgate.com/topic/169882/22-01-2-6-0-upgrade-broke-dhcp-on-wan-interface-with-custom-startup-script
SGC1990 commented 2022-02-16 19:28:47 +05:30 (Migrated from github.com)

I am having the same problem and now my WireGuard and other tools don't work and can't get them to work.

I am having the same problem and now my WireGuard and other tools don't work and can't get them to work.
grevelle commented 2022-02-17 08:13:27 +05:30 (Migrated from github.com)

Yep - supplicant not working for me either. The last time a new version of pfsense broke pfatt Matt Johnson submitted this issue to pfsense redmine. Should we do that here? Here is the issue that originated the whole thing.

Yep - supplicant not working for me either. The last time a new version of pfsense broke pfatt [Matt Johnson](https://redmine.pfsense.org/users/37033) submitted this issue to [pfsense redmine](https://redmine.pfsense.org/issues/11453). Should we do that here? Here is the [issue](https://github.com/MonkWho/pfatt/issues/41) that originated the whole thing.
bigg1969 commented 2022-02-17 08:37:06 +05:30 (Migrated from github.com)

It also broke mine after update. Per the docs, I ran "tcpdump -ei ONT_IF" and "tcpdump -ei RG_IF", which should filter and capture link layer information (2), on my interfaces and captured 0 packets from RG_IP and only the bridged DHCP traffic on the ONT_IF interface.

I reset netgraph, which removes the hooks, rebooted the gateway and modem with tcpdump running and captured 0 packets from the interfaces. Before removing the netgraph hooks, the only traffic I seen on any of the three interfaces, was the DHCP request on the ngeth0 virtual interaface, and the bridged ONT_IF interface. So the DHCP requests are still getting to the correct interface.

The fact that tcpdump doesn't see any traffic makes me think its being filtered, like promisc mode isn't allowing EAPOL 802.1X traffic to be capture, and there fore is not bridged. No authentication mean no DHCP response. IMO

I've moved to inline behind the gateway until this can be figured out. I would be willing to test once a day.

It also broke mine after update. Per the docs, I ran "tcpdump -ei ONT_IF" and "tcpdump -ei RG_IF", which should filter and capture link layer information (2), on my interfaces and captured 0 packets from RG_IP and only the bridged DHCP traffic on the ONT_IF interface. I reset netgraph, which removes the hooks, rebooted the gateway and modem with tcpdump running and captured 0 packets from the interfaces. Before removing the netgraph hooks, the only traffic I seen on any of the three interfaces, was the DHCP request on the ngeth0 virtual interaface, and the bridged ONT_IF interface. So the DHCP requests are still getting to the correct interface. The fact that tcpdump doesn't see any traffic makes me think its being filtered, like promisc mode isn't allowing EAPOL 802.1X traffic to be capture, and there fore is not bridged. No authentication mean no DHCP response. IMO I've moved to inline behind the gateway until this can be figured out. I would be willing to test once a day.
neydah700 commented 2022-02-17 13:31:27 +05:30 (Migrated from github.com)

Okay, had some success today based on info I gathered from all the various discussions online. I think it is something to do with the em(4) driver. Do all of you having issues have Intel NIC's? I put together a test pfSense server from a bunch of spare parts and it worked right away on the latest release. After digging, I couldn't get any Intel NIC to work. Using what I had around (a few crappy USB dongles worked and old PC's with integrated NICs) I had success with everything not Intel GbE. When I re-upgraded my main pfSense box I was able to move my WAN link to an SFP slot (with RJ45 Module) with some success. I say "some" because all my SFP/RJ45 modules are 10GB and they do not negotiate well with the ONT.

Something interesting for me, if_em.ko is present in /boot/kernel on 2.6.0 but wasn't in my previous version of pfSense. My knowledge is limited but I am not sure where the driver was located in the previous version? Anyone smarter than me know?

Some Useful Links:
FreeBSD 12.3 Release Notes (em(4) driver notes) - https://www.freebsd.org/releases/12.3R/relnotes/
Reddit Discussion - https://www.reddit.com/r/PFSENSE/comments/ssgsha/psa_260_breaks_att_bypass/?sort=new
Netgate Forum Discussion - https://forum.netgate.com/topic/99190/att-uverse-rg-bypass-0-2-btc/396?_=1644931323812
OPNSense GIT Issue - https://github.com/MonkWho/pfatt/issues/65

Okay, had some success today based on info I gathered from all the various discussions online. I think it is something to do with the em(4) driver. Do all of you having issues have Intel NIC's? I put together a test pfSense server from a bunch of spare parts and it worked right away on the latest release. After digging, I couldn't get any Intel NIC to work. Using what I had around (a few crappy USB dongles worked and old PC's with integrated NICs) I had success with everything not Intel GbE. When I re-upgraded my main pfSense box I was able to move my WAN link to an SFP slot (with RJ45 Module) with some success. I say "some" because all my SFP/RJ45 modules are 10GB and they do not negotiate well with the ONT. Something interesting for me, if_em.ko is present in /boot/kernel on 2.6.0 but wasn't in my previous version of pfSense. My knowledge is limited but I am not sure where the driver was located in the previous version? Anyone smarter than me know? **Some Useful Links:** FreeBSD 12.3 Release Notes (em(4) driver notes) - https://www.freebsd.org/releases/12.3R/relnotes/ Reddit Discussion - https://www.reddit.com/r/PFSENSE/comments/ssgsha/psa_260_breaks_att_bypass/?sort=new Netgate Forum Discussion - https://forum.netgate.com/topic/99190/att-uverse-rg-bypass-0-2-btc/396?_=1644931323812 OPNSense GIT Issue - https://github.com/MonkWho/pfatt/issues/65
SGC1990 commented 2022-02-17 15:03:33 +05:30 (Migrated from github.com)

I think this is going somewhere because I've tried multiple different boxes but they're all Intel Nics, when I get off work I will try a couple USB dongle's to see if it gets traffic that way.

I think this is going somewhere because I've tried multiple different boxes but they're all Intel Nics, when I get off work I will try a couple USB dongle's to see if it gets traffic that way.
neydah700 commented 2022-02-17 15:11:45 +05:30 (Migrated from github.com)

I think this is going somewhere because I've tried multiple different boxes but they're all Intel Nics, when I get off work I will try a couple USB dongle's to see if it gets traffic that way.

The USBs work for me but are slow. Download is like 100m, upload is better at around 400m. I have a 1G SFP that should get here tomorrow. Really hoping that talks better with the ONT then the 10G did.

> I think this is going somewhere because I've tried multiple different boxes but they're all Intel Nics, when I get off work I will try a couple USB dongle's to see if it gets traffic that way. The USBs work for me but are slow. Download is like 100m, upload is better at around 400m. I have a 1G SFP that should get here tomorrow. Really hoping that talks better with the ONT then the 10G did.
SGC1990 commented 2022-02-17 15:22:00 +05:30 (Migrated from github.com)

For USBs to work at 1 gig speeds you have to have 3.1 USB port or better. For FreeBSD, I am using a box equivalent to the netgate 1541 Same everything but a lot more powerful. Let me know how it goes with the other Nics.

For USBs to work at 1 gig speeds you have to have 3.1 USB port or better. For FreeBSD, I am using a box equivalent to the netgate 1541 Same everything but a lot more powerful. Let me know how it goes with the other Nics.
neydah700 commented 2022-02-17 15:27:56 +05:30 (Migrated from github.com)

For USBs to work at 1 gig speeds you have to have 3.1 USB port or better. I am using a box equivalent to the netgate 1541 Same everything but a lot more powerful. Let me know how it goes with the other Nics.

Will do! If it helps I'm using the XG-1537 so USB3.0

> For USBs to work at 1 gig speeds you have to have 3.1 USB port or better. I am using a box equivalent to the netgate 1541 Same everything but a lot more powerful. Let me know how it goes with the other Nics. Will do! If it helps I'm using the XG-1537 so USB3.0
SGC1990 commented 2022-02-17 15:40:01 +05:30 (Migrated from github.com)

Is the usb dongles 3.0, when I was using usb in past it worked great I was able to get full 1gb speeds out of my usb ports. If the usb is 3.0 then I don't know why I am getting full 1gb speeds. But I did downgrade back to 2.5.2 now WireGuard don't work on 2.5.2.

Is the usb dongles 3.0, when I was using usb in past it worked great I was able to get full 1gb speeds out of my usb ports. If the usb is 3.0 then I don't know why I am getting full 1gb speeds. But I did downgrade back to 2.5.2 now WireGuard don't work on 2.5.2.
neydah700 commented 2022-02-17 15:40:47 +05:30 (Migrated from github.com)

Is the usb dongles 3.0

Yep!

> Is the usb dongles 3.0 Yep!
MrCaturdayNight commented 2022-02-17 18:18:52 +05:30 (Migrated from github.com)

Okay, had some success today based on info I gathered from all the various discussions online. I think it is something to do with the em(4) driver.

Nothing useful to add here but I can confirm I'm using an Intel NIC with the em driver. Neither tethered or supplicant working for me on 22.1 but supplicant is working on 21.7.8

em0: <Intel(R) 82583V> port 0xe000-0xe01f mem 0xdf500000-0xdf51ffff,0xdf520000-0xdf523fff irq 16 at device 0.0 on pci1
em1: <Intel(R) 82583V> port 0xd000-0xd01f mem 0xdf400000-0xdf41ffff,0xdf420000-0xdf423fff irq 17 at device 0.0 on pci2
em2: <Intel(R) 82583V> port 0xc000-0xc01f mem 0xdf300000-0xdf31ffff,0xdf320000-0xdf323fff irq 18 at device 0.0 on pci3
em3: <Intel(R) 82583V> port 0xb000-0xb01f mem 0xdf200000-0xdf21ffff,0xdf220000-0xdf223fff irq 19 at device 0.0 on pci4
em4: <Intel(R) 82583V> port 0xa000-0xa01f mem 0xdf100000-0xdf11ffff,0xdf120000-0xdf123fff irq 16 at device 0.0 on pci5
em5: <Intel(R) 82583V> port 0x9000-0x901f mem 0xdf000000-0xdf01ffff,0xdf020000-0xdf023fff irq 17 at device 0.0 on pci6

I'm on a Protectli FW6D

> Okay, had some success today based on info I gathered from all the various discussions online. I think it is something to do with the em(4) driver. Nothing useful to add here but I can confirm I'm using an Intel NIC with the em driver. Neither tethered or supplicant working for me on 22.1 but supplicant is working on 21.7.8 em0: <Intel(R) 82583V> port 0xe000-0xe01f mem 0xdf500000-0xdf51ffff,0xdf520000-0xdf523fff irq 16 at device 0.0 on pci1 em1: <Intel(R) 82583V> port 0xd000-0xd01f mem 0xdf400000-0xdf41ffff,0xdf420000-0xdf423fff irq 17 at device 0.0 on pci2 em2: <Intel(R) 82583V> port 0xc000-0xc01f mem 0xdf300000-0xdf31ffff,0xdf320000-0xdf323fff irq 18 at device 0.0 on pci3 em3: <Intel(R) 82583V> port 0xb000-0xb01f mem 0xdf200000-0xdf21ffff,0xdf220000-0xdf223fff irq 19 at device 0.0 on pci4 em4: <Intel(R) 82583V> port 0xa000-0xa01f mem 0xdf100000-0xdf11ffff,0xdf120000-0xdf123fff irq 16 at device 0.0 on pci5 em5: <Intel(R) 82583V> port 0x9000-0x901f mem 0xdf000000-0xdf01ffff,0xdf020000-0xdf023fff irq 17 at device 0.0 on pci6 I'm on a Protectli FW6D
bigjohns97 commented 2022-02-17 21:42:51 +05:30 (Migrated from github.com)

I am using an Intel NIC but with the IGB driver.

I am using an Intel NIC but with the IGB driver.
SGC1990 commented 2022-02-17 22:37:30 +05:30 (Migrated from github.com)

I am using an Intel NIC but with the IGB driver.

And is it working or not because my system is using igb drivers too and mine is not working

> I am using an Intel NIC but with the IGB driver. And is it working or not because my system is using igb drivers too and mine is not working
neydah700 commented 2022-02-17 22:42:24 +05:30 (Migrated from github.com)

My knowledge on FreeBSD is limited but I believe igb uses the em(4) driver. All the common Intel cards fall under it (I350, 82575, etc.)

https://www.freebsd.org/releases/12.3R/hardware/

My knowledge on FreeBSD is limited but I believe igb uses the em(4) driver. All the common Intel cards fall under it (I350, 82575, etc.) https://www.freebsd.org/releases/12.3R/hardware/
bigjohns97 commented 2022-02-17 22:44:18 +05:30 (Migrated from github.com)

I am using an Intel NIC but with the IGB driver.

And is it working or not because my system is using igb drivers too and mine is not working

Not working

> > I am using an Intel NIC but with the IGB driver. > > And is it working or not because my system is using igb drivers too and mine is not working Not working
neydah700 commented 2022-02-17 23:03:57 +05:30 (Migrated from github.com)

If you look at the if_igb.ko driver in /boot/kernel it just is a shortcut to if_em.ko. I think at one point the two intel drivers merged. https://www.intel.com/content/www/us/en/download/15187/intel-network-adapter-gigabit-base-driver-for-freebsd.html?wapkw=i350%20freebsd

If you look at the if_igb.ko driver in /boot/kernel it just is a shortcut to if_em.ko. I think at one point the two intel drivers merged. https://www.intel.com/content/www/us/en/download/15187/intel-network-adapter-gigabit-base-driver-for-freebsd.html?wapkw=i350%20freebsd
neydah700 commented 2022-02-18 01:21:51 +05:30 (Migrated from github.com)

Okay, I got everything up and working on my regular Intel NIC. I’m not the biggest expert here so bear with me.

Through troubleshooting I was able to get every non-Intel NIC to authenticate and pull DHCP. After more testing all igb(4) driver-based cards failed. In the /boot/kernel folder I noticed if_igb.ko is simply a shortcut to the em(4) driver (if_em.ko). I am guessing FreeBSD is using this combined driver from intel? https://www.intel.com/content/www/us/en/download/15187/intel-network-adapter-gigabit-base-driver-for-freebsd.html

Alternatively, I found this driver that appears to be for igb(4) separately, and it seems newer. https://www.intel.com/content/www/us/en/download/14610/intel-network-adapter-driver-for-82575-6-and-82580-based-gigabit-network-connections-under-freebsd.html?wapkw=i350%20freebsd

I downloaded a FreeBSD-12.3 VM, its related source code (amd64), and complied the separate igb(4) driver.

I loaded my newly compiled if_igb.ko into the /boot/modules folder with chmod 555 permissions. Next, I added the following two lines to my /boot/loader.conf file to supersede the included driver.

if_igb_load="YES"
if_igb_name="/boot/modules/if_igb.ko"

Rebooted and everything came up just fine!

Feel free to use my compiled if_igb.ko if you don’t want to build your own.
https://github.com/neydah700/pfsense_intel/blob/main/if_igb.ko

Also, for reference here is my pfatt script if anyone needs a reference.
https://github.com/neydah700/pfsense_intel/blob/main/pfatt_intel.sh

A few notes:

  1. When I clean installed 2.6.0 (and 22.01 on my pfSense+ Box) absolutely nothing I did allowed my pfatt script to runs successfully from the /cf/conf directory. I ended up moving it to /root/pfatt and everything worked. This seemed to only be an issue once I moved to a ZFS file system but who knows.
  2. I have an angry family since our internet has been up and down for a few days now.
Okay, I got everything up and working on my regular Intel NIC. I’m not the biggest expert here so bear with me. Through troubleshooting I was able to get every non-Intel NIC to authenticate and pull DHCP. After more testing all igb(4) driver-based cards failed. In the /boot/kernel folder I noticed if_igb.ko is simply a shortcut to the em(4) driver (if_em.ko). I am guessing FreeBSD is using this combined driver from intel? https://www.intel.com/content/www/us/en/download/15187/intel-network-adapter-gigabit-base-driver-for-freebsd.html Alternatively, I found this driver that appears to be for igb(4) separately, and it seems newer. https://www.intel.com/content/www/us/en/download/14610/intel-network-adapter-driver-for-82575-6-and-82580-based-gigabit-network-connections-under-freebsd.html?wapkw=i350%20freebsd I downloaded a FreeBSD-12.3 VM, its related source code (amd64), and complied the separate igb(4) driver. I loaded my newly compiled if_igb.ko into the /boot/modules folder with chmod 555 permissions. Next, I added the following two lines to my /boot/loader.conf file to supersede the included driver. if_igb_load="YES" if_igb_name="/boot/modules/if_igb.ko" Rebooted and everything came up just fine! Feel free to use my compiled if_igb.ko if you don’t want to build your own. https://github.com/neydah700/pfsense_intel/blob/main/if_igb.ko Also, for reference here is my pfatt script if anyone needs a reference. https://github.com/neydah700/pfsense_intel/blob/main/pfatt_intel.sh A few notes: 1. When I clean installed 2.6.0 (and 22.01 on my pfSense+ Box) absolutely nothing I did allowed my pfatt script to runs successfully from the /cf/conf directory. I ended up moving it to /root/pfatt and everything worked. This seemed to only be an issue once I moved to a ZFS file system but who knows. 2. I have an angry family since our internet has been up and down for a few days now.
lnxsrt commented 2022-02-18 02:28:43 +05:30 (Migrated from github.com)

Interesting that the intel igb driver works. I searched for bugs on the FreeBSD buglist and found this...

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=260068

Looks like it might be related? Issues with vlan tagging. Was introduced in 13.0 and 12.3... recently fixed in the stable branches, so the timing lines up.

Interesting that the intel igb driver works. I searched for bugs on the FreeBSD buglist and found this... https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=260068 Looks like it might be related? Issues with vlan tagging. Was introduced in 13.0 and 12.3... recently fixed in the stable branches, so the timing lines up.
jasonsansone commented 2022-02-18 02:35:35 +05:30 (Migrated from github.com)

Some comments and feedback in testing so far:

  1. It seems safe to install and test this on 2.5.2. I have downloaded the kernel module and am testing prior to any updates. I haven't managed to break 2.5.2... yet.

  2. It would be better to create /boot/loader.conf.local instead of /boot/loader.conf. Loader.conf may be overwritten by pfsense updates.

  3. What is your output on 2.6.0 with the if_igb.ko module for "kldstat -v"? I can't confirm it is loading and in use on 2.5.2. I am reluctant to upgrade until I can validate it is loading.

Some comments and feedback in testing so far: 1. It seems safe to install and test this on 2.5.2. I have downloaded the kernel module and am testing prior to any updates. I haven't managed to break 2.5.2... yet. 2. It would be better to create /boot/loader.conf.local instead of /boot/loader.conf. Loader.conf may be overwritten by pfsense updates. 3. What is your output on 2.6.0 with the if_igb.ko module for "kldstat -v"? I can't confirm it is loading and in use on 2.5.2. I am reluctant to upgrade until I can validate it is loading.
neydah700 commented 2022-02-18 02:36:25 +05:30 (Migrated from github.com)

Interesting that the intel igb driver works. I searched for bugs on the FreeBSD buglist and found this...

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=260068

Looks like it might be related? Issues with vlan tagging. Was introduced in 13.0 and 12.3... recently fixed in the stable branches, so the timing lines up.

Could explain why we are passing 802.1x not pulling DHCP on VLAN 0. I'll add it to my redmine issue on pfSense. If anyone else has success can they go on and comment. Hopefully we get some traction! https://redmine.pfsense.org/issues/12821?next_issue_id=12820

> Interesting that the intel igb driver works. I searched for bugs on the FreeBSD buglist and found this... > > https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=260068 > > Looks like it might be related? Issues with vlan tagging. Was introduced in 13.0 and 12.3... recently fixed in the stable branches, so the timing lines up. Could explain why we are passing 802.1x not pulling DHCP on VLAN 0. I'll add it to my redmine issue on pfSense. If anyone else has success can they go on and comment. Hopefully we get some traction! https://redmine.pfsense.org/issues/12821?next_issue_id=12820
SGC1990 commented 2022-02-18 02:37:07 +05:30 (Migrated from github.com)

I am testing now reimaging since wiregraud is broke in my install right now.

I am testing now reimaging since wiregraud is broke in my install right now.
SGC1990 commented 2022-02-18 02:38:33 +05:30 (Migrated from github.com)

i am testing now reimaging since wiregraud is broke in my install right now.

Interesting that the intel igb driver works. I searched for bugs on the FreeBSD buglist and found this...
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=260068
Looks like it might be related? Issues with vlan tagging. Was introduced in 13.0 and 12.3... recently fixed in the stable branches, so the timing lines up.

Could explain why we are passing 802.1x not pulling DHCP on VLAN 0. I'll add it to my redmine issue on pfSense. If anyone else has success can they go on and comment. Hopefully we get some traction! https://redmine.pfsense.org/issues/12821?next_issue_id=12820

will do internet going out for a bit to update and bring system online.

i am testing now reimaging since wiregraud is broke in my install right now. > > Interesting that the intel igb driver works. I searched for bugs on the FreeBSD buglist and found this... > > https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=260068 > > Looks like it might be related? Issues with vlan tagging. Was introduced in 13.0 and 12.3... recently fixed in the stable branches, so the timing lines up. > > Could explain why we are passing 802.1x not pulling DHCP on VLAN 0. I'll add it to my redmine issue on pfSense. If anyone else has success can they go on and comment. Hopefully we get some traction! https://redmine.pfsense.org/issues/12821?next_issue_id=12820 will do internet going out for a bit to update and bring system online.
neydah700 commented 2022-02-18 02:40:01 +05:30 (Migrated from github.com)

Some comments and feedback in testing so far:

  1. It seems safe to install and test this on 2.5.2. I have downloaded the kernel module and am testing prior to any updates. I haven't managed to break 2.5.2... yet.
  2. It would be better to create /boot/loader.conf.local instead of /boot/loader.conf. Loader.conf may be overwritten by pfsense updates.
  3. What is your output on 2.6.0 with the if_igb.ko module for "kldstat -v"? I can't confirm it is loading and in use on 2.5.2. I am reluctant to upgrade until I can validate it is loading.

Good point on the .local, will adjust that.

For my kldstat does just this portion work for ya or do you want the whole output?

3 1 0xffffffff83cfb000 35e08 if_igb.ko (/boot/modules/if_igb.ko)
Contains modules:
Id Name
2 pci/igb

> Some comments and feedback in testing so far: > > 1. It seems safe to install and test this on 2.5.2. I have downloaded the kernel module and am testing prior to any updates. I haven't managed to break 2.5.2... yet. > 2. It would be better to create /boot/loader.conf.local instead of /boot/loader.conf. Loader.conf may be overwritten by pfsense updates. > 3. What is your output on 2.6.0 with the if_igb.ko module for "kldstat -v"? I can't confirm it is loading and in use on 2.5.2. I am reluctant to upgrade until I can validate it is loading. Good point on the .local, will adjust that. For my kldstat does just this portion work for ya or do you want the whole output? 3 1 0xffffffff83cfb000 35e08 if_igb.ko (/boot/modules/if_igb.ko) Contains modules: Id Name 2 pci/igb
jasonsansone commented 2022-02-18 02:45:43 +05:30 (Migrated from github.com)

Good point on the .local, will adjust that.

For my kldstat does just this portion work for ya or do you want the whole output?

3 1 0xffffffff83cfb000 35e08 if_igb.ko (/boot/modules/if_igb.ko) Contains modules: Id Name 2 pci/igb

Thank you. That is what I was curious about. It isn't loading on 2.5.2, but it may just be because it was compiled for a different kernel. I also can't get into load with kldload on 2.5.2.

> Good point on the .local, will adjust that. > > For my kldstat does just this portion work for ya or do you want the whole output? > > 3 1 0xffffffff83cfb000 35e08 if_igb.ko (/boot/modules/if_igb.ko) Contains modules: Id Name 2 pci/igb Thank you. That is what I was curious about. It isn't loading on 2.5.2, but it may just be because it was compiled for a different kernel. I also can't get into load with kldload on 2.5.2.
neydah700 commented 2022-02-18 02:47:54 +05:30 (Migrated from github.com)

Good point on the .local, will adjust that.
For my kldstat does just this portion work for ya or do you want the whole output?
3 1 0xffffffff83cfb000 35e08 if_igb.ko (/boot/modules/if_igb.ko) Contains modules: Id Name 2 pci/igb

Thank you. That is what I was curious about. It isn't loading on 2.5.2, but it may just be because it was compiled for a different kernel. I also can't get into load with kldload on 2.5.2.

I built it using 12.3-RELEASE on amd64 architecture. Hopefully that helps!

> > Good point on the .local, will adjust that. > > For my kldstat does just this portion work for ya or do you want the whole output? > > 3 1 0xffffffff83cfb000 35e08 if_igb.ko (/boot/modules/if_igb.ko) Contains modules: Id Name 2 pci/igb > > Thank you. That is what I was curious about. It isn't loading on 2.5.2, but it may just be because it was compiled for a different kernel. I also can't get into load with kldload on 2.5.2. I built it using 12.3-RELEASE on amd64 architecture. Hopefully that helps!
jasonsansone commented 2022-02-18 02:49:19 +05:30 (Migrated from github.com)

Good point on the .local, will adjust that.
For my kldstat does just this portion work for ya or do you want the whole output?
3 1 0xffffffff83cfb000 35e08 if_igb.ko (/boot/modules/if_igb.ko) Contains modules: Id Name 2 pci/igb

Thank you. That is what I was curious about. It isn't loading on 2.5.2, but it may just be because it was compiled for a different kernel. I also can't get into load with kldload on 2.5.2.

I built it using 12.3-RELEASE on amd64 architecture.

Time to cross fingers and see how this goes....

> > > Good point on the .local, will adjust that. > > > For my kldstat does just this portion work for ya or do you want the whole output? > > > 3 1 0xffffffff83cfb000 35e08 if_igb.ko (/boot/modules/if_igb.ko) Contains modules: Id Name 2 pci/igb > > > > > > Thank you. That is what I was curious about. It isn't loading on 2.5.2, but it may just be because it was compiled for a different kernel. I also can't get into load with kldload on 2.5.2. > > I built it using 12.3-RELEASE on amd64 architecture. Time to cross fingers and see how this goes....
jasonsansone commented 2022-02-18 03:42:25 +05:30 (Migrated from github.com)

Ok, some lessons learned.

pfSense doesn't have wget or curl packages installed by default I didn't want to start mucking up the default packages. It does have fetch. However for whatever reason, when I used fetch to grab the module it was corrupted. After downloading the module on a desktop and uploading it to the firewall with Cyberduck, this worked perfectly. It might work in 2.5.2, but now I have no way of testing. I am now going to try to upgrade to pfSense Plus. I will report. Thank you!

Ok, some lessons learned. pfSense doesn't have wget or curl packages installed by default I didn't want to start mucking up the default packages. It does have fetch. However for whatever reason, when I used fetch to grab the module it was corrupted. After downloading the module on a desktop and uploading it to the firewall with Cyberduck, this worked perfectly. It might work in 2.5.2, but now I have no way of testing. I am now going to try to upgrade to pfSense Plus. I will report. Thank you!
jasonsansone commented 2022-02-18 03:52:43 +05:30 (Migrated from github.com)

Upgrade to 22.01 from 2.6.0 was perfectly smooth with this workaround in place.

My recommendation to anyone on CE 2.5.2 is to download the module on a desktop and then upload it to your firewall since I encountered issues fetching directly to pfSense. Set up your loader.conf.local as described above. The upgrade to 2.6.0 should then proceed without issue and eventually come back up with a successfully bypassed AT&T gateway. Based on the fix being related to the Intel kernel driver not properly tagging VLAN through netmap, I think this will resolve issues for tethered or supplicant methods. If you wish to register and upgrade to Plus, you can also now do that.

Upgrade to 22.01 from 2.6.0 was perfectly smooth with this workaround in place. My recommendation to anyone on CE 2.5.2 is to download the module on a desktop and then upload it to your firewall since I encountered issues fetching directly to pfSense. Set up your loader.conf.local as described above. The upgrade to 2.6.0 should then proceed without issue and eventually come back up with a successfully bypassed AT&T gateway. Based on the fix being related to the Intel kernel driver not properly tagging VLAN through netmap, I think this will resolve issues for tethered or supplicant methods. If you wish to register and upgrade to Plus, you can also now do that.
neydah700 commented 2022-02-18 03:55:45 +05:30 (Migrated from github.com)

Upgrade to 22.01 from 2.6.0 was perfectly smooth with this workaround in place.

My recommendation to anyone on CE 2.5.2 is to download the module on a desktop and then upload it to your firewall since I encountered issues fetching directly to pfSense. Set up your loader.conf.local as described above. The upgrade to 2.6.0 should then proceed without issue and eventually come back up with a successfully bypassed AT&T gateway. Based on the fix being related to the Intel kernel driver not properly tagging VLAN through netmap, I think this will resolve issues for tethered or supplicant methods. If you wish to register and upgrade to Plus, you can also now do that.

@jasonsansone Glad you are back up! If you get a chance do you mind adding a comment over on the Redmine issue? Hopefully we can get this fixed natively! https://redmine.pfsense.org/issues/12821?next_issue_id=12820

> Upgrade to 22.01 from 2.6.0 was perfectly smooth with this workaround in place. > > My recommendation to anyone on CE 2.5.2 is to download the module on a desktop and then upload it to your firewall since I encountered issues fetching directly to pfSense. Set up your loader.conf.local as described above. The upgrade to 2.6.0 should then proceed without issue and eventually come back up with a successfully bypassed AT&T gateway. Based on the fix being related to the Intel kernel driver not properly tagging VLAN through netmap, I think this will resolve issues for tethered or supplicant methods. If you wish to register and upgrade to Plus, you can also now do that. @jasonsansone Glad you are back up! If you get a chance do you mind adding a comment over on the Redmine issue? Hopefully we can get this fixed natively! https://redmine.pfsense.org/issues/12821?next_issue_id=12820
bigjohns97 commented 2022-02-18 04:10:02 +05:30 (Migrated from github.com)

Does everyone who this has worked for extract their own certs?

I noticed you are using the EAP_Identity to apply to the MAC address on ngeth0.

Before when this was working for me I would have to apply the RG MAC to that but then use the MAC that came with the certs in the EAP_Identity part.

Does everyone who this has worked for extract their own certs? I noticed you are using the EAP_Identity to apply to the MAC address on ngeth0. Before when this was working for me I would have to apply the RG MAC to that but then use the MAC that came with the certs in the EAP_Identity part.
neydah700 commented 2022-02-18 04:12:56 +05:30 (Migrated from github.com)

Does everyone who this has worked for extract their own certs?

I noticed you are using the EAP_Identity to apply to the MAC address on ngeth0.

Before when this was working for me I would have to apply the RG MAC to that but then use the MAC that came with the certs in the EAP_Identity part.

Ah good point. My EAP and RG MAC are the same so I simplified my script. If someone uses different ones they may need to tailor my script a bit.

> Does everyone who this has worked for extract their own certs? > > I noticed you are using the EAP_Identity to apply to the MAC address on ngeth0. > > Before when this was working for me I would have to apply the RG MAC to that but then use the MAC that came with the certs in the EAP_Identity part. Ah good point. My EAP and RG MAC are the same so I simplified my script. If someone uses different ones they may need to tailor my script a bit.
jasonsansone commented 2022-02-18 04:17:47 +05:30 (Migrated from github.com)

I never even looked at the new script. I’m using the same I always have. The newly compiled module was all I needed.

I never even looked at the new script. I’m using the same I always have. The newly compiled module was all I needed.
bigjohns97 commented 2022-02-18 04:20:29 +05:30 (Migrated from github.com)

@jasonsansone would you mind posting your script, I cant seem to get mine working with my probably incorrect additions

@jasonsansone would you mind posting your script, I cant seem to get mine working with my probably incorrect additions
jasonsansone commented 2022-02-18 04:25:22 +05:30 (Migrated from github.com)

I’m using the tether method. I never bothered to mess with extracting certificates when I set this up years ago and having the gateway sit there didn’t bother me.

I’m using the tether method. I never bothered to mess with extracting certificates when I set this up years ago and having the gateway sit there didn’t bother me.
neydah700 commented 2022-02-18 04:49:08 +05:30 (Migrated from github.com)

I’m using the tether method. I never bothered to mess with extracting certificates when I set this up years ago and having the gateway sit there didn’t bother me.

The last update broke wpa_supplicant (luckily fixed) and this release broke the VLAN 0 piece. I am strongly considering going back to the tether method to reduce customizations.

> I’m using the tether method. I never bothered to mess with extracting certificates when I set this up years ago and having the gateway sit there didn’t bother me. The last update broke wpa_supplicant (luckily fixed) and this release broke the VLAN 0 piece. I am strongly considering going back to the tether method to reduce customizations.
bigjohns97 commented 2022-02-18 05:09:49 +05:30 (Migrated from github.com)

Interesting, the tether worked but only after i did the interface assignment from the console, using the assignments within the UI didn't help and then I had to reboot.

Now that ngeth0 is assigned I am going to try and flip the script back to the intel script and see if it works.

Interesting, the tether worked but only after i did the interface assignment from the console, using the assignments within the UI didn't help and then I had to reboot. Now that ngeth0 is assigned I am going to try and flip the script back to the intel script and see if it works.
neydah700 commented 2022-02-18 05:12:28 +05:30 (Migrated from github.com)

@bigjohns97 if you want, I just made a commit to my script to break out the RG and EAP MAC addresses. I haven't tested it but it should work.

https://github.com/neydah700/pfsense_intel/blob/main/pfatt_intel.sh

@bigjohns97 if you want, I just made a commit to my script to break out the RG and EAP MAC addresses. I haven't tested it but it should work. https://github.com/neydah700/pfsense_intel/blob/main/pfatt_intel.sh
Grassyloki commented 2022-02-18 05:29:20 +05:30 (Migrated from github.com)

@neydah700 Thanks for figuring out the fix. I posted to my website to hopefully help people find the fix faster. Please let me know if you think anything should be added or removed to it.
https://angrysysadmins.tech/index.php/2022/02/grassyloki/pfsense-2-6-0-fix-pf-att-bypass-mode/

@neydah700 Thanks for figuring out the fix. I posted to my website to hopefully help people find the fix faster. Please let me know if you think anything should be added or removed to it. https://angrysysadmins.tech/index.php/2022/02/grassyloki/pfsense-2-6-0-fix-pf-att-bypass-mode/
neydah700 commented 2022-02-18 05:33:05 +05:30 (Migrated from github.com)

@neydah700 Thanks for figuring out the fix. I posted to my website to hopefully help people find the fix faster. Please let me know if you think anything should be added or removed to it. https://angrysysadmins.tech/index.php/2022/02/grassyloki/pfsense-2-6-0-fix-pf-att-bypass-mode/

Thanks for sharing! One note, while this seems to be fixing the ibg(4) people I am guessing it is not fixing the em(4) people. There is more discussion going on over at the Netgate Forums. I am going to compile the combined driver and see if that still works for me. So maybe will need an update if this works!

> @neydah700 Thanks for figuring out the fix. I posted to my website to hopefully help people find the fix faster. Please let me know if you think anything should be added or removed to it. https://angrysysadmins.tech/index.php/2022/02/grassyloki/pfsense-2-6-0-fix-pf-att-bypass-mode/ Thanks for sharing! One note, while this seems to be fixing the ibg(4) people I am guessing it is not fixing the em(4) people. There is more discussion going on over at the Netgate Forums. I am going to compile the combined driver and see if that still works for me. So maybe will need an update if this works!
bigjohns97 commented 2022-02-18 05:39:48 +05:30 (Migrated from github.com)

@bigjohns97 if you want, I just made a commit to my script to break out the RG and EAP MAC addresses. I haven't tested it but it should work.

https://github.com/neydah700/pfsense_intel/blob/main/pfatt_intel.sh

Thanks for everything, unfortunately this didn't work for me but it did tell me my script was correct, the only difference between yours and mine was mine had an extra space on the logger line.

I guess I am stuck running tether mode from now on until someone maybe can solve this issue I had.

Maybe I go and try to extract the actual certs from my device at a later date and see if it's the certs that are bad or if they aren't allowing the interface MAC to not match the EAP_Identity MAC now or something.

> @bigjohns97 if you want, I just made a commit to my script to break out the RG and EAP MAC addresses. I haven't tested it but it should work. > > https://github.com/neydah700/pfsense_intel/blob/main/pfatt_intel.sh Thanks for everything, unfortunately this didn't work for me but it did tell me my script was correct, the only difference between yours and mine was mine had an extra space on the logger line. I guess I am stuck running tether mode from now on until someone maybe can solve this issue I had. Maybe I go and try to extract the actual certs from my device at a later date and see if it's the certs that are bad or if they aren't allowing the interface MAC to not match the EAP_Identity MAC now or something.
neydah700 commented 2022-02-18 05:51:35 +05:30 (Migrated from github.com)

@bigjohns97

Sorry about that! for what it's worth I have never used anything but the same MAC's, so my script might be wrong. I guess only other suggestion is make sure pfSense is not managing that interface and that you set the ngeth0 MAC address to match your RG MAC in the web interface?

@bigjohns97 Sorry about that! for what it's worth I have never used anything but the same MAC's, so my script might be wrong. I guess only other suggestion is make sure pfSense is not managing that interface and that you set the ngeth0 MAC address to match your RG MAC in the web interface?
bigjohns97 commented 2022-02-18 06:14:41 +05:30 (Migrated from github.com)

@bigjohns97

Sorry about that! for what it's worth I have never used anything but the same MAC's, so my script might be wrong. I guess only other suggestion is make sure pfSense is not managing that interface and that you set the ngeth0 MAC address to match your RG MAC in the web interface?

I tried adding this but it didn't make a difference, tether was working without it as well so I am hanging it up for the day until I get get some time to get those certs out of the RG.

Thanks again @neydah700

> @bigjohns97 > > Sorry about that! for what it's worth I have never used anything but the same MAC's, so my script might be wrong. I guess only other suggestion is make sure pfSense is not managing that interface and that you set the ngeth0 MAC address to match your RG MAC in the web interface? I tried adding this but it didn't make a difference, tether was working without it as well so I am hanging it up for the day until I get get some time to get those certs out of the RG. Thanks again @neydah700
SGC1990 commented 2022-02-18 06:18:23 +05:30 (Migrated from github.com)

i got the certs out again and now it don't work I cant get pass the

WPA_STATUS_CMD="wpa_cli status | grep 'suppPortStatus' | cut -d= -f2"
IP_STATUS_CMD="ifconfig ngeth0 | grep 'inet\ ' | cut -d' ' -f2"
/usr/bin/logger -st "pfatt" "waiting for EAP authorization..."

During all this messing. I deleted my cert, so I had to pull again.

=Here is my full script
#!/usr/bin/env sh

EAP_SUPPLICANT_IDENTITY=""
RG_ETHER_ADDR=""
LOG=/var/log/pfatt.log
ONT_IF="igb0"

getTimestamp(){
echo date "+%Y-%m-%d %H:%M:%S :: [pfatt.sh] ::"
}

DO NOT EDIT BELOW

/usr/bin/logger -st "pfatt" "starting pfatt..."
/usr/bin/logger -st "pfatt" "configuration:"
/usr/bin/logger -st "pfatt" " ONT_IF = $ONT_IF"
/usr/bin/logger -st "pfatt" " EAP_SUPPLICANT_IDENTITY = $EAP_SUPPLICANT_IDENTITY"
/usr/bin/logger -st "pfatt" " RG_ETHER_ADDR = $RG_ETHER_ADDR"

Netgraph cleanup.

/usr/bin/logger -st "pfatt" "resetting netgraph..."
/usr/sbin/ngctl shutdown $ONT_IF: >/dev/null 2>&1
/usr/sbin/ngctl shutdown vlan0: >/dev/null 2>&1
/usr/sbin/ngctl shutdown ngeth0: >/dev/null 2>&1

/usr/bin/logger -st "pfatt" "your ONT should be connected to pyshical interface $ONT_IF"
/usr/bin/logger -st "pfatt" "creating vlan node and ngeth0 interface..."
/usr/sbin/ngctl mkpeer $ONT_IF: vlan lower downstream
/usr/sbin/ngctl name $ONT_IF:lower vlan0
/usr/sbin/ngctl mkpeer vlan0: eiface vlan0 ether
/usr/sbin/ngctl msg vlan0: 'addfilter { vlan=0 hook="vlan0" }'
/usr/sbin/ngctl msg ngeth0: set $RG_ETHER_ADDR

/usr/bin/logger -st "pfatt" "enabling promisc for $ONT_IF..."
/sbin/ifconfig $ONT_IF ether $RG_ETHER_ADDR
/sbin/ifconfig $ONT_IF up
/sbin/ifconfig $ONT_IF promisc

/usr/bin/logger -st "pfatt" "starting wpa_supplicant..."

WPA_PARAMS="
set eapol_version 2,
set fast_reauth 1,
ap_scan 0,
add_network,
set_network 0 ca_cert \"/root/pfatt/wpa/ca.pem\",
set_network 0 client_cert \"/root/pfatt/wpa/client.pem\",
set_network 0 eap TLS,
set_network 0 eapol_flags 0,
set_network 0 identity \"$EAP_SUPPLICANT_IDENTITY\",
set_network 0 key_mgmt IEEE8021X,
set_network 0 phase1 \"allow_canned_success=1\",
set_network 0 private_key \"/root/pfatt/wpa/private.pem\",
enable_network 0
"
WPA_DAEMON_CMD="/usr/sbin/wpa_supplicant -Dwired -i$ONT_IF -B -C /var/run/wpa_supplicant"

Kill any existing wpa_supplicant process.

PID=$(pgrep -f "wpa_supplicant")
if [ ${PID} > 0 ];
then
/usr/bin/logger -st "pfatt" "terminating existing wpa_supplicant on PID ${PID}..."
RES=$(kill ${PID})
fi

Start wpa_supplicant daemon.

RES=$(${WPA_DAEMON_CMD})
PID=$(pgrep -f "wpa_supplicant")
/usr/bin/logger -st "pfatt" "wpa_supplicant running on PID ${PID}..."

Set WPA configuration parameters.

/usr/bin/logger -st "pfatt" "setting wpa_supplicant network configuration..."
IFS=","
for STR in ${WPA_PARAMS};
do
STR="$(echo -e "${STR}" | sed -e 's/^:space:*//')"
RES=$(eval wpa_cli ${STR})
done

Create variables to check authentication status.

WPA_STATUS_CMD="wpa_cli status | grep 'suppPortStatus' | cut -d= -f2"
IP_STATUS_CMD="ifconfig ngeth0 | grep 'inet\ ' | cut -d' ' -f2"
/usr/bin/logger -st "pfatt" "waiting for EAP authorization..."

Check authentication once per 5 seconds for 25 seconds (5 attempts). Continue without authentication if necessary (no WAN).

i=1
until [ "$i" -eq "5" ]
do
sleep 5
WPA_STATUS=$(eval ${WPA_STATUS_CMD})
if [ X${WPA_STATUS} = X"Authorized" ];
then
/usr/bin/logger -st "pfatt" "EAP authorization completed..."

	IP_STATUS=$(eval ${IP_STATUS_CMD})

	if [ -z ${IP_STATUS} ] || [ ${IP_STATUS} = "0.0.0.0" ];
	then
		/usr/bin/logger -st "pfatt" "no IP address assigned, force restarting DHCP..."
		RES=$(eval /etc/rc.d/dhclient forcerestart ngeth0)
		IP_STATUS=$(eval ${IP_STATUS_CMD})
	fi
	/usr/bin/logger -st "pfatt" "IP address is ${IP_STATUS}..."
	/usr/bin/logger -st "pfatt" "ngeth0 should now be available to configure as your WAN..."
	sleep 5
	/usr/bin/logger -st "pfatt" "set mac address on ngeth0..."
	/sbin/ifconfig ngeth0 ether $RG_ETHER_ADDR
	break
else
	/usr/bin/logger -st "pfatt" "no authentication, retrying ${i}/5..."
	i=$((i+1))
fi

done

i got the certs out again and now it don't work I cant get pass the WPA_STATUS_CMD="wpa_cli status | grep 'suppPortStatus' | cut -d= -f2" IP_STATUS_CMD="ifconfig ngeth0 | grep 'inet\ ' | cut -d' ' -f2" /usr/bin/logger -st "pfatt" "waiting for EAP authorization..." During all this messing. I deleted my cert, so I had to pull again. =Here is my full script #!/usr/bin/env sh EAP_SUPPLICANT_IDENTITY="" RG_ETHER_ADDR="" LOG=/var/log/pfatt.log ONT_IF="igb0" getTimestamp(){ echo `date "+%Y-%m-%d %H:%M:%S :: [pfatt.sh] ::"` } ##### DO NOT EDIT BELOW ################################################################################# /usr/bin/logger -st "pfatt" "starting pfatt..." /usr/bin/logger -st "pfatt" "configuration:" /usr/bin/logger -st "pfatt" " ONT_IF = $ONT_IF" /usr/bin/logger -st "pfatt" " EAP_SUPPLICANT_IDENTITY = $EAP_SUPPLICANT_IDENTITY" /usr/bin/logger -st "pfatt" " RG_ETHER_ADDR = $RG_ETHER_ADDR" # Netgraph cleanup. /usr/bin/logger -st "pfatt" "resetting netgraph..." /usr/sbin/ngctl shutdown $ONT_IF: >/dev/null 2>&1 /usr/sbin/ngctl shutdown vlan0: >/dev/null 2>&1 /usr/sbin/ngctl shutdown ngeth0: >/dev/null 2>&1 /usr/bin/logger -st "pfatt" "your ONT should be connected to pyshical interface $ONT_IF" /usr/bin/logger -st "pfatt" "creating vlan node and ngeth0 interface..." /usr/sbin/ngctl mkpeer $ONT_IF: vlan lower downstream /usr/sbin/ngctl name $ONT_IF:lower vlan0 /usr/sbin/ngctl mkpeer vlan0: eiface vlan0 ether /usr/sbin/ngctl msg vlan0: 'addfilter { vlan=0 hook="vlan0" }' /usr/sbin/ngctl msg ngeth0: set $RG_ETHER_ADDR /usr/bin/logger -st "pfatt" "enabling promisc for $ONT_IF..." /sbin/ifconfig $ONT_IF ether $RG_ETHER_ADDR /sbin/ifconfig $ONT_IF up /sbin/ifconfig $ONT_IF promisc /usr/bin/logger -st "pfatt" "starting wpa_supplicant..." WPA_PARAMS="\ set eapol_version 2,\ set fast_reauth 1,\ ap_scan 0,\ add_network,\ set_network 0 ca_cert \\\"/root/pfatt/wpa/ca.pem\\\",\ set_network 0 client_cert \\\"/root/pfatt/wpa/client.pem\\\",\ set_network 0 eap TLS,\ set_network 0 eapol_flags 0,\ set_network 0 identity \\\"$EAP_SUPPLICANT_IDENTITY\\\",\ set_network 0 key_mgmt IEEE8021X,\ set_network 0 phase1 \\\"allow_canned_success=1\\\",\ set_network 0 private_key \\\"/root/pfatt/wpa/private.pem\\\",\ enable_network 0\ " WPA_DAEMON_CMD="/usr/sbin/wpa_supplicant -Dwired -i$ONT_IF -B -C /var/run/wpa_supplicant" # Kill any existing wpa_supplicant process. PID=$(pgrep -f "wpa_supplicant") if [ ${PID} > 0 ]; then /usr/bin/logger -st "pfatt" "terminating existing wpa_supplicant on PID ${PID}..." RES=$(kill ${PID}) fi # Start wpa_supplicant daemon. RES=$(${WPA_DAEMON_CMD}) PID=$(pgrep -f "wpa_supplicant") /usr/bin/logger -st "pfatt" "wpa_supplicant running on PID ${PID}..." # Set WPA configuration parameters. /usr/bin/logger -st "pfatt" "setting wpa_supplicant network configuration..." IFS="," for STR in ${WPA_PARAMS}; do STR="$(echo -e "${STR}" | sed -e 's/^[[:space:]]*//')" RES=$(eval wpa_cli ${STR}) done # Create variables to check authentication status. WPA_STATUS_CMD="wpa_cli status | grep 'suppPortStatus' | cut -d= -f2" IP_STATUS_CMD="ifconfig ngeth0 | grep 'inet\ ' | cut -d' ' -f2" /usr/bin/logger -st "pfatt" "waiting for EAP authorization..." # Check authentication once per 5 seconds for 25 seconds (5 attempts). Continue without authentication if necessary (no WAN). i=1 until [ "$i" -eq "5" ] do sleep 5 WPA_STATUS=$(eval ${WPA_STATUS_CMD}) if [ X${WPA_STATUS} = X"Authorized" ]; then /usr/bin/logger -st "pfatt" "EAP authorization completed..." IP_STATUS=$(eval ${IP_STATUS_CMD}) if [ -z ${IP_STATUS} ] || [ ${IP_STATUS} = "0.0.0.0" ]; then /usr/bin/logger -st "pfatt" "no IP address assigned, force restarting DHCP..." RES=$(eval /etc/rc.d/dhclient forcerestart ngeth0) IP_STATUS=$(eval ${IP_STATUS_CMD}) fi /usr/bin/logger -st "pfatt" "IP address is ${IP_STATUS}..." /usr/bin/logger -st "pfatt" "ngeth0 should now be available to configure as your WAN..." sleep 5 /usr/bin/logger -st "pfatt" "set mac address on ngeth0..." /sbin/ifconfig ngeth0 ether $RG_ETHER_ADDR break else /usr/bin/logger -st "pfatt" "no authentication, retrying ${i}/5..." i=$((i+1)) fi done
neydah700 commented 2022-02-18 06:21:27 +05:30 (Migrated from github.com)

@SGC1990 what folder are your certs in and do they have the appropriate permissions? That script assumes they are in the /root/pfatt/wpa/ directory.

also, are you using igb0?

@SGC1990 what folder are your certs in and do they have the appropriate permissions? That script assumes they are in the /root/pfatt/wpa/ directory. also, are you using igb0?
SGC1990 commented 2022-02-18 06:27:16 +05:30 (Migrated from github.com)

image
and the ont is plug in to igb0

![image](https://user-images.githubusercontent.com/19717561/154596968-60778ec6-4d77-4082-8c14-b820e1d99f8a.png) and the ont is plug in to igb0
SGC1990 commented 2022-02-18 06:30:30 +05:30 (Migrated from github.com)

image

![image](https://user-images.githubusercontent.com/19717561/154597306-b135b8dc-6140-483c-8fb1-bc38380371e8.png)
bigjohns97 commented 2022-02-18 06:31:18 +05:30 (Migrated from github.com)

This is what happens to mine as well, unable to EAP auth.

This is what happens to mine as well, unable to EAP auth.
SGC1990 commented 2022-02-18 06:31:46 +05:30 (Migrated from github.com)

image

![image](https://user-images.githubusercontent.com/19717561/154597453-b819f657-0e3b-4b03-9fae-9f06c2cbfe9e.png)
SGC1990 commented 2022-02-18 06:32:15 +05:30 (Migrated from github.com)

also, the script is not making a log any more

also, the script is not making a log any more
SGC1990 commented 2022-02-18 06:32:43 +05:30 (Migrated from github.com)

This is what happens to mine as well, unable to EAP auth.

do you have teather working

> This is what happens to mine as well, unable to EAP auth. do you have teather working
bigjohns97 commented 2022-02-18 06:58:40 +05:30 (Migrated from github.com)

This is what happens to mine as well, unable to EAP auth.

do you have teather working

Yes tether works for me, do you have your own certs or someone else's?

> > This is what happens to mine as well, unable to EAP auth. > > do you have teather working Yes tether works for me, do you have your own certs or someone else's?
SGC1990 commented 2022-02-18 07:08:31 +05:30 (Migrated from github.com)

This is what happens to mine as well, unable to EAP auth.

do you have teather working

Yes tether works for me, do you have your own certs or someone else's?

I have my own.

> > > This is what happens to mine as well, unable to EAP auth. > > > > > > do you have teather working > > Yes tether works for me, do you have your own certs or someone else's? I have my own.
neydah700 commented 2022-02-18 07:14:52 +05:30 (Migrated from github.com)

@SGC1990 yea the logging broke for me as well so I ended up removing it from my script. No idea why the log stopped but that wasn't my pressing issue :).

Idk what could be different for you, if tethering works and we are using the same script. If it's not passing EAP maybe the certs need a format conversion or something? Maybe try changing the permissions on the certs themselves to something like 755 and see if it makes a difference?

@SGC1990 yea the logging broke for me as well so I ended up removing it from my script. No idea why the log stopped but that wasn't my pressing issue :). Idk what could be different for you, if tethering works and we are using the same script. If it's not passing EAP maybe the certs need a format conversion or something? Maybe try changing the permissions on the certs themselves to something like 755 and see if it makes a difference?
SGC1990 commented 2022-02-18 07:19:19 +05:30 (Migrated from github.com)

@SGC1990 yea the logging broke for me as well so I ended up removing it from my script. No idea why the log stopped but that wasn't my pressing issue :).

Idk what could be different for you, if tethering works and we are using the same script. If it's not passing EAP maybe the certs need a format conversion or something? Maybe try changing the permissions on the certs themselves to something like 755 and see if it makes a difference?

tething is not working since i lost the script for that ether.

> @SGC1990 yea the logging broke for me as well so I ended up removing it from my script. No idea why the log stopped but that wasn't my pressing issue :). > > Idk what could be different for you, if tethering works and we are using the same script. If it's not passing EAP maybe the certs need a format conversion or something? Maybe try changing the permissions on the certs themselves to something like 755 and see if it makes a difference? tething is not working since i lost the script for that ether.
neydah700 commented 2022-02-18 07:19:49 +05:30 (Migrated from github.com)

@SGC1990 .. @jasonsansone is using tethering, maybe he can share his script with you?

@SGC1990 .. @jasonsansone is using tethering, maybe he can share his script with you?
bigjohns97 commented 2022-02-18 07:24:16 +05:30 (Migrated from github.com)

Here is the tether script I used

https://github.com/MonkWho/pfatt/blob/master/bin/pfatt.sh

It's just the one from this repo.

Here is the tether script I used https://github.com/MonkWho/pfatt/blob/master/bin/pfatt.sh It's just the one from this repo.
SGC1990 commented 2022-02-18 07:42:26 +05:30 (Migrated from github.com)

Here is the tether script I used

https://github.com/MonkWho/pfatt/blob/master/bin/pfatt.sh

It's just the one from this repo.

Thank you that worked. I am up but I still want to get rid of the gateway it is taking up room.

> Here is the tether script I used > > https://github.com/MonkWho/pfatt/blob/master/bin/pfatt.sh > > It's just the one from this repo. Thank you that worked. I am up but I still want to get rid of the gateway it is taking up room.
SGC1990 commented 2022-02-18 07:43:02 +05:30 (Migrated from github.com)

Can anyone help me figure out why the logs don't work any more.

Can anyone help me figure out why the logs don't work any more.
jasonsansone commented 2022-02-19 01:30:10 +05:30 (Migrated from github.com)

@SGC1990 .. @jasonsansone is using tethering, maybe he can share his script with you?

`#!/bin/sh
set -e

ONT_IF='igb0' # CHANGE THIS VALUE
RG_IF='em0' # CHANGE THIS VALUE
RG_ETHER_ADDR='00:00:00:00:00:00' # CHANGE THIS VALUE
LOG=/var/log/pfatt.log

{
/usr/local/bin/php -r "pfSense_ngctl_attach('.', '$ONT_IF');"
/usr/local/bin/php -r "pfSense_ngctl_attach('.', '$RG_IF');"
/usr/sbin/ngctl mkpeer $ONT_IF: one2many lower one
/usr/sbin/ngctl name $ONT_IF:lower o2m
/usr/sbin/ngctl mkpeer o2m: vlan many0 downstream
/usr/sbin/ngctl name o2m:many0 vlan0
/usr/sbin/ngctl mkpeer vlan0: eiface vlan0 ether
/usr/sbin/ngctl msg vlan0: 'addfilter { vlan=0 hook="vlan0" }'
/usr/sbin/ngctl msg ngeth0: set $RG_ETHER_ADDR
/usr/sbin/ngctl mkpeer o2m: etf many1 downstream
/usr/sbin/ngctl name o2m:many1 waneapfilter
/usr/sbin/ngctl connect waneapfilter: $ONT_IF: nomatch upper
/usr/sbin/ngctl mkpeer $RG_IF: etf lower downstream
/usr/sbin/ngctl name $RG_IF:lower laneapfilter
/usr/sbin/ngctl connect laneapfilter: $RG_IF: nomatch upper
/usr/sbin/ngctl connect waneapfilter: laneapfilter: eapout eapout
/usr/sbin/ngctl msg waneapfilter: 'setfilter { matchhook="eapout" ethertype=0x888e }'
/usr/sbin/ngctl msg laneapfilter: 'setfilter { matchhook="eapout" ethertype=0x888e }'
/usr/sbin/ngctl msg o2m: setconfig "{ xmitAlg=2 failAlg=1 enabledLinks=[ 1 1 ] }"
/usr/sbin/ngctl rmhook waneapfilter: nomatch
/sbin/ifconfig $RG_IF up
/sbin/ifconfig $ONT_IF up
/sbin/ifconfig $RG_IF promisc
/sbin/ifconfig $ONT_IF promisc
} >> $LOG`

> @SGC1990 .. @jasonsansone is using tethering, maybe he can share his script with you? `#!/bin/sh set -e ONT_IF='igb0' # CHANGE THIS VALUE RG_IF='em0' # CHANGE THIS VALUE RG_ETHER_ADDR='00:00:00:00:00:00' # CHANGE THIS VALUE LOG=/var/log/pfatt.log { /usr/local/bin/php -r "pfSense_ngctl_attach('.', '$ONT_IF');" /usr/local/bin/php -r "pfSense_ngctl_attach('.', '$RG_IF');" /usr/sbin/ngctl mkpeer $ONT_IF: one2many lower one /usr/sbin/ngctl name $ONT_IF:lower o2m /usr/sbin/ngctl mkpeer o2m: vlan many0 downstream /usr/sbin/ngctl name o2m:many0 vlan0 /usr/sbin/ngctl mkpeer vlan0: eiface vlan0 ether /usr/sbin/ngctl msg vlan0: 'addfilter { vlan=0 hook="vlan0" }' /usr/sbin/ngctl msg ngeth0: set $RG_ETHER_ADDR /usr/sbin/ngctl mkpeer o2m: etf many1 downstream /usr/sbin/ngctl name o2m:many1 waneapfilter /usr/sbin/ngctl connect waneapfilter: $ONT_IF: nomatch upper /usr/sbin/ngctl mkpeer $RG_IF: etf lower downstream /usr/sbin/ngctl name $RG_IF:lower laneapfilter /usr/sbin/ngctl connect laneapfilter: $RG_IF: nomatch upper /usr/sbin/ngctl connect waneapfilter: laneapfilter: eapout eapout /usr/sbin/ngctl msg waneapfilter: 'setfilter { matchhook="eapout" ethertype=0x888e }' /usr/sbin/ngctl msg laneapfilter: 'setfilter { matchhook="eapout" ethertype=0x888e }' /usr/sbin/ngctl msg o2m: setconfig "{ xmitAlg=2 failAlg=1 enabledLinks=[ 1 1 ] }" /usr/sbin/ngctl rmhook waneapfilter: nomatch /sbin/ifconfig $RG_IF up /sbin/ifconfig $ONT_IF up /sbin/ifconfig $RG_IF promisc /sbin/ifconfig $ONT_IF promisc } >> $LOG`
jasonsansone commented 2022-02-19 01:33:28 +05:30 (Migrated from github.com)

Can anyone help me figure out why the logs don't work any more.

I can't directly answer that question, but dmesg can still be used to debug most of the creation stage of the interfaces and net graph flow.

> Can anyone help me figure out why the logs don't work any more. I can't directly answer that question, but dmesg can still be used to debug most of the creation stage of the interfaces and net graph flow.
bbrendon commented 2022-02-19 05:10:21 +05:30 (Migrated from github.com)

I'm tethered and not having much success. I have applied the patches but I'm not getting a DHCP on ngeth0.
Any ideas?

[root@fw ~]# ls -l /boot/modules/if_igb.ko
-r-xr-xr-x  1 root  wheel  222632 Feb 17 18:09 /boot/modules/if_igb.ko
[root@fw ~]# ls -l /boot/kernel/if_em.ko
-r-xr-xr-x  1 root  wheel  510656 Jan 31 12:15 /boot/kernel/if_em.ko
[root@fw ~]# ls -l /boot/kernel/if_igb.ko
lrwxr-xr-x  1 root  wheel  8 Jan 31 12:15 /boot/kernel/if_igb.ko -> if_em.ko


[root@fw ~]# cat /boot/loader.conf
kern.cam.boot_delay=10000
kern.ipc.nmbclusters="1000000"
kern.ipc.nmbjumbop="524288"
kern.ipc.nmbjumbo9="524288"
kern.ipc.semopm=100
kern.ipc.semmni=128
kern.ipc.semmns=32000
kern.ipc.shmmni=4096
if_igb_load="YES"
if_igb_name="/boot/modules/if_igb.ko"
boot_multicons="YES"
boot_serial="YES"
console="comconsole,efi"
comconsole_speed="115200"
autoboot_delay="3"
vm.pmap.pti="0"
hw.hn.vf_transparent="0"
hw.hn.use_if_start="1"
net.link.ifqmaxlen="128"
[root@fw ~]#

[root@fw ~]# ifconfig|grep -E '^(ng|em|igb)'
em0: flags=28943<UP,BROADCAST,RUNNING,PROMISC,SIMPLEX,MULTICAST,PPROMISC> metric 0 mtu 1500
em1: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500
em2: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500
em3: flags=8802<BROADCAST,SIMPLEX,MULTICAST> metric 0 mtu 1500
em4: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500
em5: flags=28943<UP,BROADCAST,RUNNING,PROMISC,SIMPLEX,MULTICAST,PPROMISC> metric 0 mtu 1500
ngeth0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500
[root@fw ~]#

I'm tethered and not having much success. I have applied the patches but I'm not getting a DHCP on ngeth0. Any ideas? ``` [root@fw ~]# ls -l /boot/modules/if_igb.ko -r-xr-xr-x 1 root wheel 222632 Feb 17 18:09 /boot/modules/if_igb.ko [root@fw ~]# ls -l /boot/kernel/if_em.ko -r-xr-xr-x 1 root wheel 510656 Jan 31 12:15 /boot/kernel/if_em.ko [root@fw ~]# ls -l /boot/kernel/if_igb.ko lrwxr-xr-x 1 root wheel 8 Jan 31 12:15 /boot/kernel/if_igb.ko -> if_em.ko [root@fw ~]# cat /boot/loader.conf kern.cam.boot_delay=10000 kern.ipc.nmbclusters="1000000" kern.ipc.nmbjumbop="524288" kern.ipc.nmbjumbo9="524288" kern.ipc.semopm=100 kern.ipc.semmni=128 kern.ipc.semmns=32000 kern.ipc.shmmni=4096 if_igb_load="YES" if_igb_name="/boot/modules/if_igb.ko" boot_multicons="YES" boot_serial="YES" console="comconsole,efi" comconsole_speed="115200" autoboot_delay="3" vm.pmap.pti="0" hw.hn.vf_transparent="0" hw.hn.use_if_start="1" net.link.ifqmaxlen="128" [root@fw ~]# [root@fw ~]# ifconfig|grep -E '^(ng|em|igb)' em0: flags=28943<UP,BROADCAST,RUNNING,PROMISC,SIMPLEX,MULTICAST,PPROMISC> metric 0 mtu 1500 em1: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500 em2: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500 em3: flags=8802<BROADCAST,SIMPLEX,MULTICAST> metric 0 mtu 1500 em4: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500 em5: flags=28943<UP,BROADCAST,RUNNING,PROMISC,SIMPLEX,MULTICAST,PPROMISC> metric 0 mtu 1500 ngeth0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500 [root@fw ~]# ```
neydah700 commented 2022-02-19 05:54:47 +05:30 (Migrated from github.com)

I'm tethered and not having much success. I have applied the patches but I'm not getting a DHCP on ngeth0. Any ideas?

[root@fw ~]# ls -l /boot/modules/if_igb.ko
-r-xr-xr-x  1 root  wheel  222632 Feb 17 18:09 /boot/modules/if_igb.ko
[root@fw ~]# ls -l /boot/kernel/if_em.ko
-r-xr-xr-x  1 root  wheel  510656 Jan 31 12:15 /boot/kernel/if_em.ko
[root@fw ~]# ls -l /boot/kernel/if_igb.ko
lrwxr-xr-x  1 root  wheel  8 Jan 31 12:15 /boot/kernel/if_igb.ko -> if_em.ko


[root@fw ~]# cat /boot/loader.conf
kern.cam.boot_delay=10000
kern.ipc.nmbclusters="1000000"
kern.ipc.nmbjumbop="524288"
kern.ipc.nmbjumbo9="524288"
kern.ipc.semopm=100
kern.ipc.semmni=128
kern.ipc.semmns=32000
kern.ipc.shmmni=4096
if_igb_load="YES"
if_igb_name="/boot/modules/if_igb.ko"
boot_multicons="YES"
boot_serial="YES"
console="comconsole,efi"
comconsole_speed="115200"
autoboot_delay="3"
vm.pmap.pti="0"
hw.hn.vf_transparent="0"
hw.hn.use_if_start="1"
net.link.ifqmaxlen="128"
[root@fw ~]#

[root@fw ~]# ifconfig|grep -E '^(ng|em|igb)'
em0: flags=28943<UP,BROADCAST,RUNNING,PROMISC,SIMPLEX,MULTICAST,PPROMISC> metric 0 mtu 1500
em1: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500
em2: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500
em3: flags=8802<BROADCAST,SIMPLEX,MULTICAST> metric 0 mtu 1500
em4: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500
em5: flags=28943<UP,BROADCAST,RUNNING,PROMISC,SIMPLEX,MULTICAST,PPROMISC> metric 0 mtu 1500
ngeth0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500
[root@fw ~]#

Hey! It looks like your NICs are using the em module and not igb. Unfortunately my igb module doesn't help with em devices. I have tried compiling an em module but didn't have a chance to test. Just uploaded here, https://github.com/neydah700/pfsense_intel/blob/main/if_em.ko

> I'm tethered and not having much success. I have applied the patches but I'm not getting a DHCP on ngeth0. Any ideas? > > ``` > [root@fw ~]# ls -l /boot/modules/if_igb.ko > -r-xr-xr-x 1 root wheel 222632 Feb 17 18:09 /boot/modules/if_igb.ko > [root@fw ~]# ls -l /boot/kernel/if_em.ko > -r-xr-xr-x 1 root wheel 510656 Jan 31 12:15 /boot/kernel/if_em.ko > [root@fw ~]# ls -l /boot/kernel/if_igb.ko > lrwxr-xr-x 1 root wheel 8 Jan 31 12:15 /boot/kernel/if_igb.ko -> if_em.ko > > > [root@fw ~]# cat /boot/loader.conf > kern.cam.boot_delay=10000 > kern.ipc.nmbclusters="1000000" > kern.ipc.nmbjumbop="524288" > kern.ipc.nmbjumbo9="524288" > kern.ipc.semopm=100 > kern.ipc.semmni=128 > kern.ipc.semmns=32000 > kern.ipc.shmmni=4096 > if_igb_load="YES" > if_igb_name="/boot/modules/if_igb.ko" > boot_multicons="YES" > boot_serial="YES" > console="comconsole,efi" > comconsole_speed="115200" > autoboot_delay="3" > vm.pmap.pti="0" > hw.hn.vf_transparent="0" > hw.hn.use_if_start="1" > net.link.ifqmaxlen="128" > [root@fw ~]# > > [root@fw ~]# ifconfig|grep -E '^(ng|em|igb)' > em0: flags=28943<UP,BROADCAST,RUNNING,PROMISC,SIMPLEX,MULTICAST,PPROMISC> metric 0 mtu 1500 > em1: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500 > em2: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500 > em3: flags=8802<BROADCAST,SIMPLEX,MULTICAST> metric 0 mtu 1500 > em4: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500 > em5: flags=28943<UP,BROADCAST,RUNNING,PROMISC,SIMPLEX,MULTICAST,PPROMISC> metric 0 mtu 1500 > ngeth0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500 > [root@fw ~]# > ``` Hey! It looks like your NICs are using the em module and not igb. Unfortunately my igb module doesn't help with em devices. I have tried compiling an em module but didn't have a chance to test. Just uploaded here, https://github.com/neydah700/pfsense_intel/blob/main/if_em.ko
SGC1990 commented 2022-02-19 06:02:51 +05:30 (Migrated from github.com)

I'm tethered and not having much success. I have applied the patches but I'm not getting a DHCP on ngeth0. Any ideas?

[root@fw ~]# ls -l /boot/modules/if_igb.ko
-r-xr-xr-x  1 root  wheel  222632 Feb 17 18:09 /boot/modules/if_igb.ko
[root@fw ~]# ls -l /boot/kernel/if_em.ko
-r-xr-xr-x  1 root  wheel  510656 Jan 31 12:15 /boot/kernel/if_em.ko
[root@fw ~]# ls -l /boot/kernel/if_igb.ko
lrwxr-xr-x  1 root  wheel  8 Jan 31 12:15 /boot/kernel/if_igb.ko -> if_em.ko


[root@fw ~]# cat /boot/loader.conf
kern.cam.boot_delay=10000
kern.ipc.nmbclusters="1000000"
kern.ipc.nmbjumbop="524288"
kern.ipc.nmbjumbo9="524288"
kern.ipc.semopm=100
kern.ipc.semmni=128
kern.ipc.semmns=32000
kern.ipc.shmmni=4096
if_igb_load="YES"
if_igb_name="/boot/modules/if_igb.ko"
boot_multicons="YES"
boot_serial="YES"
console="comconsole,efi"
comconsole_speed="115200"
autoboot_delay="3"
vm.pmap.pti="0"
hw.hn.vf_transparent="0"
hw.hn.use_if_start="1"
net.link.ifqmaxlen="128"
[root@fw ~]#

[root@fw ~]# ifconfig|grep -E '^(ng|em|igb)'
em0: flags=28943<UP,BROADCAST,RUNNING,PROMISC,SIMPLEX,MULTICAST,PPROMISC> metric 0 mtu 1500
em1: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500
em2: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500
em3: flags=8802<BROADCAST,SIMPLEX,MULTICAST> metric 0 mtu 1500
em4: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500
em5: flags=28943<UP,BROADCAST,RUNNING,PROMISC,SIMPLEX,MULTICAST,PPROMISC> metric 0 mtu 1500
ngeth0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500
[root@fw ~]#

send us the code I had to change the code to get tethering working.

> I'm tethered and not having much success. I have applied the patches but I'm not getting a DHCP on ngeth0. Any ideas? > > ``` > [root@fw ~]# ls -l /boot/modules/if_igb.ko > -r-xr-xr-x 1 root wheel 222632 Feb 17 18:09 /boot/modules/if_igb.ko > [root@fw ~]# ls -l /boot/kernel/if_em.ko > -r-xr-xr-x 1 root wheel 510656 Jan 31 12:15 /boot/kernel/if_em.ko > [root@fw ~]# ls -l /boot/kernel/if_igb.ko > lrwxr-xr-x 1 root wheel 8 Jan 31 12:15 /boot/kernel/if_igb.ko -> if_em.ko > > > [root@fw ~]# cat /boot/loader.conf > kern.cam.boot_delay=10000 > kern.ipc.nmbclusters="1000000" > kern.ipc.nmbjumbop="524288" > kern.ipc.nmbjumbo9="524288" > kern.ipc.semopm=100 > kern.ipc.semmni=128 > kern.ipc.semmns=32000 > kern.ipc.shmmni=4096 > if_igb_load="YES" > if_igb_name="/boot/modules/if_igb.ko" > boot_multicons="YES" > boot_serial="YES" > console="comconsole,efi" > comconsole_speed="115200" > autoboot_delay="3" > vm.pmap.pti="0" > hw.hn.vf_transparent="0" > hw.hn.use_if_start="1" > net.link.ifqmaxlen="128" > [root@fw ~]# > > [root@fw ~]# ifconfig|grep -E '^(ng|em|igb)' > em0: flags=28943<UP,BROADCAST,RUNNING,PROMISC,SIMPLEX,MULTICAST,PPROMISC> metric 0 mtu 1500 > em1: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500 > em2: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500 > em3: flags=8802<BROADCAST,SIMPLEX,MULTICAST> metric 0 mtu 1500 > em4: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500 > em5: flags=28943<UP,BROADCAST,RUNNING,PROMISC,SIMPLEX,MULTICAST,PPROMISC> metric 0 mtu 1500 > ngeth0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500 > [root@fw ~]# > ``` send us the code I had to change the code to get tethering working.
bbrendon commented 2022-02-19 09:00:27 +05:30 (Migrated from github.com)

@SGC1990 the code? you mean the script? I'm using the pre-canned one here.
https://github.com/MonkWho/pfatt/blob/master/bin/pfatt.sh

@neydah700 thanks for trying. Same result with the em module. What I did is below.

# cat /boot/loader.conf
kern.cam.boot_delay=10000
kern.ipc.nmbclusters="1000000"
kern.ipc.nmbjumbop="524288"
kern.ipc.nmbjumbo9="524288"
kern.ipc.semopm=100
kern.ipc.semmni=128
kern.ipc.semmns=32000
kern.ipc.shmmni=4096
if_em="YES"
if_em_name="/boot/modules/if_em.ko"
boot_multicons="YES"
boot_serial="YES"
console="comconsole,efi"
comconsole_speed="115200"
autoboot_delay="3"
vm.pmap.pti="0"
hw.hn.vf_transparent="0"
hw.hn.use_if_start="1"
net.link.ifqmaxlen="128"

 


# ls -l /boot/modules/*ko
-r-xr-xr-x  1 root  wheel  106328 Jan 12 07:44 /boot/modules/bwi_v3_ucode.ko
-r-xr-xr-x  1 root  wheel  408896 Feb 18 19:14 /boot/modules/if_em.ko
-r-xr-xr-x  1 root  wheel  222632 Feb 17 18:09 /boot/modules/if_igb.ko
-r-xr-xr-x  1 root  wheel  147976 Jan 12 07:48 /boot/modules/if_wg.ko

# ls -l /boot/kernel/*ko | grep -E 'if_(igb|em)'
-r-xr-xr-x  1 root  wheel   510656 Jan 31 12:15 /boot/kernel/if_em.ko
lrwxr-xr-x  1 root  wheel        8 Jan 31 12:15 /boot/kernel/if_igb.ko -> if_em.ko

# ifconfig|grep -E '^(ng|em|igb)'
em0: flags=28943<UP,BROADCAST,RUNNING,PROMISC,SIMPLEX,MULTICAST,PPROMISC> metric 0 mtu 1500
em1: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500
em2: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500
em3: flags=8802<BROADCAST,SIMPLEX,MULTICAST> metric 0 mtu 1500
em4: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500
em5: flags=28943<UP,BROADCAST,RUNNING,PROMISC,SIMPLEX,MULTICAST,PPROMISC> metric 0 mtu 1500
ngeth0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500

@SGC1990 the code? you mean the script? I'm using the pre-canned one here. https://github.com/MonkWho/pfatt/blob/master/bin/pfatt.sh @neydah700 thanks for trying. Same result with the em module. What I did is below. ``` # cat /boot/loader.conf kern.cam.boot_delay=10000 kern.ipc.nmbclusters="1000000" kern.ipc.nmbjumbop="524288" kern.ipc.nmbjumbo9="524288" kern.ipc.semopm=100 kern.ipc.semmni=128 kern.ipc.semmns=32000 kern.ipc.shmmni=4096 if_em="YES" if_em_name="/boot/modules/if_em.ko" boot_multicons="YES" boot_serial="YES" console="comconsole,efi" comconsole_speed="115200" autoboot_delay="3" vm.pmap.pti="0" hw.hn.vf_transparent="0" hw.hn.use_if_start="1" net.link.ifqmaxlen="128" # ls -l /boot/modules/*ko -r-xr-xr-x 1 root wheel 106328 Jan 12 07:44 /boot/modules/bwi_v3_ucode.ko -r-xr-xr-x 1 root wheel 408896 Feb 18 19:14 /boot/modules/if_em.ko -r-xr-xr-x 1 root wheel 222632 Feb 17 18:09 /boot/modules/if_igb.ko -r-xr-xr-x 1 root wheel 147976 Jan 12 07:48 /boot/modules/if_wg.ko # ls -l /boot/kernel/*ko | grep -E 'if_(igb|em)' -r-xr-xr-x 1 root wheel 510656 Jan 31 12:15 /boot/kernel/if_em.ko lrwxr-xr-x 1 root wheel 8 Jan 31 12:15 /boot/kernel/if_igb.ko -> if_em.ko # ifconfig|grep -E '^(ng|em|igb)' em0: flags=28943<UP,BROADCAST,RUNNING,PROMISC,SIMPLEX,MULTICAST,PPROMISC> metric 0 mtu 1500 em1: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500 em2: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500 em3: flags=8802<BROADCAST,SIMPLEX,MULTICAST> metric 0 mtu 1500 em4: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500 em5: flags=28943<UP,BROADCAST,RUNNING,PROMISC,SIMPLEX,MULTICAST,PPROMISC> metric 0 mtu 1500 ngeth0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500 ```
neydah700 commented 2022-02-19 09:09:37 +05:30 (Migrated from github.com)

@bbrendon Meh. I was worried that module wasn't going to work. It is supposed to be a combined igb/em driver but it never loaded properly for me.

If your willing can you run the command below with the module loaded?
sysctl dev.em.0

It should spit out a lot of lines. Do you see any that start with dev.em.0.iflib? If not I think the driver loaded properly and still has the issur. If you do see them I think my em driver isn't working. If you don't see any iflib lines let me know and I'll try compiling an older driver version.

@bbrendon Meh. I was worried that module wasn't going to work. It is supposed to be a combined igb/em driver but it never loaded properly for me. If your willing can you run the command below with the module loaded? `sysctl dev.em.0` It should spit out a lot of lines. Do you see any that start with dev.em.0.iflib? If not I think the driver loaded properly and still has the issur. If you do see them I think my em driver isn't working. If you don't see any iflib lines let me know and I'll try compiling an older driver version.
bbrendon commented 2022-02-20 02:23:51 +05:30 (Migrated from github.com)

@neydah700 SUCCESS! Reviewed it again by reading man pages for loader.conf and I realized I deleted _load from the em line in the conf file. Fat fingers.

Anyway. Fixed the typo and all good.
Thanks for the help and the if_em.ko file!

EDIT. I think dmesg shows em0 differently now. It shows the below which I think is different than previously?

em0: <Intel(R) PRO/1000 Network Connection 7.7.8> port 0xe000-0xe01f mem 0xdf500000-0xdf51ffff,0xdf520000-0xdf523fff irq 16 at device 0.0 on pci1

@neydah700 SUCCESS! Reviewed it again by reading man pages for loader.conf and I realized I deleted _load from the em line in the conf file. Fat fingers. Anyway. Fixed the typo and all good. Thanks for the help and the if_em.ko file! EDIT. I think dmesg shows em0 differently now. It shows the below which I think is different than previously? ``` em0: <Intel(R) PRO/1000 Network Connection 7.7.8> port 0xe000-0xe01f mem 0xdf500000-0xdf51ffff,0xdf520000-0xdf523fff irq 16 at device 0.0 on pci1 ```
neydah700 commented 2022-02-20 02:28:15 +05:30 (Migrated from github.com)

@neydah700 SUCCESS! Reviewed it again by reading man pages for loader.conf and I realized I deleted _load from the em line in the conf file. Fat fingers.

Anyway. Fixed the typo and all good. Thanks for the help and the if_em.ko file!

EDIT. I think dmesg shows em0 differently now. It shows the below which I think is different than previously?

em0: <Intel(R) PRO/1000 Network Connection 7.7.8> port 0xe000-0xe01f mem 0xdf500000-0xdf51ffff,0xdf520000-0xdf523fff irq 16 at device 0.0 on pci1

@bbrendon glad it's working! Did you end up using the if_igb.ko file or the if_em.ko file in the final working version?

Edit: I didn't read your full post, 7.7.8 is the version of the em driver I compiled so it looks like it took!

> @neydah700 SUCCESS! Reviewed it again by reading man pages for loader.conf and I realized I deleted _load from the em line in the conf file. Fat fingers. > > Anyway. Fixed the typo and all good. Thanks for the help and the if_em.ko file! > > EDIT. I think dmesg shows em0 differently now. It shows the below which I think is different than previously? > > ``` > em0: <Intel(R) PRO/1000 Network Connection 7.7.8> port 0xe000-0xe01f mem 0xdf500000-0xdf51ffff,0xdf520000-0xdf523fff irq 16 at device 0.0 on pci1 > ``` @bbrendon glad it's working! Did you end up using the if_igb.ko file or the if_em.ko file in the final working version? Edit: I didn't read your full post, 7.7.8 is the version of the em driver I compiled so it looks like it took!
yovio commented 2022-02-20 06:17:33 +05:30 (Migrated from github.com)

Just want to say thank you to @neydah700 I managed to upgrade mine to 2.6. My system has both em (Intel I219-LM) and igb (Intel 82756). I decided to use both driver compiled by @neydah700.

I use supplicant mode and do fresh 2.6 installation instead of upgrade from 2.5.2

Driver compiled by neydah700:
https://github.com/neydah700/pfsense_intel/raw/main/if_em.ko
https://github.com/neydah700/pfsense_intel/raw/main/if_igb.ko

content of my loader.conf.local

if_em_load="YES"
if_em_name="/boot/modules/if_em.ko"
if_igb_load="YES"
if_igb_name="/boot/modules/if_igb.ko"

Steps:

  1. Do full config backup of my 2.5.2
  2. Backup /conf/pfatt folder
  3. Install fresh 2.6
  4. Enabled ssh
  5. upload both driver (if_em.ko and if_igb.ko) to /boot/modules
  6. upload loader.conf.local to /boot
  7. upload my pfatt folder back into /conf folder
  8. reboot
  9. Check if both driver loaded. I watch boot message or can be seen in dmesg or use kldstat.
    If you check dmesg, em driver should be version 7.7.8 and igb should be 2.5.21
  10. Add early shell command into config.xml
  11. reboot
  12. assign ngeth0 as wan
  13. reboot
  14. At this time your router should have internet connection back
  15. Restore you config
Just want to say thank you to @neydah700 I managed to upgrade mine to 2.6. My system has both em (Intel I219-LM) and igb (Intel 82756). I decided to use both driver compiled by @neydah700. I use supplicant mode and do fresh 2.6 installation instead of upgrade from 2.5.2 Driver compiled by neydah700: https://github.com/neydah700/pfsense_intel/raw/main/if_em.ko https://github.com/neydah700/pfsense_intel/raw/main/if_igb.ko content of my **loader.conf.local** ``` if_em_load="YES" if_em_name="/boot/modules/if_em.ko" if_igb_load="YES" if_igb_name="/boot/modules/if_igb.ko" ``` Steps: 1. Do full config backup of my 2.5.2 2. Backup /conf/pfatt folder 2. Install fresh 2.6 2. Enabled ssh 2. upload both driver (if_em.ko and if_igb.ko) to /boot/modules 3. upload loader.conf.local to /boot 4. upload my pfatt folder back into /conf folder 5. reboot 6. Check if both driver loaded. I watch boot message or can be seen in dmesg or use kldstat. If you check dmesg, em driver should be version 7.7.8 and igb should be 2.5.21 7. Add early shell command into config.xml 8. reboot 9. assign ngeth0 as wan 10. reboot 11. At this time your router should have internet connection back 12. Restore you config
SGC1990 commented 2022-02-20 11:02:05 +05:30 (Migrated from github.com)

Just want to say thank you to @neydah700 I managed to upgrade mine to 2.6. My system has both em (Intel I219-LM) and igb (Intel 82756). I decided to use both driver compiled by @neydah700.

I use supplicant mode and do fresh 2.6 installation instead of upgrade from 2.5.2

Driver compiled by neydah700: https://github.com/neydah700/pfsense_intel/raw/main/if_em.ko https://github.com/neydah700/pfsense_intel/raw/main/if_igb.ko

content of my loader.conf.local

if_em_load="YES"
if_em_name="/boot/modules/if_em.ko"
if_igb_load="YES"
if_igb_name="/boot/modules/if_igb.ko"

Steps:

  1. Do full config backup of my 2.5.2
  2. Backup /conf/pfatt folder
  3. Install fresh 2.6
  4. Enabled ssh
  5. upload both driver (if_em.ko and if_igb.ko) to /boot/modules
  6. upload loader.conf.local to /boot
  7. upload my pfatt folder back into /conf folder
  8. reboot
  9. Check if both driver loaded. I watch boot message or can be seen in dmesg or use kldstat.
    If you check dmesg, em driver should be version 7.7.8 and igb should be 2.5.21
  10. Add early shell command into config.xml
  11. reboot
  12. assign ngeth0 as wan
  13. reboot
  14. At this time your router should have internet connection back
  15. Restore you config

So you have it work without gateway pluged in with certs download from the gateway.

> Just want to say thank you to @neydah700 I managed to upgrade mine to 2.6. My system has both em (Intel I219-LM) and igb (Intel 82756). I decided to use both driver compiled by @neydah700. > > I use supplicant mode and do fresh 2.6 installation instead of upgrade from 2.5.2 > > Driver compiled by neydah700: https://github.com/neydah700/pfsense_intel/raw/main/if_em.ko https://github.com/neydah700/pfsense_intel/raw/main/if_igb.ko > > content of my **loader.conf.local** > > ``` > if_em_load="YES" > if_em_name="/boot/modules/if_em.ko" > if_igb_load="YES" > if_igb_name="/boot/modules/if_igb.ko" > ``` > > Steps: > > 1. Do full config backup of my 2.5.2 > 2. Backup /conf/pfatt folder > 3. Install fresh 2.6 > 4. Enabled ssh > 5. upload both driver (if_em.ko and if_igb.ko) to /boot/modules > 6. upload loader.conf.local to /boot > 7. upload my pfatt folder back into /conf folder > 8. reboot > 9. Check if both driver loaded. I watch boot message or can be seen in dmesg or use kldstat. > If you check dmesg, em driver should be version 7.7.8 and igb should be 2.5.21 > 10. Add early shell command into config.xml > 11. reboot > 12. assign ngeth0 as wan > 13. reboot > 14. At this time your router should have internet connection back > 15. Restore you config So you have it work without gateway pluged in with certs download from the gateway.
grevelle commented 2022-02-20 21:44:03 +05:30 (Migrated from github.com)

@neydah700 SUCCESS! Reviewed it again by reading man pages for loader.conf and I realized I deleted _load from the em line in the conf file. Fat fingers.
Anyway. Fixed the typo and all good. Thanks for the help and the if_em.ko file!
EDIT. I think dmesg shows em0 differently now. It shows the below which I think is different than previously?

em0: <Intel(R) PRO/1000 Network Connection 7.7.8> port 0xe000-0xe01f mem 0xdf500000-0xdf51ffff,0xdf520000-0xdf523fff irq 16 at device 0.0 on pci1

@bbrendon glad it's working! Did you end up using the if_igb.ko file or the if_em.ko file in the final working version?

Edit: I didn't read your full post, 7.7.8 is the version of the em driver I compiled so it looks like it took!

That the solution with the igb drivers + supplicant method works for me. Thank you @neydah700

> > @neydah700 SUCCESS! Reviewed it again by reading man pages for loader.conf and I realized I deleted _load from the em line in the conf file. Fat fingers. > > Anyway. Fixed the typo and all good. Thanks for the help and the if_em.ko file! > > EDIT. I think dmesg shows em0 differently now. It shows the below which I think is different than previously? > > ``` > > em0: <Intel(R) PRO/1000 Network Connection 7.7.8> port 0xe000-0xe01f mem 0xdf500000-0xdf51ffff,0xdf520000-0xdf523fff irq 16 at device 0.0 on pci1 > > ``` > > @bbrendon glad it's working! Did you end up using the if_igb.ko file or the if_em.ko file in the final working version? > > Edit: I didn't read your full post, 7.7.8 is the version of the em driver I compiled so it looks like it took! That the solution with the igb drivers + supplicant method works for me. Thank you @neydah700
bigjohns97 commented 2022-02-20 21:50:02 +05:30 (Migrated from github.com)

@yovio, @grevelle Could you please post the script you are using?

@yovio, @grevelle Could you please post the script you are using?
grevelle commented 2022-02-20 22:01:11 +05:30 (Migrated from github.com)

@yovio, @grevelle Could you please post the script you are using?

I submitted a pull request a while back with an updated procedure for enabling supplicant mode to bypass the AT&T gateway. Here is the script.

> @yovio, @grevelle Could you please post the script you are using? I submitted a [pull request](https://github.com/grevelle/pfatt) a while back with an updated procedure for enabling supplicant mode to bypass the AT&T gateway. Here is the [script](https://github.com/grevelle/pfatt/blob/master/bin/pfatt.sh).
yovio commented 2022-02-20 23:11:28 +05:30 (Migrated from github.com)

@yovio, @grevelle Could you please post the script you are using?

I'm using this script: https://github.com/MonkWho/pfatt/blob/supplicant/bin/pfatt.sh

It's in supplicant branch

> @yovio, @grevelle Could you please post the script you are using? I'm using this script: https://github.com/MonkWho/pfatt/blob/supplicant/bin/pfatt.sh It's in supplicant branch
yovio commented 2022-02-20 23:12:44 +05:30 (Migrated from github.com)

Just want to say thank you to @neydah700 I managed to upgrade mine to 2.6. My system has both em (Intel I219-LM) and igb (Intel 82756). I decided to use both driver compiled by @neydah700.

I use supplicant mode and do fresh 2.6 installation instead of upgrade from 2.5.2

Driver compiled by neydah700: https://github.com/neydah700/pfsense_intel/raw/main/if_em.ko https://github.com/neydah700/pfsense_intel/raw/main/if_igb.ko

content of my loader.conf.local

if_em_load="YES"
if_em_name="/boot/modules/if_em.ko"
if_igb_load="YES"
if_igb_name="/boot/modules/if_igb.ko"

Steps:

  1. Do full config backup of my 2.5.2
  2. Backup /conf/pfatt folder
  3. Install fresh 2.6
  4. Enabled ssh
  5. upload both driver (if_em.ko and if_igb.ko) to /boot/modules
  6. upload loader.conf.local to /boot
  7. upload my pfatt folder back into /conf folder
  8. reboot
  9. Check if both driver loaded. I watch boot message or can be seen in dmesg or use kldstat.
    If you check dmesg, em driver should be version 7.7.8 and igb should be 2.5.21
  10. Add early shell command into config.xml
  11. reboot
  12. assign ngeth0 as wan
  13. reboot
  14. At this time your router should have internet connection back
  15. Restore you config

So you have it work without gateway pluged in with certs download from the gateway.

Yes, people call it wpa_supplicant method.

> > Just want to say thank you to @neydah700 I managed to upgrade mine to 2.6. My system has both em (Intel I219-LM) and igb (Intel 82756). I decided to use both driver compiled by @neydah700. > > > > I use supplicant mode and do fresh 2.6 installation instead of upgrade from 2.5.2 > > > > Driver compiled by neydah700: https://github.com/neydah700/pfsense_intel/raw/main/if_em.ko https://github.com/neydah700/pfsense_intel/raw/main/if_igb.ko > > > > content of my **loader.conf.local** > > > > ``` > > if_em_load="YES" > > if_em_name="/boot/modules/if_em.ko" > > if_igb_load="YES" > > if_igb_name="/boot/modules/if_igb.ko" > > ``` > > > > Steps: > > > > 1. Do full config backup of my 2.5.2 > > 2. Backup /conf/pfatt folder > > 3. Install fresh 2.6 > > 4. Enabled ssh > > 5. upload both driver (if_em.ko and if_igb.ko) to /boot/modules > > 6. upload loader.conf.local to /boot > > 7. upload my pfatt folder back into /conf folder > > 8. reboot > > 9. Check if both driver loaded. I watch boot message or can be seen in dmesg or use kldstat. > > If you check dmesg, em driver should be version 7.7.8 and igb should be 2.5.21 > > 10. Add early shell command into config.xml > > 11. reboot > > 12. assign ngeth0 as wan > > 13. reboot > > 14. At this time your router should have internet connection back > > 15. Restore you config > > So you have it work without gateway pluged in with certs download from the gateway. Yes, people call it wpa_supplicant method.
SGC1990 commented 2022-02-21 00:08:42 +05:30 (Migrated from github.com)

I have gotten wap_supplicant and tethering working. I will post an updated way I have tested on different boxes with intel cards and Onces without and it works with doing the update if you change over to the way I post. I am going to pull all the info together there are lots of different info.

I have gotten wap_supplicant and tethering working. I will post an updated way I have tested on different boxes with intel cards and Onces without and it works with doing the update if you change over to the way I post. I am going to pull all the info together there are lots of different info.
yovio commented 2022-02-21 02:46:22 +05:30 (Migrated from github.com)

In case this might help others. Before my successful attempt above. I did try using upgrade process instead of clean install of 2.6. In that process, I managed to get WAN IP using wpa_supplicant, so unlike most report that failed to get DHCP, I was able to, but for some reason the DNS resolver is not working fine, I did remember try using DNS Forwarder, its slightly better but connection seems really bad. The latest attempt by doing clean install is perfect.

In case this might help others. Before my successful attempt above. I did try using upgrade process instead of clean install of 2.6. In that process, I managed to get WAN IP using wpa_supplicant, so unlike most report that failed to get DHCP, I was able to, but for some reason the DNS resolver is not working fine, I did remember try using DNS Forwarder, its slightly better but connection seems really bad. The latest attempt by doing clean install is perfect.
neydah700 commented 2022-02-21 02:49:31 +05:30 (Migrated from github.com)

In case this might help others. Before my successful attempt above. I did try using upgrade process instead of clean install of 2.6. In that process, I managed to get WAN IP using wpa_supplicant, so unlike most report that failed to get DHCP, I was able to, but for some reason the DNS resolver is not working fine, I did remember try using DNS Forwarder, its slightly better but connection seems really bad. The latest attempt by doing clean install is perfect.

What chipset are your NICs using? Intel NICs seemed to be the only ones effected. In particular igb and em driver cards.

> In case this might help others. Before my successful attempt above. I did try using upgrade process instead of clean install of 2.6. In that process, I managed to get WAN IP using wpa_supplicant, so unlike most report that failed to get DHCP, I was able to, but for some reason the DNS resolver is not working fine, I did remember try using DNS Forwarder, its slightly better but connection seems really bad. The latest attempt by doing clean install is perfect. What chipset are your NICs using? Intel NICs seemed to be the only ones effected. In particular igb and em driver cards.
SGC1990 commented 2022-02-21 04:10:55 +05:30 (Migrated from github.com)

So far, I have uploaded all the files need to do the wpa_supplicant and tethering. I will have the setup info in the next few days.
This works on all systems ranging from intel and beond since the info did not help me that much, I learned how to do it without this info. This is more work. But I have a step-by-step setup, I have tested this on 33 devices so far and they came up first time. Here is the link https://github.com/SGC1990/pfatt

Thanks again neydah700 and bigjohns97

So far, I have uploaded all the files need to do the wpa_supplicant and tethering. I will have the setup info in the next few days. This works on all systems ranging from intel and beond since the info did not help me that much, I learned how to do it without this info. This is more work. But I have a step-by-step setup, I have tested this on 33 devices so far and they came up first time. Here is the link https://github.com/SGC1990/pfatt Thanks again neydah700 and bigjohns97
SGC1990 commented 2022-02-21 04:33:26 +05:30 (Migrated from github.com)

In case this might help others. Before my successful attempt above. I did try using upgrade process instead of clean install of 2.6. In that process, I managed to get WAN IP using wpa_supplicant, so unlike most report that failed to get DHCP, I was able to, but for some reason the DNS resolver is not working fine, I did remember try using DNS Forwarder, its slightly better but connection seems really bad. The latest attempt by doing clean install is perfect.

Show a picture

> In case this might help others. Before my successful attempt above. I did try using upgrade process instead of clean install of 2.6. In that process, I managed to get WAN IP using wpa_supplicant, so unlike most report that failed to get DHCP, I was able to, but for some reason the DNS resolver is not working fine, I did remember try using DNS Forwarder, its slightly better but connection seems really bad. The latest attempt by doing clean install is perfect. Show a picture
SGC1990 commented 2022-02-21 05:08:08 +05:30 (Migrated from github.com)

Supplicant info is a work in progress. but it should be ready for anybody to use. I am here to help if anyone needs it.

Supplicant info is a work in progress. but it should be ready for anybody to use. I am here to help if anyone needs it.
bigjohns97 commented 2022-02-21 05:16:12 +05:30 (Migrated from github.com)

I fear that I am not going to be able to go back to supplicant mode until I extract the certs from my actual RG.

I was using purchased certs which don't match the rg gateway Mac address.

This was never a problem before but seems to be a problem now for whatever reason.

I fear that I am not going to be able to go back to supplicant mode until I extract the certs from my actual RG. I was using purchased certs which don't match the rg gateway Mac address. This was never a problem before but seems to be a problem now for whatever reason.
SGC1990 commented 2022-02-21 05:20:00 +05:30 (Migrated from github.com)

I fear that I am not going to be able to go back to supplicant mode until I extract the certs from my actual RG.

I was using purchased certs which don't match the rg gateway Mac address.

This was never a problem before but seems to be a problem now for whatever reason.

the docs from the supplicant branch has the info to pull the certs from the rg. Takes about 10 mins.

> I fear that I am not going to be able to go back to supplicant mode until I extract the certs from my actual RG. > > I was using purchased certs which don't match the rg gateway Mac address. > > This was never a problem before but seems to be a problem now for whatever reason. the docs from the supplicant branch has the info to pull the certs from the rg. Takes about 10 mins.
bigjohns97 commented 2022-02-21 05:21:58 +05:30 (Migrated from github.com)

I fear that I am not going to be able to go back to supplicant mode until I extract the certs from my actual RG.
I was using purchased certs which don't match the rg gateway Mac address.
This was never a problem before but seems to be a problem now for whatever reason.

the docs from the supplicant branch has the info to pull the certs from the rg. Takes about 10 mins.

I'll check it out, thanks.

> > I fear that I am not going to be able to go back to supplicant mode until I extract the certs from my actual RG. > > I was using purchased certs which don't match the rg gateway Mac address. > > This was never a problem before but seems to be a problem now for whatever reason. > > the docs from the supplicant branch has the info to pull the certs from the rg. Takes about 10 mins. I'll check it out, thanks.
SGC1990 commented 2022-02-21 05:22:39 +05:30 (Migrated from github.com)

I fear that I am not going to be able to go back to supplicant mode until I extract the certs from my actual RG.
I was using purchased certs which don't match the rg gateway Mac address.
This was never a problem before but seems to be a problem now for whatever reason.

the docs from the supplicant branch has the info to pull the certs from the rg. Takes about 10 mins.

I'll check it out, thanks.

you do not even have to take the internet down just connect to wifi on the rg and then follow the docs just make sure to download Python3 for windows first.

> > > I fear that I am not going to be able to go back to supplicant mode until I extract the certs from my actual RG. > > > I was using purchased certs which don't match the rg gateway Mac address. > > > This was never a problem before but seems to be a problem now for whatever reason. > > > > > > the docs from the supplicant branch has the info to pull the certs from the rg. Takes about 10 mins. > > I'll check it out, thanks. you do not even have to take the internet down just connect to wifi on the rg and then follow the docs just make sure to download Python3 for windows first.
bigjohns97 commented 2022-02-21 06:16:26 +05:30 (Migrated from github.com)

I fear that I am not going to be able to go back to supplicant mode until I extract the certs from my actual RG.
I was using purchased certs which don't match the rg gateway Mac address.
This was never a problem before but seems to be a problem now for whatever reason.

the docs from the supplicant branch has the info to pull the certs from the rg. Takes about 10 mins.

I'll check it out, thanks.

you do not even have to take the internet down just connect to wifi on the rg and then follow the docs just make sure to download Python3 for windows first.

I am not familiar with this method, can you link me to the doc?

The only one I know about is from devicelocksmith which requires root to the device or a soldiering gun.

> > > > I fear that I am not going to be able to go back to supplicant mode until I extract the certs from my actual RG. > > > > I was using purchased certs which don't match the rg gateway Mac address. > > > > This was never a problem before but seems to be a problem now for whatever reason. > > > > > > > > > the docs from the supplicant branch has the info to pull the certs from the rg. Takes about 10 mins. > > > > > > I'll check it out, thanks. > > you do not even have to take the internet down just connect to wifi on the rg and then follow the docs just make sure to download Python3 for windows first. I am not familiar with this method, can you link me to the doc? The only one I know about is from devicelocksmith which requires root to the device or a soldiering gun.
SGC1990 commented 2022-02-21 06:19:29 +05:30 (Migrated from github.com)

I fear that I am not going to be able to go back to supplicant mode until I extract the certs from my actual RG.
I was using purchased certs which don't match the rg gateway Mac address.
This was never a problem before but seems to be a problem now for whatever reason.

the docs from the supplicant branch has the info to pull the certs from the rg. Takes about 10 mins.

I'll check it out, thanks.

you do not even have to take the internet down just connect to wifi on the rg and then follow the docs just make sure to download Python3 for windows first.

I am not familiar with this method, can you link me to the doc?

The only one I know about is from devicelocksmith which requires root to the device or a soldiering gun.

Here is the link https://github.com/SGC1990/pfatt/tree/supplicant

No Soldiering required.

> > > > > I fear that I am not going to be able to go back to supplicant mode until I extract the certs from my actual RG. > > > > > I was using purchased certs which don't match the rg gateway Mac address. > > > > > This was never a problem before but seems to be a problem now for whatever reason. > > > > > > > > > > > > the docs from the supplicant branch has the info to pull the certs from the rg. Takes about 10 mins. > > > > > > > > > I'll check it out, thanks. > > > > > > you do not even have to take the internet down just connect to wifi on the rg and then follow the docs just make sure to download Python3 for windows first. > > I am not familiar with this method, can you link me to the doc? > > The only one I know about is from devicelocksmith which requires root to the device or a soldiering gun. Here is the link https://github.com/SGC1990/pfatt/tree/supplicant No Soldiering required.
bigjohns97 commented 2022-02-21 06:59:19 +05:30 (Migrated from github.com)

I fear that I am not going to be able to go back to supplicant mode until I extract the certs from my actual RG.
I was using purchased certs which don't match the rg gateway Mac address.
This was never a problem before but seems to be a problem now for whatever reason.

the docs from the supplicant branch has the info to pull the certs from the rg. Takes about 10 mins.

I'll check it out, thanks.

you do not even have to take the internet down just connect to wifi on the rg and then follow the docs just make sure to download Python3 for windows first.

I am not familiar with this method, can you link me to the doc?
The only one I know about is from devicelocksmith which requires root to the device or a soldiering gun.

Here is the link https://github.com/SGC1990/pfatt/tree/supplicant

No Soldiering required.

Looks like it won't take 1.0.29 due to "incompatibility"

Is this what 2.7.7 is for?

Do I load 2.7.7 and then load 1.0.29?

> > > > > > I fear that I am not going to be able to go back to supplicant mode until I extract the certs from my actual RG. > > > > > > I was using purchased certs which don't match the rg gateway Mac address. > > > > > > This was never a problem before but seems to be a problem now for whatever reason. > > > > > > > > > > > > > > > the docs from the supplicant branch has the info to pull the certs from the rg. Takes about 10 mins. > > > > > > > > > > > > I'll check it out, thanks. > > > > > > > > > you do not even have to take the internet down just connect to wifi on the rg and then follow the docs just make sure to download Python3 for windows first. > > > > > > I am not familiar with this method, can you link me to the doc? > > The only one I know about is from devicelocksmith which requires root to the device or a soldiering gun. > > Here is the link https://github.com/SGC1990/pfatt/tree/supplicant > > No Soldiering required. Looks like it won't take 1.0.29 due to "incompatibility" Is this what 2.7.7 is for? Do I load 2.7.7 and then load 1.0.29?
SGC1990 commented 2022-02-21 07:00:53 +05:30 (Migrated from github.com)

I fear that I am not going to be able to go back to supplicant mode until I extract the certs from my actual RG.
I was using purchased certs which don't match the rg gateway Mac address.
This was never a problem before but seems to be a problem now for whatever reason.

the docs from the supplicant branch has the info to pull the certs from the rg. Takes about 10 mins.

I'll check it out, thanks.

you do not even have to take the internet down just connect to wifi on the rg and then follow the docs just make sure to download Python3 for windows first.

I am not familiar with this method, can you link me to the doc?
The only one I know about is from devicelocksmith which requires root to the device or a soldiering gun.

Here is the link https://github.com/SGC1990/pfatt/tree/supplicant
No Soldiering required.

Looks like it won't take 1.0.29 due to "incompatibility"

Is this what 2.7.7 is for?

Do I load 2.7.7 and then load 1.0.29?

just load 1.0.29 and leave it, 2.7.7 is if you wont to go back.

> > > > > > > I fear that I am not going to be able to go back to supplicant mode until I extract the certs from my actual RG. > > > > > > > I was using purchased certs which don't match the rg gateway Mac address. > > > > > > > This was never a problem before but seems to be a problem now for whatever reason. > > > > > > > > > > > > > > > > > > the docs from the supplicant branch has the info to pull the certs from the rg. Takes about 10 mins. > > > > > > > > > > > > > > > I'll check it out, thanks. > > > > > > > > > > > > you do not even have to take the internet down just connect to wifi on the rg and then follow the docs just make sure to download Python3 for windows first. > > > > > > > > > I am not familiar with this method, can you link me to the doc? > > > The only one I know about is from devicelocksmith which requires root to the device or a soldiering gun. > > > > > > Here is the link https://github.com/SGC1990/pfatt/tree/supplicant > > No Soldiering required. > > Looks like it won't take 1.0.29 due to "incompatibility" > > Is this what 2.7.7 is for? > > Do I load 2.7.7 and then load 1.0.29? just load 1.0.29 and leave it, 2.7.7 is if you wont to go back.
SGC1990 commented 2022-02-21 07:01:40 +05:30 (Migrated from github.com)

I fear that I am not going to be able to go back to supplicant mode until I extract the certs from my actual RG.
I was using purchased certs which don't match the rg gateway Mac address.
This was never a problem before but seems to be a problem now for whatever reason.

the docs from the supplicant branch has the info to pull the certs from the rg. Takes about 10 mins.

I'll check it out, thanks.

you do not even have to take the internet down just connect to wifi on the rg and then follow the docs just make sure to download Python3 for windows first.

I am not familiar with this method, can you link me to the doc?
The only one I know about is from devicelocksmith which requires root to the device or a soldiering gun.

Here is the link https://github.com/SGC1990/pfatt/tree/supplicant
No Soldiering required.

Looks like it won't take 1.0.29 due to "incompatibility"

Is this what 2.7.7 is for?

Do I load 2.7.7 and then load 1.0.29?

hold it witch modle do you have

> > > > > > > I fear that I am not going to be able to go back to supplicant mode until I extract the certs from my actual RG. > > > > > > > I was using purchased certs which don't match the rg gateway Mac address. > > > > > > > This was never a problem before but seems to be a problem now for whatever reason. > > > > > > > > > > > > > > > > > > the docs from the supplicant branch has the info to pull the certs from the rg. Takes about 10 mins. > > > > > > > > > > > > > > > I'll check it out, thanks. > > > > > > > > > > > > you do not even have to take the internet down just connect to wifi on the rg and then follow the docs just make sure to download Python3 for windows first. > > > > > > > > > I am not familiar with this method, can you link me to the doc? > > > The only one I know about is from devicelocksmith which requires root to the device or a soldiering gun. > > > > > > Here is the link https://github.com/SGC1990/pfatt/tree/supplicant > > No Soldiering required. > > Looks like it won't take 1.0.29 due to "incompatibility" > > Is this what 2.7.7 is for? > > Do I load 2.7.7 and then load 1.0.29? hold it witch modle do you have
bigjohns97 commented 2022-02-21 07:02:24 +05:30 (Migrated from github.com)

I fear that I am not going to be able to go back to supplicant mode until I extract the certs from my actual RG.
I was using purchased certs which don't match the rg gateway Mac address.
This was never a problem before but seems to be a problem now for whatever reason.

the docs from the supplicant branch has the info to pull the certs from the rg. Takes about 10 mins.

I'll check it out, thanks.

you do not even have to take the internet down just connect to wifi on the rg and then follow the docs just make sure to download Python3 for windows first.

I am not familiar with this method, can you link me to the doc?
The only one I know about is from devicelocksmith which requires root to the device or a soldiering gun.

Here is the link https://github.com/SGC1990/pfatt/tree/supplicant
No Soldiering required.

Looks like it won't take 1.0.29 due to "incompatibility"
Is this what 2.7.7 is for?
Do I load 2.7.7 and then load 1.0.29?

hold it witch modle do you have

BGW210-700

> > > > > > > > I fear that I am not going to be able to go back to supplicant mode until I extract the certs from my actual RG. > > > > > > > > I was using purchased certs which don't match the rg gateway Mac address. > > > > > > > > This was never a problem before but seems to be a problem now for whatever reason. > > > > > > > > > > > > > > > > > > > > > the docs from the supplicant branch has the info to pull the certs from the rg. Takes about 10 mins. > > > > > > > > > > > > > > > > > > I'll check it out, thanks. > > > > > > > > > > > > > > > you do not even have to take the internet down just connect to wifi on the rg and then follow the docs just make sure to download Python3 for windows first. > > > > > > > > > > > > I am not familiar with this method, can you link me to the doc? > > > > The only one I know about is from devicelocksmith which requires root to the device or a soldiering gun. > > > > > > > > > Here is the link https://github.com/SGC1990/pfatt/tree/supplicant > > > No Soldiering required. > > > > > > Looks like it won't take 1.0.29 due to "incompatibility" > > Is this what 2.7.7 is for? > > Do I load 2.7.7 and then load 1.0.29? > > hold it witch modle do you have BGW210-700
SGC1990 commented 2022-02-21 07:03:32 +05:30 (Migrated from github.com)

I fear that I am not going to be able to go back to supplicant mode until I extract the certs from my actual RG.
I was using purchased certs which don't match the rg gateway Mac address.
This was never a problem before but seems to be a problem now for whatever reason.

the docs from the supplicant branch has the info to pull the certs from the rg. Takes about 10 mins.

I'll check it out, thanks.

you do not even have to take the internet down just connect to wifi on the rg and then follow the docs just make sure to download Python3 for windows first.

I am not familiar with this method, can you link me to the doc?
The only one I know about is from devicelocksmith which requires root to the device or a soldiering gun.

Here is the link https://github.com/SGC1990/pfatt/tree/supplicant
No Soldiering required.

Looks like it won't take 1.0.29 due to "incompatibility"
Is this what 2.7.7 is for?
Do I load 2.7.7 and then load 1.0.29?

hold it witch model do you have

BGW210-700

what verison is on the device now..

> > > > > > > > > I fear that I am not going to be able to go back to supplicant mode until I extract the certs from my actual RG. > > > > > > > > > I was using purchased certs which don't match the rg gateway Mac address. > > > > > > > > > This was never a problem before but seems to be a problem now for whatever reason. > > > > > > > > > > > > > > > > > > > > > > > > the docs from the supplicant branch has the info to pull the certs from the rg. Takes about 10 mins. > > > > > > > > > > > > > > > > > > > > > I'll check it out, thanks. > > > > > > > > > > > > > > > > > > you do not even have to take the internet down just connect to wifi on the rg and then follow the docs just make sure to download Python3 for windows first. > > > > > > > > > > > > > > > I am not familiar with this method, can you link me to the doc? > > > > > The only one I know about is from devicelocksmith which requires root to the device or a soldiering gun. > > > > > > > > > > > > Here is the link https://github.com/SGC1990/pfatt/tree/supplicant > > > > No Soldiering required. > > > > > > > > > Looks like it won't take 1.0.29 due to "incompatibility" > > > Is this what 2.7.7 is for? > > > Do I load 2.7.7 and then load 1.0.29? > > > > > > hold it witch model do you have > > BGW210-700 what verison is on the device now..
bigjohns97 commented 2022-02-21 07:08:28 +05:30 (Migrated from github.com)

I fear that I am not going to be able to go back to supplicant mode until I extract the certs from my actual RG.
I was using purchased certs which don't match the rg gateway Mac address.
This was never a problem before but seems to be a problem now for whatever reason.

the docs from the supplicant branch has the info to pull the certs from the rg. Takes about 10 mins.

I'll check it out, thanks.

you do not even have to take the internet down just connect to wifi on the rg and then follow the docs just make sure to download Python3 for windows first.

I am not familiar with this method, can you link me to the doc?
The only one I know about is from devicelocksmith which requires root to the device or a soldiering gun.

Here is the link https://github.com/SGC1990/pfatt/tree/supplicant
No Soldiering required.

Looks like it won't take 1.0.29 due to "incompatibility"
Is this what 2.7.7 is for?
Do I load 2.7.7 and then load 1.0.29?

hold it witch model do you have

BGW210-700

what verison is on the device now..

2.16.4

> > > > > > > > > > I fear that I am not going to be able to go back to supplicant mode until I extract the certs from my actual RG. > > > > > > > > > > I was using purchased certs which don't match the rg gateway Mac address. > > > > > > > > > > This was never a problem before but seems to be a problem now for whatever reason. > > > > > > > > > > > > > > > > > > > > > > > > > > > the docs from the supplicant branch has the info to pull the certs from the rg. Takes about 10 mins. > > > > > > > > > > > > > > > > > > > > > > > > I'll check it out, thanks. > > > > > > > > > > > > > > > > > > > > > you do not even have to take the internet down just connect to wifi on the rg and then follow the docs just make sure to download Python3 for windows first. > > > > > > > > > > > > > > > > > > I am not familiar with this method, can you link me to the doc? > > > > > > The only one I know about is from devicelocksmith which requires root to the device or a soldiering gun. > > > > > > > > > > > > > > > Here is the link https://github.com/SGC1990/pfatt/tree/supplicant > > > > > No Soldiering required. > > > > > > > > > > > > Looks like it won't take 1.0.29 due to "incompatibility" > > > > Is this what 2.7.7 is for? > > > > Do I load 2.7.7 and then load 1.0.29? > > > > > > > > > hold it witch model do you have > > > > > > BGW210-700 > > what verison is on the device now.. 2.16.4
SGC1990 commented 2022-02-21 07:09:44 +05:30 (Migrated from github.com)

I fear that I am not going to be able to go back to supplicant mode until I extract the certs from my actual RG.
I was using purchased certs which don't match the rg gateway Mac address.
This was never a problem before but seems to be a problem now for whatever reason.

the docs from the supplicant branch has the info to pull the certs from the rg. Takes about 10 mins.

I'll check it out, thanks.

you do not even have to take the internet down just connect to wifi on the rg and then follow the docs just make sure to download Python3 for windows first.

I am not familiar with this method, can you link me to the doc?
The only one I know about is from devicelocksmith which requires root to the device or a soldiering gun.

Here is the link https://github.com/SGC1990/pfatt/tree/supplicant
No Soldiering required.

Looks like it won't take 1.0.29 due to "incompatibility"
Is this what 2.7.7 is for?
Do I load 2.7.7 and then load 1.0.29?

hold it witch model do you have

BGW210-700

what verison is on the device now..

2.16.4

try to down grade to 2.7.7

> > > > > > > > > > > I fear that I am not going to be able to go back to supplicant mode until I extract the certs from my actual RG. > > > > > > > > > > > I was using purchased certs which don't match the rg gateway Mac address. > > > > > > > > > > > This was never a problem before but seems to be a problem now for whatever reason. > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > the docs from the supplicant branch has the info to pull the certs from the rg. Takes about 10 mins. > > > > > > > > > > > > > > > > > > > > > > > > > > > I'll check it out, thanks. > > > > > > > > > > > > > > > > > > > > > > > > you do not even have to take the internet down just connect to wifi on the rg and then follow the docs just make sure to download Python3 for windows first. > > > > > > > > > > > > > > > > > > > > > I am not familiar with this method, can you link me to the doc? > > > > > > > The only one I know about is from devicelocksmith which requires root to the device or a soldiering gun. > > > > > > > > > > > > > > > > > > Here is the link https://github.com/SGC1990/pfatt/tree/supplicant > > > > > > No Soldiering required. > > > > > > > > > > > > > > > Looks like it won't take 1.0.29 due to "incompatibility" > > > > > Is this what 2.7.7 is for? > > > > > Do I load 2.7.7 and then load 1.0.29? > > > > > > > > > > > > hold it witch model do you have > > > > > > > > > BGW210-700 > > > > > > what verison is on the device now.. > > 2.16.4 try to down grade to 2.7.7
bigjohns97 commented 2022-02-21 07:12:18 +05:30 (Migrated from github.com)

I fear that I am not going to be able to go back to supplicant mode until I extract the certs from my actual RG.
I was using purchased certs which don't match the rg gateway Mac address.
This was never a problem before but seems to be a problem now for whatever reason.

the docs from the supplicant branch has the info to pull the certs from the rg. Takes about 10 mins.

I'll check it out, thanks.

you do not even have to take the internet down just connect to wifi on the rg and then follow the docs just make sure to download Python3 for windows first.

I am not familiar with this method, can you link me to the doc?
The only one I know about is from devicelocksmith which requires root to the device or a soldiering gun.

Here is the link https://github.com/SGC1990/pfatt/tree/supplicant
No Soldiering required.

Looks like it won't take 1.0.29 due to "incompatibility"
Is this what 2.7.7 is for?
Do I load 2.7.7 and then load 1.0.29?

hold it witch model do you have

BGW210-700

what verison is on the device now..

2.16.4

try to down grade to 2.7.7

Same message

Firmware Upgrade failed due to version incompatibility.

> > > > > > > > > > > > I fear that I am not going to be able to go back to supplicant mode until I extract the certs from my actual RG. > > > > > > > > > > > > I was using purchased certs which don't match the rg gateway Mac address. > > > > > > > > > > > > This was never a problem before but seems to be a problem now for whatever reason. > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > the docs from the supplicant branch has the info to pull the certs from the rg. Takes about 10 mins. > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > I'll check it out, thanks. > > > > > > > > > > > > > > > > > > > > > > > > > > > you do not even have to take the internet down just connect to wifi on the rg and then follow the docs just make sure to download Python3 for windows first. > > > > > > > > > > > > > > > > > > > > > > > > I am not familiar with this method, can you link me to the doc? > > > > > > > > The only one I know about is from devicelocksmith which requires root to the device or a soldiering gun. > > > > > > > > > > > > > > > > > > > > > Here is the link https://github.com/SGC1990/pfatt/tree/supplicant > > > > > > > No Soldiering required. > > > > > > > > > > > > > > > > > > Looks like it won't take 1.0.29 due to "incompatibility" > > > > > > Is this what 2.7.7 is for? > > > > > > Do I load 2.7.7 and then load 1.0.29? > > > > > > > > > > > > > > > hold it witch model do you have > > > > > > > > > > > > BGW210-700 > > > > > > > > > what verison is on the device now.. > > > > > > 2.16.4 > > try to down grade to 2.7.7 Same message Firmware Upgrade failed due to version incompatibility.
bigjohns97 commented 2022-02-21 07:20:02 +05:30 (Migrated from github.com)

https://www.reddit.com/r/ATT/comments/ouzll8/downgrade_bgw210700_on_firmware_2134_for_wpa/

Looks like this is when it started, no more custom firmwares.

https://www.reddit.com/r/ATT/comments/ouzll8/downgrade_bgw210700_on_firmware_2134_for_wpa/ Looks like this is when it started, no more custom firmwares.
SGC1990 commented 2022-02-21 07:49:32 +05:30 (Migrated from github.com)

BGW210-700

I wiill look into it and get back to you.

> BGW210-700 I wiill look into it and get back to you.
yovio commented 2022-02-21 19:25:34 +05:30 (Migrated from github.com)

em (Intel I219-LM) and igb (Intel 82756)

In case this might help others. Before my successful attempt above. I did try using upgrade process instead of clean install of 2.6. In that process, I managed to get WAN IP using wpa_supplicant, so unlike most report that failed to get DHCP, I was able to, but for some reason the DNS resolver is not working fine, I did remember try using DNS Forwarder, its slightly better but connection seems really bad. The latest attempt by doing clean install is perfect.

What chipset are your NICs using? Intel NICs seemed to be the only ones effected. In particular igb and em driver cards.
@neydah700
em (Intel I219-LM) --> WAN
igb (Intel 82756) x 4 ports --> LANs

> em (Intel I219-LM) and igb (Intel 82756) > > In case this might help others. Before my successful attempt above. I did try using upgrade process instead of clean install of 2.6. In that process, I managed to get WAN IP using wpa_supplicant, so unlike most report that failed to get DHCP, I was able to, but for some reason the DNS resolver is not working fine, I did remember try using DNS Forwarder, its slightly better but connection seems really bad. The latest attempt by doing clean install is perfect. > > What chipset are your NICs using? Intel NICs seemed to be the only ones effected. In particular igb and em driver cards. @neydah700 em (Intel I219-LM) --> WAN igb (Intel 82756) x 4 ports --> LANs
MasterJubei commented 2022-02-22 03:22:20 +05:30 (Migrated from github.com)

Okay, I got everything up and working on my regular Intel NIC. I’m not the biggest expert here so bear with me.

Through troubleshooting I was able to get every non-Intel NIC to authenticate and pull DHCP. After more testing all igb(4) driver-based cards failed. In the /boot/kernel folder I noticed if_igb.ko is simply a shortcut to the em(4) driver (if_em.ko). I am guessing FreeBSD is using this combined driver from intel? https://www.intel.com/content/www/us/en/download/15187/intel-network-adapter-gigabit-base-driver-for-freebsd.html

Alternatively, I found this driver that appears to be for igb(4) separately, and it seems newer. https://www.intel.com/content/www/us/en/download/14610/intel-network-adapter-driver-for-82575-6-and-82580-based-gigabit-network-connections-under-freebsd.html?wapkw=i350%20freebsd

I downloaded a FreeBSD-12.3 VM, its related source code (amd64), and complied the separate igb(4) driver.

I loaded my newly compiled if_igb.ko into the /boot/modules folder with chmod 555 permissions. Next, I added the following two lines to my /boot/loader.conf file to supersede the included driver.

if_igb_load="YES" if_igb_name="/boot/modules/if_igb.ko"

Rebooted and everything came up just fine!

Feel free to use my compiled if_igb.ko if you don’t want to build your own. https://github.com/neydah700/pfsense_intel/blob/main/if_igb.ko

Also, for reference here is my pfatt script if anyone needs a reference. https://github.com/neydah700/pfsense_intel/blob/main/pfatt_intel.sh

A few notes:

  1. When I clean installed 2.6.0 (and 22.01 on my pfSense+ Box) absolutely nothing I did allowed my pfatt script to runs successfully from the /cf/conf directory. I ended up moving it to /root/pfatt and everything worked. This seemed to only be an issue once I moved to a ZFS file system but who knows.
  2. I have an angry family since our internet has been up and down for a few days now.

Great thanks this seems to work. I am on the bypass method, not the WPA one and this seemed to have done the trick as far as I know. I rebooted pfsense and it still wouldn't work, but after rebooting my BGW210(while pfsense was running) then everything started to work.

So I do not know if I actually needed the driver technically, but I am sure I did.

I am using an em Intel adapter and it loads just fine

 5    1 0xffffffff840ca000    63428 if_em.ko (/boot/modules/if_em.ko)
        Contains modules:
                 Id Name
                  8 pci/lem
                  7 pci/em

Now to remember that I installed this driver a few years from now ;)

> Okay, I got everything up and working on my regular Intel NIC. I’m not the biggest expert here so bear with me. > > Through troubleshooting I was able to get every non-Intel NIC to authenticate and pull DHCP. After more testing all igb(4) driver-based cards failed. In the /boot/kernel folder I noticed if_igb.ko is simply a shortcut to the em(4) driver (if_em.ko). I am guessing FreeBSD is using this combined driver from intel? https://www.intel.com/content/www/us/en/download/15187/intel-network-adapter-gigabit-base-driver-for-freebsd.html > > Alternatively, I found this driver that appears to be for igb(4) separately, and it seems newer. https://www.intel.com/content/www/us/en/download/14610/intel-network-adapter-driver-for-82575-6-and-82580-based-gigabit-network-connections-under-freebsd.html?wapkw=i350%20freebsd > > I downloaded a FreeBSD-12.3 VM, its related source code (amd64), and complied the separate igb(4) driver. > > I loaded my newly compiled if_igb.ko into the /boot/modules folder with chmod 555 permissions. Next, I added the following two lines to my /boot/loader.conf file to supersede the included driver. > > if_igb_load="YES" if_igb_name="/boot/modules/if_igb.ko" > > Rebooted and everything came up just fine! > > Feel free to use my compiled if_igb.ko if you don’t want to build your own. https://github.com/neydah700/pfsense_intel/blob/main/if_igb.ko > > Also, for reference here is my pfatt script if anyone needs a reference. https://github.com/neydah700/pfsense_intel/blob/main/pfatt_intel.sh > > A few notes: > > 1. When I clean installed 2.6.0 (and 22.01 on my pfSense+ Box) absolutely nothing I did allowed my pfatt script to runs successfully from the /cf/conf directory. I ended up moving it to /root/pfatt and everything worked. This seemed to only be an issue once I moved to a ZFS file system but who knows. > 2. I have an angry family since our internet has been up and down for a few days now. Great thanks this seems to work. I am on the bypass method, not the WPA one and this seemed to have done the trick as far as I know. I rebooted pfsense and it still wouldn't work, but after rebooting my BGW210(while pfsense was running) then everything started to work. So I do not know if I actually needed the driver technically, but I am sure I did. I am using an em Intel adapter and it loads just fine ``` 5 1 0xffffffff840ca000 63428 if_em.ko (/boot/modules/if_em.ko) Contains modules: Id Name 8 pci/lem 7 pci/em ``` Now to remember that I installed this driver a few years from now ;)
justinledwards commented 2022-03-04 01:41:59 +05:30 (Migrated from github.com)

Confirmed that the -vlanhwtag -vlanhwfilter -vlanhwtso on ifconfig worked on both 22.1 and 22.1.2_1 for me.

Confirmed that the -vlanhwtag -vlanhwfilter -vlanhwtso on ifconfig worked on both 22.1 and 22.1.2_1 for me.
SultanSGillani commented 2022-03-06 23:34:54 +05:30 (Migrated from github.com)

I can't seem to upgrade my NVG589 to the firmware in the linked repository.

Seems like I get firmware incompatibility issues.

I can't seem to upgrade my NVG589 to the firmware in the linked repository. Seems like I get firmware incompatibility issues.
bigjohns97 commented 2022-03-07 00:10:19 +05:30 (Migrated from github.com)

I can't seem to upgrade my NVG589 to the firmware in the linked repository.

Seems like I get firmware incompatibility issues.

They have blocked this by not allowing custom firmware.

> I can't seem to upgrade my NVG589 to the firmware in the linked repository. > > Seems like I get firmware incompatibility issues. They have blocked this by not allowing custom firmware.
SultanSGillani commented 2022-03-07 00:11:49 +05:30 (Migrated from github.com)

So then what do we do? I have to stick to the bridge mode then yes? I have the Pace currently.

So then what do we do? I have to stick to the bridge mode then yes? I have the Pace currently.
bigjohns97 commented 2022-03-07 00:50:09 +05:30 (Migrated from github.com)

So then what do we do? I have to stick to the bridge mode then yes? I have the Pace currently.

I have had to stick to bridge mode, wish I would have known about how easy it was to extract certs before ATT blocked this option.

> So then what do we do? I have to stick to the bridge mode then yes? I have the Pace currently. I have had to stick to bridge mode, wish I would have known about how easy it was to extract certs before ATT blocked this option.
SultanSGillani commented 2022-03-07 02:07:59 +05:30 (Migrated from github.com)

Wow, that is unfortunate. Would have saved me some money on ebay. Good thing this worked for me as well:

Confirmed that the -vlanhwtag -vlanhwfilter -vlanhwtso on ifconfig worked on both 22.1 and 22.1.2_1 for me.

Hopefully I wont keep having regular downtimes anymore.

Wow, that is unfortunate. Would have saved me some money on ebay. Good thing this worked for me as well: > Confirmed that the -vlanhwtag -vlanhwfilter -vlanhwtso on ifconfig worked on both 22.1 and 22.1.2_1 for me. Hopefully I wont keep having regular downtimes anymore.
bigjohns97 commented 2022-03-07 03:54:39 +05:30 (Migrated from github.com)

Wow, that is unfortunate. Would have saved me some money on ebay. Good thing this worked for me as well:

Confirmed that the -vlanhwtag -vlanhwfilter -vlanhwtso on ifconfig worked on both 22.1 and 22.1.2_1 for me.

Hopefully I wont keep having regular downtimes anymore.

That worked on pfsense?

> Wow, that is unfortunate. Would have saved me some money on ebay. Good thing this worked for me as well: > > > Confirmed that the -vlanhwtag -vlanhwfilter -vlanhwtso on ifconfig worked on both 22.1 and 22.1.2_1 for me. > > Hopefully I wont keep having regular downtimes anymore. That worked on pfsense?
SultanSGillani commented 2022-03-07 07:38:53 +05:30 (Migrated from github.com)

Wow, that is unfortunate. Would have saved me some money on ebay. Good thing this worked for me as well:

Confirmed that the -vlanhwtag -vlanhwfilter -vlanhwtso on ifconfig worked on both 22.1 and 22.1.2_1 for me.

Hopefully I wont keep having regular downtimes anymore.

That worked on pfsense?

Sorry, this was on opnsense, latest version with an intel NIC.

> > Wow, that is unfortunate. Would have saved me some money on ebay. Good thing this worked for me as well: > > > > > > > Confirmed that the -vlanhwtag -vlanhwfilter -vlanhwtso on ifconfig worked on both 22.1 and 22.1.2_1 for me. > > > > > > Hopefully I wont keep having regular downtimes anymore. > > > > That worked on pfsense? Sorry, this was on opnsense, latest version with an intel NIC.
johnavich commented 2022-03-08 03:24:06 +05:30 (Migrated from github.com)

has anyone had this issue with realtek devices (re0/re1)? its not using the if_em drivers.

has anyone had this issue with realtek devices (re0/re1)? its not using the if_em drivers.
SultanSGillani commented 2022-03-08 03:36:00 +05:30 (Migrated from github.com)

Can we confirm you can't use the supplicant since you can't revert old att boxes to specific firmware?

I bought a NVG589 and can't update the firmware. There seems to be a lot
of incorrect information in many places for the supplicant setup.

Can we confirm you can't use the supplicant since you can't revert old att boxes to specific firmware? I bought a NVG589 and can't update the firmware. There seems to be a lot of incorrect information in many places for the supplicant setup.
SultanSGillani commented 2022-03-08 03:54:07 +05:30 (Migrated from github.com)

I can't seem to upgrade my NVG589 to the firmware in the linked repository.
Seems like I get firmware incompatibility issues.

They have blocked this by not allowing custom firmware.

Also, I have not seen this anywhere. Where have you heard this? I am confused as I have never seen this in any of the issues here.

> > I can't seem to upgrade my NVG589 to the firmware in the linked repository. > > Seems like I get firmware incompatibility issues. > > They have blocked this by not allowing custom firmware. Also, I have not seen this anywhere. Where have you heard this? I am confused as I have never seen this in any of the issues here.
bigjohns97 commented 2022-03-08 03:58:24 +05:30 (Migrated from github.com)

I can't seem to upgrade my NVG589 to the firmware in the linked repository.
Seems like I get firmware incompatibility issues.

They have blocked this by not allowing custom firmware.

Also, I have not seen this anywhere. Where have you heard this? I am confused as I have never seen this in any of the issues here.

https://www.reddit.com/r/ATT/comments/ouzll8/downgrade_bgw210700_on_firmware_2134_for_wpa/

I also tried applying the firmware posted to my own device and found the error message that led me to the above reddit thread.

> > > I can't seem to upgrade my NVG589 to the firmware in the linked repository. > > > Seems like I get firmware incompatibility issues. > > > > > > They have blocked this by not allowing custom firmware. > > Also, I have not seen this anywhere. Where have you heard this? I am confused as I have never seen this in any of the issues here. https://www.reddit.com/r/ATT/comments/ouzll8/downgrade_bgw210700_on_firmware_2134_for_wpa/ I also tried applying the firmware posted to my own device and found the error message that led me to the above reddit thread.
SultanSGillani commented 2022-03-08 04:05:09 +05:30 (Migrated from github.com)

I can't seem to upgrade my NVG589 to the firmware in the linked repository.
Seems like I get firmware incompatibility issues.

They have blocked this by not allowing custom firmware.

Also, I have not seen this anywhere. Where have you heard this? I am confused as I have never seen this in any of the issues here.

https://www.reddit.com/r/ATT/comments/ouzll8/downgrade_bgw210700_on_firmware_2134_for_wpa/

I also tried applying the firmware posted to my own device and found the error message that led me to the above reddit thread.

Is there a reason why this is not mentioned anywhere?

Is this because of secrecy or something? If so thats fine. I have talked to ATT tech support mentioning their horrific service, and will be getting a BGW210-700.
Bridge mode for the PACE is a nightmare so maybe bridge mode for the BGW will be better I guess.

Just to add here, I have not mentioned anything in regards to this. I just told them that the PACE is shit.

> > > > I can't seem to upgrade my NVG589 to the firmware in the linked repository. > > > > Seems like I get firmware incompatibility issues. > > > > > > > > > They have blocked this by not allowing custom firmware. > > > > > > Also, I have not seen this anywhere. Where have you heard this? I am confused as I have never seen this in any of the issues here. > > https://www.reddit.com/r/ATT/comments/ouzll8/downgrade_bgw210700_on_firmware_2134_for_wpa/ > > I also tried applying the firmware posted to my own device and found the error message that led me to the above reddit thread. Is there a reason why this is not mentioned anywhere? Is this because of secrecy or something? If so thats fine. I have talked to ATT tech support mentioning their horrific service, and will be getting a BGW210-700. Bridge mode for the PACE is a nightmare so maybe bridge mode for the BGW will be better I guess. Just to add here, I have not mentioned anything in regards to this. I just told them that the PACE is shit.
bigjohns97 commented 2022-03-08 04:10:36 +05:30 (Migrated from github.com)

I can't seem to upgrade my NVG589 to the firmware in the linked repository.
Seems like I get firmware incompatibility issues.

They have blocked this by not allowing custom firmware.

Also, I have not seen this anywhere. Where have you heard this? I am confused as I have never seen this in any of the issues here.

https://www.reddit.com/r/ATT/comments/ouzll8/downgrade_bgw210700_on_firmware_2134_for_wpa/
I also tried applying the firmware posted to my own device and found the error message that led me to the above reddit thread.

Is there a reason why this is not mentioned anywhere?

Is this because of secrecy or something? If so thats fine. I have talked to ATT tech support mentioning their horrific service, and will be getting a BGW210-700. Bridge mode for the PACE is a nightmare so maybe bridge mode for the BGW will be better I guess.

Just to add here, I have not mentioned anything in regards to this. I just told them that the PACE is shit.

Careful, you're likely to get the BGW320 and not be able to bypass at all.

> > > > > I can't seem to upgrade my NVG589 to the firmware in the linked repository. > > > > > Seems like I get firmware incompatibility issues. > > > > > > > > > > > > They have blocked this by not allowing custom firmware. > > > > > > > > > Also, I have not seen this anywhere. Where have you heard this? I am confused as I have never seen this in any of the issues here. > > > > > > https://www.reddit.com/r/ATT/comments/ouzll8/downgrade_bgw210700_on_firmware_2134_for_wpa/ > > I also tried applying the firmware posted to my own device and found the error message that led me to the above reddit thread. > > Is there a reason why this is not mentioned anywhere? > > Is this because of secrecy or something? If so thats fine. I have talked to ATT tech support mentioning their horrific service, and will be getting a BGW210-700. Bridge mode for the PACE is a nightmare so maybe bridge mode for the BGW will be better I guess. > > Just to add here, I have not mentioned anything in regards to this. I just told them that the PACE is shit. Careful, you're likely to get the BGW320 and not be able to bypass at all.
SultanSGillani commented 2022-03-08 04:14:16 +05:30 (Migrated from github.com)

I can't seem to upgrade my NVG589 to the firmware in the linked repository.
Seems like I get firmware incompatibility issues.

They have blocked this by not allowing custom firmware.

Also, I have not seen this anywhere. Where have you heard this? I am confused as I have never seen this in any of the issues here.

https://www.reddit.com/r/ATT/comments/ouzll8/downgrade_bgw210700_on_firmware_2134_for_wpa/
I also tried applying the firmware posted to my own device and found the error message that led me to the above reddit thread.

Is there a reason why this is not mentioned anywhere?
Is this because of secrecy or something? If so thats fine. I have talked to ATT tech support mentioning their horrific service, and will be getting a BGW210-700. Bridge mode for the PACE is a nightmare so maybe bridge mode for the BGW will be better I guess.
Just to add here, I have not mentioned anything in regards to this. I just told them that the PACE is shit.

Careful, you're likely to get the BGW320 and not be able to bypass at all.

Then I will probably have to move to another internet company then. I cannot deal with intermittent downtimes while working from home. This just started about 2 months ago, and I am not sure why.

Regardless, if they send me the wrong equipment I will just have to return it back and cancel my sub.

> > > > > > I can't seem to upgrade my NVG589 to the firmware in the linked repository. > > > > > > Seems like I get firmware incompatibility issues. > > > > > > > > > > > > > > > They have blocked this by not allowing custom firmware. > > > > > > > > > > > > Also, I have not seen this anywhere. Where have you heard this? I am confused as I have never seen this in any of the issues here. > > > > > > > > > https://www.reddit.com/r/ATT/comments/ouzll8/downgrade_bgw210700_on_firmware_2134_for_wpa/ > > > I also tried applying the firmware posted to my own device and found the error message that led me to the above reddit thread. > > > > > > Is there a reason why this is not mentioned anywhere? > > Is this because of secrecy or something? If so thats fine. I have talked to ATT tech support mentioning their horrific service, and will be getting a BGW210-700. Bridge mode for the PACE is a nightmare so maybe bridge mode for the BGW will be better I guess. > > Just to add here, I have not mentioned anything in regards to this. I just told them that the PACE is shit. > > Careful, you're likely to get the BGW320 and not be able to bypass at all. Then I will probably have to move to another internet company then. I cannot deal with intermittent downtimes while working from home. This just started about 2 months ago, and I am not sure why. Regardless, if they send me the wrong equipment I will just have to return it back and cancel my sub.
SultanSGillani commented 2022-03-08 22:12:40 +05:30 (Migrated from github.com)

I am good now. I was able to extract on a lower firmware version. Thanks for the help all.

I am good now. I was able to extract on a lower firmware version. Thanks for the help all.
bigjohns97 commented 2022-03-08 22:19:19 +05:30 (Migrated from github.com)

I am good now. I was able to extract on a lower firmware version. Thanks for the help all.

Please do share, how did you get to the lower firmware version?

I am stuck on tether and would love to unplug the RG and throw it back in the closet.

> I am good now. I was able to extract on a lower firmware version. Thanks for the help all. Please do share, how did you get to the lower firmware version? I am stuck on tether and would love to unplug the RG and throw it back in the closet.
SultanSGillani commented 2022-03-09 03:57:18 +05:30 (Migrated from github.com)

I am good now. I was able to extract on a lower firmware version. Thanks for the help all.

Please do share, how did you get to the lower firmware version?

I am stuck on tether and would love to unplug the RG and throw it back in the closet.

Hey,

Just an FYI I am using opnsense. I went through this tutorial and realized the ping command here: https://github.com/MakiseKurisu/NVG589/wiki/Root-Access, was wrong now.

It should be `ping telnetd -l sh -p 9999 192.168.1.254`
(Or whatever your gateway ip address is)

Once I got it to work I was able to run the rest of the process.

telnet 192.168.1.254 9999

I was able to downgrade to this firmware to be able to get this done: https://github.com/MakiseKurisu/NVG589/blob/master/nbxvu9.1.0h4d38.bin

This allowed me to do the above.

> > I am good now. I was able to extract on a lower firmware version. Thanks for the help all. > > Please do share, how did you get to the lower firmware version? > > I am stuck on tether and would love to unplug the RG and throw it back in the closet. Hey, Just an FYI I am using opnsense. I went through this tutorial and realized the ping command here: https://github.com/MakiseKurisu/NVG589/wiki/Root-Access, was wrong now. It should be ``` `ping telnetd -l sh -p 9999 192.168.1.254` ``` (Or whatever your gateway ip address is) Once I got it to work I was able to run the rest of the process. `telnet 192.168.1.254 9999 ` I was able to downgrade to this firmware to be able to get this done: https://github.com/MakiseKurisu/NVG589/blob/master/nbxvu9.1.0h4d38.bin This allowed me to do the above.
bigjohns97 commented 2022-03-09 03:57:56 +05:30 (Migrated from github.com)

I am good now. I was able to extract on a lower firmware version. Thanks for the help all.

Please do share, how did you get to the lower firmware version?
I am stuck on tether and would love to unplug the RG and throw it back in the closet.

Hey,

Just an FYI I am using opnsense. I went through this tutorial and realized the ping command here: https://github.com/MakiseKurisu/NVG589/wiki/Root-Access, was wrong now.

It should be `ping telnetd -l sh -p 9999 192.168.1.254` (Or whatever your gateway ip address is)

Once I got it to work I was able to run the rest of the process.

telnet 192.168.1.254 9999

I was able to downgrade to this firmware to be able to get this done: https://github.com/MakiseKurisu/NVG589/blob/master/nbxvu9.1.0h4d38.bin

This allowed me to do the above.

Ah I see you have the NVG589

> > > I am good now. I was able to extract on a lower firmware version. Thanks for the help all. > > > > > > Please do share, how did you get to the lower firmware version? > > I am stuck on tether and would love to unplug the RG and throw it back in the closet. > > Hey, > > Just an FYI I am using opnsense. I went through this tutorial and realized the ping command here: https://github.com/MakiseKurisu/NVG589/wiki/Root-Access, was wrong now. > > It should be `` `ping telnetd -l sh -p 9999 192.168.1.254` `` (Or whatever your gateway ip address is) > > Once I got it to work I was able to run the rest of the process. > > `telnet 192.168.1.254 9999 ` > > I was able to downgrade to this firmware to be able to get this done: https://github.com/MakiseKurisu/NVG589/blob/master/nbxvu9.1.0h4d38.bin > > This allowed me to do the above. Ah I see you have the NVG589
SultanSGillani commented 2022-03-09 03:58:24 +05:30 (Migrated from github.com)

Yeah, I still have an order for the BGW210 but for now im good.

Yeah, I still have an order for the BGW210 but for now im good.
SultanSGillani commented 2022-03-09 03:59:21 +05:30 (Migrated from github.com)

I probably made some dumb rookie moves, but I figured it out in the end. You live, and you learn.

I probably made some dumb rookie moves, but I figured it out in the end. You live, and you learn.
neclimdul commented 2022-03-13 07:24:27 +05:30 (Migrated from github.com)

Been digging into this a lot and there's quite a bit to digest.

  1. There is a lot of churn on the freebsd intel driver related to hardware vlan tagging. Enough churn that its hard to piece together if this is even a bug/regression in the driver like https://github.com/MonkWho/pfatt/issues/67#issuecomment-1043443331 implies or if it was only ever working because of bugs.
  2. All the changes and the noted fix of disabling hwvlan handling point to the intel nics filtering VLAN traffic by default. That actually seems like a sane default for a non-router nic so again, maybe not a bug and we should be disabling the hw filtering.
  3. this affects all configurations with the ont connection on an intel nic. the WPA discussions seem like noise. As documented in the README, this project works by tagging outgoing non-EAP traffic with VLAN0 so that filtering breaks all traffic for any setup.
  4. -vlanhwtso doesn't make sense since its unrelated to VLAN tagging. In my testing it was not needed. I'm guessing everyone has powerful enough computers a little bit of packet offloading on the nic isn't a big deal but its nice to have so I would remove that from the changes.
  5. Anyone know why there isn't a pull to make that change to the repo?
Been digging into this a lot and there's quite a bit to digest. 1) There is a lot of churn on the freebsd intel driver related to hardware vlan tagging. Enough churn that its hard to piece together if this is even a bug/regression in the driver like https://github.com/MonkWho/pfatt/issues/67#issuecomment-1043443331 implies or if it was only ever working because of bugs. 2) All the changes and the noted fix of disabling hwvlan handling point to the intel nics filtering VLAN traffic by default. That actually seems like a sane default for a non-router nic so again, maybe not a bug and we should be disabling the hw filtering. 2) this affects all configurations with the ont connection on an intel nic. the WPA discussions seem like noise. As documented in the README, this project works by tagging outgoing non-EAP traffic with VLAN0 so that filtering breaks all traffic for any setup. 4) -vlanhwtso doesn't make sense since its unrelated to VLAN tagging. In my testing it was not needed. I'm guessing everyone has powerful enough computers a little bit of packet offloading on the nic isn't a big deal but its nice to have so I would remove that from the changes. 5) Anyone know why there isn't a pull to make that change to the repo?
ChronicledMonocle commented 2022-03-18 05:48:43 +05:30 (Migrated from github.com)

Has anybody tested on 2.7 or 22.05 DEVEL branches of pfSense at this point? There was a bunch of patches including the FreeBSD 12.3 em driver patches, I think, in the latest kernel builds.

Has anybody tested on 2.7 or 22.05 DEVEL branches of pfSense at this point? There was a bunch of patches including the FreeBSD 12.3 em driver patches, I think, in the latest kernel builds.
SeaMonkey82 commented 2022-03-19 11:40:25 +05:30 (Migrated from github.com)

When I tried this on pfSense 2.6, the startup sequence was outputting to the console at about one character per second. I couldn't bear the downtime to wait for it to finish. Any idea why it would move so slow? Also, I had to manually select VGA console from the bootup menu to see any output at all, whereas normally this just happens by default.

When I tried this on pfSense 2.6, the startup sequence was outputting to the console at about one character per second. I couldn't bear the downtime to wait for it to finish. Any idea why it would move so slow? Also, I had to manually select VGA console from the bootup menu to see any output at all, whereas normally this just happens by default.
bigjohns97 commented 2022-03-19 20:00:22 +05:30 (Migrated from github.com)

Has anybody tested on 2.7 or 22.05 DEVEL branches of pfSense at this point? There was a bunch of patches including the FreeBSD 12.3 em driver patches, I think, in the latest kernel builds.

I might be willing to risk this (running bare metal) could you point me to the reason why you suggest that the drivers were updated?

> Has anybody tested on 2.7 or 22.05 DEVEL branches of pfSense at this point? There was a bunch of patches including the FreeBSD 12.3 em driver patches, I think, in the latest kernel builds. I might be willing to risk this (running bare metal) could you point me to the reason why you suggest that the drivers were updated?
SeaMonkey82 commented 2022-03-19 22:19:08 +05:30 (Migrated from github.com)

When I tried this on pfSense 2.6, the startup sequence was outputting to the console at about one character per second. I couldn't bear the downtime to wait for it to finish. Any idea why it would move so slow? Also, I had to manually select VGA console from the bootup menu to see any output at all, whereas normally this just happens by default.

More pointedly, has anyone been using this solution with pfSense set to use a RAM disk? Should this make a difference?

> When I tried this on pfSense 2.6, the startup sequence was outputting to the console at about one character per second. I couldn't bear the downtime to wait for it to finish. Any idea why it would move so slow? Also, I had to manually select VGA console from the bootup menu to see any output at all, whereas normally this just happens by default. More pointedly, has anyone been using this solution with pfSense set to use a RAM disk? Should this make a difference?
SeaMonkey82 commented 2022-03-20 10:48:56 +05:30 (Migrated from github.com)

Just want to say thank you to @neydah700 I managed to upgrade mine to 2.6. My system has both em (Intel I219-LM) and igb (Intel 82756). I decided to use both driver compiled by @neydah700.

I use supplicant mode and do fresh 2.6 installation instead of upgrade from 2.5.2

Driver compiled by neydah700: https://github.com/neydah700/pfsense_intel/raw/main/if_em.ko https://github.com/neydah700/pfsense_intel/raw/main/if_igb.ko

content of my loader.conf.local

if_em_load="YES"
if_em_name="/boot/modules/if_em.ko"
if_igb_load="YES"
if_igb_name="/boot/modules/if_igb.ko"

Steps:

1. Do full config backup of my 2.5.2

2. Backup /conf/pfatt folder

3. Install fresh 2.6

4. Enabled ssh

5. upload both driver (if_em.ko and if_igb.ko) to /boot/modules

6. upload loader.conf.local to /boot

7. upload my pfatt folder back into /conf folder

8. reboot

9. Check if both driver loaded. I watch boot message or can be seen in dmesg or use kldstat.
   If you check dmesg, em driver should be version 7.7.8 and igb should be 2.5.21

10. Add early shell command into config.xml

11. reboot

12. assign ngeth0 as wan

13. reboot

14. At this time your router should have internet connection back

15. Restore you config

I sort of got it working by following this post. Unfortunately, there's a lot of custom pfSense configuration that this broke, and I couldn't manage to sort it out before deciding I didn't want to incur any more downtime trying to figure it out. I realize this is beyond the scope of this particular issue, but if anyone could give me some pointers, I'd appreciate it.

My standard config is thus:

  • WAN is a static IPv4 /29 address connected to LAN port on the BGW210 (Yes, I reconfigured the cabling as instructed)
  • Upstream gateway is set to WAN IPv4 address +1, as is the default gateway under routing
  • BGW210 is configured with
    • Manual IP Passthrough mode
    • Public Subnet Mode On
    • Allow Inbound Traffic On
    • Public Gateway Address same as upstream gateway in pfSense
    • Public Subnet Mask: 255.255.255.248
    • DHCPv4 Start Address: WAN IP minus 4
    • DHCPv4 End Address: WAN IP

While I could get it to communicate with the rest of the internet by changing the WAN interface to DHCP, the IP address it was obtaining wasn't my static IP, and none of my OpenVPN connections would complete. At no point was the Broadband light on the BGW210 solid green.

Anyhow, if anyone else is using this with a static IP, can you please share what additional configuration you had to do to get it working?

> Just want to say thank you to @neydah700 I managed to upgrade mine to 2.6. My system has both em (Intel I219-LM) and igb (Intel 82756). I decided to use both driver compiled by @neydah700. > > I use supplicant mode and do fresh 2.6 installation instead of upgrade from 2.5.2 > > Driver compiled by neydah700: https://github.com/neydah700/pfsense_intel/raw/main/if_em.ko https://github.com/neydah700/pfsense_intel/raw/main/if_igb.ko > > content of my **loader.conf.local** > > ``` > if_em_load="YES" > if_em_name="/boot/modules/if_em.ko" > if_igb_load="YES" > if_igb_name="/boot/modules/if_igb.ko" > ``` > > Steps: > > 1. Do full config backup of my 2.5.2 > > 2. Backup /conf/pfatt folder > > 3. Install fresh 2.6 > > 4. Enabled ssh > > 5. upload both driver (if_em.ko and if_igb.ko) to /boot/modules > > 6. upload loader.conf.local to /boot > > 7. upload my pfatt folder back into /conf folder > > 8. reboot > > 9. Check if both driver loaded. I watch boot message or can be seen in dmesg or use kldstat. > If you check dmesg, em driver should be version 7.7.8 and igb should be 2.5.21 > > 10. Add early shell command into config.xml > > 11. reboot > > 12. assign ngeth0 as wan > > 13. reboot > > 14. At this time your router should have internet connection back > > 15. Restore you config I sort of got it working by following this post. Unfortunately, there's a lot of custom pfSense configuration that this broke, and I couldn't manage to sort it out before deciding I didn't want to incur any more downtime trying to figure it out. I realize this is beyond the scope of this particular issue, but if anyone could give me some pointers, I'd appreciate it. My standard config is thus: - WAN is a static IPv4 /29 address connected to LAN port on the BGW210 (Yes, I reconfigured the cabling as instructed) - Upstream gateway is set to WAN IPv4 address +1, as is the default gateway under routing - BGW210 is configured with - Manual IP Passthrough mode - Public Subnet Mode On - Allow Inbound Traffic On - Public Gateway Address same as upstream gateway in pfSense - Public Subnet Mask: 255.255.255.248 - DHCPv4 Start Address: WAN IP minus 4 - DHCPv4 End Address: WAN IP While I could get it to communicate with the rest of the internet by changing the WAN interface to DHCP, the IP address it was obtaining *wasn't* my static IP, and none of my OpenVPN connections would complete. At no point was the Broadband light on the BGW210 solid green. Anyhow, if anyone else is using this with a static IP, can you please share what additional configuration you had to do to get it working?
SGC1990 commented 2022-03-20 11:25:30 +05:30 (Migrated from github.com)

Just want to say thank you to @neydah700 I managed to upgrade mine to 2.6. My system has both em (Intel I219-LM) and igb (Intel 82756). I decided to use both driver compiled by @neydah700.
I use supplicant mode and do fresh 2.6 installation instead of upgrade from 2.5.2
Driver compiled by neydah700: https://github.com/neydah700/pfsense_intel/raw/main/if_em.ko https://github.com/neydah700/pfsense_intel/raw/main/if_igb.ko
content of my loader.conf.local

if_em_load="YES"
if_em_name="/boot/modules/if_em.ko"
if_igb_load="YES"
if_igb_name="/boot/modules/if_igb.ko"

Steps:

1. Do full config backup of my 2.5.2

2. Backup /conf/pfatt folder

3. Install fresh 2.6

4. Enabled ssh

5. upload both driver (if_em.ko and if_igb.ko) to /boot/modules

6. upload loader.conf.local to /boot

7. upload my pfatt folder back into /conf folder

8. reboot

9. Check if both driver loaded. I watch boot message or can be seen in dmesg or use kldstat.
   If you check dmesg, em driver should be version 7.7.8 and igb should be 2.5.21

10. Add early shell command into config.xml

11. reboot

12. assign ngeth0 as wan

13. reboot

14. At this time your router should have internet connection back

15. Restore you config

I sort of got it working by following this post. Unfortunately, there's a lot of custom pfSense configuration that this broke, and I couldn't manage to sort it out before deciding I didn't want to incur any more downtime trying to figure it out. I realize this is beyond the scope of this particular issue, but if anyone could give me some pointers, I'd appreciate it.

My standard config is thus:

  • WAN is a static IPv4 /29 address connected to LAN port on the BGW210 (Yes, I reconfigured the cabling as instructed)

  • Upstream gateway is set to WAN IPv4 address +1, as is the default gateway under routing

  • BGW210 is configured with

    • Manual IP Passthrough mode
    • Public Subnet Mode On
    • Allow Inbound Traffic On
    • Public Gateway Address same as upstream gateway in pfSense
    • Public Subnet Mask: 255.255.255.248
    • DHCPv4 Start Address: WAN IP minus 4
    • DHCPv4 End Address: WAN IP

While I could get it to communicate with the rest of the internet by changing the WAN interface to DHCP, the IP address it was obtaining wasn't my static IP, and none of my OpenVPN connections would complete. At no point was the Broadband light on the BGW210 solid green.

Anyhow, if anyone else is using this with a static IP, can you please share what additional configuration you had to do to get it working?

I have a block of 32 ips. All you have to do to get the ip working is to set the ip of ngeth0 to dhcp and then setup up you ip under Virtual IPs, then go to nat and set nat to Hybrid Outbound NAT rule generation. and make a nat to the dedicated ip now the lan will be using the dedicated ip. If you have more then one then you can keep adding then to Virtual IPs, and keep using nat to send then out back local client.

If you need anymore help let me know I have mine setup with open port to dedicated ips and more.

> > Just want to say thank you to @neydah700 I managed to upgrade mine to 2.6. My system has both em (Intel I219-LM) and igb (Intel 82756). I decided to use both driver compiled by @neydah700. > > I use supplicant mode and do fresh 2.6 installation instead of upgrade from 2.5.2 > > Driver compiled by neydah700: https://github.com/neydah700/pfsense_intel/raw/main/if_em.ko https://github.com/neydah700/pfsense_intel/raw/main/if_igb.ko > > content of my **loader.conf.local** > > ``` > > if_em_load="YES" > > if_em_name="/boot/modules/if_em.ko" > > if_igb_load="YES" > > if_igb_name="/boot/modules/if_igb.ko" > > ``` > > > > > > > > > > > > > > > > > > > > > > > > Steps: > > ``` > > 1. Do full config backup of my 2.5.2 > > > > 2. Backup /conf/pfatt folder > > > > 3. Install fresh 2.6 > > > > 4. Enabled ssh > > > > 5. upload both driver (if_em.ko and if_igb.ko) to /boot/modules > > > > 6. upload loader.conf.local to /boot > > > > 7. upload my pfatt folder back into /conf folder > > > > 8. reboot > > > > 9. Check if both driver loaded. I watch boot message or can be seen in dmesg or use kldstat. > > If you check dmesg, em driver should be version 7.7.8 and igb should be 2.5.21 > > > > 10. Add early shell command into config.xml > > > > 11. reboot > > > > 12. assign ngeth0 as wan > > > > 13. reboot > > > > 14. At this time your router should have internet connection back > > > > 15. Restore you config > > ``` > > I sort of got it working by following this post. Unfortunately, there's a lot of custom pfSense configuration that this broke, and I couldn't manage to sort it out before deciding I didn't want to incur any more downtime trying to figure it out. I realize this is beyond the scope of this particular issue, but if anyone could give me some pointers, I'd appreciate it. > > My standard config is thus: > > * WAN is a static IPv4 /29 address connected to LAN port on the BGW210 (Yes, I reconfigured the cabling as instructed) > * Upstream gateway is set to WAN IPv4 address +1, as is the default gateway under routing > * BGW210 is configured with > > * Manual IP Passthrough mode > * Public Subnet Mode On > * Allow Inbound Traffic On > * Public Gateway Address same as upstream gateway in pfSense > * Public Subnet Mask: 255.255.255.248 > * DHCPv4 Start Address: WAN IP minus 4 > * DHCPv4 End Address: WAN IP > > While I could get it to communicate with the rest of the internet by changing the WAN interface to DHCP, the IP address it was obtaining _wasn't_ my static IP, and none of my OpenVPN connections would complete. At no point was the Broadband light on the BGW210 solid green. > > Anyhow, if anyone else is using this with a static IP, can you please share what additional configuration you had to do to get it working? I have a block of 32 ips. All you have to do to get the ip working is to set the ip of ngeth0 to dhcp and then setup up you ip under Virtual IPs, then go to nat and set nat to Hybrid Outbound NAT rule generation. and make a nat to the dedicated ip now the lan will be using the dedicated ip. If you have more then one then you can keep adding then to Virtual IPs, and keep using nat to send then out back local client. If you need anymore help let me know I have mine setup with open port to dedicated ips and more.
johnavich commented 2022-03-20 11:52:12 +05:30 (Migrated from github.com)

i simply left the public IP's as nat's in my setup. i have ngeth0 set to dhcp, and use NAT's to handle my /29 block. It allows me to utilize all 8 IP's after a fashion (the first and last won't allow for inbound traffic, but outbound works without issue, like for IOT networks). All other 6 IP's use both internal and external traffic based on the NAT table Firewall => NAT => etc.

i simply left the public IP's as nat's in my setup. i have ngeth0 set to dhcp, and use NAT's to handle my /29 block. It allows me to utilize all 8 IP's after a fashion (the first and last won't allow for inbound traffic, but outbound works without issue, like for IOT networks). All other 6 IP's use both internal and external traffic based on the NAT table Firewall => NAT => etc.
SGC1990 commented 2022-03-20 11:56:02 +05:30 (Migrated from github.com)

i simply left the public IP's as nat's in my setup. i have ngeth0 set to dhcp, and use NAT's to handle my /29 block. It allows me to utilize all 8 IP's after a fashion (the first and last won't allow for inbound traffic, but outbound works without issue, like for IOT networks). All other 6 IP's use both internal and external traffic based on the NAT table Firewall => NAT => etc.

All you have to do is use 1:1 nat and then go to the firewall and map it.

> i simply left the public IP's as nat's in my setup. i have ngeth0 set to dhcp, and use NAT's to handle my /29 block. It allows me to utilize all 8 IP's after a fashion (the first and last won't allow for inbound traffic, but outbound works without issue, like for IOT networks). All other 6 IP's use both internal and external traffic based on the NAT table Firewall => NAT => etc. All you have to do is use 1:1 nat and then go to the firewall and map it.
SeaMonkey82 commented 2022-03-20 12:05:59 +05:30 (Migrated from github.com)

1:1 NAT isn't an option for me, because I have two OpenVPN servers (site-to-site and remote) running on pfSense under my single public IP.

Virtual IP sounds like it could work, but if I understand correctly, it would require changing every Inbound NAT, Outbound NAT (I use Manual), VPN Client/Server, and Firewall Rule that references my WAN address (whether as the interface or destination) to instead reference the Virtual IP.

1:1 NAT isn't an option for me, because I have two OpenVPN servers (site-to-site and remote) running on pfSense under my single public IP. Virtual IP sounds like it could work, but if I understand correctly, it would require changing every Inbound NAT, Outbound NAT (I use Manual), VPN Client/Server, and Firewall Rule that references my WAN address (whether as the interface or destination) to instead reference the Virtual IP.
SGC1990 commented 2022-03-20 12:10:12 +05:30 (Migrated from github.com)

1:1 NAT isn't an option for me, because I have two OpenVPN servers (site-to-site and remote) running on pfSense under my single public IP.

Virtual IP sounds like it could work, but if I understand correctly, it would require changing every Inbound NAT, Outbound NAT (I use Manual), VPN Client/Server, and Firewall Rule that references my WAN address (whether as the interface or destination) to instead reference the Virtual IP.

do you have the openvpn running in pfsense

> 1:1 NAT isn't an option for me, because I have two OpenVPN servers (site-to-site and remote) running on pfSense under my single public IP. > > Virtual IP sounds like it could work, but if I understand correctly, it would require changing every Inbound NAT, Outbound NAT (I use Manual), VPN Client/Server, and Firewall Rule that references my WAN address (whether as the interface or destination) to instead reference the Virtual IP. do you have the openvpn running in pfsense
SeaMonkey82 commented 2022-03-20 12:11:16 +05:30 (Migrated from github.com)

Yes.

> Yes.
SGC1990 commented 2022-03-20 12:12:44 +05:30 (Migrated from github.com)

Yes.

then just use Virtual IP then make a nat rule that is 127.0.0.1 to that ip and then open firewall ports you should be good to go

> > > > Yes. then just use Virtual IP then make a nat rule that is 127.0.0.1 to that ip and then open firewall ports you should be good to go
johnavich commented 2022-03-20 20:07:09 +05:30 (Migrated from github.com)

I use 1:1 and have 1 address dedicated to openvpn. Having a second is just as easy, and you don't even need to worry about the virtual ip shenanigans.you shouldn't need to even reconfigure your rules either

I use 1:1 and have 1 address dedicated to openvpn. Having a second is just as easy, and you don't even need to worry about the virtual ip shenanigans.you shouldn't need to even reconfigure your rules either
SGC1990 commented 2022-03-20 21:31:57 +05:30 (Migrated from github.com)

I use 1:1 and have 1 address dedicated to openvpn. Having a second is just as easy, and you don't even need to worry about the virtual ip shenanigans.you shouldn't need to even reconfigure your rules either

Somthimes on reboot it does something with the script and makes the system go unresponsive and then I had to remove all my configurations and then we add them back again.

> I use 1:1 and have 1 address dedicated to openvpn. Having a second is just as easy, and you don't even need to worry about the virtual ip shenanigans.you shouldn't need to even reconfigure your rules either Somthimes on reboot it does something with the script and makes the system go unresponsive and then I had to remove all my configurations and then we add them back again.
SeaMonkey82 commented 2022-03-20 22:29:13 +05:30 (Migrated from github.com)

I did end up using Virtual IP, and I did have to replace a lot of references to WAN address in my config, but it was pretty straightforward. The first time I tried, I had failed to set the MAC address on the WAN interface to the BGW210 MAC. Another thing I had to was change the default gateway from StaticIP+1 to StaticIP. The only major snag I've hit in updating my rulesets is one that forwarded traffic bound for the LAN IP of the BGW210 out the WAN interface. Because the BGW210 is now only connected on the ONT port instead of one of the LAN ports, this doesn't work. I do have a spare interface on the firewall that I could connect to one of the LAN ports for this purpose. I know I don't want to enable WiFi on it. Curious how others handle access to the web interface on the BGW210 in tethered mode.

I did end up using Virtual IP, and I did have to replace a lot of references to WAN address in my config, but it was pretty straightforward. The first time I tried, I had failed to set the MAC address on the WAN interface to the BGW210 MAC. Another thing I had to was change the default gateway from StaticIP+1 to StaticIP. The only major snag I've hit in updating my rulesets is one that forwarded traffic bound for the LAN IP of the BGW210 out the WAN interface. Because the BGW210 is now only connected on the ONT port instead of one of the LAN ports, this doesn't work. I do have a spare interface on the firewall that I could connect to one of the LAN ports for this purpose. I know I don't want to enable WiFi on it. Curious how others handle access to the web interface on the BGW210 in tethered mode.
lnxsrt commented 2022-03-26 00:09:58 +05:30 (Migrated from github.com)

Been digging into this a lot and there's quite a bit to digest.

1. There is a lot of churn on the freebsd intel driver related to hardware vlan tagging. Enough churn that its hard to piece together if this is even a bug/regression in the driver like [pfSense 2.6 and pfSense Plus 22.01 Broken #67 (comment)](https://github.com/MonkWho/pfatt/issues/67#issuecomment-1043443331) implies or if it was only ever working because of bugs.

2. All the changes and the noted fix of disabling hwvlan handling point to the intel nics filtering VLAN traffic by default. That actually seems like a sane default for a non-router nic so again, maybe not a bug and we should be disabling the hw filtering.

3. this affects all configurations with the ont connection on an intel nic. the WPA discussions seem like noise. As documented in the README, this project works by tagging outgoing non-EAP traffic with VLAN0 so that filtering breaks all traffic for any setup.

4. -vlanhwtso doesn't make sense since its unrelated to VLAN tagging. In my testing it was not needed. I'm guessing everyone has powerful enough computers a little bit of packet offloading on the nic isn't a big deal but its nice to have so I would remove that from the changes.

5. Anyone know why there isn't a pull to make that change to the repo?

I've been too busy to formally submit any bugs. The FreeBSD upstream fixes are all over the place, I'm with you, hard to follow.

I re-enabled vlanhwtso and my setup still works fine. Confirming your experience.

For reference, I have the vlanhwtag vlanhwfilter enabled on my LAN em0 Intel interface with multiple VLANS in OPNSense and it works fine. I do think it is an igb related FreeBSD driver bug that these HW vlan offloading options don't work.

Additionally it looks like the 22.1.4 codebase for the e1000 driver (igb and em in Freebsd) remains unchanged with a Dec 22, 2021 modified date. So, these disabling options are still needed for the time being.

https://github.com/opnsense/src/tree/22.1.4/sys/dev/e1000

> Been digging into this a lot and there's quite a bit to digest. > > 1. There is a lot of churn on the freebsd intel driver related to hardware vlan tagging. Enough churn that its hard to piece together if this is even a bug/regression in the driver like [pfSense 2.6 and pfSense Plus 22.01 Broken #67 (comment)](https://github.com/MonkWho/pfatt/issues/67#issuecomment-1043443331) implies or if it was only ever working because of bugs. > > 2. All the changes and the noted fix of disabling hwvlan handling point to the intel nics filtering VLAN traffic by default. That actually seems like a sane default for a non-router nic so again, maybe not a bug and we should be disabling the hw filtering. > > 3. this affects all configurations with the ont connection on an intel nic. the WPA discussions seem like noise. As documented in the README, this project works by tagging outgoing non-EAP traffic with VLAN0 so that filtering breaks all traffic for any setup. > > 4. -vlanhwtso doesn't make sense since its unrelated to VLAN tagging. In my testing it was not needed. I'm guessing everyone has powerful enough computers a little bit of packet offloading on the nic isn't a big deal but its nice to have so I would remove that from the changes. > > 5. Anyone know why there isn't a pull to make that change to the repo? I've been too busy to formally submit any bugs. The FreeBSD upstream fixes are all over the place, I'm with you, hard to follow. I re-enabled vlanhwtso and my setup still works fine. Confirming your experience. For reference, I have the vlanhwtag vlanhwfilter enabled on my LAN em0 Intel interface with multiple VLANS in OPNSense and it works fine. I do think it is an igb related FreeBSD driver bug that these HW vlan offloading options don't work. Additionally it looks like the 22.1.4 codebase for the e1000 driver (igb and em in Freebsd) remains unchanged with a Dec 22, 2021 modified date. So, these disabling options are still needed for the time being. https://github.com/opnsense/src/tree/22.1.4/sys/dev/e1000
ChronicledMonocle commented 2022-05-01 07:11:30 +05:30 (Migrated from github.com)

Tested on pfSense Plus 22.05 and getting the following:

Fatal error: Uncaught Error: Call to undefined function pfSense_ngctl_attach() in Command line code:1
Stack trace:
#0 {main}
thrown in Command line code on line 1

I also tried running the PHP code directly without the variables and it threw the same errors to console.

I'll attach this to the redmine as well.

Tested on pfSense Plus 22.05 and getting the following: Fatal error: Uncaught Error: Call to undefined function pfSense_ngctl_attach() in Command line code:1 Stack trace: #0 {main} thrown in Command line code on line 1 I also tried running the PHP code directly without the variables and it threw the same errors to console. I'll attach this to the redmine as well.
ChronicledMonocle commented 2022-05-01 20:52:19 +05:30 (Migrated from github.com)

The pfSense_ngctl_attach() and pfSense_ngctl_detach() php modules are being removed in pfSense Plus 22.05 and pfSense CE 2.7, which is why this command is failing on the latest builds. These commands are apparently no longer needed as all interfaces will always be a part of netgraph in the newer release, so these lines should be able to be commented out. I'll test with these lines removed in the next few days. If it works without them, I'll create a fork and/or open an issue with the project to correct it.

The pfSense_ngctl_attach() and pfSense_ngctl_detach() php modules are being removed in pfSense Plus 22.05 and pfSense CE 2.7, which is why this command is failing on the latest builds. These commands are apparently no longer needed as all interfaces will always be a part of netgraph in the newer release, so these lines should be able to be commented out. I'll test with these lines removed in the next few days. If it works without them, I'll create a fork and/or open an issue with the project to correct it.
neclimdul commented 2022-05-02 20:02:10 +05:30 (Migrated from github.com)

A bit different than the Intel issue being discussed previously but that one's actually easy to fix. Added a pull that supports old and newer versions of pfSense while people update.

Currently running opnsense so I haven't tested it past confirming it parses correctly but its pretty straight forward. If you want to give it a shot it'd be appreciated.

A bit different than the Intel issue being discussed previously but that one's actually easy to fix. Added a pull that supports old and newer versions of pfSense while people update. Currently running opnsense so I haven't tested it past confirming it parses correctly but its pretty straight forward. If you want to give it a shot it'd be appreciated.
ChronicledMonocle commented 2022-05-08 08:25:09 +05:30 (Migrated from github.com)

A bit different than the Intel issue being discussed previously but that one's actually easy to fix. Added a pull that supports old and newer versions of pfSense while people update.

Currently running opnsense so I haven't tested it past confirming it parses correctly but its pretty straight forward. If you want to give it a shot it'd be appreciated.

Thank you for the patch neclimdul! I've tested with the patched script. My testing can be found here:

https://redmine.pfsense.org/issues/12821#note-14

Seems that on internal builds of pfSense Plus 22.05 there is still an issue with DHCP over VLAN0 on the included Intel driver. I've raised the flag on this internally so hopefully there will be a fix soon. Even if it isn't, though, things should keep humming along for non-Intel NICs or with the custom driver, which I'll compile a new one of and post here from my build environment.

> A bit different than the Intel issue being discussed previously but that one's actually easy to fix. Added a pull that supports old and newer versions of pfSense while people update. > > Currently running opnsense so I haven't tested it past confirming it parses correctly but its pretty straight forward. If you want to give it a shot it'd be appreciated. Thank you for the patch neclimdul! I've tested with the patched script. My testing can be found here: https://redmine.pfsense.org/issues/12821#note-14 Seems that on internal builds of pfSense Plus 22.05 there is still an issue with DHCP over VLAN0 on the included Intel driver. I've raised the flag on this internally so hopefully there will be a fix soon. Even if it isn't, though, things should keep humming along for non-Intel NICs or with the custom driver, which I'll compile a new one of and post here from my build environment.
ChronicledMonocle commented 2022-06-05 06:59:34 +05:30 (Migrated from github.com)

FYI to anyone not watching the redmine or who stumbles on this bug report, the issue ONLY affects igb/em interfaces. Intel ix or igc are not affected and likely Realtek, Broadcom, or any other NIC should be fine as well. For igb/em interfaces, just compile a driver from the Intel provided driver above and load in the driver with the loader.conf.local override.

FYI to anyone not watching the redmine or who stumbles on this bug report, the issue ONLY affects igb/em interfaces. Intel ix or igc are not affected and likely Realtek, Broadcom, or any other NIC should be fine as well. For igb/em interfaces, just compile a driver from the Intel provided driver above and load in the driver with the loader.conf.local override.
johnavich commented 2022-06-05 07:04:23 +05:30 (Migrated from github.com)

@ChronicledMonocle would you then suggest those of us with Realtek, Broadcom etc chippers create a different bug report then?

@ChronicledMonocle would you then suggest those of us with Realtek, Broadcom etc chippers create a different bug report then?
ChronicledMonocle commented 2022-06-05 07:26:56 +05:30 (Migrated from github.com)

@ChronicledMonocle would you then suggest those of us with Realtek, Broadcom etc chippers create a different bug report then?

What kind of NIC do you have and what issue are you running into? I'm running this script on a box with ix and igc interfaces without issues and unaltered just fine.

> @ChronicledMonocle would you then suggest those of us with Realtek, Broadcom etc chippers create a different bug report then? What kind of NIC do you have and what issue are you running into? I'm running this script on a box with ix and igc interfaces without issues and unaltered just fine.
johnavich commented 2022-06-08 02:28:54 +05:30 (Migrated from github.com)

I have a realtek add-on board:
image

my experience was much the same as described in this post, the DHCP packet simply wouldn't pass onto the ONT after the initial negotiation.

I have a realtek add-on board: ![image](https://user-images.githubusercontent.com/37229753/172481311-1c194b8f-d4dc-4fa3-9adb-37c182c189e3.png) my experience was much the same as described in this post, the DHCP packet simply wouldn't pass onto the ONT after the initial negotiation.
jasonsansone commented 2022-06-27 20:47:44 +05:30 (Migrated from github.com)

22.05 has been released. Has anyone been able to test the final release version yet?

22.05 has been released. Has anyone been able to test the final release version yet?
ChronicledMonocle commented 2022-06-28 00:36:34 +05:30 (Migrated from github.com)

22.05 has been released. Has anyone been able to test the final release version yet?

I have. Still broken for igb/em interfaces. Works fine on other types of interfaces I've tested.

> 22.05 has been released. Has anyone been able to test the final release version yet? I have. Still broken for igb/em interfaces. Works fine on other types of interfaces I've tested.
jasonsansone commented 2022-06-28 00:38:36 +05:30 (Migrated from github.com)

The base hasn’t changed from FreeBSD 12.3, so does the existing driver solution for 22.01 work? In short, can you safely direct update if you are on 22.01 to 22.05?

The base hasn’t changed from FreeBSD 12.3, so does the existing driver solution for 22.01 work? In short, can you safely direct update if you are on 22.01 to 22.05?
ChronicledMonocle commented 2022-06-28 00:40:42 +05:30 (Migrated from github.com)

The base hasn’t changed from FreeBSD 12.3, so does the existing driver solution for 22.01 work? In short, can you safely direct update if you are on 22.01 to 22.05?

If the major kernel version hasn't changed, should be fine.

> The base hasn’t changed from FreeBSD 12.3, so does the existing driver solution for 22.01 work? In short, can you safely direct update if you are on 22.01 to 22.05? If the major kernel version hasn't changed, should be fine.
jasonsansone commented 2022-06-28 00:53:06 +05:30 (Migrated from github.com)

The base hasn’t changed from FreeBSD 12.3, so does the existing driver solution for 22.01 work? In short, can you safely direct update if you are on 22.01 to 22.05?

If the major kernel version hasn't changed, should be fine.

Rolled the dice and updated. So far so good.

> > The base hasn’t changed from FreeBSD 12.3, so does the existing driver solution for 22.01 work? In short, can you safely direct update if you are on 22.01 to 22.05? > > If the major kernel version hasn't changed, should be fine. Rolled the dice and updated. So far so good.
SGC1990 commented 2022-06-29 05:29:52 +05:30 (Migrated from github.com)

Working fine with 22.05 no problems with both types

Working fine with 22.05 no problems with both types
neydah700 commented 2022-07-02 02:49:22 +05:30 (Migrated from github.com)

For those already using the customer driver, when you upgrade the custom driver stays in place. The root issue is not solved yet but has been marked in Redmine for the "next" release. https://redmine.pfsense.org/issues/12821?next_issue_id=12820

If you do a clean install to 22.05 the issue will probably come back.

For those already using the customer driver, when you upgrade the custom driver stays in place. The root issue is not solved yet but has been marked in Redmine for the "next" release. https://redmine.pfsense.org/issues/12821?next_issue_id=12820 If you do a clean install to 22.05 the issue will probably come back.
computergeek1507 commented 2022-07-31 06:27:44 +05:30 (Migrated from github.com)

I installed opnsense 22.07 and this issue still persists with the Intel interfaces. I changed the config to a Realtek interface and then the script worked.

I installed opnsense 22.07 and this issue still persists with the Intel interfaces. I changed the config to a Realtek interface and then the script worked.
SamBudeh commented 2022-08-01 20:55:09 +05:30 (Migrated from github.com)

Okay, I got everything up and working on my regular Intel NIC. I’m not the biggest expert here so bear with me.

Through troubleshooting I was able to get every non-Intel NIC to authenticate and pull DHCP. After more testing all igb(4) driver-based cards failed. In the /boot/kernel folder I noticed if_igb.ko is simply a shortcut to the em(4) driver (if_em.ko). I am guessing FreeBSD is using this combined driver from intel? https://www.intel.com/content/www/us/en/download/15187/intel-network-adapter-gigabit-base-driver-for-freebsd.html

Alternatively, I found this driver that appears to be for igb(4) separately, and it seems newer. https://www.intel.com/content/www/us/en/download/14610/intel-network-adapter-driver-for-82575-6-and-82580-based-gigabit-network-connections-under-freebsd.html?wapkw=i350%20freebsd

I downloaded a FreeBSD-12.3 VM, its related source code (amd64), and complied the separate igb(4) driver.

I loaded my newly compiled if_igb.ko into the /boot/modules folder with chmod 555 permissions. Next, I added the following two lines to my /boot/loader.conf file to supersede the included driver.

if_igb_load="YES" if_igb_name="/boot/modules/if_igb.ko"

Rebooted and everything came up just fine!

Feel free to use my compiled if_igb.ko if you don’t want to build your own. https://github.com/neydah700/pfsense_intel/blob/main/if_igb.ko

Also, for reference here is my pfatt script if anyone needs a reference. https://github.com/neydah700/pfsense_intel/blob/main/pfatt_intel.sh

A few notes:

  1. When I clean installed 2.6.0 (and 22.01 on my pfSense+ Box) absolutely nothing I did allowed my pfatt script to runs successfully from the /cf/conf directory. I ended up moving it to /root/pfatt and everything worked. This seemed to only be an issue once I moved to a ZFS file system but who knows.
  2. I have an angry family since our internet has been up and down for a few days now.

@neydah700 you saved the day my friend! 2.6 was my first attempt with pfSense. I was about to give up. The above did the trick. I'm up and running and my ATT 1Gb has never been faster. Thank you!

> Okay, I got everything up and working on my regular Intel NIC. I’m not the biggest expert here so bear with me. > > Through troubleshooting I was able to get every non-Intel NIC to authenticate and pull DHCP. After more testing all igb(4) driver-based cards failed. In the /boot/kernel folder I noticed if_igb.ko is simply a shortcut to the em(4) driver (if_em.ko). I am guessing FreeBSD is using this combined driver from intel? https://www.intel.com/content/www/us/en/download/15187/intel-network-adapter-gigabit-base-driver-for-freebsd.html > > Alternatively, I found this driver that appears to be for igb(4) separately, and it seems newer. https://www.intel.com/content/www/us/en/download/14610/intel-network-adapter-driver-for-82575-6-and-82580-based-gigabit-network-connections-under-freebsd.html?wapkw=i350%20freebsd > > I downloaded a FreeBSD-12.3 VM, its related source code (amd64), and complied the separate igb(4) driver. > > I loaded my newly compiled if_igb.ko into the /boot/modules folder with chmod 555 permissions. Next, I added the following two lines to my /boot/loader.conf file to supersede the included driver. > > if_igb_load="YES" if_igb_name="/boot/modules/if_igb.ko" > > Rebooted and everything came up just fine! > > Feel free to use my compiled if_igb.ko if you don’t want to build your own. https://github.com/neydah700/pfsense_intel/blob/main/if_igb.ko > > Also, for reference here is my pfatt script if anyone needs a reference. https://github.com/neydah700/pfsense_intel/blob/main/pfatt_intel.sh > > A few notes: > > 1. When I clean installed 2.6.0 (and 22.01 on my pfSense+ Box) absolutely nothing I did allowed my pfatt script to runs successfully from the /cf/conf directory. I ended up moving it to /root/pfatt and everything worked. This seemed to only be an issue once I moved to a ZFS file system but who knows. > 2. I have an angry family since our internet has been up and down for a few days now. @neydah700 you saved the day my friend! 2.6 was my first attempt with pfSense. I was about to give up. The above did the trick. I'm up and running and my ATT 1Gb has never been faster. Thank you!
neydah700 commented 2023-05-16 00:47:26 +05:30 (Migrated from github.com)

We might finally be able to close this issue out. https://redmine.pfsense.org/issues/12821?next_issue_id=12820

We might finally be able to close this issue out. https://redmine.pfsense.org/issues/12821?next_issue_id=12820
anthonywww commented 2024-02-28 09:55:14 +05:30 (Migrated from github.com)

Having issues with ix

Recently updated and all hell broke loose.

Not using dumped certs, wpa_supplicant, pfSense Plus, etc. just trying to use the original tethered method.

I did a backup and clean reinstall + restore, however, now earlyshellcmd is not included, so script can't auto exec on startup, tried symlinking /usr/local/etc/rc.d/pfatt -> /root/pfatt.sh - it runs but still having issues below:

After applying PR #73 the issue appears to be at /usr/sbin/ngctl mkpeer o2m: etf many1 downstream in the script.

uname -a

FreeBSD pfsense 14.0-CURRENT FreeBSD 14.0-CURRENT amd64 1400094 #1 RELENG_2_7_2-n255948-8d2b56da39c: Wed Dec  6 20:45:47 UTC 2023     root@freebsd:/var/jenkins/workspace/pfSense-CE-snapshots-2_7_2-main/obj/amd64/StdASW5b/var/jenkins/workspace/pfSense-CE-snapshots-2_7_2-main/sources/FreeBSD-src-RELENG_2_7_2/amd64.amd64/sys/pfSense amd64

Error:

ngctl: send msg: No such file or directory

Log:

2024-02-27 19:39:12 :: [pfatt.sh] :: pfSense + AT&T U-verse Residential Gateway for true bridge mode
2024-02-27 19:39:12 :: [pfatt.sh] :: Configuration:
2024-02-27 19:39:12 :: [pfatt.sh] ::        ONT_IF: ix0
2024-02-27 19:39:12 :: [pfatt.sh] ::         RG_IF: ix3
2024-02-27 19:39:12 :: [pfatt.sh] :: RG_ETHER_ADDR: <redacted>
2024-02-27 19:39:12 :: [pfatt.sh] :: attaching interfaces to ng_ether... OK!
2024-02-27 19:39:12 :: [pfatt.sh] :: building netgraph nodes...
2024-02-27 19:39:12 :: [pfatt.sh] ::   creating ng_one2many... OK!
2024-02-27 19:39:12 :: [pfatt.sh] ::   creating vlan node and interface... OK!
2024-02-27 19:39:12 :: [pfatt.sh] ::   defining etf for ix0 (ONT)...

sysctl dev.ix.0

dev.ix.0.fw_version: eTrack 0x800003e2 PHY FW V286
dev.ix.0.enable_aim: 0
dev.ix.0.advertise_speed: 7
dev.ix.0.fc: 3
dev.ix.0.mac_stats.tx_frames_1024_1522: 0
dev.ix.0.mac_stats.tx_frames_512_1023: 0
dev.ix.0.mac_stats.tx_frames_256_511: 203
dev.ix.0.mac_stats.tx_frames_128_255: 0
dev.ix.0.mac_stats.tx_frames_65_127: 5
dev.ix.0.mac_stats.tx_frames_64: 6
dev.ix.0.mac_stats.management_pkts_txd: 0
dev.ix.0.mac_stats.mcast_pkts_txd: 5
dev.ix.0.mac_stats.bcast_pkts_txd: 209
dev.ix.0.mac_stats.good_pkts_txd: 214
dev.ix.0.mac_stats.total_pkts_txd: 214
dev.ix.0.mac_stats.good_octets_txd: 71960
dev.ix.0.mac_stats.checksum_errs: 0
dev.ix.0.mac_stats.management_pkts_drpd: 0
dev.ix.0.mac_stats.management_pkts_rcvd: 0
dev.ix.0.mac_stats.recv_jabberd: 0
dev.ix.0.mac_stats.recv_oversized: 0
dev.ix.0.mac_stats.recv_fragmented: 0
dev.ix.0.mac_stats.recv_undersized: 0
dev.ix.0.mac_stats.rx_frames_1024_1522: 0
dev.ix.0.mac_stats.rx_frames_512_1023: 0
dev.ix.0.mac_stats.rx_frames_256_511: 0
dev.ix.0.mac_stats.rx_frames_128_255: 0
dev.ix.0.mac_stats.rx_frames_65_127: 0
dev.ix.0.mac_stats.rx_frames_64: 0
dev.ix.0.mac_stats.bcast_pkts_rcvd: 0
dev.ix.0.mac_stats.mcast_pkts_rcvd: 0
dev.ix.0.mac_stats.good_pkts_rcvd: 0
dev.ix.0.mac_stats.total_pkts_rcvd: 77
dev.ix.0.mac_stats.good_octets_rcvd: 0
dev.ix.0.mac_stats.total_octets_rcvd: 5544
dev.ix.0.mac_stats.xoff_recvd: 0
dev.ix.0.mac_stats.xoff_txd: 0
dev.ix.0.mac_stats.xon_recvd: 0
dev.ix.0.mac_stats.xon_txd: 0
dev.ix.0.mac_stats.rx_missed_packets: 0
dev.ix.0.mac_stats.rec_len_errs: 0
dev.ix.0.mac_stats.remote_faults: 0
dev.ix.0.mac_stats.local_faults: 10
dev.ix.0.mac_stats.short_discards: 0
dev.ix.0.mac_stats.byte_errs: 0
dev.ix.0.mac_stats.ill_errs: 0
dev.ix.0.mac_stats.crc_errs: 0
dev.ix.0.mac_stats.rx_errs: 0
dev.ix.0.queue3.rx_discarded: 0
dev.ix.0.queue3.rx_copies: 0
dev.ix.0.queue3.rx_bytes: 0
dev.ix.0.queue3.rx_packets: 0
dev.ix.0.queue3.rxd_tail: 128
dev.ix.0.queue3.rxd_head: 0
dev.ix.0.queue3.irqs: 0
dev.ix.0.queue3.interrupt_rate: 31250
dev.ix.0.queue3.tx_packets: 0
dev.ix.0.queue3.tso_tx: 0
dev.ix.0.queue3.txd_tail: 0
dev.ix.0.queue3.txd_head: 0
dev.ix.0.queue2.rx_discarded: 0
dev.ix.0.queue2.rx_copies: 0
dev.ix.0.queue2.rx_bytes: 0
dev.ix.0.queue2.rx_packets: 0
dev.ix.0.queue2.rxd_tail: 128
dev.ix.0.queue2.rxd_head: 0
dev.ix.0.queue2.irqs: 0
dev.ix.0.queue2.interrupt_rate: 31250
dev.ix.0.queue2.tx_packets: 0
dev.ix.0.queue2.tso_tx: 0
dev.ix.0.queue2.txd_tail: 0
dev.ix.0.queue2.txd_head: 0
dev.ix.0.queue1.rx_discarded: 0
dev.ix.0.queue1.rx_copies: 0
dev.ix.0.queue1.rx_bytes: 0
dev.ix.0.queue1.rx_packets: 0
dev.ix.0.queue1.rxd_tail: 128
dev.ix.0.queue1.rxd_head: 0
dev.ix.0.queue1.irqs: 0
dev.ix.0.queue1.interrupt_rate: 31250
dev.ix.0.queue1.tx_packets: 0
dev.ix.0.queue1.tso_tx: 0
dev.ix.0.queue1.txd_tail: 0
dev.ix.0.queue1.txd_head: 0
dev.ix.0.queue0.rx_discarded: 0
dev.ix.0.queue0.rx_copies: 0
dev.ix.0.queue0.rx_bytes: 0
dev.ix.0.queue0.rx_packets: 0
dev.ix.0.queue0.rxd_tail: 128
dev.ix.0.queue0.rxd_head: 0
dev.ix.0.queue0.irqs: 210
dev.ix.0.queue0.interrupt_rate: 31250
dev.ix.0.queue0.tx_packets: 214
dev.ix.0.queue0.tso_tx: 0
dev.ix.0.queue0.txd_tail: 432
dev.ix.0.queue0.txd_head: 432
dev.ix.0.link_irq: 1
dev.ix.0.watchdog_events: 0
dev.ix.0.dropped: 0
dev.ix.0.iflib.rxq3.rxq_fl0.buf_size: 2048
dev.ix.0.iflib.rxq3.rxq_fl0.credits: 128
dev.ix.0.iflib.rxq3.rxq_fl0.cidx: 0
dev.ix.0.iflib.rxq3.rxq_fl0.pidx: 128
dev.ix.0.iflib.rxq3.cpu: 6
dev.ix.0.iflib.rxq2.rxq_fl0.buf_size: 2048
dev.ix.0.iflib.rxq2.rxq_fl0.credits: 128
dev.ix.0.iflib.rxq2.rxq_fl0.cidx: 0
dev.ix.0.iflib.rxq2.rxq_fl0.pidx: 128
dev.ix.0.iflib.rxq2.cpu: 4
dev.ix.0.iflib.rxq1.rxq_fl0.buf_size: 2048
dev.ix.0.iflib.rxq1.rxq_fl0.credits: 128
dev.ix.0.iflib.rxq1.rxq_fl0.cidx: 0
dev.ix.0.iflib.rxq1.rxq_fl0.pidx: 128
dev.ix.0.iflib.rxq1.cpu: 2
dev.ix.0.iflib.rxq0.rxq_fl0.buf_size: 2048
dev.ix.0.iflib.rxq0.rxq_fl0.credits: 128
dev.ix.0.iflib.rxq0.rxq_fl0.cidx: 0
dev.ix.0.iflib.rxq0.rxq_fl0.pidx: 128
dev.ix.0.iflib.rxq0.cpu: 0
dev.ix.0.iflib.txq3.r_abdications: 0
dev.ix.0.iflib.txq3.r_restarts: 0
dev.ix.0.iflib.txq3.r_stalls: 0
dev.ix.0.iflib.txq3.r_starts: 0
dev.ix.0.iflib.txq3.r_drops: 0
dev.ix.0.iflib.txq3.r_enqueues: 0
dev.ix.0.iflib.txq3.ring_state: pidx_head: 0000 pidx_tail: 0000 cidx: 0000 state: IDLE
dev.ix.0.iflib.txq3.txq_cleaned: 0
dev.ix.0.iflib.txq3.txq_processed: 0
dev.ix.0.iflib.txq3.txq_in_use: 0
dev.ix.0.iflib.txq3.txq_cidx_processed: 0
dev.ix.0.iflib.txq3.txq_cidx: 0
dev.ix.0.iflib.txq3.txq_pidx: 0
dev.ix.0.iflib.txq3.no_tx_dma_setup: 0
dev.ix.0.iflib.txq3.txd_encap_efbig: 0
dev.ix.0.iflib.txq3.tx_map_failed: 0
dev.ix.0.iflib.txq3.no_desc_avail: 0
dev.ix.0.iflib.txq3.mbuf_defrag_failed: 0
dev.ix.0.iflib.txq3.m_pullups: 0
dev.ix.0.iflib.txq3.mbuf_defrag: 0
dev.ix.0.iflib.txq3.cpu: 6
dev.ix.0.iflib.txq2.r_abdications: 0
dev.ix.0.iflib.txq2.r_restarts: 0
dev.ix.0.iflib.txq2.r_stalls: 0
dev.ix.0.iflib.txq2.r_starts: 0
dev.ix.0.iflib.txq2.r_drops: 0
dev.ix.0.iflib.txq2.r_enqueues: 0
dev.ix.0.iflib.txq2.ring_state: pidx_head: 0000 pidx_tail: 0000 cidx: 0000 state: IDLE
dev.ix.0.iflib.txq2.txq_cleaned: 0
dev.ix.0.iflib.txq2.txq_processed: 0
dev.ix.0.iflib.txq2.txq_in_use: 0
dev.ix.0.iflib.txq2.txq_cidx_processed: 0
dev.ix.0.iflib.txq2.txq_cidx: 0
dev.ix.0.iflib.txq2.txq_pidx: 0
dev.ix.0.iflib.txq2.no_tx_dma_setup: 0
dev.ix.0.iflib.txq2.txd_encap_efbig: 0
dev.ix.0.iflib.txq2.tx_map_failed: 0
dev.ix.0.iflib.txq2.no_desc_avail: 0
dev.ix.0.iflib.txq2.mbuf_defrag_failed: 0
dev.ix.0.iflib.txq2.m_pullups: 0
dev.ix.0.iflib.txq2.mbuf_defrag: 0
dev.ix.0.iflib.txq2.cpu: 4
dev.ix.0.iflib.txq1.r_abdications: 0
dev.ix.0.iflib.txq1.r_restarts: 0
dev.ix.0.iflib.txq1.r_stalls: 0
dev.ix.0.iflib.txq1.r_starts: 0
dev.ix.0.iflib.txq1.r_drops: 0
dev.ix.0.iflib.txq1.r_enqueues: 0
dev.ix.0.iflib.txq1.ring_state: pidx_head: 0000 pidx_tail: 0000 cidx: 0000 state: IDLE
dev.ix.0.iflib.txq1.txq_cleaned: 0
dev.ix.0.iflib.txq1.txq_processed: 0
dev.ix.0.iflib.txq1.txq_in_use: 0
dev.ix.0.iflib.txq1.txq_cidx_processed: 0
dev.ix.0.iflib.txq1.txq_cidx: 0
dev.ix.0.iflib.txq1.txq_pidx: 0
dev.ix.0.iflib.txq1.no_tx_dma_setup: 0
dev.ix.0.iflib.txq1.txd_encap_efbig: 0
dev.ix.0.iflib.txq1.tx_map_failed: 0
dev.ix.0.iflib.txq1.no_desc_avail: 0
dev.ix.0.iflib.txq1.mbuf_defrag_failed: 0
dev.ix.0.iflib.txq1.m_pullups: 0
dev.ix.0.iflib.txq1.mbuf_defrag: 0
dev.ix.0.iflib.txq1.cpu: 2
dev.ix.0.iflib.txq0.r_abdications: 0
dev.ix.0.iflib.txq0.r_restarts: 0
dev.ix.0.iflib.txq0.r_stalls: 0
dev.ix.0.iflib.txq0.r_starts: 214
dev.ix.0.iflib.txq0.r_drops: 0
dev.ix.0.iflib.txq0.r_enqueues: 214
dev.ix.0.iflib.txq0.ring_state: pidx_head: 0214 pidx_tail: 0214 cidx: 0214 state: IDLE
dev.ix.0.iflib.txq0.txq_cleaned: 398
dev.ix.0.iflib.txq0.txq_processed: 430
dev.ix.0.iflib.txq0.txq_in_use: 34
dev.ix.0.iflib.txq0.txq_cidx_processed: 430
dev.ix.0.iflib.txq0.txq_cidx: 398
dev.ix.0.iflib.txq0.txq_pidx: 432
dev.ix.0.iflib.txq0.no_tx_dma_setup: 0
dev.ix.0.iflib.txq0.txd_encap_efbig: 0
dev.ix.0.iflib.txq0.tx_map_failed: 0
dev.ix.0.iflib.txq0.no_desc_avail: 0
dev.ix.0.iflib.txq0.mbuf_defrag_failed: 0
dev.ix.0.iflib.txq0.m_pullups: 0
dev.ix.0.iflib.txq0.mbuf_defrag: 0
dev.ix.0.iflib.txq0.cpu: 0
dev.ix.0.iflib.override_nrxds: 0
dev.ix.0.iflib.override_ntxds: 0
dev.ix.0.iflib.use_logical_cores: 0
dev.ix.0.iflib.separate_txrx: 0
dev.ix.0.iflib.core_offset: 0
dev.ix.0.iflib.tx_abdicate: 0
dev.ix.0.iflib.rx_budget: 0
dev.ix.0.iflib.disable_msix: 0
dev.ix.0.iflib.override_qs_enable: 0
dev.ix.0.iflib.override_nrxqs: 0
dev.ix.0.iflib.override_ntxqs: 0
dev.ix.0.iflib.driver_version: 4.0.1-k
dev.ix.0.%parent: pci4
dev.ix.0.%pnpinfo: vendor=0x8086 device=0x1528 subvendor=0x15d9 subdevice=0x1528 class=0x020000
dev.ix.0.%location: slot=0 function=0 dbsf=pci0:4:0:0
dev.ix.0.%driver: ix
dev.ix.0.%desc: Intel(R) X540-AT2
## Having issues with ix Recently updated and all hell broke loose. Not using `dumped certs`, `wpa_supplicant`, `pfSense Plus`, etc. just trying to use the original tethered method. I did a backup and clean reinstall + restore, however, now earlyshellcmd is not included, so script can't auto exec on startup, tried symlinking `/usr/local/etc/rc.d/pfatt` -> `/root/pfatt.sh` - it runs but still having issues below: After applying PR #73 the issue appears to be at `/usr/sbin/ngctl mkpeer o2m: etf many1 downstream` in the script. uname -a ``` FreeBSD pfsense 14.0-CURRENT FreeBSD 14.0-CURRENT amd64 1400094 #1 RELENG_2_7_2-n255948-8d2b56da39c: Wed Dec 6 20:45:47 UTC 2023 root@freebsd:/var/jenkins/workspace/pfSense-CE-snapshots-2_7_2-main/obj/amd64/StdASW5b/var/jenkins/workspace/pfSense-CE-snapshots-2_7_2-main/sources/FreeBSD-src-RELENG_2_7_2/amd64.amd64/sys/pfSense amd64 ``` Error: > ngctl: send msg: No such file or directory Log: ``` 2024-02-27 19:39:12 :: [pfatt.sh] :: pfSense + AT&T U-verse Residential Gateway for true bridge mode 2024-02-27 19:39:12 :: [pfatt.sh] :: Configuration: 2024-02-27 19:39:12 :: [pfatt.sh] :: ONT_IF: ix0 2024-02-27 19:39:12 :: [pfatt.sh] :: RG_IF: ix3 2024-02-27 19:39:12 :: [pfatt.sh] :: RG_ETHER_ADDR: <redacted> 2024-02-27 19:39:12 :: [pfatt.sh] :: attaching interfaces to ng_ether... OK! 2024-02-27 19:39:12 :: [pfatt.sh] :: building netgraph nodes... 2024-02-27 19:39:12 :: [pfatt.sh] :: creating ng_one2many... OK! 2024-02-27 19:39:12 :: [pfatt.sh] :: creating vlan node and interface... OK! 2024-02-27 19:39:12 :: [pfatt.sh] :: defining etf for ix0 (ONT)... ``` sysctl dev.ix.0 ``` dev.ix.0.fw_version: eTrack 0x800003e2 PHY FW V286 dev.ix.0.enable_aim: 0 dev.ix.0.advertise_speed: 7 dev.ix.0.fc: 3 dev.ix.0.mac_stats.tx_frames_1024_1522: 0 dev.ix.0.mac_stats.tx_frames_512_1023: 0 dev.ix.0.mac_stats.tx_frames_256_511: 203 dev.ix.0.mac_stats.tx_frames_128_255: 0 dev.ix.0.mac_stats.tx_frames_65_127: 5 dev.ix.0.mac_stats.tx_frames_64: 6 dev.ix.0.mac_stats.management_pkts_txd: 0 dev.ix.0.mac_stats.mcast_pkts_txd: 5 dev.ix.0.mac_stats.bcast_pkts_txd: 209 dev.ix.0.mac_stats.good_pkts_txd: 214 dev.ix.0.mac_stats.total_pkts_txd: 214 dev.ix.0.mac_stats.good_octets_txd: 71960 dev.ix.0.mac_stats.checksum_errs: 0 dev.ix.0.mac_stats.management_pkts_drpd: 0 dev.ix.0.mac_stats.management_pkts_rcvd: 0 dev.ix.0.mac_stats.recv_jabberd: 0 dev.ix.0.mac_stats.recv_oversized: 0 dev.ix.0.mac_stats.recv_fragmented: 0 dev.ix.0.mac_stats.recv_undersized: 0 dev.ix.0.mac_stats.rx_frames_1024_1522: 0 dev.ix.0.mac_stats.rx_frames_512_1023: 0 dev.ix.0.mac_stats.rx_frames_256_511: 0 dev.ix.0.mac_stats.rx_frames_128_255: 0 dev.ix.0.mac_stats.rx_frames_65_127: 0 dev.ix.0.mac_stats.rx_frames_64: 0 dev.ix.0.mac_stats.bcast_pkts_rcvd: 0 dev.ix.0.mac_stats.mcast_pkts_rcvd: 0 dev.ix.0.mac_stats.good_pkts_rcvd: 0 dev.ix.0.mac_stats.total_pkts_rcvd: 77 dev.ix.0.mac_stats.good_octets_rcvd: 0 dev.ix.0.mac_stats.total_octets_rcvd: 5544 dev.ix.0.mac_stats.xoff_recvd: 0 dev.ix.0.mac_stats.xoff_txd: 0 dev.ix.0.mac_stats.xon_recvd: 0 dev.ix.0.mac_stats.xon_txd: 0 dev.ix.0.mac_stats.rx_missed_packets: 0 dev.ix.0.mac_stats.rec_len_errs: 0 dev.ix.0.mac_stats.remote_faults: 0 dev.ix.0.mac_stats.local_faults: 10 dev.ix.0.mac_stats.short_discards: 0 dev.ix.0.mac_stats.byte_errs: 0 dev.ix.0.mac_stats.ill_errs: 0 dev.ix.0.mac_stats.crc_errs: 0 dev.ix.0.mac_stats.rx_errs: 0 dev.ix.0.queue3.rx_discarded: 0 dev.ix.0.queue3.rx_copies: 0 dev.ix.0.queue3.rx_bytes: 0 dev.ix.0.queue3.rx_packets: 0 dev.ix.0.queue3.rxd_tail: 128 dev.ix.0.queue3.rxd_head: 0 dev.ix.0.queue3.irqs: 0 dev.ix.0.queue3.interrupt_rate: 31250 dev.ix.0.queue3.tx_packets: 0 dev.ix.0.queue3.tso_tx: 0 dev.ix.0.queue3.txd_tail: 0 dev.ix.0.queue3.txd_head: 0 dev.ix.0.queue2.rx_discarded: 0 dev.ix.0.queue2.rx_copies: 0 dev.ix.0.queue2.rx_bytes: 0 dev.ix.0.queue2.rx_packets: 0 dev.ix.0.queue2.rxd_tail: 128 dev.ix.0.queue2.rxd_head: 0 dev.ix.0.queue2.irqs: 0 dev.ix.0.queue2.interrupt_rate: 31250 dev.ix.0.queue2.tx_packets: 0 dev.ix.0.queue2.tso_tx: 0 dev.ix.0.queue2.txd_tail: 0 dev.ix.0.queue2.txd_head: 0 dev.ix.0.queue1.rx_discarded: 0 dev.ix.0.queue1.rx_copies: 0 dev.ix.0.queue1.rx_bytes: 0 dev.ix.0.queue1.rx_packets: 0 dev.ix.0.queue1.rxd_tail: 128 dev.ix.0.queue1.rxd_head: 0 dev.ix.0.queue1.irqs: 0 dev.ix.0.queue1.interrupt_rate: 31250 dev.ix.0.queue1.tx_packets: 0 dev.ix.0.queue1.tso_tx: 0 dev.ix.0.queue1.txd_tail: 0 dev.ix.0.queue1.txd_head: 0 dev.ix.0.queue0.rx_discarded: 0 dev.ix.0.queue0.rx_copies: 0 dev.ix.0.queue0.rx_bytes: 0 dev.ix.0.queue0.rx_packets: 0 dev.ix.0.queue0.rxd_tail: 128 dev.ix.0.queue0.rxd_head: 0 dev.ix.0.queue0.irqs: 210 dev.ix.0.queue0.interrupt_rate: 31250 dev.ix.0.queue0.tx_packets: 214 dev.ix.0.queue0.tso_tx: 0 dev.ix.0.queue0.txd_tail: 432 dev.ix.0.queue0.txd_head: 432 dev.ix.0.link_irq: 1 dev.ix.0.watchdog_events: 0 dev.ix.0.dropped: 0 dev.ix.0.iflib.rxq3.rxq_fl0.buf_size: 2048 dev.ix.0.iflib.rxq3.rxq_fl0.credits: 128 dev.ix.0.iflib.rxq3.rxq_fl0.cidx: 0 dev.ix.0.iflib.rxq3.rxq_fl0.pidx: 128 dev.ix.0.iflib.rxq3.cpu: 6 dev.ix.0.iflib.rxq2.rxq_fl0.buf_size: 2048 dev.ix.0.iflib.rxq2.rxq_fl0.credits: 128 dev.ix.0.iflib.rxq2.rxq_fl0.cidx: 0 dev.ix.0.iflib.rxq2.rxq_fl0.pidx: 128 dev.ix.0.iflib.rxq2.cpu: 4 dev.ix.0.iflib.rxq1.rxq_fl0.buf_size: 2048 dev.ix.0.iflib.rxq1.rxq_fl0.credits: 128 dev.ix.0.iflib.rxq1.rxq_fl0.cidx: 0 dev.ix.0.iflib.rxq1.rxq_fl0.pidx: 128 dev.ix.0.iflib.rxq1.cpu: 2 dev.ix.0.iflib.rxq0.rxq_fl0.buf_size: 2048 dev.ix.0.iflib.rxq0.rxq_fl0.credits: 128 dev.ix.0.iflib.rxq0.rxq_fl0.cidx: 0 dev.ix.0.iflib.rxq0.rxq_fl0.pidx: 128 dev.ix.0.iflib.rxq0.cpu: 0 dev.ix.0.iflib.txq3.r_abdications: 0 dev.ix.0.iflib.txq3.r_restarts: 0 dev.ix.0.iflib.txq3.r_stalls: 0 dev.ix.0.iflib.txq3.r_starts: 0 dev.ix.0.iflib.txq3.r_drops: 0 dev.ix.0.iflib.txq3.r_enqueues: 0 dev.ix.0.iflib.txq3.ring_state: pidx_head: 0000 pidx_tail: 0000 cidx: 0000 state: IDLE dev.ix.0.iflib.txq3.txq_cleaned: 0 dev.ix.0.iflib.txq3.txq_processed: 0 dev.ix.0.iflib.txq3.txq_in_use: 0 dev.ix.0.iflib.txq3.txq_cidx_processed: 0 dev.ix.0.iflib.txq3.txq_cidx: 0 dev.ix.0.iflib.txq3.txq_pidx: 0 dev.ix.0.iflib.txq3.no_tx_dma_setup: 0 dev.ix.0.iflib.txq3.txd_encap_efbig: 0 dev.ix.0.iflib.txq3.tx_map_failed: 0 dev.ix.0.iflib.txq3.no_desc_avail: 0 dev.ix.0.iflib.txq3.mbuf_defrag_failed: 0 dev.ix.0.iflib.txq3.m_pullups: 0 dev.ix.0.iflib.txq3.mbuf_defrag: 0 dev.ix.0.iflib.txq3.cpu: 6 dev.ix.0.iflib.txq2.r_abdications: 0 dev.ix.0.iflib.txq2.r_restarts: 0 dev.ix.0.iflib.txq2.r_stalls: 0 dev.ix.0.iflib.txq2.r_starts: 0 dev.ix.0.iflib.txq2.r_drops: 0 dev.ix.0.iflib.txq2.r_enqueues: 0 dev.ix.0.iflib.txq2.ring_state: pidx_head: 0000 pidx_tail: 0000 cidx: 0000 state: IDLE dev.ix.0.iflib.txq2.txq_cleaned: 0 dev.ix.0.iflib.txq2.txq_processed: 0 dev.ix.0.iflib.txq2.txq_in_use: 0 dev.ix.0.iflib.txq2.txq_cidx_processed: 0 dev.ix.0.iflib.txq2.txq_cidx: 0 dev.ix.0.iflib.txq2.txq_pidx: 0 dev.ix.0.iflib.txq2.no_tx_dma_setup: 0 dev.ix.0.iflib.txq2.txd_encap_efbig: 0 dev.ix.0.iflib.txq2.tx_map_failed: 0 dev.ix.0.iflib.txq2.no_desc_avail: 0 dev.ix.0.iflib.txq2.mbuf_defrag_failed: 0 dev.ix.0.iflib.txq2.m_pullups: 0 dev.ix.0.iflib.txq2.mbuf_defrag: 0 dev.ix.0.iflib.txq2.cpu: 4 dev.ix.0.iflib.txq1.r_abdications: 0 dev.ix.0.iflib.txq1.r_restarts: 0 dev.ix.0.iflib.txq1.r_stalls: 0 dev.ix.0.iflib.txq1.r_starts: 0 dev.ix.0.iflib.txq1.r_drops: 0 dev.ix.0.iflib.txq1.r_enqueues: 0 dev.ix.0.iflib.txq1.ring_state: pidx_head: 0000 pidx_tail: 0000 cidx: 0000 state: IDLE dev.ix.0.iflib.txq1.txq_cleaned: 0 dev.ix.0.iflib.txq1.txq_processed: 0 dev.ix.0.iflib.txq1.txq_in_use: 0 dev.ix.0.iflib.txq1.txq_cidx_processed: 0 dev.ix.0.iflib.txq1.txq_cidx: 0 dev.ix.0.iflib.txq1.txq_pidx: 0 dev.ix.0.iflib.txq1.no_tx_dma_setup: 0 dev.ix.0.iflib.txq1.txd_encap_efbig: 0 dev.ix.0.iflib.txq1.tx_map_failed: 0 dev.ix.0.iflib.txq1.no_desc_avail: 0 dev.ix.0.iflib.txq1.mbuf_defrag_failed: 0 dev.ix.0.iflib.txq1.m_pullups: 0 dev.ix.0.iflib.txq1.mbuf_defrag: 0 dev.ix.0.iflib.txq1.cpu: 2 dev.ix.0.iflib.txq0.r_abdications: 0 dev.ix.0.iflib.txq0.r_restarts: 0 dev.ix.0.iflib.txq0.r_stalls: 0 dev.ix.0.iflib.txq0.r_starts: 214 dev.ix.0.iflib.txq0.r_drops: 0 dev.ix.0.iflib.txq0.r_enqueues: 214 dev.ix.0.iflib.txq0.ring_state: pidx_head: 0214 pidx_tail: 0214 cidx: 0214 state: IDLE dev.ix.0.iflib.txq0.txq_cleaned: 398 dev.ix.0.iflib.txq0.txq_processed: 430 dev.ix.0.iflib.txq0.txq_in_use: 34 dev.ix.0.iflib.txq0.txq_cidx_processed: 430 dev.ix.0.iflib.txq0.txq_cidx: 398 dev.ix.0.iflib.txq0.txq_pidx: 432 dev.ix.0.iflib.txq0.no_tx_dma_setup: 0 dev.ix.0.iflib.txq0.txd_encap_efbig: 0 dev.ix.0.iflib.txq0.tx_map_failed: 0 dev.ix.0.iflib.txq0.no_desc_avail: 0 dev.ix.0.iflib.txq0.mbuf_defrag_failed: 0 dev.ix.0.iflib.txq0.m_pullups: 0 dev.ix.0.iflib.txq0.mbuf_defrag: 0 dev.ix.0.iflib.txq0.cpu: 0 dev.ix.0.iflib.override_nrxds: 0 dev.ix.0.iflib.override_ntxds: 0 dev.ix.0.iflib.use_logical_cores: 0 dev.ix.0.iflib.separate_txrx: 0 dev.ix.0.iflib.core_offset: 0 dev.ix.0.iflib.tx_abdicate: 0 dev.ix.0.iflib.rx_budget: 0 dev.ix.0.iflib.disable_msix: 0 dev.ix.0.iflib.override_qs_enable: 0 dev.ix.0.iflib.override_nrxqs: 0 dev.ix.0.iflib.override_ntxqs: 0 dev.ix.0.iflib.driver_version: 4.0.1-k dev.ix.0.%parent: pci4 dev.ix.0.%pnpinfo: vendor=0x8086 device=0x1528 subvendor=0x15d9 subdevice=0x1528 class=0x020000 dev.ix.0.%location: slot=0 function=0 dbsf=pci0:4:0:0 dev.ix.0.%driver: ix dev.ix.0.%desc: Intel(R) X540-AT2 ```
owenthewizard commented 2024-02-29 06:17:40 +05:30 (Migrated from github.com)

@anthonywww there's no reason to use the tethered method anymore, nor supplicant with netgraph/switch. pfSense includes the necessary patches in wpa_supplicant and dhclient already. All you need are the certificates.

@anthonywww there's no reason to use the tethered method anymore, nor supplicant with netgraph/switch. pfSense includes the necessary patches in wpa_supplicant and dhclient already. All you need are the certificates.
anthonywww commented 2024-03-06 01:32:49 +05:30 (Migrated from github.com)
bump https://github.com/MonkWho/pfatt/issues/67#issuecomment-1968192203
neydah700 commented 2024-03-06 05:24:14 +05:30 (Migrated from github.com)

bump #67 (comment)

If you still want to use the tethered method and not any of the other workarounds you don't need, and probably shouldn't use, netgraph anymore. There is functionality built into pfsense now.

https://docs.netgate.com/pfsense/en/latest/recipes/authbridge.html

> bump [#67 (comment)](https://github.com/MonkWho/pfatt/issues/67#issuecomment-1968192203) If you still want to use the tethered method and not any of the other workarounds you don't need, and probably shouldn't use, netgraph anymore. There is functionality built into pfsense now. https://docs.netgate.com/pfsense/en/latest/recipes/authbridge.html
anthonywww commented 2024-03-06 07:12:16 +05:30 (Migrated from github.com)

bump #67 (comment)

If you still want to use the tethered method and not any of the other workarounds you don't need, and probably shouldn't use, netgraph anymore. There is functionality built into pfsense now.

https://docs.netgate.com/pfsense/en/latest/recipes/authbridge.html

Ah yes, I've seen that article, though it doesn't appear to work for the CE (non-Plus) version of PfSense unfortunately. Is there a guide for the CE version?

image

> > bump [#67 (comment)](https://github.com/MonkWho/pfatt/issues/67#issuecomment-1968192203) > > If you still want to use the tethered method and not any of the other workarounds you don't need, and probably shouldn't use, netgraph anymore. There is functionality built into pfsense now. > > https://docs.netgate.com/pfsense/en/latest/recipes/authbridge.html Ah yes, I've seen that article, though it doesn't appear to work for the CE (non-Plus) version of PfSense unfortunately. Is there a guide for the CE version? ![image](https://github.com/MonkWho/pfatt/assets/31651690/59878310-1070-4e58-a920-d8c3af644bf7)
tehdango commented 2024-03-10 07:52:06 +05:30 (Migrated from github.com)

If there is a guide I never found it. I decided to use the supplicant method since pfsense now supports it in all versions.

If there is a guide I never found it. I decided to use the supplicant method since pfsense now supports it in all versions.
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: hhf/pfatt#67
No description provided.