Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    (2.0.3) Shouldn't my ports be 'stealth'?

    Scheduled Pinned Locked Moved Firewalling
    19 Posts 8 Posters 10.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      Mr. Jingles
      last edited by

      Thank you very much for your reply, John  ;D

      I am rather quite sure that I was testing the right external IP (that is, grc.com automatically takes my IP I take it).

      I do agree with you that this site might have an error or so. I did your nstat-command, which returns this:

      
      [2.0.3-RELEASE][admin@pfsense.localdomain]/root(1): netstat -an |egrep 'Proto|LISTEN'
      Proto Recv-Q Send-Q  Local Address          Foreign Address       (state)
      tcp4       0      0 127.0.0.1.3128         *.*                    LISTEN
      tcp4       0      0 192.168.1.1.3128       *.*                    LISTEN
      tcp4       0      0 *.3000                 *.*                    LISTEN
      tcp6       0      0 *.53                   *.*                    LISTEN
      tcp4       0      0 *.53                   *.*                    LISTEN
      tcp4       0      0 *.80                   *.*                    LISTEN
      tcp4       0      0 *.22                   *.*                    LISTEN
      tcp6       0      0 *.22                   *.*                    LISTEN
      
      

      However, what does surprise me is that your post at the top shows your external IP, yet mine shows the adress of Pfsense (?)

      I will post my firewall rules (per screenshot), but I have to walk the guardians of my wife ( ;D) first, they are grumbling downstairs that I am already too late doing that.

      Thank you again for your help  :P

      Bye,

      EDIT: while walking my dogs, I was thinking: could this for some reason be caused because Pfsense is doing 'pass through' PPPoE?

      :

      • My ISP has a horrible modem/router. On 2.0.2, I couldn't get PPPoE to work in Pfsense (PFS).

      • So in 2.0.2 I had this setup:
        –- ISP modem/router does PPPoE and DHCP's 192.168.1.2 to PFS-WAN.
        --- PFS does DHCP in different subnet to LAN-clients.
        --- "It just worked" (noob expression  ;D).

      • Yesterday I upgraded to 2.0.3:
        --- I simply let all cables in place the way they were (so PFS WAN-cable in ISP modem/router)
        --- I changed PFS-WAN settings from 'DHCP' to 'PPPoE' and entered log in information.
        --- "It just worked" (surprised noob expression  ;D).

      • On trying to understand why this happened, I learned:
        --- There are now two PPPoE connections at the same time;
        ------- One from the modem/router
        ------- One from PFS, which is called 'PPPoE pass through'

      • So while walking the dogs, I said to myself: 'self':
        --- Two PPPoE's might mean 2 external IP's
        --- It could be that grc.com is testing IP1 (the modem/router, which has all these closed but not stealth ports)
        --- While PFS is actually using a different IP2.

      • Back home, I checked, but no: the external IP grc.com reports as testing is the very same PFS reports as the WAN-IP in the Dashboard.

      So, would disabling the PPPoE connection the ISP modem/router makes solve this vague problem? Normally, I would simply test this, but the last time I disabled the PPPoE and DHCP in the modem/router I wasted a full afternoon trying to get that thing to do anything at all again (hard resetting it to factory settings a couple of times, calling the help desk, and so on and so forth). So I'd rather not 'simply try it', I was hoping somebody would know if this is, for known technical reasons, most likely the cause of this problem.

      6 and a half billion people know that they are stupid, agressive, lower life forms.

      1 Reply Last reply Reply Quote 0
      • M
        Mr. Jingles
        last edited by

        I also had to add the firewall rules, I created screen shots:

        FW_rules_LAN.png
        FW_rules_LAN.png_thumb
        FW_rules_WAN.png
        FW_rules_WAN.png_thumb
        FW_rules_floating.png
        FW_rules_floating.png_thumb
        FW_rules_floating.png
        FW_rules_floating.png_thumb

        6 and a half billion people know that they are stupid, agressive, lower life forms.

        1 Reply Last reply Reply Quote 0
        • M
          Mr. Jingles
          last edited by

          A small update: when I run nmap from the Wireless LAN of my neighbour against my own external IP, nmap says 'all ports are filtered'. Which suggests it is working fine. Which leaves me with why it does show all these open ports when I use internet test sites.

          I do suspect it has to do with the ISP's modem/router doing the 'original' PPPoE, and PFS doing a 'pass through' PPPoE next to that.

          6 and a half billion people know that they are stupid, agressive, lower life forms.

          1 Reply Last reply Reply Quote 0
          • chpalmerC
            chpalmer
            last edited by

            I do suspect it has to do with the ISP's modem/router doing the 'original' PPPoE, and PFS doing a 'pass through' PPPoE next to that.

            X2

            Triggering snowflakes one by one..
            Intel(R) Core(TM) i5-4590T CPU @ 2.00GHz on an M400 WG box.

            1 Reply Last reply Reply Quote 0
            • M
              Mr. Jingles
              last edited by

              @chpalmer:

              X2

              ???

              ( ;D)

              6 and a half billion people know that they are stupid, agressive, lower life forms.

              1 Reply Last reply Reply Quote 0
              • M
                mr_bobo
                last edited by

                @Hollander:

                Which leaves me with why it does show all these open ports when I use internet test sites.

                Nmap online scan

                1 Reply Last reply Reply Quote 0
                • chpalmerC
                  chpalmer
                  last edited by

                  @Hollander:

                  @chpalmer:

                  X2

                  ???

                  ( ;D)

                  Means me also.  I tend to agree with your theory.  When I check against GRC (which I tend to believe spreads a little FUD around) I get everything except the one port I have open as invisible.

                  Triggering snowflakes one by one..
                  Intel(R) Core(TM) i5-4590T CPU @ 2.00GHz on an M400 WG box.

                  1 Reply Last reply Reply Quote 0
                  • R
                    razzfazz
                    last edited by

                    @Hollander:

                    Which leaves me with why it does show all these open ports when I use internet test sites.

                    What open ports? Your earlier screen shot shows everything either as "stealth" or "closed" (i.e., "drop" or "reject" in terms of pf rules). Neither of these are harmful or dangerous.

                    The closed ports that you're seeing are most likely ports that are filtered by your ISP; i.e., they get rejected upstream from you, and requests for them never even get to your box.

                    1 Reply Last reply Reply Quote 0
                    • P
                      PhoenixOrion
                      last edited by

                      I am having the same problem but. With some of the ports not stealthed. When I am connected through pfsense on the WAN with dhcp all is stealthed. Which is what I want. But I use a vpn service, to share anonymous internet with the whole house and have pfsense connect as a client on openvpn. When it is connected as a client I get about 10 ports that are closed but not stealthed and am wondering what I can do to get them to stealth. I can also vpn directly from my computer not the pfsense box and all is stealthed with comodo firewall so not sure where these closed ports are coming from. But I do have a Wireless linksys router in between the pfsense box and my computer. I haven't tested it for a while but I believe all ports on it should be stealthed it is running ddwrt. Any help I would appreciate as well.

                      1 Reply Last reply Reply Quote 0
                      • C
                        cmb
                        last edited by

                        as long as you haven't added any reject rules, you're either open or "stealth" or something other than the firewall is responding. When it's a small number of ports, it's almost certainly because the ISP (or VPN provider in that case) is doing blocking.

                        1 Reply Last reply Reply Quote 0
                        • P
                          PhoenixOrion
                          last edited by

                          @cmb:

                          as long as you haven't added any reject rules, you're either open or "stealth" or something other than the firewall is responding. When it's a small number of ports, it's almost certainly because the ISP (or VPN provider in that case) is doing blocking.

                          It is vpn checked with openvpn connection and it is them. If I connect sstp,pptp or l2tp they are stealthed but their openvpn is not fully stealthed? For my vpn provider. All this time pulling out my hair unless it is a openvpn problem not sure yet.

                          1 Reply Last reply Reply Quote 0
                          • M
                            Mr. Jingles
                            last edited by

                            Hmmm, sorry if I may come back at this again  :-X

                            I ran the test at grc.com again, but the funny thing is: the ports that grc.com shows as 'closed' but not 'stealth' (I take it this is 'reject' versus 'drop') are the ports that also do not show in Status/System logs/Firewall. For example, you see 'port 992' is 'closed' but not 'stealth' in the first screenshot, and in the firewall log you see no port 992 blocked (second screenshot).

                            So this would then mean that PFS isn't blocking that since it never reaches PFS since my ISP is already blocking that?

                            grc.jpg
                            grc.jpg_thumb

                            6 and a half billion people know that they are stupid, agressive, lower life forms.

                            1 Reply Last reply Reply Quote 0
                            • M
                              Mr. Jingles
                              last edited by

                              Still only one screenshot at a time to be posted  :P Here is number 2:

                              2013-07-07_194752.jpg
                              2013-07-07_194752.jpg_thumb

                              6 and a half billion people know that they are stupid, agressive, lower life forms.

                              1 Reply Last reply Reply Quote 0
                              • M
                                Mr. Jingles
                                last edited by

                                @mr_bobo:

                                @Hollander:

                                Which leaves me with why it does show all these open ports when I use internet test sites.

                                Nmap online scan

                                Thank you very much for this link  ;D

                                That links shows the first 5000 ports all filtered. So this might confirm what I wrote right before this reply, I think.

                                6 and a half billion people know that they are stupid, agressive, lower life forms.

                                1 Reply Last reply Reply Quote 0
                                • chpalmerC
                                  chpalmer
                                  last edited by

                                  Good bedtime reading-

                                  http://cable-dsl.navasgroup.com/#CheckSecurity

                                  http://web.archive.org/web/20060215171504/http://blog.netwarriors.org/articles/2003/11/11/shieldsup-analyzed

                                  and all this if you really have allot of time on your hands-

                                  http://web.archive.org/web/20060204120906/http://www.grcsucks.com/

                                  Im not posting this to flame but to educate on some past "disagreements" in the online security field.

                                  Take it all with a grain of salt!

                                  Triggering snowflakes one by one..
                                  Intel(R) Core(TM) i5-4590T CPU @ 2.00GHz on an M400 WG box.

                                  1 Reply Last reply Reply Quote 0
                                  • M
                                    Mr. Jingles
                                    last edited by

                                    @chpalmer:

                                    Good bedtime reading-

                                    http://cable-dsl.navasgroup.com/#CheckSecurity

                                    http://web.archive.org/web/20060215171504/http://blog.netwarriors.org/articles/2003/11/11/shieldsup-analyzed

                                    and all this if you really have allot of time on your hands-

                                    http://web.archive.org/web/20060204120906/http://www.grcsucks.com/

                                    Im not posting this to flame but to educate on some past "disagreements" in the online security field.

                                    Take it all with a grain of salt!

                                    :o

                                    ???

                                    :-X

                                    :P

                                    ;D

                                    You sir, thank you very much for these links; that is a lot of reading to do, but I skimmed through some of them and it was like:  :o

                                    Thank you  ;D

                                    6 and a half billion people know that they are stupid, agressive, lower life forms.

                                    1 Reply Last reply Reply Quote 0
                                    • K
                                      kejianshi
                                      last edited by

                                      How could anyone take GRCsucks as a flame job?  haha.

                                      That said, a simple scan from their site comes up for me all ports stealth except the ports I opened purposefully.

                                      All is well on my pfsense (except perhaps the holes I punched in the firewall myself)

                                      Then again, I may be riddled with backdoor trojans…  Apparently hard to know from their results.

                                      1 Reply Last reply Reply Quote 0
                                      • First post
                                        Last post
                                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.