Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    I'm sick of neer-do-wells hitting my WAN with TCP:SYN

    Scheduled Pinned Locked Moved Firewalling
    20 Posts 6 Posters 1.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • H
      henderbc
      last edited by

      OK - I have a plan I would appreciate comments on.

      1. Find all IPs sending me TCP:SYNs on my WAN.
      2. Turn the IPs into simple subnets (eg: 46.17.96.38 -> 46.17.0.0/16
      3. Remove duplicates resulting from ignoring lower 2 octets
      4. Make an alias with the resulting subnets called BLACKLIST
      5. Make a rule:
        Block WAN Source network BLACKLIST Destination any (don't log)
      6. Make another rule below the rule in 5) :
        Block WAN Source any Destination any (output log)
      7. Make another rule:
        Block LAN Source any Destination BLACKLIST (don't log)
      8. After a day (or maybe a week) collect all the log entries resulting from 6) and repeat 2) through 4) adding the newly harvested subnets to the BLACKLIST alias

      I know I could use all sorts of solutions such as pfBlocker, but the above is something I could do without much complication that would allow me over time to build up a set of external host with which I simply refuse to communicate in any way.

      Yes, blaming an x.x.0.0/16 subnet on the actions of a x.x.x.x host could possibly result in breaking a web site or two somewhere down the road, but I'm willing to accept that possibility.

      All comments welcome.

      keyserK johnpozJ P 3 Replies Last reply Reply Quote 0
      • keyserK
        keyser Rebel Alliance @henderbc
        last edited by

        @henderbc Why? It’s not like you are communicating with them if your firewall blocks a SYN packet from them.
        The only difference this makes is your’e not logging it, and that you cannot initiate a session to the entire /16 subnet they represent - which very likely will cause you issues along the way.

        Love the no fuss of using the official appliances :-)

        1 Reply Last reply Reply Quote 1
        • johnpozJ
          johnpoz LAYER 8 Global Moderator @henderbc
          last edited by

          @henderbc this is exercise in futility to be honest

          Do you have any port forwards setup? if not all this traffic blocked anyway. If you do have port forwards setup, its much better to just allow the IPs you want, be it even if that is country.. If you allow only say US IPs, this is going to be where more restrictive than you banning the internet one subnet at a time..

          Or just use lists that are already maintained and easy to install, its noise anyway.. The internet is a noisy place..

          Traffic to example 23 is going to be dropped for example, sql another one 1433, do you have these open to the internet via a port forward. If not then that traffic doesn't go anywhere and is just dropped. If you don't want to see the noise, then just turn off the default log and log only say your port forwards, or other interesting ports you want to see.

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.7.2, 24.11

          H 1 Reply Last reply Reply Quote 1
          • H
            henderbc @johnpoz
            last edited by

            @johnpoz
            First, I have no ports open as of now. When I need do do that, I can make appropriate exception rules.

            As for why, my purpose is not to make internet noise visible. Rather, it is to discover who out there is interested in my firewall and potentially my devices behind it.

            Here's my rationale: There are 65K /16 subnets out there, each of which may contain one or more entities who have entirely different motives than me for being connected to the internet, and undoubtedly some of those are malicious. Let's just say that of those 65K subnets, one percent of them contain one or more malicious actors. That means I only have to block ALL communication with 655 of the subnets.

            They get a black mark by TCP:SYN'ing me and by denying them any form of communication, I would make it impossible for them to receive anything at all from my protected LAN.

            I agree that this is far from being a complete solution, but don't you think that it has the potential of eliminating a useful number of threats?

            johnpozJ 1 Reply Last reply Reply Quote 0
            • johnpozJ
              johnpoz LAYER 8 Global Moderator @henderbc
              last edited by johnpoz

              @henderbc said in I'm sick of neer-do-wells hitting my WAN with TCP:SYN:

              First, I have no ports open as of now.

              Then what do you think this accomplishes.. Other than extra work for you to do that does nothing. The default is deny, creating another deny does nothing..

              If you don't want to see the noise then turn of logging of default.

              You understand out of the box some box sending you a syn or ping or whatever gets ZERO back, the traffic is just dropped.. You're not accomplishing anything creating another block..

              Such rules only make sense when you have port forwards and want to limit who can actually talk to your port forwards..

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.7.2, 24.11

              1 Reply Last reply Reply Quote 0
              • M
                michmoor LAYER 8 Rebel Alliance
                last edited by michmoor

                I honestly do not understand the rationale here. It’s nonsensical.
                I’m not trying to be mean but seriously I don’t get it. I read your post 3 times. I’m thinking maybe there’s some high level plan here that I’m missing. It happens I’m human.
                But at that end of the day you have no open ports to the internet. Absolutely no way an inbound session can be initiated to you at all. You want to create blocklists for already blocked IPs to do what exactly?

                One more edit:
                Then you want to create a block rule to block nets on boundaries such as /16. That’s insane as the internet doesn’t work that way. And do this because an IP is sending a SYN?!?

                Firewall: NetGate,Palo Alto-VM,Juniper SRX
                Routing: Juniper, Arista, Cisco
                Switching: Juniper, Arista, Cisco
                Wireless: Unifi, Aruba IAP
                JNCIP,CCNP Enterprise

                johnpozJ 1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator @michmoor
                  last edited by

                  @michmoor said in I'm sick of neer-do-wells hitting my WAN with TCP:SYN:

                  lock rule to block nets on boundaries such as /16.

                  Yeah that is going to block a lot of stuff, other companies, etc. I would see doing huge large nets preventing access to you port forwards. But if you block that outbound, you most likely end up breaking big chunks of the net..

                  But as you already said you don't have any port forwards..

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                  H 1 Reply Last reply Reply Quote 0
                  • H
                    henderbc @johnpoz
                    last edited by

                    @johnpoz I guess I've done a poor job of explaining my plan. Perhaps an analogy would help.

                    There are several shopping malls in the town where I live. As it turns out, one of them has, upon occasion had muggings take place in the parking lot. It seems logical to me to simply choose to shop elsewhere because I can. The store owners were not responsible, nor were the thousands of other shoppers who regularly go there. I don't really care about the details of the last mugging that occurred. I just draw conclusions about that place that make me want to avoid it.

                    Similarly, my firewall plan has nothing directly to do with somebody on some subnet sending me a TCP:SYN packet. I am well aware that my firewall will simply ignore that packet. However, the fact that somebody decided to not mind their own business and reach out to my unique WAN port (repeatedly in many cases) is evidence that, for whatever reason, makes me prefer to get my information elsewhere. In other words, if someone on some subnet touches my box, I will block that subnet going forward, not just from unsolicited traffic on the WAN side, but also potential threats coming from inside my network in the future.

                    I am essentially trying to build a crime map of the internet much the way some web sites build a crime map of big cities in the US, coloring whole city blocks 'red' - not because all the people in that block are criminals, but rather because it only makes sense to choose to spend my time in 'green' areas.

                    At the moment, this is just an hypothesis for me. It may well turn out that I have to block the entire internet.

                    But maybe only 1% of it.

                    1 Reply Last reply Reply Quote 0
                    • P
                      Patch @henderbc
                      last edited by

                      @henderbc said in I'm sick of neer-do-wells hitting my WAN with TCP:SYN:

                      I have a plan I would appreciate comments on

                      I suggest starting with pfblockerNG-develop and use the feeds to block known bad players and VPN.
                      Then see what is left.

                      That should explicitly block most scanners. Then when you want to open a port you know most bad players will not see you.

                      johnpozJ 1 Reply Last reply Reply Quote 0
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator @Patch
                        last edited by

                        @patch Well your going to not have much of the internet to use then..

                        Like saying oh, there was a mugging in Chicago - not going to go to US ever..

                        There are many CDNs where boxes are run, where 1 bad user now blocks you from all good stuff on their whole network. So you get a one bad stray syn from say AWS, and your not going to go to any AWS ip.. Welcome to non functioning internet.

                        Some of that traffic is orgs trying to map how open the internet is.. Run on legit CDNs that house lots of other stuff..

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                        P 1 Reply Last reply Reply Quote 0
                        • P
                          Patch @johnpoz
                          last edited by Patch

                          @johnpoz
                          I find a selection of the feeds in pfBlocker relatively specific for my use case. Sad to hear your find them less useful.

                          johnpozJ 1 Reply Last reply Reply Quote 0
                          • johnpozJ
                            johnpoz LAYER 8 Global Moderator @Patch
                            last edited by johnpoz

                            @patch I didn't say that - those are rules that can be very specific for someone wanting to do what he is doing. What I am saying finding an IP and then blocking the /16 that IP come is going to be problematic at best if you actually want to use the internet.

                            There are maintained lists already, say for example the shodan scanner

                            https://wiki.ipfire.org/configuration/firewall/blockshodan

                            And sure the lists in pfblocker - no reason to try and reinvent the wheel here.

                            Blocking based on AS vs a arbitrarily random cidr of /16 would be a better option..

                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                            If you get confused: Listen to the Music Play
                            Please don't Chat/PM me for help, unless mod related
                            SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                            NogBadTheBadN H 2 Replies Last reply Reply Quote 1
                            • NogBadTheBadN
                              NogBadTheBad @johnpoz
                              last edited by

                              @johnpoz Indeed:-

                              Screenshot 2023-01-23 at 11.52.16.png

                              Andy

                              1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                              1 Reply Last reply Reply Quote 0
                              • H
                                henderbc @johnpoz
                                last edited by

                                @johnpoz OK - I'm convinced. My plan is going to take a lot of work without much payoff.

                                As you might have guessed by now, I'm pretty much a pfSense NOOB and
                                I appreciate all of your insights and expertise.

                                It looks like I'll be investing some work in pfBlocker. Can anyone suggest the best (simplest) step-by-step guide to getting a basic pfBlocker setup started?

                                NogBadTheBadN 1 Reply Last reply Reply Quote 0
                                • NogBadTheBadN
                                  NogBadTheBad @henderbc
                                  last edited by NogBadTheBad

                                  @henderbc Use pfBlocker like my example to create aliases and then use those on the WAN interface.

                                  There is a wizard to do the basic install, you'll also need to sign up for a MaxMind license key if you want to use their GeoIP data.

                                  Install the pfBlockerNG-devel version.

                                  https://www.youtube.com/watch?v=xizAeAqYde4

                                  https://www.youtube.com/watch?v=oNo77CMoxUM

                                  Andy

                                  1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                                  H 1 Reply Last reply Reply Quote 0
                                  • H
                                    henderbc @NogBadTheBad
                                    last edited by

                                    @nogbadthebad Here's what running the wizard gave me:
                                    a6a590f0-ed64-4ba9-a21c-d036babda141-image.png

                                    Would you recommend I use your entries instead of these or as well as?

                                    johnpozJ NogBadTheBadN 2 Replies Last reply Reply Quote 0
                                    • johnpozJ
                                      johnpoz LAYER 8 Global Moderator @henderbc
                                      last edited by

                                      @henderbc I don't seem to have any problem downloading that talos list

                                      https://www.talosintelligence.com/documents/ip-blacklist

                                      Can you open that link in a browser? It redirects to different location, but can get a list of IPs in my browser - does that work for you?

                                      redirect.jpg

                                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                                      If you get confused: Listen to the Music Play
                                      Please don't Chat/PM me for help, unless mod related
                                      SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                                      1 Reply Last reply Reply Quote 0
                                      • NogBadTheBadN
                                        NogBadTheBad @henderbc
                                        last edited by NogBadTheBad

                                        @henderbc It's up to you to be honest, I wanted to create my own list rather than the standard one.

                                        I just started looking at what was hitting my WAN interface and built up a list of what was doing a port scan on my WAN.

                                        It started from the shodan list and sort of expanded.

                                        Andy

                                        1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                                        johnpozJ 1 Reply Last reply Reply Quote 0
                                        • johnpozJ
                                          johnpoz LAYER 8 Global Moderator @NogBadTheBad
                                          last edited by

                                          @nogbadthebad ^ exactly what I would suggest, what you want to block would be up to you.. But again keep in mind if you have zero ports opens its all pretty pointless other say not logging this traffic to keep your firewall log smaller?

                                          If your phone ringer is off, does it really matter if a spammer calls you - you don't answer the phone anyway because the phone doesn't ring.. But you might not like picking up your phone and see missed calls.

                                          So if you don't want to log these scanners that valid, but if your still going to log them, and you don't have any ports open anyway.. Not sure what the point is? Other than say info on how much traffic is coming from these known scanners. Another big scanner is recyber.net but atleast they have an optout where you can put in your IP and they are suppose to exclude your IP from their scanning.

                                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                                          If you get confused: Listen to the Music Play
                                          Please don't Chat/PM me for help, unless mod related
                                          SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                                          NogBadTheBadN 1 Reply Last reply Reply Quote 1
                                          • NogBadTheBadN
                                            NogBadTheBad @johnpoz
                                            last edited by

                                            @johnpoz said in I'm sick of neer-do-wells hitting my WAN with TCP:SYN:

                                            If your phone ringer is off, does it really matter if a spammer calls you - you don't answer the phone anyway because the phone doesn't ring.. But you might not like picking up your phone and see missed calls.

                                            My ringer is on as I have an IPSec VPN & SFTP server local 😁

                                            Andy

                                            1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.