Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Too many alerts: "ET SCAN Potential SSH Scan OUTBOUND"

    Scheduled Pinned Locked Moved IDS/IPS
    11 Posts 4 Posters 3.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D
      denis_ju
      last edited by

      hello!

      I have too many alerts like this in the screenshoot from my WAN interface!

      I have three interfaces:

      WAN (public ip) - snort NOT in blocking mode - IPS Policy Selection "Connectivity"
      LAN - snort NOT in blocking mode - IPS Policy Selection "Balanced"
      DMZ - snort in blocking mode - IPS Policy Selection "Security"

      Poorly configured pfsense/snort?
      Pfsense is infected?
      LAN is infected?
      Etc ...?
      Does anyone have an idea what it could be?

      Screenshot_2023-11-10_20-57-28-.png

      D S 2 Replies Last reply Reply Quote 0
      • D
        denis_ju @denis_ju
        last edited by

        @denis_ju
        Installed packages:

        pfsense 2.7.0
        snort 4.1.6_11
        ntopng 0.8.13_10
        arpwatch 0.2.1
        bandwidthd 0.7.5
        darkstat 3.1.3_6
        freeradius3 0.15.10 (not active)
        mailreport 3.6.4_1
        openvpn-client-export 1.9_1
        pfBlockerNG-devel 3.2.0_6
        RRD_Summary 2.2
        Service_Watchdog 1.8.7_1
        squid 0.4.46 (not active)
        squidGuard 1.16.19 (not active)
        Status_Traffic_Totals 2.3.2_3
        Tailscale 0.1.4 (not active)

        1 Reply Last reply Reply Quote 0
        • S
          SteveITS Galactic Empire @denis_ju
          last edited by

          @denis_ju 0.0.0.0/8 isn't a public IP: https://www.iana.org/assignments/iana-ipv4-special-registry/iana-ipv4-special-registry.xhtml I had to look it up to see if it was even valid. :)

          If you change Snort to run on LAN it will show the source IP as the LAN device making the request. (and since Snort runs outside of the firewall, it will avoid scanning any inbound traffic that isn't going to be allowed by the firewall)

          You could also block port 22 outbound on LAN and log that rule and see what is making the request.

          Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
          When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
          Upvote 👍 helpful posts!

          D 1 Reply Last reply Reply Quote 1
          • D
            denis_ju @SteveITS
            last edited by

            @SteveITS said in Too many alerts: "ET SCAN Potential SSH Scan OUTBOUND":

            @denis_ju 0.0.0.0/8 isn't a public IP: https://www.iana.org/assignments/iana-ipv4-special-registry/iana-ipv4-special-registry.xhtml I had to look it up to see if it was even valid. :)

            Yes, that's clear to me.

            If you change Snort to run on LAN it will show the source IP as the LAN device making the request.

            Just done.
            Snort for wan disabled.
            Snort for lan remains active as before.
            After the change, there is no source device making the request.

            (and since Snort runs outside of the firewall, it will avoid scanning any inbound traffic that isn't going to be allowed by the firewall)

            You could also block port 22 outbound on LAN and log that rule and see what is making the request.

            Port 22 (out) for lan blocked and logged.

            After the change there are no "snort lan" alerts for port 22.
            No alerts seen on firewall logs for lan port 22.

            S 1 Reply Last reply Reply Quote 0
            • S
              SteveITS Galactic Empire @denis_ju
              last edited by

              @denis_ju Well that's weird and implies it either stopped or was coming from pfSense. If you put it back on WAN and it recurs I might consider reinstalling pfSense and restoring the config from backup so you know it's clean.

              Technically you can run Snort on both LAN and WAN for this test, it's just double scanning.

              Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
              When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
              Upvote 👍 helpful posts!

              1 Reply Last reply Reply Quote 0
              • bmeeksB
                bmeeks
                last edited by

                Likely ntopng if I recall correctly from previous run-ins with this issue. I'm not 100% sure it was ntopng, but I do remember it was a package the user had installed making internal connections/probes and triggering the alert.

                I would simply disable that rule.

                D 1 Reply Last reply Reply Quote 2
                • D
                  denis_ju @bmeeks
                  last edited by

                  @bmeeks said in Too many alerts: "ET SCAN Potential SSH Scan OUTBOUND":

                  Likely ntopng if I recall correctly from previous run-ins with this issue. I'm not 100% sure it was ntopng, but I do remember it was a package the user had installed making internal connections/probes and triggering the alert.

                  You're right. Yesterday I tried to stop ntopng service and then I didn't see any alerts anymore.

                  I would simply disable that rule.

                  I don't know whether this rule in WAN "blocking mode" silences other attacks/alerts!

                  bmeeksB 1 Reply Last reply Reply Quote 0
                  • bmeeksB
                    bmeeks @denis_ju
                    last edited by

                    @denis_ju said in Too many alerts: "ET SCAN Potential SSH Scan OUTBOUND":

                    I don't know whether this rule in WAN "blocking mode" silences other attacks/alerts!

                    In my personal opinion (and I managed an IDS/IPS for a Fortune 500 for several years before retiring), rules like that ET SCAN one are not very helpful because too many innocuous behaviors can trigger them. Your example in this post is a perfect one -- another package you installed for a different purpose was detected as doing somethng "bad" by this hair-trigger rule.

                    Also note this rule is set to detect outbound SSH scans, not inbound scans. So, it is designed to trigger when hosts on your protected networks are doing outbound scans for an open SSH port. In my view, it would be better placed to have this rule on your internal interfaces and not on the WAN. This is because all traffic from internal hosts must traverse the internal interface before getting routed to its destination.

                    D 1 Reply Last reply Reply Quote 1
                    • D
                      denis_ju @bmeeks
                      last edited by

                      @bmeeks

                      Today, out of curiosity, I activated ntopng again. Wanted to see what alerts came out.
                      A flood of alerts can be seen!
                      I don't understand why ntopng causes so many alerts!

                      Screenshot_2023-11-12_10-49-46-.png

                      johnpozJ 1 Reply Last reply Reply Quote 0
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator @denis_ju
                        last edited by johnpoz

                        @denis_ju said in Too many alerts: "ET SCAN Potential SSH Scan OUTBOUND":

                        I don't understand why ntopng causes so many alerts!

                        Because you have discovery enabled - its trying to discover, so you yeah going to create traffic like that.

                        Not sure how you have ntop setup - but it shouldn't be doing discover to externals..

                        https://forum.netgate.com/topic/173693/suspicious-traffic

                        Specific post with links to other posts
                        https://forum.netgate.com/post/1055688

                        Does nobody search before they post?

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                        D 1 Reply Last reply Reply Quote 1
                        • D
                          denis_ju @johnpoz
                          last edited by

                          @johnpoz said in Too many alerts: "ET SCAN Potential SSH Scan OUTBOUND":

                          @denis_ju said in Too many alerts: "ET SCAN Potential SSH Scan OUTBOUND":

                          I don't understand why ntopng causes so many alerts!

                          Because you have discovery enabled - its trying to discover, so you yeah going to create traffic like that.

                          You are right! This is the solution!

                          Thank you!

                          Not sure how you have ntop setup - but it shouldn't be doing discover to externals..

                          https://forum.netgate.com/topic/173693/suspicious-traffic

                          Specific post with links to other posts
                          https://forum.netgate.com/post/1055688

                          Does nobody search before they post?

                          I'll read it carefully! Thank you!

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.