Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Incoming connections to pfsense box from Facebook?

    Scheduled Pinned Locked Moved Firewalling
    45 Posts 5 Posters 3.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ
      johnpoz LAYER 8 Global Moderator @rasputinthegreatest
      last edited by johnpoz

      @rasputinthegreatest its called NOISE!! a stray packet here is not going to cause your internet to slow down.. Quit looking at random noise on the internet and think its causing you a problem..

      Your work computer - DO YOU DISCONNECT the vpn on the weekends.. If you do not disconnect the vpn - then if like every other work vpn on the planet, all traffic is routed through that - you want to go to the internet you go to through the vpn..

      My work laptop is pretty much always connected to my companies vpn.. Guess what my internet access is slower than my normal 500/50 internet -- because its routing through the company network, etc. etc.. Its got added overhead of the vpn tunnel itself, etc.

      If you want to know if pfsense or your isp is having issues with your upload speed your going to have to take the vpn out of the equation - if not then get with your work IT why their vpn is slow ;)

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.8, 24.11

      R 2 Replies Last reply Reply Quote 0
      • R
        rasputinthegreatest @johnpoz
        last edited by

        @johnpoz Sorry I might have been unclear. I have my personal computer and a work computer. After work hours the work computer is powered down. The VPN client is also only installed on this particular computer and not on a network level. So it is impossible for it to interfer with the rest of my network. And I do my speedtests on other devices unrelated to my work computer as well.

        1 Reply Last reply Reply Quote 0
        • R
          rasputinthegreatest @johnpoz
          last edited by rasputinthegreatest

          @johnpoz So right now my internet is very slow again. I can't find anything in my traffic graph that uses up any speed. Since I am double natting I also disabled the WLAN of my fritzbox so no devices can use up bandwidth there. Still my speeds vary between 14 to 33mbit/s. After disabling my AP the speed went back to normal. But in the past when it happend and I turned off the AP it didn't do anything. There was also no bandwidth usage by the AP router.
          Can the ISP be responsible for that issue?

          Also do you know what this means? At that time I was only in this forum and on Instagram and that IP leads to facebook

           2 	UDP 	Potentially Bad Traffic 	157.240.253.63   	443 	192.168.178.42   	5600  140:3     	(spp_sip) URI is too long
          

          EDIT: I noticed when the graphs spike it doesn't show any IP uploading but the graph spikes. Or it says 2.0M up but on the left I see like 25kbit/s upload. Can there be a device hiding itself?
          Or maybe I am reading it wrong. Does bandwith in = LAN (out)?
          graph.png

          Also why is 192.168.1.255 showing up when it is not assigned?

          In general I see a lot of spikes on the orange line which I feel like should be less than the blue one.
          out.png

          R 1 Reply Last reply Reply Quote 0
          • R
            rasputinthegreatest @rasputinthegreatest
            last edited by rasputinthegreatest

            I saw a lot of strange IPs. A lot of Amazon servers.
            Also 10.0.170.10 is an internal IP but that isn't assigned in my network was showing up for a second
            Also this IP showed up and it leads to the Department of Defense in America??? Why in the hell would there be any upload in that direction?
            https://www.abuseipdb.com/check/55.222.236.99
            Am I going crazy or is this actually worrying?
            Also noticed in the firewall log that there was a Destination shown to be a different ISP being blocked.

             	Default deny rule IPv6 (1000000105) 	[fe80::563a:d6ff:feb9:4ab9]:43546		[2003:xxxxxxxxxx]:443		TCP:S 
            
            GertjanG 1 Reply Last reply Reply Quote 0
            • GertjanG
              Gertjan @rasputinthegreatest
              last edited by Gertjan

              @rasputinthegreatest said in Incoming connections to pfsense box from Facebook?:

              Also 10.0.170.10 is an internal IP but that isn't assigned in my network was showing up for a second

              On WAN ?

              @rasputinthegreatest said in Incoming connections to pfsense box from Facebook?:

              Also this IP showed up and it leads to the Department of Defense in America???

              So, from you, your place ... to them ?
              Defense uses IPv6 as it is more 'obscure'.

              @rasputinthegreatest said in Incoming connections to pfsense box from Facebook?:

              Default deny rule IPv6 (1000000105) [fe80::563a:d6ff:feb9:4ab9]:43546 [2003:xxxxxxxxxx]:443 TCP:S

              AnIPv6 packet coming into the pfSense WAN and as it is using 'local' IPv6 addresses (they start with fe80) it originates from your upstream router, the fritz.
              Frittz - or so other device connected to the LAN of Fritz, and it wants to connect to a https server, present on it's LAN, behind pfSense. The default WAN (IPv6) behavior is : block.
              Yeah, that's awkward.

              No "help me" PM's please. Use the forum, the community will thank you.
              Edit : and where are the logs ??

              R 1 Reply Last reply Reply Quote 0
              • R
                rasputinthegreatest @Gertjan
                last edited by rasputinthegreatest

                @Gertjan said in Incoming connections to pfsense box from Facebook?:

                So, from you, your place ... to them ?
                Defense uses IPv6 as it is more 'obscure'.

                @Gertjan said in Incoming connections to pfsense box from Facebook?:

                Yeah, that's awkward.

                Yes it was mostly outgoing traffic
                do.png
                I was looking at my LAN under graphs showing local traffic and remote traffic aka "All"
                But the IP shows here as DoD https://www.abuseipdb.com/check/55.222.236.99
                What do you mean by awkward? I was looking at LAN traffic. But my ipv6 fe address was going to this public ipv6 that is not my ISP but a different one

                GertjanG 1 Reply Last reply Reply Quote 0
                • GertjanG
                  Gertjan @rasputinthegreatest
                  last edited by Gertjan

                  @rasputinthegreatest said in Incoming connections to pfsense box from Facebook?:

                  52.222.236.99

                  That's Amazon in Germany.
                  Look around you, your LAN, someone is doing some shopping with your connection.

                  @rasputinthegreatest said in Incoming connections to pfsense box from Facebook?:

                  I was looking at LAN traffic

                  Ah, didn't know what you were looking at, I was presuming WAN.
                  LAN isn't interesting as that concerns your own devices.
                  ( you know what your own device do, right ?! )

                  @rasputinthegreatest said in Incoming connections to pfsense box from Facebook?:

                  But what about those ipv6 awkward connections?

                  The fe80 was also seen on LAN ?

                  No "help me" PM's please. Use the forum, the community will thank you.
                  Edit : and where are the logs ??

                  R 2 Replies Last reply Reply Quote 0
                  • R
                    rasputinthegreatest @Gertjan
                    last edited by rasputinthegreatest

                    @Gertjan said in Incoming connections to pfsense box from Facebook?:

                    @rasputinthegreatest said in Incoming connections to pfsense box from Facebook?:

                    52.222.236.99

                    That's Amazon in Germany.
                    Look around you, your LAN, someone is doing some shopping with your connection.

                    Oh my god what simple typo can do. lmao Thank you
                    But what about those ipv6 awkward connections?

                    1 Reply Last reply Reply Quote 0
                    • R
                      rasputinthegreatest @Gertjan
                      last edited by

                      @Gertjan said in Incoming connections to pfsense box from Facebook?:

                      @rasputinthegreatest said in Incoming connections to pfsense box from Facebook?:

                      52.222.236.99

                      That's Amazon in Germany.
                      Look around you, your LAN, someone is doing some shopping with your connection.

                      @rasputinthegreatest said in Incoming connections to pfsense box from Facebook?:

                      I was looking at LAN traffic

                      Ah, didn't know what you were looking at, I was presuming WAN.
                      LAN isn't interesting as that concerns your own devices.
                      ( you know what your own device do, right ?! )

                      @rasputinthegreatest said in Incoming connections to pfsense box from Facebook?:

                      But what about those ipv6 awkward connections?

                      The fe80 was also seen on LAN ?

                      yes that fe80 was seen on LAN traffic graph. Same for that 10.0 IP which is not assigned in my internal network though. I know all my devices but that IP makes no sense. Only thing I could imagine it could be is my work VPN network. But that one is 10.232.x.x

                      GertjanG R 2 Replies Last reply Reply Quote 0
                      • GertjanG
                        Gertjan @rasputinthegreatest
                        last edited by

                        @rasputinthegreatest said in Incoming connections to pfsense box from Facebook?:

                        Same for that 10.0 IP which is not assigned in my internal network though

                        Normally ( disregard the first rule ) :

                        f68c451c-c111-4034-9300-b583b31cef9c-image.png

                        which means that my LAN interface will accept only traffic 192.168.1.0/24 sourced (originates) traffic, as 192.168.1.0/24 is my pfSense LAN.
                        All other traffic will hit the hidden last rule(s) which look like this :

                        #---------------------------------------------------------------------------
                        # default deny rules
                        #---------------------------------------------------------------------------
                        block in log inet all ridentifier 1000000103 label "Default deny rule IPv4"
                        block out log inet all ridentifier 1000000104 label "Default deny rule IPv4"
                        block in log inet6 all ridentifier 1000000105 label "Default deny rule IPv6"
                        block out log inet6 all ridentifier 1000000106 label "Default deny rule IPv6
                        ```"
                        
                        These are block all rules, present on all pfSense interfaces.
                        
                        This means that if you have a device that want's to use 10.1.2.3 on your LAN, it will go 'nowhere'. Even if it reaches some how your pfSense LAN interface, it will get dropped.
                        
                        You can see the "1000000105" rule which you already found as you've shown it in your post above.

                        No "help me" PM's please. Use the forum, the community will thank you.
                        Edit : and where are the logs ??

                        1 Reply Last reply Reply Quote 0
                        • R
                          rasputinthegreatest @rasputinthegreatest
                          last edited by rasputinthegreatest

                          @Gertjan I also saw this IP right now with in-and outbound traffic and it seems very sus https://www.abuseipdb.com/check/34.107.243.93
                          Also this IP shows up in my LAN traffic graph https://www.abuseipdb.com/check/40.113.103.199
                          output.png
                          Why is this not being blocked?

                          Regarding the rules. I have these preconfigured rules. Do I need to add anything to them?
                          rules.png

                          What can I do to block these malicious IPs from making connections to my network?

                          Also here you can see a bandwidth spike but it doesn't show any IP
                          spike.png

                          S 1 Reply Last reply Reply Quote 0
                          • S
                            SteveITS Galactic Empire @rasputinthegreatest
                            last edited by

                            @rasputinthegreatest

                            Potentially Bad Traffic

                            If you have the Info rules enabled understand those are not intended for blocking.

                            If you have Snort running on WAN move it to LAN. On WAN it operates outside the firewall so anything hitting your WAN IP is scanned even if it will be dropped.

                            Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                            When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                            Upvote 👍 helpful posts!

                            R 1 Reply Last reply Reply Quote 0
                            • R
                              rasputinthegreatest @SteveITS
                              last edited by

                              @SteveITS I am using pfsense out of the box except for snort. I have snort setup on WAN and LAN.
                              Where do I find the info rules? Snort wasn't even picking up those IPs. I just saw them pop up on the traffic graph for a second.
                              https://www.abuseipdb.com/check/34.107.243.93
                              https://www.abuseipdb.com/check/40.113.103.199

                              How can I make sure this stuff gets picked up and blocked? And where can it come from if it is showing in the LAN traffic graph.

                              GertjanG johnpozJ 2 Replies Last reply Reply Quote 0
                              • GertjanG
                                Gertjan @rasputinthegreatest
                                last edited by

                                @rasputinthegreatest said in Incoming connections to pfsense box from Facebook?:

                                I have snort setup on WAN

                                You're lucky, you have a router front of your pfSense that is protecting it, so no illicit traffic can reach your pfSense. That is, I hope you've set it up like that.

                                If your pfSense's WAN interface did have your 'real' WAN IP, and you get yourself 'dossed', then every incoming packet 'not requested for' (wasn't a reply from what was requested from your LAN(s), then it gets dropped very (extremely) qyicky by the firewall.
                                With snort an WAN you said : I want every valid reply packet and also every illicit packet being scanned by snort. So, now every packet will cost you thousands of CPU cycles more.
                                In case of an incoming dos your CPU will go in overdrive, and this can even take down the system.
                                Exactly what the dosser wanted, and hew as counting on a bit of your help.

                                Never ever scan (snort, suricata, etc) the WAN port, except if you have 'huge' resources.
                                Its a wast of time, power, comfort etc etc.
                                It's like installing that tictoc app so you can see if you can find pure BS ....

                                No "help me" PM's please. Use the forum, the community will thank you.
                                Edit : and where are the logs ??

                                1 Reply Last reply Reply Quote 0
                                • johnpozJ
                                  johnpoz LAYER 8 Global Moderator @rasputinthegreatest
                                  last edited by johnpoz

                                  @rasputinthegreatest there is no way some 34.x address is inbound into LAN interface as source.. Unless you were using that internally - of your have something forwarding traffic to your lan interface from some other connection..

                                  To your upload being jammed - I would for starters disable snort.. That can have performance impact.. Does your issue go away?

                                  internet -- wan pfsense lan -- your stuff

                                  How would some internet IP 34.x ever be source of traffic inbound into your lan? Or even outbound for that matter.

                                  How about you draw up how you have your stuff connected.. Because you must have your lan exposed to the public internet or connected is some odd way if you could ever see internet IPs inbound as source into your lan interface.. In a normal setup that would just be impossible.. Unless you were using 34.x something internally on your own networks.

                                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                                  If you get confused: Listen to the Music Play
                                  Please don't Chat/PM me for help, unless mod related
                                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                                  R 1 Reply Last reply Reply Quote 0
                                  • R
                                    rasputinthegreatest @johnpoz
                                    last edited by rasputinthegreatest

                                    @johnpoz The whole reason I got the pfsense box was because of my upload issues. At the moment my setup looks like this
                                    diag.jpg
                                    my pfsense box is plugged into the 2.5gig port of my fritzbox
                                    fritzbox goes into WAN port on pfsense box and Lan port from pfsense box goes to a switch where my devices are connected behind.
                                    Where is the error in this setup? I followed Jim's garage setup.
                                    Here are the WAN settings
                                    wan.png
                                    And here LAN settings
                                    lan.png

                                    Anything I am missing? Regarding the IP 34.x.x.x I was showing "Remote" in the traffic graph. Should I not be able to see any public IPs in the traffic?
                                    trafficgra.jpg

                                    GertjanG johnpozJ 2 Replies Last reply Reply Quote 0
                                    • GertjanG
                                      Gertjan @rasputinthegreatest
                                      last edited by

                                      @rasputinthegreatest

                                      Why did you keep the Fritzbox ?

                                      No "help me" PM's please. Use the forum, the community will thank you.
                                      Edit : and where are the logs ??

                                      R 1 Reply Last reply Reply Quote 0
                                      • R
                                        rasputinthegreatest @Gertjan
                                        last edited by

                                        @Gertjan It is provided by the ISP and doesn't support bridge mode afaik. So I am forced to double-nat

                                        1 Reply Last reply Reply Quote 0
                                        • johnpozJ
                                          johnpoz LAYER 8 Global Moderator @rasputinthegreatest
                                          last edited by

                                          @rasputinthegreatest said in Incoming connections to pfsense box from Facebook?:

                                          pfsense box was because of my upload issues.

                                          So you had this issue before you put in pfsense.. Why would you think pfsense could magically fix something like that if you were having it before?

                                          From that drawing there is no possible way for pfsense to see some 34.x as source into the lan - just not possible.. Unless you have somehow created that traffic on your lan, or have some other connection into your lan that would send the traffic on to pfsense lan.

                                          You don't have any sort of bridge setup in pfsense do you?

                                          So your running 2.5ge on your internal network, and is this 2.5ge connection on pfsense interface on lan, and wan I assume is only gig?

                                          You can run into weirdness when you change speeds like that - there is currently a thread going on about 1ge, 2.5ge and 10ge with multiple connections not see full speed, etc.

                                          So for example your pc if connected to that switch at 2.5ge says oh I can send data at 2.5, but then the connection to pfsense is only 1, so you can run in to buffering issues on the switch. flow control should normally take care of such issues..

                                          To see if that could be possible contributing factor... I would set your interfaces to be the same across the board.. Pc to switch, switch to pfsense, etc.

                                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                                          If you get confused: Listen to the Music Play
                                          Please don't Chat/PM me for help, unless mod related
                                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                                          R 1 Reply Last reply Reply Quote 0
                                          • R
                                            rasputinthegreatest @johnpoz
                                            last edited by rasputinthegreatest

                                            @johnpoz I didn't think the pfsense would fix the issue with my upload speeds. It was rather a tool to investigate and see invidiual devices traffic since my Fritzbox doesn't allow that.
                                            I don't have any bridge mode setup for sure. Under the Traffic Graph I had "LAN" and "Remote" enabled like in the screenshot above. And here it showed for example the external IP of my companies VPN server, Amazon connections and all sorts of public IPs.
                                            If I am not supposed to see any of these things that is probably bad but I have no explanation for it. For now I removed the pfsense firewall and just went back to the Fritzbox only.
                                            All interfaces are 2,5Gig throughout my network. Except my work computers NIC which is 1Gig. My personal computer is 2.5gig as well. The switch inbetween is a Trendnet 2.5Gig switch.
                                            Can the issue be that my Fritzboxs network is 192.168.178.1. Then the WAN Port that goes into my pfsense box is assigned 192.168.178.42 through DHCP but the LAN Port hat goes into my switch is 192.168.1.1? I still don't see how anything could be exposed to the internet if my Fritzbox is still there in front?

                                            @johnpoz said in Incoming connections to pfsense box from Facebook?:

                                            To see if that could be possible contributing factor... I would set your interfaces to be the same across the board.. Pc to switch, switch to pfsense, etc.

                                            Like I said this is already the case

                                            EDIT: @johnpoz Do you see any error in my diagram or config? I haven't changed anything inside pfsense from the most basic setup that would cause to expose my network to the internet

                                            johnpozJ 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.