Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Is it possible for one to "slip through"?

    Scheduled Pinned Locked Moved General pfSense Questions
    36 Posts 6 Posters 3.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • OBXJeepGuyO
      OBXJeepGuy @johnpoz
      last edited by

      @johnpoz said in Is it possible for one to "slip through"?:

      @obxjeepguy said in Is it possible for one to "slip through"?:

      Just like the folks who cover their license plates in photos of their cars.

      No not the same - lic number is unique and could be looked up ;)

      Rfc1918 space used by everyone.. It would be like telling you I live on the planet earth ;) could you find me with that info hehehe

      My pc is 192.168.9.100, my gateway is 192.168.9.253 - does that give you any info at all that could be used to track me to where I am exactly, or even what ISP I use, etc.

      All very true. I was always told to not even let any of those numbers out. Especially port numbers. I know the only way is if I knew your public IP address. So that being said, I will get on with port forwarding, and @stephenw10 will see there is a linked rule.

      Screenshot 2022-11-19 at 08-29-35 pfSense.Colossus - Firewall NAT Port Forward.png

      johnpozJ 1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator @OBXJeepGuy
        last edited by

        @obxjeepguy I not sure who told you to hide those or ports.. But they don't work in networking that is for sure.

        Me knowing your forwarding to 80 or 443 provides me nothing if I don't know what your public wan IP is. Like saying hay your house number is 123.. What city, what street ;) if I do not know these things 123 is meaningless and provides nothing to track you. But it can be very helpful in spotting problems. Hey that should be 443, not 444 etc.

        For example I forward externally port 23040 to my plex on 32400. Without even a clue to what my public IP is - how does that give away anything?

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        OBXJeepGuyO 2 Replies Last reply Reply Quote 1
        • OBXJeepGuyO
          OBXJeepGuy @johnpoz
          last edited by

          @johnpoz I seem to be learning quite a bit today. Screenshot 2022-11-19 at 08-58-05 pfSense.Colossus - Firewall NAT Port Forward.png

          1 Reply Last reply Reply Quote 0
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by

            Anyway can we assume you are not translating the ports between the WAN and targets?

            The floating block rule you had would have blocked that traffic you saw unless it was somehow not applied at that time or a state already existed. Since you're only forwarding TCP traffic though a state remaining open would be far less likely.

            Steve

            OBXJeepGuyO 1 Reply Last reply Reply Quote 0
            • OBXJeepGuyO
              OBXJeepGuy @stephenw10
              last edited by OBXJeepGuy

              @stephenw10 said in Is it possible for one to "slip through"?:

              Anyway can we assume you are not translating the ports between the WAN and targets?

              The floating block rule you had would have blocked that traffic you saw unless it was somehow not applied at that time or a state already existed. Since you're only forwarding TCP traffic though a state remaining open would be far less likely.

              Steve

              No port translating.
              That floating block rule has been in place since I first set this up. The thing I don't understand is a "state already existed".

              1 Reply Last reply Reply Quote 0
              • OBXJeepGuyO
                OBXJeepGuy @johnpoz
                last edited by

                @johnpoz And I just looked at the state table. I guess too much time has passed and it has dropped off the list.

                1 Reply Last reply Reply Quote 0
                • stephenw10S
                  stephenw10 Netgate Administrator
                  last edited by

                  Another possibility is that the alias somehow became invalid when pfBlocker updated and it wasn't applied. I would put a custom list in a separate entry because that will always be valid and doesn't require updating.

                  OBXJeepGuyO 1 Reply Last reply Reply Quote 0
                  • OBXJeepGuyO
                    OBXJeepGuy @stephenw10
                    last edited by OBXJeepGuy

                    @stephenw10 Never even thought of that possibility. Very interesting. I wouldn't even begin to know how to put that list in a separate entry, so I will leave well enough alone. This setup has worked insanely well for me in a lot of ways. It just kind of puzzled me when that one IP got through.

                    And thanks a million for all of the replies. I feel I have learned a ton, even about things not on this subject.

                    N johnpozJ 2 Replies Last reply Reply Quote 1
                    • N
                      nimrod @OBXJeepGuy
                      last edited by nimrod

                      @stephenw10

                      Wouldnt this option prevented this issue ?

                      5f219169-7aca-464b-a7b3-ac7b58515f4e-image.png

                      stephenw10S J 2 Replies Last reply Reply Quote 0
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator @OBXJeepGuy
                        last edited by

                        @obxjeepguy just create a IP/network alias under firewall aliases

                        alias.jpg

                        Then you can use that in any rule you want.. There is nothing wrong with have 2 rules that are suppose to block the same thing. You know for sure your manually created alias will have what you put in it.. There is always the off chance, slim as it might be that when you automate stuff to update that something goes wrong and maybe doesn't update correctly. It should work 9999 out of 10k - but you never know..

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                        1 Reply Last reply Reply Quote 2
                        • stephenw10S
                          stephenw10 Netgate Administrator @nimrod
                          last edited by

                          @nimrod said in Is it possible for one to "slip through"?:

                          Wouldnt this option prevented this issue ?

                          That's a good point. Yes I would expect it to if it was set. Assuming this was caused by an open state.

                          1 Reply Last reply Reply Quote 1
                          • J
                            jdeloach @nimrod
                            last edited by

                            @nimrod said in Is it possible for one to "slip through"?:

                            @stephenw10

                            Wouldnt this option prevented this issue ?

                            5f219169-7aca-464b-a7b3-ac7b58515f4e-image.png

                            Just to add my 2 cents worth, I just ran into a situation where the states were not being cleared because an IP appeared to remain after the force command. I ended up manually clearing the states to fix the issue.

                            I would say, if all else fails, manually clear the states as was suggested earlier, I think.

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.