Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Was I the target of a successful attack?

    Scheduled Pinned Locked Moved General pfSense Questions
    25 Posts 6 Posters 3.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J
      jsnicaise
      last edited by

      Could be something like that. Are you asking a question or are you telling me that's what you think it is? :)

      1 Reply Last reply Reply Quote 0
      • S
        Supermule Banned
        last edited by

        Thats a guess from here :)

        1 Reply Last reply Reply Quote 0
        • J
          jsnicaise
          last edited by

          how could I troubleshoot that further than reading from the logs in /var/log ?

          1 Reply Last reply Reply Quote 0
          • S
            Supermule Banned
            last edited by

            Make your attack surface as small as possible and harden the pfsense box.

            Disable SSH and predefined ports other than the outmost necessary.

            Run Snort with block option enabled and released every 24hrs.

            1 Reply Last reply Reply Quote 0
            • M
              mir
              last edited by

              could it be an idea to have fail2ban as part of a pfsense installation?

              fail2ban will prevent ddos attacks bringing down ssh.

              1 Reply Last reply Reply Quote 0
              • S
                Supermule Banned
                last edited by

                Would be a viable option to have indeed!

                1 Reply Last reply Reply Quote 0
                • M
                  mir
                  last edited by

                  Is it possible to add a feature request for fail2ban in pfsense? I think this is important to prevent (D)DOS attacks leading to crash of service so my hope is that it is added to pfsense core and not as a package.

                  1 Reply Last reply Reply Quote 0
                  • D
                    doktornotor Banned
                    last edited by

                    @mir:

                    Is it possible to add a feature request for fail2ban in pfsense? I think this is important to prevent (D)DOS attacks leading to crash of service so my hope is that it is added to pfsense core and not as a package.

                    But it's already there. https://doc.pfsense.org/index.php/Sshlockout

                    1 Reply Last reply Reply Quote 0
                    • S
                      Supermule Banned
                      last edited by

                      Maybe not working then?? or enabled??

                      1 Reply Last reply Reply Quote 0
                      • D
                        doktornotor Banned
                        last edited by

                        @Supermule:

                        Maybe not working then?? or enabled??

                        Erm… read the logs posted?

                        Jan  4 00:51:23 pf01 sshlockout[37765]: Locking out 222.186.56.43 after 15 invalid attempts

                        Looks damn well working.

                        P.S. None of this protects against DDoS. Not possible. Won't save your WAN from crashing.

                        1 Reply Last reply Reply Quote 0
                        • S
                          Supermule Banned
                          last edited by

                          Yes I can see that :) Thank you.

                          https://doc.pfsense.org/index.php/HOWTO_enable_SSH_access

                          Not a way to configure it. And it seems that all though i disable it on the webgui then it doesnt get disabled in the console menu.

                          ![secure shell.PNG_thumb](/public/imported_attachments/1/secure shell.PNG_thumb)
                          ![secure shell.PNG](/public/imported_attachments/1/secure shell.PNG)

                          1 Reply Last reply Reply Quote 0
                          • S
                            Supermule Banned
                            last edited by

                            The console is responsive ONLY when you enable and disable the sshd.

                            No can do via the gui.

                            1 Reply Last reply Reply Quote 0
                            • D
                              doktornotor Banned
                              last edited by

                              No idea what are you trying to do with console. Serial console is not SSH.

                              1 Reply Last reply Reply Quote 0
                              • S
                                Supermule Banned
                                last edited by

                                I know…. but you can enable/disable it via the gui and via console.

                                It doesnt work disabling it via the GUI. Only via the console...

                                1 Reply Last reply Reply Quote 0
                                • D
                                  doktornotor Banned
                                  last edited by

                                  What's IT?!

                                  1 Reply Last reply Reply Quote 0
                                  • S
                                    Supermule Banned
                                    last edited by

                                    SSH :)

                                    1 Reply Last reply Reply Quote 0
                                    • D
                                      doktornotor Banned
                                      last edited by

                                      Before disabling SSH via GUI:

                                      
                                      # netstat -an | grep .22
                                      tcp4       0      0 *.22                   *.*                    LISTEN
                                      tcp6       0      0 *.22                   *.*                    LISTEN
                                      
                                      

                                      After disabling SSH via GUI:

                                      
                                      # netstat -an | grep .22
                                      #
                                      
                                      

                                      Re-enabling SSH via console:

                                      
                                      # netstat -an | grep .22
                                      tcp4       0      0 *.22                   *.*                    LISTEN
                                      tcp6       0      0 *.22                   *.*                    LISTEN
                                      
                                      

                                      and checking back the GUI:

                                      1 Reply Last reply Reply Quote 0
                                      • S
                                        Supermule Banned
                                        last edited by

                                        Doesnt work here…

                                        1 Reply Last reply Reply Quote 0
                                        • KOMK
                                          KOM
                                          last edited by

                                          P.S. None of this protects against DDoS. Not possible. Won't save your WAN from crashing.

                                          This x 1000.  I don't know why so many people incorrectly think that a simple firewall rule can mitigate a DDoS attack.  I guess someone should tell the netops over at Sony and MS that they should add a firewall rule to stop their entire gaming networks from being blown offline like what happened a week or two ago…

                                          1 Reply Last reply Reply Quote 0
                                          • S
                                            Supermule Banned
                                            last edited by

                                            It doesnt stop it or prevent it…

                                            It handles it and doesnt interfere with normal services.

                                            And dont let the security at Sony disturb you at night....if North Korea can get in, everyone can....

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.