You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I have set default network option to "Prompt" in the global settings.
I have disabled "Force Block Incoming Connections" in the global settings (I'm aware of the risks).
I have created a global incoming rule "Allow LAN ICMP".
I have created a global outgoing rule "Allow ICMP".
Yet, when pinging the host from another machine in the same network, there is no response
I can see the inbound ICMP packages (echo request) on the host using Wireshark, but no outbound packages (echo reply).
What did you expect to happen?:
ICMP should come through and responses should be send to the network.
How did you reproduce it?:
Fails every time.
Issue also occurs when an incoming rule "Allow *" is used. Also other incoming connections are blocked.
Debug Information:
Version 1.6.10
Portmaster 1.6.10
built with go1.22.3 (gc -cgo) for windows/amd64
at 2024-05-15T12:03:21Z
commit 867d0bca2d71d7247039cf8e6b129580c28be7d6 (clean)
at 2024-05-15T09:08:08Z
from [email protected]:Safing/portmaster.git
Licensed under the GPLv3 license.
Platform: Microsoft Windows 11 Pro 10.0.22631 Build 22631
System: Microsoft Windows 11 Pro windows (Standalone Workstation) 10.0.22631 Build 22631
Kernel: 10.0.22631 Build 22631 x86_64
No Module ErrorUnexpected Logs
240926 17:51:22.961 v/location:303 > WARN 580 netenv: failed to get IPv4 device location from traceroute: did not receive any actionable ICMP reply
240926 17:52:52.073 er/resolve:460 > WARN 582 resolver: query to dns://192.168.180.5:53#system failed: dial udp :53222->192.168.180.5:53: bind: An attempt was made to access a socket in a way forbidden by its access permissions.
240926 17:53:47.006 er/resolve:460 > WARN 584 resolver: query to dns://192.168.180.5:53#system failed: dial udp :50130->192.168.180.5:53: bind: An attempt was made to access a socket in a way forbidden by its access permissions.
240926 17:53:48.016 er/resolve:460 > WARN 586 resolver: query to dns://192.168.180.5:53#system failed: dial udp :63723->192.168.180.5:53: bind: An attempt was made to access a socket in a way forbidden by its access permissions.
240926 17:53:48.016 ine-status:561 > WARN 588 netenv: dns query check failed: all 1 query-compliant resolvers failed, last error: dial udp :63723->192.168.180.5:53: bind: An attempt was made to access a socket in a way forbidden by its access permissions.
240926 17:54:07.881 er/resolve:460 > WARN 590 resolver: query to dns://192.168.180.5:53#system failed: dial udp :49347->192.168.180.5:53: bind: An attempt was made to access a socket in a way forbidden by its access permissions.
240926 17:54:07.881 er/resolve:316 > WARN 592 resolver: async query for _ldap._tcp.dc._msdcs.[redacted].SRV failed: all 1 query-compliant resolvers failed, last error: dial udp :49347->192.168.180.5:53: bind: An attempt was made to access a socket in a way forbidden by its access permissions.
240926 17:55:20.054 er/resolve:460 > WARN 594 resolver: query to dns://192.168.180.5:53#system failed: dial udp :53508->192.168.180.5:53: bind: An attempt was made to access a socket in a way forbidden by its access permissions.
240926 17:55:20.054 ine-status:561 > WARN 596 netenv: dns query check failed: all 1 query-compliant resolvers failed, last error: dial udp :53508->192.168.180.5:53: bind: An attempt was made to access a socket in a way forbidden by its access permissions.
240926 17:56:25.808 er/resolve:460 > WARN 598 resolver: query to dns://192.168.180.5:53#system failed: dial udp :53196->192.168.180.5:53: bind: An attempt was made to access a socket in a way forbidden by its access permissions.
240926 17:56:33.073 CURRENT TIME
DatagramV4Callout Callout This callout is used to handle datagram data for IPv4. {a6be3096-66bf-4959-8629-1c3a4c40c31e} [no provider key] FWPM_LAYER_DATAGRAM_DATA_V4
DatagramV4Filter Filter The filter is used for handling datagram data for IPv4. {cba0938d-9526-4a83-ad88-e765550f9f47} [no provider key] FWPM_LAYER_DATAGRAM_DATA_V4 {a87fb472-fc68-4805-8559-c6ae774773e0}
DatagramV6Callout Callout This callout is used to handle datagram data for IPv6. {d55cb395-29a1-4716-8cb1-65c888995f54} [no provider key] FWPM_LAYER_DATAGRAM_DATA_V6
DatagramV6Filter Filter The filter is used for handling datagram data for IPv6. {e0ae3c3e-a6e0-472f-8576-3664bfbe43c5} [no provider key] FWPM_LAYER_DATAGRAM_DATA_V6 {a87fb472-fc68-4805-8559-c6ae774773e0}
Edge traversal Teredo Authorization Sublayer SubLayer Edge traversal Teredo Authorization Sublayer {7b6b11f6-cbb5-433c-ae06-6a4f0076e49e}
IPxlat Forward IPv4 filter Callout Filters forwarded IPv4 packets into synthetic IPv6 packets {b255c296-7e0c-4115-95f3-b7f24a8a1162} [no provider key] FWPM_LAYER_IPFORWARD_V4
IPxlat Forward IPv4 sub layer SubLayer Sub layer for filtering forwarded IPv4 packets into synthetic IPv6 packets {4351e497-5d8b-46bc-86d9-abccdb868d6d}
IPxlat Inbound IPv6 filter Callout Filters incoming IPv6 packets into synthetic IPv4 packets {93bb703d-0502-42e2-8e30-a14576e5085d} [no provider key] FWPM_LAYER_INBOUND_IPPACKET_V6
IPxlat Inbound IPv6 sub layer SubLayer Sub layer for filtering incoming IPv6 packets into synthetic IPv4 packets {dfb035ca-c2a7-4684-97b6-4dbc57c63590}
IPxlat Outbound IPv4 filter Callout Filters outgoing IPv4 packets into synthetic IPv6 packets {66d52657-1979-4e58-b3f7-4756434c4880} [no provider key] FWPM_LAYER_OUTBOUND_IPPACKET_V4
IPxlat Outbound IPv4 sub layer SubLayer Sub layer for filtering outgoing IPv4 packets into synthetic IPv6 packets {d3e70856-fc90-4c0a-b9b2-a6f73e20b5cc}
NsAleFlowEstablishedV4 Callout Nsr ALE Flow Established V4 Callout {71da3b2d-c3e4-4aba-a5af-2518733296eb} [no provider key] FWPM_LAYER_ALE_FLOW_ESTABLISHED_V4
NsAleFlowEstablishedV6 Callout Nsr ALE Flow Established V6 Callout {891dd37c-9874-4a5e-a039-ba6f448a0e93} [no provider key] FWPM_LAYER_ALE_FLOW_ESTABLISHED_V6
NsStreamV4 Callout Nsr Stream V4 Callout {be26feaa-d260-4ee7-b4dc-ef842f537842} [no provider key] FWPM_LAYER_STREAM_V4
NsStreamV6 Callout Nsr Stream V6 Callout {3df07fda-20cc-4ad6-a06f-1df3134b4971} [no provider key] FWPM_LAYER_STREAM_V6
NsrSubLayer SubLayer nsr sublayer {94f25722-8dd9-49fc-8b64-1374205ab5e0}
PortmasterALEInboundV4Callout Callout This callout is used by the Portmaster to monitor outbound IPv4 traffic before the connection is established. {e36216c5-7b33-40ee-b054-fb1bc7decc19} [no provider key] FWPM_LAYER_ALE_AUTH_RECV_ACCEPT_V4
PortmasterALEInboundV4Filter Filter This filter is used by the Portmaster to monitor inbound IPv4 traffic before the connection is established. {5b420764-3ae5-414b-bac4-e473c985e754} [no provider key] FWPM_LAYER_ALE_AUTH_RECV_ACCEPT_V4 {a87fb472-fc68-4805-8559-c6ae774773e0}
PortmasterALEInboundV6Callout Callout This callout is used by the Portmaster to monitor outbound IPv6 traffic before the connection is established. {77ea9927-66e7-4cf8-9ea2-941edf2fae63} [no provider key] FWPM_LAYER_ALE_AUTH_RECV_ACCEPT_V6
PortmasterALEInboundV6Filter Filter This filter is used by the Portmaster to monitor inbound IPv6 traffic before the connection is established. {a4b71627-9c16-42f1-a04e-77d38125d78f} [no provider key] FWPM_LAYER_ALE_AUTH_RECV_ACCEPT_V6 {a87fb472-fc68-4805-8559-c6ae774773e0}
PortmasterALEOutboundV4Callout Callout This callout is used by the Portmaster to montiror outbound IPv4 traffic before the connection is established. {029819fe-97d9-4e5f-a0fb-78ef5cef8ac4} [no provider key] FWPM_LAYER_ALE_AUTH_CONNECT_V4
PortmasterALEOutboundV4Filter Filter This filter is used by the Portmaster to monitor outbound IPv4 traffic before the connection is established. {7e8ff1d9-6696-4cea-9c6a-5f1750d2c353} [no provider key] FWPM_LAYER_ALE_AUTH_CONNECT_V4 {a87fb472-fc68-4805-8559-c6ae774773e0}
PortmasterALEOutboundV6Callout Callout This callout is used by the Portmaster to monitor outbound IPv6 traffic before the connection is established. {d6b0213a-337a-4cc6-84c0-cc60731b9e2a} [no provider key] FWPM_LAYER_ALE_AUTH_CONNECT_V6
PortmasterALEOutboundV6Filter Filter This filter is used by the Portmaster to monitor outbound IPv6 traffic before the connection is established. {b73aecc0-a6a6-40ba-9f20-bdc9ed872eac} [no provider key] FWPM_LAYER_ALE_AUTH_CONNECT_V6 {a87fb472-fc68-4805-8559-c6ae774773e0}
PortmasterInboundV4Callout Callout This callout is used by the Portmaster to intercept inbound IPv4 traffic. {05c55149-4732-4857-8d10-f178f3a06f8c} [no provider key] FWPM_LAYER_INBOUND_IPPACKET_V4
PortmasterInboundV4Filter Filter This filter is used by the Portmaster to intercept inbound IPv4 traffic. {1353d0fa-7872-4c5d-b329-e21f127abfae} [no provider key] FWPM_LAYER_INBOUND_IPPACKET_V4 {a87fb472-fc68-4805-8559-c6ae774773e0}
PortmasterInboundV6Callout Callout This callout is used by the Portmaster to intercept inbound IPv6 traffic. {ceff1df7-2baa-44c5-a6e5-73a95849bcff} [no provider key] FWPM_LAYER_INBOUND_IPPACKET_V6
PortmasterInboundV6Filter Filter This filter is used by the Portmaster to intercept inbound IPv6 traffic. {37ec1ef5-faa2-48ed-a3df-6f3fad0fb161} [no provider key] FWPM_LAYER_INBOUND_IPPACKET_V6 {a87fb472-fc68-4805-8559-c6ae774773e0}
PortmasterOutboundV4Callout Callout This callout is used by the Portmaster to intercept outbound IPv4 traffic. {41162b9e-8473-4b88-a5eb-04cf1d276b06} [no provider key] FWPM_LAYER_OUTBOUND_IPPACKET_V4
PortmasterOutboundV4Filter Filter This filter is used by the Portmaster to intercept outbound IPv4 traffic. {cebb6c4d-61f9-4196-b1a8-f96b23284a96} [no provider key] FWPM_LAYER_OUTBOUND_IPPACKET_V4 {a87fb472-fc68-4805-8559-c6ae774773e0}
PortmasterOutboundV6Callout Callout This callout is used by the Portmaster to intercept outbound IPv6 traffic. {32bad112-6af4-4109-809b-c07570ba01b4} [no provider key] FWPM_LAYER_OUTBOUND_IPPACKET_V6
PortmasterOutboundV6Filter Filter This filter is used by the Portmaster to intercept outbound IPv6 traffic. {095abd95-99a1-4879-b4bf-a0bb39f76432} [no provider key] FWPM_LAYER_OUTBOUND_IPPACKET_V6 {a87fb472-fc68-4805-8559-c6ae774773e0}
PortmasterSublayer SubLayer The Portmaster sublayer holds all it's filters. {a87fb472-fc68-4805-8559-c6ae774773e0}
STREAM_FILTER Filter Filter used to capture Stream traffic {65758e15-1fc1-494e-b330-516d0dde8d12} [no provider key] FWPM_LAYER_STREAM_V4 {94f25722-8dd9-49fc-8b64-1374205ab5e0}
STREAM_FILTER Filter Filter used to capture Stream traffic {ec1d91e7-366b-4075-adaf-add9bcd666a4} [no provider key] FWPM_LAYER_STREAM_V6 {94f25722-8dd9-49fc-8b64-1374205ab5e0}
StreamV4Callout Callout This callout is used to handle stream data for IPv4. {525dac52-65de-4a6f-b546-2b1f3bc226db} [no provider key] FWPM_LAYER_STREAM_V4
StreamV4Filter Filter The filter is used for handling stream data for IPv4. {1976247a-a9f9-4c46-a91e-89fec9d0709a} [no provider key] FWPM_LAYER_STREAM_V4 {a87fb472-fc68-4805-8559-c6ae774773e0}
StreamV6Callout Callout This callout is used to handle stream data for IPv6. {4321ddf9-57b2-4391-8fc5-c5b46c655587} [no provider key] FWPM_LAYER_STREAM_V6
StreamV6Filter Filter The filter is used for handling stream data for IPv6. {79e9ed09-96fd-40ef-8853-f7d24d18f3fb} [no provider key] FWPM_LAYER_STREAM_V6 {a87fb472-fc68-4805-8559-c6ae774773e0}
TCP_FILTER Filter Filter used to capture TCP traffic {22ae0ed1-98e3-4f36-a8bc-d791131d6b1a} [no provider key] FWPM_LAYER_ALE_FLOW_ESTABLISHED_V6 {94f25722-8dd9-49fc-8b64-1374205ab5e0}
TCP_FILTER Filter Filter used to capture TCP traffic {70a1fc4a-0ab7-4169-a4a8-62076ab0e6b4} [no provider key] FWPM_LAYER_ALE_FLOW_ESTABLISHED_V4 {94f25722-8dd9-49fc-8b64-1374205ab5e0}
Teredo socket option opt out block filter Filter [no description] {1c75d4f8-134c-440c-824b-e5264224274f} {d8852324-f371-45c1-bdf5-2fd156502691} FWPM_LAYER_ALE_AUTH_RECV_ACCEPT_V6 {7b6b11f6-cbb5-433c-ae06-6a4f0076e49e}
Greetings and welcome to our community! As this is the first issue you opened here, we wanted to share some useful infos with you:
🗣️ Our community on Discord is super helpful and active. We also have an AI-enabled support bot that knows Portmaster well and can give you immediate help.
📖 The Wiki answers all common questions and has many important details. If you can't find an answer there, let us know, so we can add anything that's missing.
Nevermind, I figured out that my issues was a collision with the Windows Firewall after I have deinstalled Glasswire in preparation of Installation of Portmaster. I was not aware that the Windows Firewall is in effect with Portmaster. Instead I assume Portmaster is replacing the Windows Firewall. Now that I understood this, the solution was to add respective rules for inbound data traffic in the Windows Firewall as well and then it works.
Pre-Submit Checklist:
What happened:
What did you expect to happen?:
ICMP should come through and responses should be send to the network.
How did you reproduce it?:
Fails every time.
Issue also occurs when an incoming rule "Allow *" is used. Also other incoming connections are blocked.
Debug Information:
Version 1.6.10
Platform: Microsoft Windows 11 Pro 10.0.22631 Build 22631
No Module Error
Unexpected Logs
Status: Online
SPN: disabled (module disabled)
Resolvers: 1/1
Config: 8
Updates: stable (13/33)
Compatibility: WFP State (42)
Goroutine Stack
The text was updated successfully, but these errors were encountered: