Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Was I the target of a successful attack?

    Scheduled Pinned Locked Moved General pfSense Questions
    25 Posts 6 Posters 3.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      Supermule Banned
      last edited by

      DDoS on SSH and it created a buffer overflow and WAN went offline??

      1 Reply Last reply Reply Quote 0
      • J
        jsnicaise
        last edited by

        Could be something like that. Are you asking a question or are you telling me that's what you think it is? :)

        1 Reply Last reply Reply Quote 0
        • S
          Supermule Banned
          last edited by

          Thats a guess from here :)

          1 Reply Last reply Reply Quote 0
          • J
            jsnicaise
            last edited by

            how could I troubleshoot that further than reading from the logs in /var/log ?

            1 Reply Last reply Reply Quote 0
            • S
              Supermule Banned
              last edited by

              Make your attack surface as small as possible and harden the pfsense box.

              Disable SSH and predefined ports other than the outmost necessary.

              Run Snort with block option enabled and released every 24hrs.

              1 Reply Last reply Reply Quote 0
              • M
                mir
                last edited by

                could it be an idea to have fail2ban as part of a pfsense installation?

                fail2ban will prevent ddos attacks bringing down ssh.

                1 Reply Last reply Reply Quote 0
                • S
                  Supermule Banned
                  last edited by

                  Would be a viable option to have indeed!

                  1 Reply Last reply Reply Quote 0
                  • M
                    mir
                    last edited by

                    Is it possible to add a feature request for fail2ban in pfsense? I think this is important to prevent (D)DOS attacks leading to crash of service so my hope is that it is added to pfsense core and not as a package.

                    1 Reply Last reply Reply Quote 0
                    • D
                      doktornotor Banned
                      last edited by

                      @mir:

                      Is it possible to add a feature request for fail2ban in pfsense? I think this is important to prevent (D)DOS attacks leading to crash of service so my hope is that it is added to pfsense core and not as a package.

                      But it's already there. https://doc.pfsense.org/index.php/Sshlockout

                      1 Reply Last reply Reply Quote 0
                      • S
                        Supermule Banned
                        last edited by

                        Maybe not working then?? or enabled??

                        1 Reply Last reply Reply Quote 0
                        • D
                          doktornotor Banned
                          last edited by

                          @Supermule:

                          Maybe not working then?? or enabled??

                          Erm… read the logs posted?

                          Jan  4 00:51:23 pf01 sshlockout[37765]: Locking out 222.186.56.43 after 15 invalid attempts

                          Looks damn well working.

                          P.S. None of this protects against DDoS. Not possible. Won't save your WAN from crashing.

                          1 Reply Last reply Reply Quote 0
                          • S
                            Supermule Banned
                            last edited by

                            Yes I can see that :) Thank you.

                            https://doc.pfsense.org/index.php/HOWTO_enable_SSH_access

                            Not a way to configure it. And it seems that all though i disable it on the webgui then it doesnt get disabled in the console menu.

                            ![secure shell.PNG_thumb](/public/imported_attachments/1/secure shell.PNG_thumb)
                            ![secure shell.PNG](/public/imported_attachments/1/secure shell.PNG)

                            1 Reply Last reply Reply Quote 0
                            • S
                              Supermule Banned
                              last edited by

                              The console is responsive ONLY when you enable and disable the sshd.

                              No can do via the gui.

                              1 Reply Last reply Reply Quote 0
                              • D
                                doktornotor Banned
                                last edited by

                                No idea what are you trying to do with console. Serial console is not SSH.

                                1 Reply Last reply Reply Quote 0
                                • S
                                  Supermule Banned
                                  last edited by

                                  I know…. but you can enable/disable it via the gui and via console.

                                  It doesnt work disabling it via the GUI. Only via the console...

                                  1 Reply Last reply Reply Quote 0
                                  • D
                                    doktornotor Banned
                                    last edited by

                                    What's IT?!

                                    1 Reply Last reply Reply Quote 0
                                    • S
                                      Supermule Banned
                                      last edited by

                                      SSH :)

                                      1 Reply Last reply Reply Quote 0
                                      • D
                                        doktornotor Banned
                                        last edited by

                                        Before disabling SSH via GUI:

                                        
                                        # netstat -an | grep .22
                                        tcp4       0      0 *.22                   *.*                    LISTEN
                                        tcp6       0      0 *.22                   *.*                    LISTEN
                                        
                                        

                                        After disabling SSH via GUI:

                                        
                                        # netstat -an | grep .22
                                        #
                                        
                                        

                                        Re-enabling SSH via console:

                                        
                                        # netstat -an | grep .22
                                        tcp4       0      0 *.22                   *.*                    LISTEN
                                        tcp6       0      0 *.22                   *.*                    LISTEN
                                        
                                        

                                        and checking back the GUI:

                                        1 Reply Last reply Reply Quote 0
                                        • S
                                          Supermule Banned
                                          last edited by

                                          Doesnt work here…

                                          1 Reply Last reply Reply Quote 0
                                          • KOMK
                                            KOM
                                            last edited by

                                            P.S. None of this protects against DDoS. Not possible. Won't save your WAN from crashing.

                                            This x 1000.  I don't know why so many people incorrectly think that a simple firewall rule can mitigate a DDoS attack.  I guess someone should tell the netops over at Sony and MS that they should add a firewall rule to stop their entire gaming networks from being blown offline like what happened a week or two ago…

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.