Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Hows Google getting past my alias lists?

    Scheduled Pinned Locked Moved General pfSense Questions
    30 Posts 9 Posters 7.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • F
      firewalluser
      last edited by

      2.2-RELEASE (amd64)
      built on Thu Jan 22 14:03:54 CST 2015
      FreeBSD 10.1-RELEASE-p4

      So I've setup a win7 machine to see whats trying to get out on its own network with default access set to block.

      I've created some aliases and created a rule for every site/org I deal with.
      Googles aliases are simply google.co.uk and www.google.co.uk

      Rule is set to
      IPv4 TCP * * Google * * none   access to google Aliases

      In the logs I can see the firefox google search periodically touching base and its been blocked with the Default deny rule IPv4 (1000000103)
      lis01s13-in-f3.1e100.net 216.58.208.3:443

      yet a few seconds later a different ip and host name and googles getting out.
      lhr08s07-in-f3.1e100.net 216.58.208.35:443

      How is Google getting around the the alias block?

      TIA

      Capitalism, currently The World's best Entertainment Control System and YOU cant buy it! But you can buy this, or some of this or some of these

      Asch Conformity, mainly the blind leading the blind.

      1 Reply Last reply Reply Quote 0
      • D
        doktornotor Banned
        last edited by

        The filterdns script does not run even remotely often enough to catch up with the DNS stuff that Google is doing. Trying to filter Google like this is definitely a waste of time.

        1 Reply Last reply Reply Quote 0
        • H
          heper
          last edited by

          the only way todo that is blocking all known cidr ranges …. but that'll kill youtube and other g-services

          1 Reply Last reply Reply Quote 0
          • F
            firewalluser
            last edited by

            @doktornotor:

            The filterdns script does not run even remotely often enough to catch up with the DNS stuff that Google is doing. Trying to filter Google like this is definitely a waste of time.

            Does the filterdns use resolver? If so, I'm running resolver with maximum ttl at the moment, not the usual 864000 (1 day) TTL, but then I dont understand how the firewall log resolves the ip address 216.58.208.35 to lhr08s07-in-f3.1e100.net which is still not a google.co.uk subdomain but a 1e100.net subdomain.

            Do different parts of pfsense use different sources/methods to resolve?

            @heper:

            the only way todo that is blocking all known cidr ranges …. but that'll kill youtube and other g-services

            Thats ok, I only use google for search, which might be the only option to fall back to.

            Capitalism, currently The World's best Entertainment Control System and YOU cant buy it! But you can buy this, or some of this or some of these

            Asch Conformity, mainly the blind leading the blind.

            1 Reply Last reply Reply Quote 0
            • D
              doktornotor Banned
              last edited by

              The PTR used for various CDN clusters that Google is running on is really irrelevant here.

              1 Reply Last reply Reply Quote 0
              • F
                firewalluser
                last edited by

                what tool/website are you using to get that information?

                I've tried a few sites like viewdns.info and others but so far I've not found anything to suggest the google.co.uk domain was linked to the ip address it got out on.

                A reverse dns on the ip gives csi.gstatic.com from ipaddress.com.

                Capitalism, currently The World's best Entertainment Control System and YOU cant buy it! But you can buy this, or some of this or some of these

                Asch Conformity, mainly the blind leading the blind.

                1 Reply Last reply Reply Quote 0
                • D
                  doktornotor Banned
                  last edited by

                  It's just a reverse record.

                  
                  $ host 216.58.208.35
                  35.208.58.216.in-addr.arpa domain name pointer lhr08s07-in-f3.1e100.net.
                  35.208.58.216.in-addr.arpa domain name pointer lhr08s07-in-f3.1e100.net.
                  
                  
                  1 Reply Last reply Reply Quote 0
                  • F
                    firewalluser
                    last edited by

                    Sorry I thought you meant or were implying their ptr record of  lhr08s07-in-f3.1e100.net is not helpful when they also have other domain names running from the ip address.

                    The thing I cant understand is the aliases should be a domain name, so I would expect the google.co.uk domain to have been linked to that ip address somehow, but I cant find anything to suggest this yet, hence the mystery of how google managed to get out.

                    Capitalism, currently The World's best Entertainment Control System and YOU cant buy it! But you can buy this, or some of this or some of these

                    Asch Conformity, mainly the blind leading the blind.

                    1 Reply Last reply Reply Quote 0
                    • KOMK
                      KOM
                      last edited by

                      One FQDN can resolve to many different IP addresses with DNS set to give out a different one in rotating fashion for subsequent lookups.  This is commonly used simple method to load-balance sites.

                      1 Reply Last reply Reply Quote 0
                      • F
                        firewalluser
                        last edited by

                        I can understand that, well I did a hostname lookup using Diagnostics: DNS Lookup and google.co.uk returned just the one ip address that being 216.58.208.35!

                        Thought that was weird so tried google.com and got
                        62.24.155.222/32, 62.24.155.246/32, 62.24.155.231/32, 62.24.155.232/32, 62.24.155.242/32, 62.24.155.247/32, 62.24.155.251/32, 62.24.155.217/32, 62.24.155.212/32, 62.24.155.237/32…
                        tried google.se and got
                        62.24.155.236/32, 62.24.155.212/32, 62.24.155.227/32, 62.24.155.237/32, 62.24.155.242/32, 62.24.155.226/32, 62.24.155.216/32, 62.24.155.251/32, 62.24.155.246/32, 62.24.155.221/32
                        so went back and tried google.co.uk and this time got not one ip address but what I was expecting, that being
                        62.24.155.247/32, 62.24.155.227/32, 62.24.155.241/32, 62.24.155.231/32, 62.24.155.222/32, 62.24.155.237/32, 62.24.155.236/32, 62.24.155.226/32, 62.24.155.216/32, 62.24.155.246/32

                        So why would Diagnostics: DNS Lookup report just one ip address to begin with before reporting the full list?
                        I checked in the resolver log and the only update is
                        Feb 2 19:29:06 filterdns: clearing entry 208.73.211.199 from table Mozzilla_firefox on host www.mozzilla.org
                        Feb 2 19:29:06 filterdns: clearing entry 208.73.211.191 from table Mozzilla_firefox on host www.mozzilla.org
                        Feb 2 19:29:06 filterdns: clearing entry 208.73.211.194 from table Mozzilla_firefox on host www.mozzilla.org
                        Feb 2 19:29:06 filterdns: clearing entry 208.73.210.212 from table Mozzilla_firefox on host www.mozzilla.org
                        Feb 2 19:29:06 filterdns: adding entry 208.73.211.165 to table Mozzilla_firefox on host www.mozzilla.org
                        Feb 2 19:29:06 filterdns: adding entry 208.73.210.205 to table Mozzilla_firefox on host www.mozzilla.org
                        Feb 2 19:29:06 filterdns: adding entry 208.73.211.163 to table Mozzilla_firefox on host www.mozzilla.org
                        Feb 2 19:29:06 filterdns: adding entry 208.73.211.242 to table Mozzilla_firefox on host www.mozzilla.org

                        Something seems odd.

                        Capitalism, currently The World's best Entertainment Control System and YOU cant buy it! But you can buy this, or some of this or some of these

                        Asch Conformity, mainly the blind leading the blind.

                        1 Reply Last reply Reply Quote 0
                        • D
                          doktornotor Banned
                          last edited by

                          Look, for huge stuff like Google, these IPs change pretty much every time you try to resolve the FQDN. Absolutely normal. This really will not get you anywhere regarding attempts to block Google.

                          1 Reply Last reply Reply Quote 0
                          • F
                            firewalluser
                            last edited by

                            I  understand what you say, but right now I've got something trying to connect back to google and I'm trying to find out what it is.

                            I didnt have any webpages open except pf's own webpages (dashboard, systemlog, aliases, resolvers log and firewall rules), even my default toolbar search in firefox is set to chambers uk (dictionary people) so I'm at a loss as to how firefox can still be talking to google, especially when I run noscript which blocks all javascript until the domain/subdomain is enabled.

                            I'm beginning to think there must be some other code built into firefox which is talking back to google.

                            Edit.
                            This seems weird as well. In the resolver log I see

                            pfmechanics.com.MyDomainNameWhichWillRemainPrivate

                            Now why would I be seeing "pfmechanics.com" as a sub domain attached to my domain name (see the resolver logs below) or is this one of those read-the-contract-to-see-what-else-I've-signed-up-for moments?

                            eg

                            Feb 2 20:06:31 unbound: [63509:0] info: resolving MyDomainNameWhichWillRemainPrivate. DS IN
                            Feb 2 20:06:31 unbound: [63509:0] info: query response was NXDOMAIN ANSWER
                            Feb 2 20:06:31 unbound: [63509:0] info: reply from <mydomainnamewhichwillremainprivate.>184.172.157.218#53
                            Feb 2 20:06:31 unbound: [63509:0] info: response for pfmechanics.com.MyDomainNameWhichWillRemainPrivate. A IN
                            Feb 2 20:06:31 unbound: [63509:0] info: query response was ANSWER
                            Feb 2 20:06:31 unbound: [63509:0] info: reply from <pfmechanics.net.>192.207.126.7#53
                            Feb 2 20:06:31 unbound: [63509:0] info: response for ns1.pfmechanics.net. A IN
                            Feb 2 20:06:30 unbound: [63509:0] info: resolving b.ns.MyDomainRegistrar. AAAA IN
                            Feb 2 20:06:30 unbound: [63509:0] info: resolving c.ns.MyDomainRegistrar. AAAA IN
                            Feb 2 20:06:30 unbound: [63509:0] info: query response was REFERRAL
                            Feb 2 20:06:30 unbound: [63509:0] info: reply from <com.>192.35.51.30#53
                            Feb 2 20:06:30 unbound: [63509:0] info: response for pfmechanics.com.MyDomainNameWhichWillRemainPrivate. A IN
                            Feb 2 20:06:30 unbound: [63509:0] info: resolving ns1.pfmechanics.net. AAAA IN
                            Feb 2 20:06:30 unbound: [63509:0] info: resolving ns1.pfmechanics.com. AAAA IN
                            Feb 2 20:06:30 unbound: [63509:0] info: query response was REFERRAL
                            Feb 2 20:06:30 unbound: [63509:0] info: reply from <net.>192.48.79.30#53
                            Feb 2 20:06:30 unbound: [63509:0] info: response for ns2.pfmechanics.net. AAAA IN
                            Feb 2 20:06:30 unbound: [63509:0] info: resolving ns1.pfmechanics.com. AAAA IN
                            Feb 2 20:06:30 unbound: [63509:0] info: resolving ns2.pfmechanics.com. AAAA IN
                            Feb 2 20:06:30 unbound: [63509:0] info: query response was REFERRAL
                            Feb 2 20:06:30 unbound: [63509:0] info: reply from <net.>192.48.79.30#53
                            Feb 2 20:06:30 unbound: [63509:0] info: response for ns1.pfmechanics.net. A IN
                            Feb 2 20:06:30 unbound: [63509:0] info: query response was ANSWER
                            Feb 2 20:06:30 unbound: [63509:0] info: reply from <pfmechanics.net.>192.207.126.6#53
                            Feb 2 20:06:30 unbound: [63509:0] info: response for ns2.pfmechanics.net. A IN</pfmechanics.net.></net.></net.></com.></pfmechanics.net.></mydomainnamewhichwillremainprivate.>

                            Capitalism, currently The World's best Entertainment Control System and YOU cant buy it! But you can buy this, or some of this or some of these

                            Asch Conformity, mainly the blind leading the blind.

                            1 Reply Last reply Reply Quote 0
                            • D
                              doktornotor Banned
                              last edited by

                              Among others: https://developers.google.com/safe-browsing/

                              1 Reply Last reply Reply Quote 0
                              • F
                                firewalluser
                                last edited by

                                I'm trying to reduce my google exposure so this wont be off much use.

                                Having typed in https://developers.google.com/safe-browsing/ and bearing in mind all I have is google.co.uk and www.google.co.uk setup in an alias with a rule allowing supposedly just those domains, I can see right now in the bottom left of firefox it cycling through all the google domains like ajax.googleapis.com, www.googleadservices.com, fonts.googleapis.com and others before eventually loading that web page.

                                It kind of makes a mockery of firewalls in some ways doesnt it, as this could equally be malware getting out doing its stuff, and thus more malware coming back in.

                                Capitalism, currently The World's best Entertainment Control System and YOU cant buy it! But you can buy this, or some of this or some of these

                                Asch Conformity, mainly the blind leading the blind.

                                1 Reply Last reply Reply Quote 0
                                • BBcan177B
                                  BBcan177 Moderator
                                  last edited by

                                  With pfBlockerNG, you can download lists from Hurricane Electric using the new "html" format setting.  I posted about it in a different thread (See below). While it might not be suitable for each requirement, it can be used quite effectively. Just enter the Search criteria in the HE Search box.

                                  https://forum.pfsense.org/index.php?topic=83421.msg479553#msg479553

                                  Example of HE IP lists:

                                  http://bgp.he.net/search?search%5Bsearch%5D=twitter&commit=Search
                                  http://bgp.he.net/search?search%5Bsearch%5D=facebook&commit=Search
                                  http://bgp.he.net/search?search%5Bsearch%5D=spotify&commit=Search
                                  http://bgp.he.net/search?search%5Bsearch%5D=dropbox&commit=Search

                                  "Experience is something you don't get until just after you need it."

                                  Website: http://pfBlockerNG.com
                                  Twitter: @BBcan177  #pfBlockerNG
                                  Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                                  1 Reply Last reply Reply Quote 0
                                  • F
                                    firewalluser
                                    last edited by

                                    @bbCan177, thanks for the link, I've been using them amongst others to look up and cross reference the address blocks, but I'll check out the thread as I had pfblocker iirc installed on another site to restrict access to just UK IP addresses as the customer didnt trade abroad.

                                    Capitalism, currently The World's best Entertainment Control System and YOU cant buy it! But you can buy this, or some of this or some of these

                                    Asch Conformity, mainly the blind leading the blind.

                                    1 Reply Last reply Reply Quote 0
                                    • D
                                      doktornotor Banned
                                      last edited by

                                      @firewalluser:

                                      I'm trying to reduce my google exposure so this wont be off much use.

                                      Hmmm? I was not suggesting that you should use it. FF and Chrome uses Google Safebrowsing by default and downloads the databases every time you launch the browser. You can check that in %UserProfile%\AppData\Local\Mozilla\Firefox\Profiles<randomjunk.default>\safebrowsing</randomjunk.default>

                                      1 Reply Last reply Reply Quote 0
                                      • F
                                        firewalluser
                                        last edited by

                                        Ok so for another test, I've disabled the rule which allows the google aliases comprising of google.co.uk and www.google.co.uk out onto the net, and guess what its still loaded the webpage https://developers.google.com/safe-browsing/

                                        So I'm going to try and do an explicit block of all the assigned google cidr's becuase in the system logs amongst those that resolve to a google domain, there are plenty of ip's that dont resolve and yet apart from being logged in here there is no other webpage being looked at or service/app running getting out on this single machine on its own network.

                                        Currently this would suggest Google has a wide range of ip addresses which do not resolve.

                                        Capitalism, currently The World's best Entertainment Control System and YOU cant buy it! But you can buy this, or some of this or some of these

                                        Asch Conformity, mainly the blind leading the blind.

                                        1 Reply Last reply Reply Quote 0
                                        • F
                                          firewalluser
                                          last edited by

                                          @doktornotor:

                                          @firewalluser:

                                          I'm trying to reduce my google exposure so this wont be off much use.

                                          Hmmm? I was not suggesting that you should use it. FF and Chrome uses Google Safebrowsing by default and downloads the databases every time you launch the browser. You can check that in %UserProfile%\AppData\Local\Mozilla\Firefox\Profiles<randomjunk.default>\safebrowsing</randomjunk.default>

                                          I can see in the folder last 3 files were modified a few minutes ago, but I do have mozilla as an allowed alias comprising of mozilla.org, www.mozzilla.org, addons.mozilla.org, bugzilla.mozilla.org, Ftp.mozilla.org

                                          Capitalism, currently The World's best Entertainment Control System and YOU cant buy it! But you can buy this, or some of this or some of these

                                          Asch Conformity, mainly the blind leading the blind.

                                          1 Reply Last reply Reply Quote 0
                                          • F
                                            firewalluser
                                            last edited by

                                            Well with an explicit block and having double checked things in firefox like send back telemetry is switched off, no history etc, the firewall log shows google is probably using some amazon cloud servers if the port numbers are anything to go by but surprising google would also be using amazon cloud severs. In another test the default deny rule is showing up with my isp's ip addresses when trying to access google, which is beginning to make me wonder just how much of the web google is not connected to.

                                            Feb 2 21:29:33 opt1 Default deny rule IPv4 (1000000103) 192.168.2.1:60532   54.186.10.229:443
                                            ec2-54-186-10-229.us-west-2.compute.amazonaws.com TCP:S
                                            block/1000000103 Feb 2 21:29:32 opt1 Default deny rule IPv4 (1000000103) 192.168.2.1:60531   54.186.10.229:443
                                            ec2-54-186-10-229.us-west-2.compute.amazonaws.com TCP:S
                                            block/1422911107
                                            Feb 2 21:29:31 opt1 USER_RULE opt1 to google com Aliases (1422911107) 192.168.2.1:60533       62.24.155.232:443 TCP:S
                                            block/1000000103
                                            Feb 2 21:29:30 opt1 Default deny rule IPv4 (1000000103) 192.168.2.1:60532   54.186.10.229:443
                                            ec2-54-186-10-229.us-west-2.compute.amazonaws.com TCP:S
                                            block/1000000103
                                            Feb 2 21:29:29 opt1 Default deny rule IPv4 (1000000103) 192.168.2.1:60531   54.186.10.229:443
                                            ec2-54-186-10-229.us-west-2.compute.amazonaws.com TCP:S
                                            block/1422911107
                                            Feb 2 21:29:19 opt1 USER_RULE opt1 to google com Aliases (1422911107) 192.168.2.1:60524       62.24.155.217:443 TCP:S
                                            block/1000000103
                                            Feb 2 21:29:18 opt1 Default deny rule IPv4 (1000000103) 192.168.2.1:60523   54.186.10.229:443
                                            ec2-54-186-10-229.us-west-2.compute.amazonaws.com TCP:S
                                            block/1422911107
                                            Feb 2 21:29:13 opt1 USER_RULE opt1 to google com Aliases (1422911107) 192.168.2.1:60524       62.24.155.217:443 TCP:S
                                            block/1000000103
                                            Feb 2 21:29:12 opt1 Default deny rule IPv4 (1000000103) 192.168.2.1:60523   54.186.10.229:443
                                            ec2-54-186-10-229.us-west-2.compute.amazonaws.com TCP:S
                                            block/1422911107
                                            Feb 2 21:29:10 opt1 USER_RULE opt1 to google com Aliases (1422911107) 192.168.2.1:60524       62.24.155.217:443 TCP:S
                                            block/1000000103
                                            Feb 2 21:29:08 opt1 Default deny rule IPv4 (1000000103) 192.168.2.1:60523   54.186.10.229:443
                                            ec2-54-186-10-229.us-west-2.compute.amazonaws.com TCP:S
                                            block/1422911107
                                            Feb 2 21:28:57 opt1 USER_RULE opt1 to google com Aliases (1422911107) 192.168.2.1:60518       62.24.155.221:443 TCP:S
                                            block/1422911107
                                            Feb 2 21:28:57 opt1 USER_RULE opt1 to google com Aliases (1422911107) 192.168.2.1:60517       62.24.155.221:443 TCP:S
                                            block/1000000103
                                            Feb 2 21:28:56 opt1 Default deny rule IPv4 (1000000103) 192.168.2.1:60516   54.186.10.229:443
                                            ec2-54-186-10-229.us-west-2.compute.amazonaws.com TCP:S
                                            block/1000000103
                                            Feb 2 21:28:56 opt1 Default deny rule IPv4 (1000000103) 192.168.2.1:60515   54.186.10.229:443
                                            ec2-54-186-10-229.us-west-2.compute.amazonaws.com TCP:S
                                            block/1422911107
                                            Feb 2 21:28:51 opt1 USER_RULE opt1 to google com Aliases (1422911107) 192.168.2.1:60518       62.24.155.221:443 TCP:S
                                            block/1422911107
                                            Feb 2 21:28:51 opt1 USER_RULE opt1 to google com Aliases (1422911107) 192.168.2.1:60517       62.24.155.221:443 TCP:S
                                            block/1000000103
                                            Feb 2 21:28:50 opt1 Default deny rule IPv4 (1000000103) 192.168.2.1:60516   54.186.10.229:443
                                            ec2-54-186-10-229.us-west-2.compute.amazonaws.com TCP:S
                                            block/1000000103
                                            Feb 2 21:28:50 opt1 Default deny rule IPv4 (1000000103) 192.168.2.1:60515   54.186.10.229:443
                                            ec2-54-186-10-229.us-west-2.compute.amazonaws.com TCP:S
                                            block/1422911107
                                            Feb 2 21:28:48 opt1 USER_RULE opt1 to google com Aliases (1422911107) 192.168.2.1:60518       62.24.155.221:443 TCP:S
                                            block/1422911107
                                            Feb 2 21:28:48 opt1 USER_RULE opt1 to google com Aliases (1422911107) 192.168.2.1:60517       62.24.155.221:443 TCP:S
                                            block/1000000103
                                            Feb 2 21:28:47 opt1 Default deny rule IPv4 (1000000103) 192.168.2.1:60516   54.186.10.229:443
                                            ec2-54-186-10-229.us-west-2.compute.amazonaws.com TCP:S
                                            block/1000000103
                                            Feb 2 21:28:47 opt1 Default deny rule IPv4 (1000000103) 192.168.2.1:60515   54.186.10.229:443
                                            ec2-54-186-10-229.us-west-2.compute.amazonaws.com TCP:S

                                            Anyway still testing as I need to find out how google got out earlier but not now.

                                            Capitalism, currently The World's best Entertainment Control System and YOU cant buy it! But you can buy this, or some of this or some of these

                                            Asch Conformity, mainly the blind leading the blind.

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.