Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Should I be worried about this traffic?

    Scheduled Pinned Locked Moved Firewalling
    20 Posts 5 Posters 8.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M Offline
      mallen324
      last edited by

      Or even:

      Oct 18 16:09:57 WAN 61.155.106.171:17788 75.x.x.201:9388 UDP
      Oct 18 16:09:49 WAN 61.155.106.171:17788 75.x.x.201:9388 UDP
      Oct 18 16:09:43 WAN 61.155.106.171:17788 75.x.x.201:9388 UDP

      FYI: This did not knock out my internet, I am just trying to get a grasp on log reading now.

      Some quick googling shows its a China IP. What would cause that log to show up? Is there any legitimate reason for the 61.155 IP to try and reach 75.x.x.201? What's port 9388 used for? Is it possible someone here is looking up a chinese website, and its just normal traffic?

      Also, in the previous attached image, at 13:25:48 the IP 74.125.225.87 is trying to do something to port 39586. That's a google IP address, I doubt that's trying to harm me, but what would it be doing for that to show up in my log?

      1 Reply Last reply Reply Quote 0
      • johnpozJ Online
        johnpoz LAYER 8 Global Moderator
        last edited by

        Again its 3 packets that were blocked – this is not going to knock out anything.

        You sure its not just your firewall blocking UDP packets that were in response to something requested by your network or maybe P2P?

        I would really suggest you sniff the traffic your seeing before you go jumping to conclusions -- look at your state table to see if you have any clients that had made connections to those IPs for a start.

        I see quite a bit of blocked UDP traffic on my firewall as well -- there is LOTS of noise on the net!

        Without sniffing the traffic to see what the packets are don't jump to any conclusions about what the traffic is.  Could be your clients running p2p?  Which can be on lots of strange ports 17788 and 9388 are not listed ports for any sort of specific application that I can tell.

        Again I would look to see if you have states open to those IPs from your clients, and for sure SNIFF the traffic to see what it is.

        For example - I just took a quick capture, and noticed this blocked udp packet

        95.16.52.100:42706 ---> 24.13.xx.xx:10704

        Now look at the capture I have of that packet -- notice the d1:ad2:id20 - tells me its p2p DHT traffic!

        http://www.bittorrent.org/beps/bep_0005.html

        yeah I run a p2p client, so your going to see LOTS of weird traffic - and sure your firewall will block stuff like this!

        I would guess you got some people running p2p is all ;)

        edit: I added a easier to read view of the data in that packet, I am no expert on the bittorrent protocol to be sure -- but it can generate quite a bit of traffic like this.  Should those packets be allowed vs blocked (off to read up on the bit torrent protocol) -- I would think so.  I should prob look into a way to do that ;)  But once you join a p2p swarm, you can see traffic for days and days related to that joining.

        udpstuff.jpg
        udpstuff.jpg_thumb
        blockedudp.jpg
        blockedudp.jpg_thumb
        easiertoread.jpg
        easiertoread.jpg_thumb

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 25.07.1 | Lab VMs 2.8, 25.07.1

        1 Reply Last reply Reply Quote 0
        • M Offline
          mallen324
          last edited by

          Wow, thank you for your detailed response!

          I will try and scan some traffic. I need to look into how to use wireshark effectively first though. Im sure google will help me with that though.

          I installed snort as a package for now. Maybe that will work as well. Thanks again!

          1 Reply Last reply Reply Quote 0
          • johnpozJ Online
            johnpoz LAYER 8 Global Moderator
            last edited by

            pfsense has built in capture – just capture and download, you can view the files with wireshark.

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 25.07.1 | Lab VMs 2.8, 25.07.1

            1 Reply Last reply Reply Quote 0
            • M Offline
              mallen324
              last edited by

              Thats the weird thing, I dont have that option. Im on the 1.2.3 release. You can see in my original post that there's no links to do so in my firewall traffic logs. Is there something I need to install, like a package or something?

              EDIT:
              I just found and installed the "Packet Capture Fix". However, it did not add anything it seems…

              1 Reply Last reply Reply Quote 0
              • johnpozJ Online
                johnpoz LAYER 8 Global Moderator
                last edited by

                I have been on the 2.0 line for quite some time, but I thought that 1.2.3 had capture as well.

                If not you might have some problems capturing traffic on your wan interface.  So if you shell to your box you don't have tcpdump?

                tcpdump.jpg
                tcpdump.jpg_thumb

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 25.07.1 | Lab VMs 2.8, 25.07.1

                1 Reply Last reply Reply Quote 0
                • C Offline
                  cmb
                  last edited by

                  You're chasing and worrying about something that isn't in any way related, looks like you're just losing your Internet connection briefly on occasion, and the little bit of blocked Internet noise you have in the logs isn't related.

                  Packet capture is under Diagnostics>Packet Capture but that's not likely to be of any help.

                  Keep constant pings going to a variety of things, your WAN IP, your WAN's gateway, and something on the Internet, and see what succeeds and what fails when it drops.

                  1 Reply Last reply Reply Quote 0
                  • johnpozJ Online
                    johnpoz LAYER 8 Global Moderator
                    last edited by

                    I agree he is worried about noise, but actually looking at the traffic will clear his mind that he is under some sort of attack and that the traffic is just noise - I would guess p2p myself from the ports and being and upd most likely dht type traffic.

                    Once he has cleared his mind that its just that and not some attack quite possible its just his isp having issue for his loss of internet.

                    Look at your quality graph.. how does it look?  This should show you possible loss of of internet when your gateway does not answer pings.

                    status_rrd_graph_img.php.png
                    status_rrd_graph_img.php.png_thumb

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 25.07.1 | Lab VMs 2.8, 25.07.1

                    1 Reply Last reply Reply Quote 0
                    • M Offline
                      mallen324
                      last edited by

                      Ok so its been awhile… other pressing issues and whatnot. So I enabled SSHing in and started playing around with tcpdump. Im still trying to figure out how to use it correctly though. Any tips?

                      EDIT: WOW, I did not see the 2nd page on this thread. Im looking at the quality graph but am unsure what to look at. Ill stare at it some more though!

                      1 Reply Last reply Reply Quote 0
                      • M Offline
                        mallen324
                        last edited by

                        Johnpoz was right, I am able to get a capture file from diagnostics->packet. So I guess Ill disable SSH and forget about tcpdump for now.

                        I loaded that .cap file in wireshark but dont really know what to look for. I guess my next step is to contact my ISP with a list of times our internet went out and see if they can see it on their end.

                        1 Reply Last reply Reply Quote 0
                        • johnpozJ Online
                          johnpoz LAYER 8 Global Moderator
                          last edited by

                          I already went over what to look for in the packet capture in post number #10
                          http://forum.pfsense.org/index.php/topic,41957.msg217775.html#msg217775

                          Did you see d1:ad2:id20 in the payload?

                          If so then its just P2P noise!!!  You can filter it out if you want from the log so you don't get all freaked out about such NOISE

                          I would be happy to look at the packet capture you took if you want - just PM it to me. or Post it.

                          To filter just create a layer 7 container for bittorrent, then a wan firewall rule on to block that layer 7 and not log it.  Now your P2P noise will be gone and you can stop freaking out about NOISE ;)

                          After your posts I decided I didn't need to see all that noise either - so that is what I did.

                          Like I said the internet is FULL OF NOISE!!!  Yes the default block that blocks all unwanted traffic is going to log that noise.  So you can either create the block all rule yourself and not log it, or if you want you can just filter out what is clearly P2P traffic your seeing for example d1:ad2:id20 in the payload via a layer7 rule and not log it.  So this way you will just see non p2p stuff that is blocked ;)  And should be less information that your seeing.

                          As to your quality RRD graph – what is it you do not understand?  It is showing you the response times to your gateway, if if you lost connectivity to your ISP gateway it would show in this graph..  Its pretty straight forward -- not sure what else to say.

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 25.07.1 | Lab VMs 2.8, 25.07.1

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.