• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Block pfsense localhost flows?

Scheduled Pinned Locked Moved Firewalling
9 Posts 3 Posters 3.5k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • C
    crester
    last edited by May 13, 2013, 5:52 PM

    Hello.
    I have just installed pfSense and I recognize it is intuitive but I have no idea more than my background in another firewalls.

    I am able to NAT, do rules, get working snort and so on.

    But I have seen I can connect from pfsense to anywhere, and I can ping i.e. an Internet address.

    I have created a any-any-drop rule for each interface, and in none of them there are a rule to allow ping, but still I can ping from the host, and I haven't logs regarding this traffic.

    How can I block the firewall host to get certain flows?

    Thank you.

    1 Reply Last reply Reply Quote 0
    • G
      gderf
      last edited by May 13, 2013, 6:16 PM

      Rules on an interface only apply to packets coming into the firewall on that interface. They can not have an effect on packets originating from inside the firewall.

      1 Reply Last reply Reply Quote 0
      • C
        crester
        last edited by May 13, 2013, 6:43 PM

        So, is it impossible to have rules that apply the firewall as-is?

        Don't you think it is a security breach having the firewall host with whole flows to all the connected hosts "to it"?

        1 Reply Last reply Reply Quote 0
        • G
          gderf
          last edited by May 13, 2013, 7:01 PM

          Password protect the console and/or restrict physical access to it. Do not allow unauthorized access to the shell and GUI.

          1 Reply Last reply Reply Quote 0
          • C
            crester
            last edited by May 13, 2013, 7:55 PM May 13, 2013, 7:53 PM

            yep, it is on page 1 of the good practices manual.

            what about, i.e. a pfSense 0-Day and a host compromise?
            there are no keys nor passwords nor phisical access.

            1 Reply Last reply Reply Quote 0
            • G
              gderf
              last edited by May 13, 2013, 8:55 PM

              How would anything you could do with the firewall configuration protect you against a pfsense remote access vulnerability? If they can breach the firewall via external access they can can gain a shell and reconfigure it to their desire, removing anything you had put in place to protect attached networks.

              I just don't understand your concern. Maybe you could explain it more fully. How is pfsense any different than any other security solution in this regard?

              1 Reply Last reply Reply Quote 0
              • C
                cmb
                last edited by May 13, 2013, 11:25 PM

                You can use floating rules to override the default pass out.

                1 Reply Last reply Reply Quote 0
                • C
                  crester
                  last edited by May 14, 2013, 10:41 AM

                  @gderf:

                  How would anything you could do with the firewall configuration protect you against a pfsense remote access vulnerability? If they can breach the firewall via external access they can can gain a shell and reconfigure it to their desire, removing anything you had put in place to protect attached networks.

                  I just don't understand your concern. Maybe you could explain it more fully. How is pfsense any different than any other security solution in this regard?

                  Hi gderf,

                  lets suppose there is a worm that is not designed to attack pfSense as is, but it works in linux/bsd environment.
                  lets suppose an administrator infects the pfSense host with the worm
                  This worm is unable to change the rules. This worm is unable to offer gain a shell.

                  But this worm is a zombie that is able to read, tcpdump, and so on.

                  This is only a think in a forum…. but I still think there must be control over the flows from the firewall.

                  1 Reply Last reply Reply Quote 0
                  • C
                    crester
                    last edited by May 14, 2013, 10:42 AM

                    @cmb:

                    You can use floating rules to override the default pass out.

                    Thank you cmb.

                    I will have a look to see what can I do with floating rules.

                    1 Reply Last reply Reply Quote 0
                    7 out of 9
                    • First post
                      7/9
                      Last post
                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                      This community forum collects and processes your personal information.
                      consent.not_received