Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Periodic since 2.2 pages load blank, certs invalid

    Scheduled Pinned Locked Moved General pfSense Questions
    126 Posts 14 Posters 46.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DerelictD
      Derelict LAYER 8 Netgate
      last edited by

      If you were affected by this, what part of the world are you in?  Just curious.  Interesting incident.

      Chattanooga, Tennessee, USA
      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
      Do Not Chat For Help! NO_WAN_EGRESS(TM)

      1 Reply Last reply Reply Quote 0
      • T
        Trel
        last edited by

        @kejianshi:

        I don't think one machine on the network could be the problem (unless that machine is pfsense its self), at least in my case, or going to unbound+DNSSEC would have made no difference.

        I just double checked and it looks like I never enabled DNSSEC when I changed to unbound.  Does that change your answer at all?
        (needless to say, it's getting turned on now)

        @Derelict:

        If you were affected by this, what part of the world are you in?  Just curious.  Interesting incident.

        North East USA.

        1 Reply Last reply Reply Quote 0
        • K
          kejianshi
          last edited by

          How about this - I will show you where the pfsense is sitting.  Hows that?  Check PM

          1 Reply Last reply Reply Quote 0
          • C
            cmb
            last edited by

            @Trel:

            @Derelict:

            If you were affected by this, what part of the world are you in?  Just curious.  Interesting incident.

            North East USA.

            Seems to be geographically diverse. At least two in the US in this thread, one in the UK.

            1 Reply Last reply Reply Quote 0
            • K
              kejianshi
              last edited by

              The pfsense in question is in Maryland, for me.

              1 Reply Last reply Reply Quote 0
              • T
                Trel
                last edited by

                By the way, I can confirm for sure that pfsense was seeing the bad DNS.

                I have an alias for facebook.com
                I saw this in the resolver log

                filterdns: adding entry 195.22.26.248 to table Social_Test on host facebook.com
                

                195.22.26.248 is the bad IP.  PFSense itself saw that when it did its update on the alias resolution.

                1 Reply Last reply Reply Quote 0
                • K
                  kejianshi
                  last edited by

                  https://www.virustotal.com/en/ip-address/195.22.26.248/information/

                  https://www.robtex.net/en/advisory/ip/195/22/26/248/

                  Seems like there is an associated IP block thats pretty much into everything bad.

                  1 Reply Last reply Reply Quote 0
                  • T
                    Trel
                    last edited by

                    @kejianshi:

                    https://www.virustotal.com/en/ip-address/195.22.26.248/information/

                    https://www.robtex.net/en/advisory/ip/195/22/26/248/

                    Seems like there is an associated IP block thats pretty much into everything bad.

                    I don't doubt that, but that doesn't answer the question as to how when using google dns and level3 dns with unbound, that legitimate sites started resolving to this IP range, unless I'm missing something.

                    1 Reply Last reply Reply Quote 0
                    • K
                      kejianshi
                      last edited by

                      No idea

                      1 Reply Last reply Reply Quote 0
                      • A
                        agreenfield1
                        last edited by

                        Same thing happened to me this morning: https certs signed by lolcat, all dns inquiries not handled by pfsense directly give 195.22.26.248, and using the Google DNS and Level 3 dns servers.  I was able to resolve the issue for the time being by checking the 'Allow DNS server list to be overridden by DHCP/PPP on WAN' box, which presumably switched pfsense from using the compromised/poisoned DNS server to my ISPs DNS server.

                        I originally thought this issue was unrelated to pfsense, and posted the issue here:https://forum.pfsense.org/index.php?topic=88238.0.  But after seeing this thread, it seems like pfsense 2.2 / DNS Resolver / Unbound may be a factor?

                        Configuration: PFSense 2.2, DNS Resolver, GoogleDNS and Level3 as primary and secondary DNS servers respectively.

                        1 Reply Last reply Reply Quote 0
                        • K
                          kejianshi
                          last edited by

                          Nope - Because the same thing was happening to me using dnsmasq…

                          Actually switching to unbound + DNSSEC cured it.

                          1 Reply Last reply Reply Quote 0
                          • DerelictD
                            Derelict LAYER 8 Netgate
                            last edited by

                            I originally thought this issue was unrelated to pfsense, and posted the issue here:https://forum.pfsense.org/index.php?topic=88238.0.  But after seeing this thread, it seems like pfsense 2.2 / DNS Resolver / Unbound may be a factor?

                            This has nothing to do with pfSense.  It has to do with you relying solely on google/level3 for all your DNS and someone is playing with it.

                            Chattanooga, Tennessee, USA
                            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                            Do Not Chat For Help! NO_WAN_EGRESS(TM)

                            1 Reply Last reply Reply Quote 0
                            • K
                              kejianshi
                              last edited by

                              Yep…  Now who could do that on a broad basis?

                              1 Reply Last reply Reply Quote 0
                              • DerelictD
                                Derelict LAYER 8 Netgate
                                last edited by

                                It's intriguing.

                                Chattanooga, Tennessee, USA
                                A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                1 Reply Last reply Reply Quote 0
                                • T
                                  Trel
                                  last edited by

                                  Actually once I switched fully to unbound + DNSSEC only, I had a new issue.  At the same times, unbound would stop working.  The service would be running, but it wouldn't resolve anything until I restarted the service.

                                  I finally found a common thread for that happening.  It almost always directly followed someone doing a lookup of

                                  api-nyc01.exip.org
                                  

                                  or

                                  ns3.csof.net
                                  

                                  The IP for those are in the 195.22.x range that was mentioned earlier.

                                  Almost without fail, trying to access one of those, causes unbound to stop working until I restart the service.

                                  If someone is willing to look at that, because of how it lines up, it looks like trying to access/doing a lookup on those domains will either cause the blank pages and lolcat certs, or will cause unbound to stop resolving until the service is restarted.

                                  It's too coincidental to ignore in this case.

                                  1 Reply Last reply Reply Quote 0
                                  • D
                                    doktornotor Banned
                                    last edited by

                                    @Trel:

                                    It almost always directly followed someone doing a lookup of

                                    api-nyc01.exip.org
                                    

                                    or

                                    ns3.csof.net
                                    

                                    The IP for those are in the 195.22.x range that was mentioned earlier.
                                    Almost without fail, trying to access one of those, causes unbound to stop working until I restart the service.

                                    Tried both, unbound still working. :) Apparently no NSA love here.  :'( ;D

                                    1 Reply Last reply Reply Quote 0
                                    • T
                                      Trel
                                      last edited by

                                      Now, I also had block rules in place for that range of IP.
                                      I wonder if that could interact in some way.

                                      Additionally, if you have Snort/Suricata installed, do you now have alerts mentioning the Anubis DNS Sinkhole?

                                      1 Reply Last reply Reply Quote 0
                                      • D
                                        doktornotor Banned
                                        last edited by

                                        @Trel:

                                        if you have Snort/Suricata installed

                                        Noooooooooooooo!!!

                                        1 Reply Last reply Reply Quote 0
                                        • K
                                          kejianshi
                                          last edited by

                                          !!!

                                          1 Reply Last reply Reply Quote 0
                                          • H
                                            heper
                                            last edited by

                                            (unbound has been enabled for more then a month without issues … until an hour ago)
                                            i've suddenly been experiencing the blank pages + dns redirects to buydomains.com for lots of valid domains.

                                            i tried to fix it by enabling dnssec ... didn't help

                                            for now i've enabled "forwarding mode" on unbound ... this seems to fix the issue.

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.