Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    (2.0.3) Shouldn't my ports be 'stealth'?

    Scheduled Pinned Locked Moved Firewalling
    19 Posts 8 Posters 10.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ
      johnpoz LAYER 8 Global Moderator
      last edited by

      Well I would say that test is not valid - sure your testing your IP?  Or you are forwarding traffic inbound to what looks like a windows box with those 135 to 139 ports, 445..  Or whatever it is you have from your ISP is open to those ports.  Pfsense is clearly not listening on those ports..  Do a simple netstat on your pfsense to see what its listening on.

      example - here is my pfsense box
      netstat -an | egrep 'Proto|LISTEN'
      Proto Recv-Q Send-Q Local Address          Foreign Address        (state)
      tcp4       0      0 24.13.xx.xx.443       .                    LISTEN
      tcp6       0      0 *.53                   .                    LISTEN
      tcp4       0      0 *.53                   .                    LISTEN
      tcp4       0      0 *.2189                 .                    LISTEN
      tcp6       0      0 *.80                   .                    LISTEN
      tcp4       0      0 *.80                   .                    LISTEN
      tcp4       0      0 *.22                   .                    LISTEN
      tcp6       0      0 *.22                   .                    LISTEN

      And from that test I show this for mine

      
      Results from scan of ports: 0-1055
      
          2 Ports Open
          0 Ports Closed
       1054 Ports Stealth
      ---------------------
       1056 Ports Tested
      
      NO PORTS were found to be CLOSED.
      Ports found to be OPEN were: 22, 443
      
      

      Which yeah I am listing on 22 and 443 on the WAN..  I would highly suggest you post your firewall rules for your wan and or PPPoE interfaces.  And validate what IP you were actually testing or if something in between.

      Clearly pfsense, especially default setup is not going to be listening on those ports you show, telnet and smtp and windows ports and 992 I show as Secure Telnet (over TLS/SSL) - yeah pfsense does not listen on those ports ;) look yourself via the netstat command I posted

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.8, 24.11

      1 Reply Last reply Reply Quote 0
      • M
        Mr. Jingles
        last edited by

        Thank you very much for your reply, John  ;D

        I am rather quite sure that I was testing the right external IP (that is, grc.com automatically takes my IP I take it).

        I do agree with you that this site might have an error or so. I did your nstat-command, which returns this:

        
        [2.0.3-RELEASE][admin@pfsense.localdomain]/root(1): netstat -an |egrep 'Proto|LISTEN'
        Proto Recv-Q Send-Q  Local Address          Foreign Address       (state)
        tcp4       0      0 127.0.0.1.3128         *.*                    LISTEN
        tcp4       0      0 192.168.1.1.3128       *.*                    LISTEN
        tcp4       0      0 *.3000                 *.*                    LISTEN
        tcp6       0      0 *.53                   *.*                    LISTEN
        tcp4       0      0 *.53                   *.*                    LISTEN
        tcp4       0      0 *.80                   *.*                    LISTEN
        tcp4       0      0 *.22                   *.*                    LISTEN
        tcp6       0      0 *.22                   *.*                    LISTEN
        
        

        However, what does surprise me is that your post at the top shows your external IP, yet mine shows the adress of Pfsense (?)

        I will post my firewall rules (per screenshot), but I have to walk the guardians of my wife ( ;D) first, they are grumbling downstairs that I am already too late doing that.

        Thank you again for your help  :P

        Bye,

        EDIT: while walking my dogs, I was thinking: could this for some reason be caused because Pfsense is doing 'pass through' PPPoE?

        :

        • My ISP has a horrible modem/router. On 2.0.2, I couldn't get PPPoE to work in Pfsense (PFS).

        • So in 2.0.2 I had this setup:
          –- ISP modem/router does PPPoE and DHCP's 192.168.1.2 to PFS-WAN.
          --- PFS does DHCP in different subnet to LAN-clients.
          --- "It just worked" (noob expression  ;D).

        • Yesterday I upgraded to 2.0.3:
          --- I simply let all cables in place the way they were (so PFS WAN-cable in ISP modem/router)
          --- I changed PFS-WAN settings from 'DHCP' to 'PPPoE' and entered log in information.
          --- "It just worked" (surprised noob expression  ;D).

        • On trying to understand why this happened, I learned:
          --- There are now two PPPoE connections at the same time;
          ------- One from the modem/router
          ------- One from PFS, which is called 'PPPoE pass through'

        • So while walking the dogs, I said to myself: 'self':
          --- Two PPPoE's might mean 2 external IP's
          --- It could be that grc.com is testing IP1 (the modem/router, which has all these closed but not stealth ports)
          --- While PFS is actually using a different IP2.

        • Back home, I checked, but no: the external IP grc.com reports as testing is the very same PFS reports as the WAN-IP in the Dashboard.

        So, would disabling the PPPoE connection the ISP modem/router makes solve this vague problem? Normally, I would simply test this, but the last time I disabled the PPPoE and DHCP in the modem/router I wasted a full afternoon trying to get that thing to do anything at all again (hard resetting it to factory settings a couple of times, calling the help desk, and so on and so forth). So I'd rather not 'simply try it', I was hoping somebody would know if this is, for known technical reasons, most likely the cause of this problem.

        6 and a half billion people know that they are stupid, agressive, lower life forms.

        1 Reply Last reply Reply Quote 0
        • M
          Mr. Jingles
          last edited by

          I also had to add the firewall rules, I created screen shots:

          FW_rules_LAN.png
          FW_rules_LAN.png_thumb
          FW_rules_WAN.png
          FW_rules_WAN.png_thumb
          FW_rules_floating.png
          FW_rules_floating.png_thumb
          FW_rules_floating.png
          FW_rules_floating.png_thumb

          6 and a half billion people know that they are stupid, agressive, lower life forms.

          1 Reply Last reply Reply Quote 0
          • M
            Mr. Jingles
            last edited by

            A small update: when I run nmap from the Wireless LAN of my neighbour against my own external IP, nmap says 'all ports are filtered'. Which suggests it is working fine. Which leaves me with why it does show all these open ports when I use internet test sites.

            I do suspect it has to do with the ISP's modem/router doing the 'original' PPPoE, and PFS doing a 'pass through' PPPoE next to that.

            6 and a half billion people know that they are stupid, agressive, lower life forms.

            1 Reply Last reply Reply Quote 0
            • chpalmerC
              chpalmer
              last edited by

              I do suspect it has to do with the ISP's modem/router doing the 'original' PPPoE, and PFS doing a 'pass through' PPPoE next to that.

              X2

              Triggering snowflakes one by one..
              Intel(R) Core(TM) i5-4590T CPU @ 2.00GHz on an M400 WG box.

              1 Reply Last reply Reply Quote 0
              • M
                Mr. Jingles
                last edited by

                @chpalmer:

                X2

                ???

                ( ;D)

                6 and a half billion people know that they are stupid, agressive, lower life forms.

                1 Reply Last reply Reply Quote 0
                • M
                  mr_bobo
                  last edited by

                  @Hollander:

                  Which leaves me with why it does show all these open ports when I use internet test sites.

                  Nmap online scan

                  1 Reply Last reply Reply Quote 0
                  • chpalmerC
                    chpalmer
                    last edited by

                    @Hollander:

                    @chpalmer:

                    X2

                    ???

                    ( ;D)

                    Means me also.  I tend to agree with your theory.  When I check against GRC (which I tend to believe spreads a little FUD around) I get everything except the one port I have open as invisible.

                    Triggering snowflakes one by one..
                    Intel(R) Core(TM) i5-4590T CPU @ 2.00GHz on an M400 WG box.

                    1 Reply Last reply Reply Quote 0
                    • R
                      razzfazz
                      last edited by

                      @Hollander:

                      Which leaves me with why it does show all these open ports when I use internet test sites.

                      What open ports? Your earlier screen shot shows everything either as "stealth" or "closed" (i.e., "drop" or "reject" in terms of pf rules). Neither of these are harmful or dangerous.

                      The closed ports that you're seeing are most likely ports that are filtered by your ISP; i.e., they get rejected upstream from you, and requests for them never even get to your box.

                      1 Reply Last reply Reply Quote 0
                      • P
                        PhoenixOrion
                        last edited by

                        I am having the same problem but. With some of the ports not stealthed. When I am connected through pfsense on the WAN with dhcp all is stealthed. Which is what I want. But I use a vpn service, to share anonymous internet with the whole house and have pfsense connect as a client on openvpn. When it is connected as a client I get about 10 ports that are closed but not stealthed and am wondering what I can do to get them to stealth. I can also vpn directly from my computer not the pfsense box and all is stealthed with comodo firewall so not sure where these closed ports are coming from. But I do have a Wireless linksys router in between the pfsense box and my computer. I haven't tested it for a while but I believe all ports on it should be stealthed it is running ddwrt. Any help I would appreciate as well.

                        1 Reply Last reply Reply Quote 0
                        • C
                          cmb
                          last edited by

                          as long as you haven't added any reject rules, you're either open or "stealth" or something other than the firewall is responding. When it's a small number of ports, it's almost certainly because the ISP (or VPN provider in that case) is doing blocking.

                          1 Reply Last reply Reply Quote 0
                          • P
                            PhoenixOrion
                            last edited by

                            @cmb:

                            as long as you haven't added any reject rules, you're either open or "stealth" or something other than the firewall is responding. When it's a small number of ports, it's almost certainly because the ISP (or VPN provider in that case) is doing blocking.

                            It is vpn checked with openvpn connection and it is them. If I connect sstp,pptp or l2tp they are stealthed but their openvpn is not fully stealthed? For my vpn provider. All this time pulling out my hair unless it is a openvpn problem not sure yet.

                            1 Reply Last reply Reply Quote 0
                            • M
                              Mr. Jingles
                              last edited by

                              Hmmm, sorry if I may come back at this again  :-X

                              I ran the test at grc.com again, but the funny thing is: the ports that grc.com shows as 'closed' but not 'stealth' (I take it this is 'reject' versus 'drop') are the ports that also do not show in Status/System logs/Firewall. For example, you see 'port 992' is 'closed' but not 'stealth' in the first screenshot, and in the firewall log you see no port 992 blocked (second screenshot).

                              So this would then mean that PFS isn't blocking that since it never reaches PFS since my ISP is already blocking that?

                              grc.jpg
                              grc.jpg_thumb

                              6 and a half billion people know that they are stupid, agressive, lower life forms.

                              1 Reply Last reply Reply Quote 0
                              • M
                                Mr. Jingles
                                last edited by

                                Still only one screenshot at a time to be posted  :P Here is number 2:

                                2013-07-07_194752.jpg
                                2013-07-07_194752.jpg_thumb

                                6 and a half billion people know that they are stupid, agressive, lower life forms.

                                1 Reply Last reply Reply Quote 0
                                • M
                                  Mr. Jingles
                                  last edited by

                                  @mr_bobo:

                                  @Hollander:

                                  Which leaves me with why it does show all these open ports when I use internet test sites.

                                  Nmap online scan

                                  Thank you very much for this link  ;D

                                  That links shows the first 5000 ports all filtered. So this might confirm what I wrote right before this reply, I think.

                                  6 and a half billion people know that they are stupid, agressive, lower life forms.

                                  1 Reply Last reply Reply Quote 0
                                  • chpalmerC
                                    chpalmer
                                    last edited by

                                    Good bedtime reading-

                                    http://cable-dsl.navasgroup.com/#CheckSecurity

                                    http://web.archive.org/web/20060215171504/http://blog.netwarriors.org/articles/2003/11/11/shieldsup-analyzed

                                    and all this if you really have allot of time on your hands-

                                    http://web.archive.org/web/20060204120906/http://www.grcsucks.com/

                                    Im not posting this to flame but to educate on some past "disagreements" in the online security field.

                                    Take it all with a grain of salt!

                                    Triggering snowflakes one by one..
                                    Intel(R) Core(TM) i5-4590T CPU @ 2.00GHz on an M400 WG box.

                                    1 Reply Last reply Reply Quote 0
                                    • M
                                      Mr. Jingles
                                      last edited by

                                      @chpalmer:

                                      Good bedtime reading-

                                      http://cable-dsl.navasgroup.com/#CheckSecurity

                                      http://web.archive.org/web/20060215171504/http://blog.netwarriors.org/articles/2003/11/11/shieldsup-analyzed

                                      and all this if you really have allot of time on your hands-

                                      http://web.archive.org/web/20060204120906/http://www.grcsucks.com/

                                      Im not posting this to flame but to educate on some past "disagreements" in the online security field.

                                      Take it all with a grain of salt!

                                      :o

                                      ???

                                      :-X

                                      :P

                                      ;D

                                      You sir, thank you very much for these links; that is a lot of reading to do, but I skimmed through some of them and it was like:  :o

                                      Thank you  ;D

                                      6 and a half billion people know that they are stupid, agressive, lower life forms.

                                      1 Reply Last reply Reply Quote 0
                                      • K
                                        kejianshi
                                        last edited by

                                        How could anyone take GRCsucks as a flame job?  haha.

                                        That said, a simple scan from their site comes up for me all ports stealth except the ports I opened purposefully.

                                        All is well on my pfsense (except perhaps the holes I punched in the firewall myself)

                                        Then again, I may be riddled with backdoor trojans…  Apparently hard to know from their results.

                                        1 Reply Last reply Reply Quote 0
                                        • First post
                                          Last post
                                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.