Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    ip address silently blocked

    Scheduled Pinned Locked Moved Firewalling
    35 Posts 4 Posters 3.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ
      johnpoz LAYER 8 Global Moderator @lifeboy
      last edited by johnpoz

      @lifeboy said in ip address silently blocked:

      My default deny rule logs, so I expect that failed ping to be in there if it were blocked, but it's not

      Its not going to be there if it never gets there!

      Sniff on your wan when you do your ping test - do you see the ping get there?

      The only way it would not be in the firewall log is it never gets there, or you have something like snort or something blocking it. So the firewall never actually saw it to say block or allow.

      Other thing that could cause what your seeing is you have a rule blocking - set to not log. Do you have any rules in floating? Sniff is always best place to start - so you KNOW for sure if traffic is getting to pfsense or not. I would guess you have a floating rule blocking it set to not log. Maybe a pfblocker rule? Based on geoip or reputation or some other list your loading?

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.8, 24.11

      lifeboyL 1 Reply Last reply Reply Quote 0
      • lifeboyL
        lifeboy @johnpoz
        last edited by lifeboy

        @johnpoz I sniff the WAN port, but it's doens't get there.

        It's clear it doesn't get there. But if it gets there when I disable the firewall, then it's something the firewall does that blocks it, not so?

        I don't have snort installed.

        If it was one firewall doing this I'd suspect some rule or config, but 2 different ones makes me suspect it's something else.

        johnpozJ GertjanG 2 Replies Last reply Reply Quote 0
        • johnpozJ
          johnpoz LAYER 8 Global Moderator @lifeboy
          last edited by johnpoz

          @lifeboy said in ip address silently blocked:

          I sniff the WAN port, but it's doens't get there.

          Sniff has zero to do with firewall on or off.. If its not getting there, its not getting there - nothing pfsense can do - can not answer, can not forward if it doesn't see the traffic. Can not allow, can not block.

          Sniff would see the traffic before it ever gets to the firewall. The traffic is viewed via a sniff before it would be passed up the stack to the firewall. It is via the interface and what the interface sees or puts on the wire.. In front of any firewall your running on that interface.

          network -- interface - sniff -- firewall (pfsense)

          As traffic enters the interface from the network - if your sniffing you would see traffic no matter what your firewall or any application up the stack would do with the traffic. Outbound, firewall could stop the traffic from being put on the network before the sniffer would see it.. But if you see it via the sniff - then it was put on the wire outbound, etc.

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.8, 24.11

          1 Reply Last reply Reply Quote 0
          • GertjanG
            Gertjan @lifeboy
            last edited by Gertjan

            @lifeboy
            Example of what @johnpoz said above :
            When I snif on my WAN with these settings :

            1c601b3a-cac3-4911-bdf9-66430f8d23d1-image.png

            = I selected WAN, IPv4 and "ICMP"

            I have a lot of results, and it tells me that 'something' locally is pinging some one on the net.
            The something is the dpinger process that constantly pings a remote device so it can 'mesure' my uplink (WAN) connection.
            This is a default configuration case.
            The remote device is a host that I choose myself : one of my own web server, hosted somewhere on the Internet.

            15:45:35.050123 IP 198.23.119.36 > 192.168.10.3: ICMP echo request, id 21026, seq 24371, length 8
            15:45:35.050158 IP 192.168.10.3 > 198.23.119.36: ICMP echo reply, id 21026, seq 24371, length 8
            15:45:35.164477 IP 192.168.10.3 > 188.165.53.87: ICMP echo request, id 2264, seq 46975, length 9
            15:45:35.187540 IP 188.165.53.87 > 192.168.10.3: ICMP echo reply, id 2264, seq 46975, length 9
            15:45:35.666470 IP 192.168.10.3 > 188.165.53.87: ICMP echo request, id 2264, seq 46976, length 9
            15:45:35.689982 IP 188.165.53.87 > 192.168.10.3: ICMP echo reply, id 2264, seq 46976, length 9
            15:45:36.167471 IP 192.168.10.3 > 188.165.53.87: ICMP echo request, id 2264, seq 46977, length 9
            15:45:36.190547 IP 188.165.53.87 > 192.168.10.3: ICMP echo reply, id 2264, seq 46977, length 9
            15:45:36.669470 IP 192.168.10.3 > 188.165.53.87: ICMP echo request, id 2264, seq 46978, length 9
            15:45:36.692864 IP 188.165.53.87 > 192.168.10.3: ICMP echo reply, id 2264, seq 46978, length 9
            15:45:37.170470 IP 192.168.10.3 > 188.165.53.87: ICMP echo request, id 2264, seq 46979, length 9
            15:45:37.193307 IP 188.165.53.87 > 192.168.10.3: ICMP echo reply, id 2264, seq 46979, length 9
            15:45:37.437407 IP 169.45.119.36 > 192.168.10.3: ICMP echo request, id 2101, seq 48249, length 8
            15:45:37.437426 IP 192.168.10.3 > 169.45.119.36: ICMP echo reply, id 2101, seq 48249, length 8
            15:45:37.672470 IP 192.168.10.3 > 188.165.53.87: ICMP echo request, id 2264, seq 46980, length 9
            15:45:37.694874 IP 188.165.53.87 > 192.168.10.3: ICMP echo reply, id 2264, seq 46980, length 9
            

            198.23.119.36 = 24.77.17c6.ip4.static.sl-reverse.com : dono who that is, but he pinged 'me', and 'I' replied. He pings me a lot .....

            "192.168.10.3" (192.168.10.1) is my upstream ISP router. 192.168.10.3 is my pfSense WAN IP, it's an RFC1918.

            My ISP routes all traffic, everything, to 192.168.1.3, my pfSense WAN IP.

            188.165.53.87 is the IP my dpinger process "WAN checker" is using as the gateway check device.

            When I start to ping to my WAN IP from some remote location (a remote dedicated server) using 188.165.201.123, I see :

            15:50:15.500120 IP 188.165.201.123 > 192.168.10.3: ICMP echo request, id 28246, seq 11, length 64
            15:50:15.500132 IP 192.168.10.3 > 188.165.201.123: ICMP echo reply, id 28246, seq 11, length 64
            

            I understand that you don't care about all this ping stuff. I'm just showing what I send on one side, and receive on the other side.

            So :
            Do you have an upstream router ?
            What are the NAT rules you use ?

            edit : Troubleshooting NAT Port Forwards

            No "help me" PM's please. Use the forum, the community will thank you.
            Edit : and where are the logs ??

            lifeboyL 1 Reply Last reply Reply Quote 0
            • lifeboyL
              lifeboy @Gertjan
              last edited by lifeboy

              @Gertjan

              I'm now contacting the client to run a ping from her side again to do another packet capture on the WAN port. I'll do that with the firewall enabled and disabled.

              The fact is that she cannot even ping the WAN ip address, whereas the rest of the world apparently can.
              When the firewall is disabled, she can ping the WAN port. Forget all the rest: The problem is essentially just that.

              Can you ping 197.214.117.194 ? She can't (this is the one firewall)
              Can you ping 197.214.119.130 ? Sha can't (this is the other firewall)

              She can ping the first FW's gateway address, 197.214.117.193 as well as the second FW's gateway 197.214.119.129.

              ALSO: This was not a problem yesterday, but today it suddenly is.

              johnpozJ 1 Reply Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator @lifeboy
                last edited by johnpoz

                Your firewall being on or off would have zero to do with traffic getting to that IP...

                In like 30 some years in the business - have never seen such a thing.. A sniff always happens before the firewall in the stack.. If not seeing it via sniff, its not getting there. Or you sniff is messed up - wrong filtering, wrong interface, etc.

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.8, 24.11

                lifeboyL 1 Reply Last reply Reply Quote 0
                • lifeboyL
                  lifeboy @johnpoz
                  last edited by lifeboy

                  @johnpoz said in ip address silently blocked:

                  Your firewall being on or off would have zero to do with traffic getting to that IP...

                  In like 30 some years in the business - have never seen such a thing..

                  neither have I in about as many years :-)

                  A sniff always happens before the firewall in the stack.. If not seeing it via sniff,
                  its not getting there. Or you sniff is messed up - wrong filtering, wrong
                  interface, etc.

                  Here's the pfSense packet capture with the firewall enabled:

                  16:54:40.059933 IP 197.214.117.194 > 197.214.117.193: ICMP echo request, id 36805, seq 32265, length 9
                  16:54:40.060261 IP 197.214.117.193 > 197.214.117.194: ICMP echo reply, id 36805, seq 32265, length 9
                  16:54:40.561928 IP 197.214.117.194 > 197.214.117.193: ICMP echo request, id 36805, seq 32266, length 9
                  16:54:40.562254 IP 197.214.117.193 > 197.214.117.194: ICMP echo reply, id 36805, seq 32266, length 9
                  16:54:41.063930 IP 197.214.117.194 > 197.214.117.193: ICMP echo request, id 36805, seq 32267, length 9
                  16:54:41.064256 IP 197.214.117.193 > 197.214.117.194: ICMP echo reply, id 36805, seq 32267, length 9
                  16:54:41.565932 IP 197.214.117.194 > 197.214.117.193: ICMP echo request, id 36805, seq 32268, length 9
                  16:54:41.566259 IP 197.214.117.193 > 197.214.117.194: ICMP echo reply, id 36805, seq 32268, length 9
                  

                  And here it is with the firewall disabled:

                  16:59:30.846247 IP 197.214.117.193 > 197.214.117.194: ICMP echo reply, id 36805, seq 32843, length 9
                  16:59:31.045781 IP 102.218.142.79 > 197.214.117.194: ICMP echo request, id 1, seq 167, length 40
                  16:59:31.045795 IP 197.214.117.194 > 102.218.142.79: ICMP echo reply, id 1, seq 167, length 40
                  16:59:31.347906 IP 197.214.117.194 > 197.214.117.193: ICMP echo request, id 36805, seq 32844, length 9
                  16:59:31.348233 IP 197.214.117.193 > 197.214.117.194: ICMP echo reply, id 36805, seq 32844, length 9
                  16:59:31.849904 IP 197.214.117.194 > 197.214.117.193: ICMP echo request, id 36805, seq 32845, length 9
                  16:59:31.850229 IP 197.214.117.193 > 197.214.117.194: ICMP echo reply, id 36805, seq 32845, length 9
                  16:59:32.050159 IP 102.218.142.79 > 197.214.117.194: ICMP echo request, id 1, seq 168, length 40
                  16:59:32.050168 IP 197.214.117.194 > 102.218.142.79: ICMP echo reply, id 1, seq 168, length 40
                  16:59:32.351906 IP 197.214.117.194 > 197.214.117.193: ICMP echo request, id 36805, seq 32846, length 9
                  16:59:32.352389 IP 197.214.117.193 > 197.214.117.194: ICMP echo reply, id 36805, seq 32846, length 9
                  

                  Here's a screenshot from the client, first part where the firewall is enabled, second part where it's disabled.

                  70a4f09b-98cc-485f-94ba-50d00143cb70-image.png

                  So clearly the firewall is blocking the icmp packets from that address 102.218.142.79.

                  But not from other addresses:
                  (with the firewall packet filter enabled)

                  df9e0db0-c5f5-4e43-9cf1-0b93f023c7cd-image.png

                  johnpozJ 1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator @lifeboy
                    last edited by

                    @lifeboy said in ip address silently blocked:

                    So clearly the firewall is blocking the icmp packets from that address.

                    That is not what I see - how can firewall block what it doesn't see? Again if pfsense doesn't see the traffic how can it do anything with it.. The firewall being on or off has nothing to do with what traffic is seen by the interface.

                    Run your wan traffic through a switch/tap and mirror/span the port so you can sniff outside of pfsense. To see if traffic is actually put on the wire towards pfsense wan.

                    But have never on any device let alone pfsense ever see firewall have any effect on what your sniffing. Sniff is taken from the interface before the "firewall" even sees it to block or allow.

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    lifeboyL 1 Reply Last reply Reply Quote 0
                    • lifeboyL
                      lifeboy @johnpoz
                      last edited by lifeboy

                      @johnpoz, fair enough, but how do you explain that the minute the firewall packet filter is disabled, the traffic is seen and a ping returned?

                      Also, why is only that ip address getting a timeout, when every other address I have tried is passed by the filters and a response sent back to a ping?

                      Also, the on firewall is a physical metal (Sun X2100) machine, whereas the other is a VM on Proxmox. Both have the exact same behaviour.

                      I'll see what I can do to sniff the traffic on the metal box from the switch.

                      NogBadTheBadN johnpozJ 2 Replies Last reply Reply Quote 0
                      • NogBadTheBadN
                        NogBadTheBad @lifeboy
                        last edited by NogBadTheBad

                        @lifeboy Why are you seeing traffic from 197.214.117.193 going to 197.214.117.194 through the firewall, aren't they both on the same subnet past the pfSense interface?

                        Screenshot 2021-09-09 at 16.31.35.png

                        Andy

                        1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                        1 Reply Last reply Reply Quote 0
                        • johnpozJ
                          johnpoz LAYER 8 Global Moderator @lifeboy
                          last edited by johnpoz

                          @lifeboy said in ip address silently blocked:

                          but how do you explain that the minute the firewall packet filter is disabled, the traffic is seen and a ping returned?

                          I don't - all I can say in 30 some years doing this stuff have never in my life seen a firewall have anyway to control what a sniff sees or doesn't see. If your sniff is not seeing it - then its not there.. Why its not there.. No idea. But nothing can happen with that traffic on pfsense if the traffic is not there.

                          197.214.117.193 going to 197.214.117.194 through the firewall,

                          That is not going through the firewall - he is sniffing on the wan.. And that is his dpinger pinging his gateway would be my take on that.. Better filtering on his sniff so he doesn't see that noise, and only sees the source of the pings would of been better idea. For all we know he didn't see the traffic because he filled up his 100 packets before pings even started ;)

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                          lifeboyL 1 Reply Last reply Reply Quote 0
                          • lifeboyL
                            lifeboy @johnpoz
                            last edited by lifeboy

                            @johnpoz said in ip address silently blocked:

                            @lifeboy said in ip address silently blocked:

                            but how do you explain that the minute the firewall packet filter is disabled, the traffic is seen and a ping returned?

                            I don't - all I can say in 30 some years doing this stuff have never in my life seen a firewall have anyway to control what a sniff sees or doesn't see. If your sniff is not seeing it - then its not there.. Why its not there.. No idea. But nothing can happen with that traffic on pfsense if the traffic is not there.

                            Well, the traffic is there the moment I disable the packet filter. So the packet filter is somehow involved in this, that much is clear.

                            197.214.117.193 going to 197.214.117.194 through the firewall,

                            That is not going through the firewall - he is sniffing on the wan.. And that is his dpinger pinging his gateway would be my take on that.. Better filtering on his sniff so he doesn't see that noise, and only sees the source of the pings would of been
                            better idea.

                            Yes, it is dpinger. I didn't filter it out on purpose, simple because I want to see everthing for the duration of the capture, since I'm dealing with an unknown here.

                            For all we know he didn't see the traffic because he filled up his 100 packets before pings even started ;)

                            Nope, not the case. I first started the ping (with "ping -t"), then I started capturing and stopped it again. I then disabled the packet filter on pfSense, the ping started getting replies and I captured packets again. In the second capture, the address is present, in the first not. But I did say this all quite clearly and presented the details. It seems people don't read clearly?

                            My suspicion is that this is some regression that has been introduced in the 2.5.2. This address is pretty close to a bogon network range 102.218.0.0/17. Are bogon network packets just silently dropped?

                            As a test I have now disabled "Block bogon networks" on the WAN port and lo and behold, pings now are being responded to. As soon as I enable it again, they time out.

                            I suspect that instead of 102.218.0.0/17 being blocked, 102.218.0.0/16 is being blocked. I cannot find an authoritive list of bogon networks though. Can someone help with that?

                            lifeboyL 1 Reply Last reply Reply Quote 0
                            • lifeboyL
                              lifeboy @lifeboy
                              last edited by lifeboy

                              To answer my own question: https://<firewall>/diag_tables.php and select bogon to view the list. In there 102.218.0.0/17 is listed, but no matches for 102.218.142.79, so there seems to be a buggy bogon filter.

                              johnpozJ 1 Reply Last reply Reply Quote 0
                              • johnpozJ
                                johnpoz LAYER 8 Global Moderator @lifeboy
                                last edited by johnpoz

                                @lifeboy said in ip address silently blocked:

                                there seems to be a buggy bogon filter.

                                And again even if was bogon - firewall is after sniff!! Nothing you can do in the firewall has anything to do with what you see on the interface via a sniff.. Just doesn't work that way..

                                Here
                                https://docs.netgate.com/pfsense/en/latest/diagnostics/packetcapture/index.html

                                "For incoming traffic, captures will show traffic that arrives on an interface on the firewall regardless of whether that traffic will be blocked by the firewall configuration"

                                alt text

                                If you say it works when not doing bogon - has your bogon be updated recently? Look in diagnostic tables for what cidrs are listed in bogon for pfsense..

                                An intelligent man is sometimes forced to be drunk to spend time with his fools
                                If you get confused: Listen to the Music Play
                                Please don't Chat/PM me for help, unless mod related
                                SG-4860 24.11 | Lab VMs 2.8, 24.11

                                lifeboyL 1 Reply Last reply Reply Quote 0
                                • lifeboyL
                                  lifeboy @johnpoz
                                  last edited by

                                  @johnpoz, look I really don't care about the semantics of what you're explaining (which is not wrong) ...

                                  The fact is that when I turn bogon filtering off, the packets are allowed, and when I turn it back on, the packets silently are blocked. pfSense does that. It has nothing to do with how or whether I sniff the traffic or not.

                                  So, how to do file a bug report?

                                  johnpozJ 1 Reply Last reply Reply Quote 0
                                  • johnpozJ
                                    johnpoz LAYER 8 Global Moderator @lifeboy
                                    last edited by johnpoz

                                    So did you validate what is in pfsense bogon table, look under diag, tables bogon. maybe yours is old..

                                    I don't see that listed..

                                    bogon.jpg

                                    Should show you when last updated
                                    updated.jpg

                                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                                    If you get confused: Listen to the Music Play
                                    Please don't Chat/PM me for help, unless mod related
                                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                                    lifeboyL 1 Reply Last reply Reply Quote 0
                                    • lifeboyL
                                      lifeboy @johnpoz
                                      last edited by lifeboy

                                      @johnpoz, I explained in detail in my previous reply that I did interrogate the list and didn't find a match. I even speculated that it the /17 might be a filtered as a /16, so again: Why are why going in circles?

                                      bogon filter on: nothing is "seen" by pfSense' packet capture tool. pings time out.
                                      bogon filter off: packets are recording by the packet filter. pings get a reply.

                                      Conclusion: There's a problem with the bogon filter.

                                      Clear enough?

                                      Please don't be obnoxious about this, even if you're a global moderator.

                                      johnpozJ 1 Reply Last reply Reply Quote 0
                                      • johnpozJ
                                        johnpoz LAYER 8 Global Moderator @lifeboy
                                        last edited by johnpoz

                                        @lifeboy I just PM you my IP, have that IP ping my IP.. I have bogon blocked, I have it set to log and I allow ping. And running a sniff. If can show its being blocked more than happy to help you fill out a bug report.

                                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                                        If you get confused: Listen to the Music Play
                                        Please don't Chat/PM me for help, unless mod related
                                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                                        johnpozJ 1 Reply Last reply Reply Quote 0
                                        • johnpozJ
                                          johnpoz LAYER 8 Global Moderator @johnpoz
                                          last edited by johnpoz

                                          Ok.. Now we are getting somewhere with info we can work with for bug report.

                                          From my quick look at my bogon table - that should not be blocked. But clearly it is being blocked..

                                          info.jpg

                                          But also seeing it via sniff - so have no idea what going on why your not seeing sniff..

                                          edit: Ok it should be blocked by bogon - with this entry
                                          102.218.128.0/19
                                          102.218.128.0 - 102.218.159.255

                                          So need to see if bogon is just not updated..

                                          https://www.team-cymru.org/Services/Bogons/fullbogons-ipv4.txt

                                          102.218.0.0/18
                                          102.218.64.0/19
                                          102.218.96.0/21
                                          102.218.104.0/22
                                          102.218.128.0/23
                                          102.218.131.0/24
                                          102.219.56.0/22
                                          102.221.132.0/22
                                          102.221.136.0/21
                                          102.223.180.0/22
                                          102.223.184.0/21
                                          

                                          edit: Doh I can not read this afternoon - looks like updated list it is removed. That /19 changed to a /23

                                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                                          If you get confused: Listen to the Music Play
                                          Please don't Chat/PM me for help, unless mod related
                                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                                          lifeboyL 1 Reply Last reply Reply Quote 0
                                          • lifeboyL
                                            lifeboy @johnpoz
                                            last edited by

                                            @johnpoz I just had a look at my log setting and see that "Log packets blocked by 'Block Bogon Networks' rules" is not turned on, which explains why I didn't see them in the log. I see the bogon block log now.

                                            johnpozJ 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.