Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Installed latest snap, now can't login to GUI

    Scheduled Pinned Locked Moved 2.0-RC Snapshot Feedback and Problems - RETIRED
    25 Posts 8 Posters 6.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      mastermindpro
      last edited by

      Sure, I've done that now, but my point is that I shouldn't have to.  I think all this "feature" is going to do is generate lots more questions from end-users.  I simply don't see how it increases security in the slightest.

      1 Reply Last reply Reply Quote 0
      • jimpJ
        jimp Rebel Alliance Developer Netgate
        last edited by

        Because an attacker can make up whatever DNS entry he wants on a domain he controls, and point it to your router to exploit this hole.

        Unless the router knows what hostnames are valid, it can't protect against that.

        Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

        Need help fast? Netgate Global Support!

        Do not Chat/PM for help!

        1 Reply Last reply Reply Quote 0
        • M
          mastermindpro
          last edited by

          I understand that, but how is that realistically an actual hole in security?  No one but an admin knows the login for the firewall, so redirecting random users to it shouldn't pose a problem.  If an admin gets redirected to it, then they can log in.

          I'm still missing where the "hole" is.  Setting up wildcard records just to resolve to a firewall's IP has been a possibility since DNS was invented.  Is this only in the DoS category?

          1 Reply Last reply Reply Quote 0
          • jimpJ
            jimp Rebel Alliance Developer Netgate
            last edited by

            For the details, you'll have to read up on DNS rebinding, as linked elsewhere in the thread.

            If you don't like the checks, you can disable them under the Admin options as well.

            Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

            Need help fast? Netgate Global Support!

            Do not Chat/PM for help!

            1 Reply Last reply Reply Quote 0
            • C
              cmb
              last edited by

              Its purpose is almost entirely protecting from gross negligence - a system with default or easily guessed password. Or, if some vulnerability is found in our web interface in the future, it protects against that being exploited in such a manner.

              1 Reply Last reply Reply Quote 0
              • M
                mastermindpro
                last edited by

                @cmb:

                Its purpose is almost entirely protecting from gross negligence - a system with default or easily guessed password. Or, if some vulnerability is found in our web interface in the future, it protects against that being exploited in such a manner.

                Only if accessed via a hostname that isn't on the list.  If accessed by IP, which I have a tendency to think is more likely for a brute-force attack, this check does nothing.

                Please don't turn into Microsoft in the security department…trying to protect from gross negligence by making everything harder to use.  Why not just force the user to change the admin password on first login?  Wouldn't that be 100% more effective than protecting from DNS rebinding "attacks"???  You can't, and shouldn't, be trying to force best practice procedures on people assuming that your way is the best in every scenario.

                I don't have any problem with this being an option, but enabling it by default only prompts more questions here and elsewhere.

                1 Reply Last reply Reply Quote 0
                • jimpJ
                  jimp Rebel Alliance Developer Netgate
                  last edited by

                  But accessing by IP has no relevance to a DNS rebinding attack.

                  Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                  Need help fast? Netgate Global Support!

                  Do not Chat/PM for help!

                  1 Reply Last reply Reply Quote 0
                  • M
                    mastermindpro
                    last edited by

                    Of course…I never indicated that.

                    My point was that, since the type of attack that you're trying to protect against is not generally going to come at a firewall by name, then this check is probably pointless.  It only serves to keep the people who own/administer the device out of it in some situations.

                    I'm done trying to debate this…

                    1 Reply Last reply Reply Quote 0
                    • jimpJ
                      jimp Rebel Alliance Developer Netgate
                      last edited by

                      @mastermindpro:

                      My point was that, since the type of attack that you're trying to protect against is not generally going to come at a firewall by name, then this check is probably pointless.  It only serves to keep the people who own/administer the device out of it in some situations.

                      The only attack we're trying to protect against with this is a DNS rebinding attack, and can only come by name. I'm not sure where the confusion is coming from.

                      Mismatched IPs are also checked, but are only warned against, not blocked entirely.

                      The "average" user is not going to be accessing their router by a custom hostname anyhow, so they'll not trigger this protection. However, the error message could probably be more verbose with a better description of how to bypass the error if it's a legit hostname.

                      Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                      Need help fast? Netgate Global Support!

                      Do not Chat/PM for help!

                      1 Reply Last reply Reply Quote 0
                      • K
                        kpa
                        last edited by

                        I think the confusion here lies in that the DNS rebind attack does not use your own DNS domain/records but a completely unrelated domain name.

                        1 Reply Last reply Reply Quote 0
                        • D
                          dszp
                          last edited by

                          I am 100% for enabling this by default, and in fact it has resulted in positive press for pfSense for being responsive to the security issues raised at BlackHat this week. If you look at this tweet: http://twitter.com/sullrich/status/19855137030 and follow the link to the article referenced, the last paragraph says, "'The only router software that I know of that does this now is pfsense,' Heffner said. 'They contacted me when my Black Hat talk abstract went up.'" You can't buy that kind of praise…from the guy who did the BlackHat talk and is doing all the interviews no less!

                          If adding a little configuration to access the firewall by more than one hostname gets pfSense this kind of security kudos (and, being a firewall, isn't the whole dang point to be as secure as possible?!), I'm all for it. Especially since it's likely 99% of users use the IP of pfSense (especially home users, where this attack is most likely and default passwords are less likely to have been changed) and will never see the warning.

                          I do agree that perhaps a link could be provided to a more detailed explanation of the problem. However, 2.0 is still a beta, and there's still time to get this in place before the release, even if it were next week (which would be awesome, but I'm not speculating, just wishing :-) I would certainly not find this to be an out of place default switch, especially on a beta-level product, even without documentation. As long as it's well documented when finally released, I agree that leaving it on by default is extremely wise, even when upgrading from 1.2.3. Layered security (defense-in-depth) is good, even if you always change your admin passwords.

                          Kudos!

                          David Szpunar

                          1 Reply Last reply Reply Quote 0
                          • M
                            merc
                            last edited by

                            I wasted a lot of precious time trying to figure out what the hell all of a sudden happened, and why I couldn't access the firewall.  If this is going to be left on by default, then the notice must give the administrator ways to get around it and how to manage it in the future.  I have absolutely no use for this feature at all, as I don't allow remote access to the UI.

                            1 Reply Last reply Reply Quote 0
                            • jimpJ
                              jimp Rebel Alliance Developer Netgate
                              last edited by

                              It has nothing to do with you enabling remote access - DNS rebinding attacks are a way that someone remotely could get access to your router even when you have explicitly denied it. That's why it's a security risk.

                              The error message could probably be clearer, though. But it's still a beta so there's plenty of time to get a simple fix like that in.

                              Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                              Need help fast? Netgate Global Support!

                              Do not Chat/PM for help!

                              1 Reply Last reply Reply Quote 0
                              • E
                                Efonnes
                                last edited by

                                Would there be anything wrong with having the message suggest to try accessing it by IP address instead and where to go to configure an exception for the host name?

                                1 Reply Last reply Reply Quote 0
                                • K
                                  kpa
                                  last edited by

                                  Another way to protect the system from DNS rebinding attacks is to filter out all private address space addresses from the DNS replies that come from upstream forwarders. It's not going to work in every case though because not everyone uses the DNS forwarder that is included in pfSense.

                                  Edit: 2.0 BETA already seems to do this with dnsmasq –stop-dns-rebind option, the other protection methods seem a bit excessive in that case…

                                  1 Reply Last reply Reply Quote 0
                                  • C
                                    cmb
                                    last edited by

                                    @kpa:

                                    Edit: 2.0 BETA already seems to do this with dnsmasq –stop-dns-rebind option, the other protection methods seem a bit excessive in that case…

                                    Yes that's already done, no it's not excessive - that only helps if you're using the DNS forwarder, lots of people don't.

                                    1 Reply Last reply Reply Quote 0
                                    • First post
                                      Last post
                                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.