Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Why does my Rule not match?

    Scheduled Pinned Locked Moved Firewalling
    13 Posts 5 Posters 4.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • P
      phil.davis
      last edited by

      You could look at Diagnostics->Tables, verify that CC_Sinkhole_IPs is a table, and has the needed IPs in it.
      Maybe there is some issue with having a mix of IP addresses and FQDNs in 1 alias? I just looked on my system (2.1-RC0) and a mixed alias like that is working.

      As the Greek philosopher Isosceles used to say, "There are 3 sides to every triangle."
      If I helped you, then help someone else - buy someone a gift from the INF catalog http://secure.inf.org/gifts/usd/

      1 Reply Last reply Reply Quote 0
      • D
        doktornotor Banned
        last edited by

        Well, maybe it just did not resolve due to DNS failure, or whatever. Also, I'd block pretty much every port, not just web ports. You do NOT want any such outgoing traffic to those IPs. Also afraid the alias is vastly incomplete. A maintained ZeUS blocklist in a format usable by pfBlocker is available here: http://list.iblocklist.com/?list=ynkdjqsjyfmilsgbogqf&fileformat=p2p&archiveformat=gz, currently has 217 CC servers.

        1 Reply Last reply Reply Quote 0
        • A
          andriusst
          last edited by

          Did you use toggle button adjacent to a tick box to disable/enable rule? If so try rebooting pfsense to see if rule in question starts working.
          I noticed that using a toggle button does not always re-enable the rule.

          1 Reply Last reply Reply Quote 0
          • M
            mircsicz
            last edited by

            Wow, first no single answer and then three in a row… Awesome, thank you all so much!!!

            @ phil.davis
            Thx Phil, I had a look at Diag > Tables and that one is OK...

            @ doktornotor
            Thx I already had that link: http://www.netsecdb.de/?q=node/3081 I now used it and combined it with your URL...

            @ andriusst
            I did a reboot last night, sadly I had another access to 82.165.37.26 an hour before that!

            I'll let you know what the log's are containing when I check em next on monday.

            Greetz
            Mircsicz

            1 Reply Last reply Reply Quote 0
            • M
              mircsicz
              last edited by

              According to CBL they again had contact with 82.165.37.26…

              So it seems the rule's didn't work again! And a grep on the exported log's did show that the IP is once more not mentioned in the log's. Which is quite logical if the rule doesn't work...  >:(

              I've rebooted the box again to see if that helps!

              Greetz
              Mircsicz

              1 Reply Last reply Reply Quote 0
              • D
                doktornotor Banned
                last edited by

                A bunch of notes:
                0/ The CBL nonsense blacklist is broken in the first place, as are any blocklists that do collateral listings.
                1/ WTH is "contact"? If I telnet to the IP:80 (say for diagnosing the firewall settings), I'll get on their blocklist? Wonderful concept.  ::)
                2/ Trying to block something on firewall absolutely does not solve the root problem, which are the (allegedly) infected boxes. After one week spent with hunting the ghosts, it'd be about time to scan the machines with AV scanner instead and disinfect/reimage them.

                EDIT: Frankly, I don't trust the guys and their claims about "contacts" at all… Set up some outbound NAT/port forward for the IP (82.165.37.26), set up a webserver, let it log the requests.

                1 Reply Last reply Reply Quote 0
                • M
                  mircsicz
                  last edited by

                  To your 2nd point:
                  they define 'contact' as follows:

                  
                  This was detected by observing this IP attempting to make contact to a Zeus Command and Control server, with contents unique to Zeus C&C command protocols.
                  
                  

                  So I expect em to wireshark that IP…

                  To your 3rd point:
                  We used 'desinfec't' from a German computer-mag, it's an ubuntu based live-cd and utilizes up to 5 different scanners... But could not clean all of the machines!

                  So the plan is to block&log that traffic and then see which machine is trying to call 'home'! If this would be my network there would be a default image, but there aren't even backups of those client's... I don't wanna share my other judgement about that 'strategy'! I'm only in charge for the firewall....

                  Greetz
                  mircsicz

                  EDIT: I don't get that outbound NAT hint can explain that Little further pls?

                  1 Reply Last reply Reply Quote 0
                  • D
                    doktornotor Banned
                    last edited by

                    @mircsicz:

                    EDIT: I don't get that outbound NAT hint can explain that Little further pls?

                    The idea was, instead of trying to block, redirect the traffic to some local webserver and log the requests… instead of relying on CBL folks' claims about something making "contacts". As said, these DNSBL folks are generally the sort of people I plain don't trust.

                    1 Reply Last reply Reply Quote 0
                    • K
                      kejianshi
                      last edited by

                      If you have been infected with ZEUS (or anything for that matter), don't attempt to clean it.  Wipe it and do a full reinstall.  Once a machine has been infected in such a way, you can never trust that install again.  Also, if ZEUS has done its job, you need to treat your entire network as if you have lost all your passwords to a thief.  Change them all.  Also, if I were a thief, one of the first things I would do is build myself some access to your systems for when you found my trojan.  Maybe add an account for myself and use SSH or something.  So, your problem could potentially go further than just eliminating the trojan.

                      Also, here is a lesson for future infrastructure decisions:

                      Zeus targets Microsoft Windows machines. It does not work on Mac OS X or Linux.  (This is the case with almost all malwar)

                      1 Reply Last reply Reply Quote 0
                      • D
                        doktornotor Banned
                        last edited by

                        @kejianshi:

                        If you have been infected with ZEUS (or anything for that matter), don't attempt to clean it.  Wipe it and do a full reinstall.  Once a machine has been infected in such a way, you can never trust that install again.

                        That's pretty much valid for any similar compromise. Suggested reading:
                        Help: I Got Hacked. Now What Do I Do?
                        Help: I Got Hacked. Now What Do I Do? Part II

                        The only way to clean a compromised system is to flatten and rebuild. That’s right. If you have a system that has been completely compromised, the only thing you can do is to flatten the system (reformat the system disk) and rebuild it from scratch (reinstall Windows and your applications). Alternatively, you could of course work on your resume instead, but I don’t want to see you doing that.

                        1 Reply Last reply Reply Quote 0
                        • K
                          kejianshi
                          last edited by

                          I agree with the doktornotor.

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.