Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Pfsense freeze at DDoS attack - Tuning?

    Scheduled Pinned Locked Moved Firewalling
    68 Posts 10 Posters 23.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • H
      Harvy66
      last edited by

      It's where ever you set max states, I think. I forgot to check when I got home yesterday….. Definitely in the menu at the top left.

      1 Reply Last reply Reply Quote 0
      • S
        Supermule Banned
        last edited by

        FOUND IT!

        Thanks mate! ;)

        1 Reply Last reply Reply Quote 0
        • H
          Harvy66
          last edited by

          @Supermule:

          FOUND IT!

          Thanks mate! ;)

          In case others wonder

          Advanced->Firewall/NAT->Firewall Adaptive Timeouts

          1 Reply Last reply Reply Quote 0
          • S
            Supermule Banned
            last edited by

            Any progress of this? We are currently testing different attack scenarios and settings and currently we can make pfsense survive the floods but only barely.

            1 Reply Last reply Reply Quote 0
            • H
              Harvy66
              last edited by

              Supermule, at what rates and what type of CPU?

              1 Reply Last reply Reply Quote 0
              • S
                Supermule Banned
                last edited by

                Currently seeing 7,5mbit and 140K states and the pipe becomes unstable using ping….

                pfsense_ESXi.PNG
                pfsense.PNG
                pfsense_ESXi.PNG_thumb
                pfsense.PNG_thumb

                1 Reply Last reply Reply Quote 0
                • S
                  Supermule Banned
                  last edited by

                  We could test againt http://store.netgate.com and see how robust it is??

                  I mean we report something and no reply at all to what can be done to make it more robust/resistent.

                  1 Reply Last reply Reply Quote 0
                  • K
                    kejianshi
                    last edited by

                    Its a weekend man - I'm sure they will be getting back with you Monday.  No need to DDOS their stores I think.  haha

                    1 Reply Last reply Reply Quote 0
                    • S
                      Supermule Banned
                      last edited by

                      I wouldnt do that, but hey…. what to do to get their attention to this pretty important issue :)

                      1 Reply Last reply Reply Quote 0
                      • K
                        kejianshi
                        last edited by

                        I imagine they want to give their GFs and wives a little personal time sometimes…

                        Maybe there is currently no fix?  Nothing to say?  Things are always quieter on the forum weekends...

                        Plus in texas where a few of the main guys are located, its like EARLY morning.

                        1 Reply Last reply Reply Quote 0
                        • S
                          Supermule Banned
                          last edited by

                          Only the earliest bird cataches the fattest worms ;)

                          1 Reply Last reply Reply Quote 0
                          • H
                            Harvy66
                            last edited by

                            DDOS'n someone else's servers is probably a great way to get the FBI involved.

                            1 Reply Last reply Reply Quote 0
                            • S
                              Supermule Banned
                              last edited by

                              Its for testing purposes :D

                              No harm done. They sell it, we test it against what they have….

                              No crime involved :D

                              1 Reply Last reply Reply Quote 0
                              • L
                                lowprofile
                                last edited by

                                For me it looks like the attack bypass the syncookie feature, and then causing this massive ACK from pfsense = too much to handle… crash...

                                1 Reply Last reply Reply Quote 0
                                • M
                                  Mithrondil
                                  last edited by

                                  I got an out-of-the-box install on my pfsense, and I got no custom WAN firewall/rules, I also got no vpn_WAN rules either, can any1 link me a guide for that?

                                  Im alone in my household and I  only use WAN for outgoing DNS and for establishing an openvpn connection.

                                  1 Reply Last reply Reply Quote 0
                                  • H
                                    Harvy66
                                    last edited by

                                    A DDOS guide for WAN rules and OpenVPN? What? Are you in the correct thread?

                                    1 Reply Last reply Reply Quote 0
                                    • M
                                      Mithrondil
                                      last edited by

                                      @Harvy66:

                                      What are your WAN firewall rules? By default, PFSense should be dropping incoming data, not responding to it.

                                      Im wondering about this reply, since it suggests that rules are needed for wan interface.

                                      1 Reply Last reply Reply Quote 0
                                      • H
                                        Harvy66
                                        last edited by

                                        @Mithrondil:

                                        @Harvy66:

                                        What are your WAN firewall rules? By default, PFSense should be dropping incoming data, not responding to it.

                                        Im wondering about this reply, since it suggests that rules are needed for wan interface.

                                        If you want to listen for connections, which is why I asked because DDOS attacks have different characteristics if you accept connections than if you don't.

                                        1 Reply Last reply Reply Quote 0
                                        • S
                                          Supermule Banned
                                          last edited by

                                          You can kill a pfsense FW even if no rules are applied on WAN…and thats weird.

                                          1 Reply Last reply Reply Quote 0
                                          • keyserK
                                            keyser Rebel Alliance
                                            last edited by

                                            ?? Are you saying this specifik SYN flood kills the firewall with states even if you have no PASS rules on the WAN interface? So it accepts the packet and creates a state even though it should be blocked?

                                            I'm worried about this issue! Still no word or reply from the pfsense guy's?

                                            Love the no fuss of using the official appliances :-)

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.