Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    I'm sick of neer-do-wells hitting my WAN with TCP:SYN

    Scheduled Pinned Locked Moved Firewalling
    20 Posts 6 Posters 1.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ
      johnpoz LAYER 8 Global Moderator @henderbc
      last edited by johnpoz

      @henderbc said in I'm sick of neer-do-wells hitting my WAN with TCP:SYN:

      First, I have no ports open as of now.

      Then what do you think this accomplishes.. Other than extra work for you to do that does nothing. The default is deny, creating another deny does nothing..

      If you don't want to see the noise then turn of logging of default.

      You understand out of the box some box sending you a syn or ping or whatever gets ZERO back, the traffic is just dropped.. You're not accomplishing anything creating another block..

      Such rules only make sense when you have port forwards and want to limit who can actually talk to your port forwards..

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.7.2, 24.11

      1 Reply Last reply Reply Quote 0
      • M
        michmoor LAYER 8 Rebel Alliance
        last edited by michmoor

        I honestly do not understand the rationale here. It’s nonsensical.
        I’m not trying to be mean but seriously I don’t get it. I read your post 3 times. I’m thinking maybe there’s some high level plan here that I’m missing. It happens I’m human.
        But at that end of the day you have no open ports to the internet. Absolutely no way an inbound session can be initiated to you at all. You want to create blocklists for already blocked IPs to do what exactly?

        One more edit:
        Then you want to create a block rule to block nets on boundaries such as /16. That’s insane as the internet doesn’t work that way. And do this because an IP is sending a SYN?!?

        Firewall: NetGate,Palo Alto-VM,Juniper SRX
        Routing: Juniper, Arista, Cisco
        Switching: Juniper, Arista, Cisco
        Wireless: Unifi, Aruba IAP
        JNCIP,CCNP Enterprise

        johnpozJ 1 Reply Last reply Reply Quote 0
        • johnpozJ
          johnpoz LAYER 8 Global Moderator @michmoor
          last edited by

          @michmoor said in I'm sick of neer-do-wells hitting my WAN with TCP:SYN:

          lock rule to block nets on boundaries such as /16.

          Yeah that is going to block a lot of stuff, other companies, etc. I would see doing huge large nets preventing access to you port forwards. But if you block that outbound, you most likely end up breaking big chunks of the net..

          But as you already said you don't have any port forwards..

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.7.2, 24.11

          H 1 Reply Last reply Reply Quote 0
          • H
            henderbc @johnpoz
            last edited by

            @johnpoz I guess I've done a poor job of explaining my plan. Perhaps an analogy would help.

            There are several shopping malls in the town where I live. As it turns out, one of them has, upon occasion had muggings take place in the parking lot. It seems logical to me to simply choose to shop elsewhere because I can. The store owners were not responsible, nor were the thousands of other shoppers who regularly go there. I don't really care about the details of the last mugging that occurred. I just draw conclusions about that place that make me want to avoid it.

            Similarly, my firewall plan has nothing directly to do with somebody on some subnet sending me a TCP:SYN packet. I am well aware that my firewall will simply ignore that packet. However, the fact that somebody decided to not mind their own business and reach out to my unique WAN port (repeatedly in many cases) is evidence that, for whatever reason, makes me prefer to get my information elsewhere. In other words, if someone on some subnet touches my box, I will block that subnet going forward, not just from unsolicited traffic on the WAN side, but also potential threats coming from inside my network in the future.

            I am essentially trying to build a crime map of the internet much the way some web sites build a crime map of big cities in the US, coloring whole city blocks 'red' - not because all the people in that block are criminals, but rather because it only makes sense to choose to spend my time in 'green' areas.

            At the moment, this is just an hypothesis for me. It may well turn out that I have to block the entire internet.

            But maybe only 1% of it.

            1 Reply Last reply Reply Quote 0
            • P
              Patch @henderbc
              last edited by

              @henderbc said in I'm sick of neer-do-wells hitting my WAN with TCP:SYN:

              I have a plan I would appreciate comments on

              I suggest starting with pfblockerNG-develop and use the feeds to block known bad players and VPN.
              Then see what is left.

              That should explicitly block most scanners. Then when you want to open a port you know most bad players will not see you.

              johnpozJ 1 Reply Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator @Patch
                last edited by

                @patch Well your going to not have much of the internet to use then..

                Like saying oh, there was a mugging in Chicago - not going to go to US ever..

                There are many CDNs where boxes are run, where 1 bad user now blocks you from all good stuff on their whole network. So you get a one bad stray syn from say AWS, and your not going to go to any AWS ip.. Welcome to non functioning internet.

                Some of that traffic is orgs trying to map how open the internet is.. Run on legit CDNs that house lots of other stuff..

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                P 1 Reply Last reply Reply Quote 0
                • P
                  Patch @johnpoz
                  last edited by Patch

                  @johnpoz
                  I find a selection of the feeds in pfBlocker relatively specific for my use case. Sad to hear your find them less useful.

                  johnpozJ 1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator @Patch
                    last edited by johnpoz

                    @patch I didn't say that - those are rules that can be very specific for someone wanting to do what he is doing. What I am saying finding an IP and then blocking the /16 that IP come is going to be problematic at best if you actually want to use the internet.

                    There are maintained lists already, say for example the shodan scanner

                    https://wiki.ipfire.org/configuration/firewall/blockshodan

                    And sure the lists in pfblocker - no reason to try and reinvent the wheel here.

                    Blocking based on AS vs a arbitrarily random cidr of /16 would be a better option..

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                    NogBadTheBadN H 2 Replies Last reply Reply Quote 1
                    • NogBadTheBadN
                      NogBadTheBad @johnpoz
                      last edited by

                      @johnpoz Indeed:-

                      Screenshot 2023-01-23 at 11.52.16.png

                      Andy

                      1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                      1 Reply Last reply Reply Quote 0
                      • H
                        henderbc @johnpoz
                        last edited by

                        @johnpoz OK - I'm convinced. My plan is going to take a lot of work without much payoff.

                        As you might have guessed by now, I'm pretty much a pfSense NOOB and
                        I appreciate all of your insights and expertise.

                        It looks like I'll be investing some work in pfBlocker. Can anyone suggest the best (simplest) step-by-step guide to getting a basic pfBlocker setup started?

                        NogBadTheBadN 1 Reply Last reply Reply Quote 0
                        • NogBadTheBadN
                          NogBadTheBad @henderbc
                          last edited by NogBadTheBad

                          @henderbc Use pfBlocker like my example to create aliases and then use those on the WAN interface.

                          There is a wizard to do the basic install, you'll also need to sign up for a MaxMind license key if you want to use their GeoIP data.

                          Install the pfBlockerNG-devel version.

                          https://www.youtube.com/watch?v=xizAeAqYde4

                          https://www.youtube.com/watch?v=oNo77CMoxUM

                          Andy

                          1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                          H 1 Reply Last reply Reply Quote 0
                          • H
                            henderbc @NogBadTheBad
                            last edited by

                            @nogbadthebad Here's what running the wizard gave me:
                            a6a590f0-ed64-4ba9-a21c-d036babda141-image.png

                            Would you recommend I use your entries instead of these or as well as?

                            johnpozJ NogBadTheBadN 2 Replies Last reply Reply Quote 0
                            • johnpozJ
                              johnpoz LAYER 8 Global Moderator @henderbc
                              last edited by

                              @henderbc I don't seem to have any problem downloading that talos list

                              https://www.talosintelligence.com/documents/ip-blacklist

                              Can you open that link in a browser? It redirects to different location, but can get a list of IPs in my browser - does that work for you?

                              redirect.jpg

                              An intelligent man is sometimes forced to be drunk to spend time with his fools
                              If you get confused: Listen to the Music Play
                              Please don't Chat/PM me for help, unless mod related
                              SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                              1 Reply Last reply Reply Quote 0
                              • NogBadTheBadN
                                NogBadTheBad @henderbc
                                last edited by NogBadTheBad

                                @henderbc It's up to you to be honest, I wanted to create my own list rather than the standard one.

                                I just started looking at what was hitting my WAN interface and built up a list of what was doing a port scan on my WAN.

                                It started from the shodan list and sort of expanded.

                                Andy

                                1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                                johnpozJ 1 Reply Last reply Reply Quote 0
                                • johnpozJ
                                  johnpoz LAYER 8 Global Moderator @NogBadTheBad
                                  last edited by

                                  @nogbadthebad ^ exactly what I would suggest, what you want to block would be up to you.. But again keep in mind if you have zero ports opens its all pretty pointless other say not logging this traffic to keep your firewall log smaller?

                                  If your phone ringer is off, does it really matter if a spammer calls you - you don't answer the phone anyway because the phone doesn't ring.. But you might not like picking up your phone and see missed calls.

                                  So if you don't want to log these scanners that valid, but if your still going to log them, and you don't have any ports open anyway.. Not sure what the point is? Other than say info on how much traffic is coming from these known scanners. Another big scanner is recyber.net but atleast they have an optout where you can put in your IP and they are suppose to exclude your IP from their scanning.

                                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                                  If you get confused: Listen to the Music Play
                                  Please don't Chat/PM me for help, unless mod related
                                  SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                                  NogBadTheBadN 1 Reply Last reply Reply Quote 1
                                  • NogBadTheBadN
                                    NogBadTheBad @johnpoz
                                    last edited by

                                    @johnpoz said in I'm sick of neer-do-wells hitting my WAN with TCP:SYN:

                                    If your phone ringer is off, does it really matter if a spammer calls you - you don't answer the phone anyway because the phone doesn't ring.. But you might not like picking up your phone and see missed calls.

                                    My ringer is on as I have an IPSec VPN & SFTP server local 😁

                                    Andy

                                    1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                                    1 Reply Last reply Reply Quote 0
                                    • First post
                                      Last post
                                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.