• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Possible DoS attack

Scheduled Pinned Locked Moved IDS/IPS
7 Posts 3 Posters 927 Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • S
    supermario_bueno
    last edited by Apr 7, 2022, 7:54 PM

    I'm new to Pfsense. Today I noticed that one of the internet links from my company started using too much bandwidth. I ran a package capture in it, and through it's logs, I saw that there is one IP pinging the link's IP, so 99% of the packages are ICMP request and reply from this same IP. I created an alias and a rule, trying to block this IP. I put it on the top of all the other rules, but the ping didn't stop. I even tried installing Snort, configured it, ran it, but that IP is still pinging... I don't know what else to do.

    S G 2 Replies Last reply Apr 7, 2022, 9:06 PM Reply Quote 0
    • S
      SteveITS Galactic Empire @supermario_bueno
      last edited by Apr 7, 2022, 9:06 PM

      @supermario_bueno If there's an open state you may need to kill it:
      https://docs.netgate.com/pfsense/en/latest/troubleshooting/firewall.html#new-rules-are-not-applied

      Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
      When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
      Upvote 👍 helpful posts!

      S 1 Reply Last reply Apr 8, 2022, 10:58 AM Reply Quote 0
      • S
        supermario_bueno @SteveITS
        last edited by Apr 8, 2022, 10:58 AM

        @steveits Oh, I see. I created and applied the rule blocking that IP, I checked, and there is an open state between my WAN and this IP, using the ICMP protocol. So I need to kill this connection. I just gotta figure out how to do that 😅

        1 Reply Last reply Reply Quote 0
        • S
          supermario_bueno
          last edited by supermario_bueno Apr 8, 2022, 11:27 AM Apr 8, 2022, 11:26 AM

          I tried using the "pfctl -k host" comand in the prompt, but it returns: "killed 0 states from 1 sources and 0 destinations", it's not killing the state =/ I also tried the command "pfctl -k host -k host", to try to kill that specific state, but I get the same return.

          S 1 Reply Last reply Apr 8, 2022, 2:12 PM Reply Quote 0
          • G
            Gertjan @supermario_bueno
            last edited by Apr 8, 2022, 1:08 PM

            @supermario_bueno said in Possible DoS attack:

            I even tried installing Snort, configured it, ran it, but that IP is still pinging... I don't know what else to do.

            Yes, you know what to do ;)
            You can't do anything on your side.
            You have to go to the device that is pinging you, and stop that command that says "ping you".

            Example : If I was pinging your IP right now, could you stop me from doing that ?
            No.
            But you could ask me to do ^

            You could contact the guy that manages your upstream router/firewall, and ask them to "block" ping from a defined IP? a network or even more.
            This means : contact your ISP. But, be careful (see below).

            You can't block (stop) from someone sending you something. You can't block what comes down into your WAN pipe. Not on your side of the pipe.

            Normally, a simple small ICMP (ping) packet will get dropped if the originating ICMP wasn't a request from your side.
            You activated 'snort' (== millions of CPU cycles !!) to "analyse" (there is nothing to analyse).
            What will happen if 'some one' now send you many packets ? Your pfSense spike to a 100 % CPU utilisation .... and then it comes crashing down.

            What to do ?

            1. nothing : drop them as fast as possible. (what a beauty : this is pfSense default counter mesure !) Don't try to do something with it remember : cycles !!)
            2. Change the WAN IP, if possible.
            3. Make no enemies on the net. Because, you will loose (or get a huuuuuuge WAN pipe, like several Mbytes / sec, so you can welcome there packets with open arms)
            4. I'll say it again : if your ISP has a firewall, use it. (But they will probably not doing that, they throw you off their client list)
            5. Hide yourself behind a VPN, and change your IP when needed.
            6. Analysing DOS traffic might be useful if your if you are preparing some MIT study, and you have the hardware to do so, like an entire Google Data centre.
            7. "keep a low profile" & "fly under the radar".

            No "help me" PM's please. Use the forum, the community will thank you.
            Edit : and where are the logs ??

            1 Reply Last reply Reply Quote 0
            • S
              SteveITS Galactic Empire @supermario_bueno
              last edited by Apr 8, 2022, 2:12 PM

              @supermario_bueno On the doc page I linked it says "See Check the State Table." That page says "the open connection will not be cut off. To see an immediate effect from a new block rule, the states must be reset. See Firewall States for more information." That will get you to here:
              https://docs.netgate.com/pfsense/en/latest/monitoring/status/firewall-states-gui.html where you can click the trash can icon to delete a state.

              Gertjan is correct that you can't end the incoming traffic since it's already gone down the wire to you, but if you are allowing your router to respond to pings then blocking the inbound would at least stop the outbound responses.

              Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
              When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
              Upvote 👍 helpful posts!

              S 1 Reply Last reply Apr 8, 2022, 6:25 PM Reply Quote 0
              • S
                supermario_bueno @SteveITS
                last edited by Apr 8, 2022, 6:25 PM

                @steveits Thank you so much for you advice!! I tracked the location of that IP and just emailed the company, explaining what's happening. The most intriguing part is that the IP is from the agency that registers and maintains all".br" websites here in Brazil, maybe they were victims of some kind of attack.

                1 Reply Last reply Reply Quote 0
                7 out of 7
                • First post
                  7/7
                  Last post
                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                  This community forum collects and processes your personal information.
                  consent.not_received