Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Is it possible for one to "slip through"?

    Scheduled Pinned Locked Moved General pfSense Questions
    36 Posts 6 Posters 3.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • OBXJeepGuyO
      OBXJeepGuy
      last edited by

      I have a particular IP range blocked with pfBlockerNG, but it appears one got through, anyway. Thoughts?Screenshot 2022-11-15 at 17-35-02 pfSense.Colossus - Firewall pfBlockerNG IP IPv4.png BI.png

      GertjanG 1 Reply Last reply Reply Quote 0
      • GertjanG
        Gertjan @OBXJeepGuy
        last edited by

        @obxjeepguy

        What are we looking at :

        ab0a171a-b4a0-445b-8f7a-712d13f7af11-image.png

        The original IP feed ?
        The 205.210.31.0/24 could have been whitelisted - is it part of the alias popup when you inspect the pfBlockerNG firewall rule ?

        Another way : a state already existed.

        No "help me" PM's please. Use the forum, the community will thank you.
        Edit : and where are the logs ??

        johnpozJ OBXJeepGuyO 2 Replies Last reply Reply Quote 0
        • johnpozJ
          johnpoz LAYER 8 Global Moderator @Gertjan
          last edited by johnpoz

          @gertjan said in Is it possible for one to "slip through"?:

          Another way : a state already existed.

          But was a connection actually made? Or is that what he showing just a connection attempt by the client? Doesn't seem like the session was actually done. There are no frames, there is no time listed for the session, etc. Looks like some sort of connection attempt?

          But sure I would look in the pfsense state table

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.8, 24.11

          OBXJeepGuyO 1 Reply Last reply Reply Quote 1
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by

            If that IP list is being applies as a block to inbound connections that would otherwise reach that server then no, the connection would not 'slip through'.
            So either it's not being applied like that or there is another rule passing it. Or, yes, there was an existing state before the block was added.

            Steve

            1 Reply Last reply Reply Quote 1
            • OBXJeepGuyO
              OBXJeepGuy @Gertjan
              last edited by OBXJeepGuy

              @gertjan I meant to label everything, but did not. What you are looking at is the custom ipv4 block list in pfBlockerNG. With that in the list, nothing in that range should have gotten past the firewall, yet an ip address from that range came through to my Blue Iris server.

              1 Reply Last reply Reply Quote 0
              • OBXJeepGuyO
                OBXJeepGuy @johnpoz
                last edited by

                @johnpoz said in Is it possible for one to "slip through"?:

                @gertjan said in Is it possible for one to "slip through"?:

                Another way : a state already existed.

                But was a connection actually made? Or is that what he showing just a connection attempt by the client? Doesn't seem like the session was actually done. There are no frames, there is no time listed for the session, etc. Looks like some sort of connection attempt?

                But sure I would look in the pfsense state table

                No connection was actually made. However, that ip address shouldn't even be able to get that far the way it is set up. Also, I have to look into this "state already existed" everyone is talking about.

                johnpozJ 1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator @OBXJeepGuy
                  last edited by

                  @obxjeepguy said in Is it possible for one to "slip through"?:

                  that ip address shouldn't even be able to get that far the way it is set up.

                  But from what you posted I can not really tell if that is outbound connection attempt from inside your network, or a connection attempt from outside pfsense that is forwarded in?

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  1 Reply Last reply Reply Quote 0
                  • stephenw10S
                    stephenw10 Netgate Administrator
                    last edited by

                    Yes, more info needed.

                    I had assumed that you are forwarding traffic to the BlueIris server and have pfBlocker adding rules to filter that?
                    If you are using pfBlocker to automatically add rules make sure it's adding rules where you expect and in the right order.
                    Make sure the alias pfBlocker creates actually contains that subnet.

                    Steve

                    1 Reply Last reply Reply Quote 0
                    • OBXJeepGuyO
                      OBXJeepGuy
                      last edited by

                      1668552951143-screenshot-2022-11-15-at-17-35-02-pfsense.colossus-firewall-pfblockerng-ip-ipv4.png 1668552958928-bi.png

                      Okay, hopefully this explains it better. I have been running this firewall for about a year now with great success. Once I block a range, I never see another attempt. This particular one is the first time I have seen something like this happen.

                      1 Reply Last reply Reply Quote 0
                      • stephenw10S
                        stephenw10 Netgate Administrator
                        last edited by

                        But how are you applying that block? What is it blocking, traffic from a port forward to the server?

                        OBXJeepGuyO 1 Reply Last reply Reply Quote 0
                        • OBXJeepGuyO
                          OBXJeepGuy @stephenw10
                          last edited by

                          @stephenw10 I am blocking that IP range from anything on my LAN.

                          johnpozJ 1 Reply Last reply Reply Quote 0
                          • johnpozJ
                            johnpoz LAYER 8 Global Moderator @OBXJeepGuy
                            last edited by johnpoz

                            @obxjeepguy where is the rule?? On your lan? In floating, on your Wan?

                            What are the order of the rules? etc.. For all we know that was the device your showing the 205.x address in trying to make a connection and it didn't work, etc..

                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                            If you get confused: Listen to the Music Play
                            Please don't Chat/PM me for help, unless mod related
                            SG-4860 24.11 | Lab VMs 2.8, 24.11

                            1 Reply Last reply Reply Quote 0
                            • stephenw10S
                              stephenw10 Netgate Administrator
                              last edited by

                              From connecting to anything on your LAN?

                              Yeah, we need to see the rule and where it's applied really. There are many ways to apply that incorrectly. 😉

                              1 Reply Last reply Reply Quote 1
                              • OBXJeepGuyO
                                OBXJeepGuy
                                last edited by

                                I am guessing this is what you are looking for.

                                Screenshot 2022-11-17 at 17-27-47 pfSense.Colossus - Firewall Rules Floating.png

                                Screenshot 2022-11-17 at 17-32-42 pfSense.Colossus - Firewall pfBlockerNG IP.png

                                stephenw10S 1 Reply Last reply Reply Quote 0
                                • stephenw10S
                                  stephenw10 Netgate Administrator @OBXJeepGuy
                                  last edited by stephenw10

                                  Those all look like the included list names. Is your custom block list added to one of those?

                                  Or, what 'list action' do you have set on your custom list?

                                  OBXJeepGuyO 1 Reply Last reply Reply Quote 0
                                  • OBXJeepGuyO
                                    OBXJeepGuy @stephenw10
                                    last edited by

                                    @stephenw10 The custom block list is within pfB_PRI1_v4.

                                    1 Reply Last reply Reply Quote 0
                                    • stephenw10S
                                      stephenw10 Netgate Administrator
                                      last edited by

                                      Ok, so that would block connections from that subnet inbound on WAN. And since it's a floating rule it would do so before and pass rules you might have on the WAN tab. You haven't explicitly confirmed it but I assume you have a port forward to the server on WAN with linked firewall rules there?

                                      OBXJeepGuyO 2 Replies Last reply Reply Quote 1
                                      • OBXJeepGuyO
                                        OBXJeepGuy @stephenw10
                                        last edited by

                                        @stephenw10 said in Is it possible for one to "slip through"?:

                                        Ok, so that would block connections from that subnet inbound on WAN. And since it's a floating rule it would do so before and pass rules you might have on the WAN tab. You haven't explicitly confirmed it but I assume you have a port forward to the server on WAN with linked firewall rules there?

                                        Yes, I do have a port forward going to the server. I should have included that. I’ll post an image as soon as I get back to a PC.

                                        1 Reply Last reply Reply Quote 0
                                        • OBXJeepGuyO
                                          OBXJeepGuy
                                          last edited by

                                          Okay. There it is. Been quite busy at work.

                                          IMG_2676.jpg

                                          1 Reply Last reply Reply Quote 0
                                          • OBXJeepGuyO
                                            OBXJeepGuy @stephenw10
                                            last edited by

                                            @stephenw10 Now that I look at it, something seems off. I'm not quite sure.

                                            johnpozJ 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.