Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    What is the biggest attack in GBPS you stopped

    Scheduled Pinned Locked Moved General pfSense Questions
    737 Posts 33 Posters 714.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      Supermule Banned
      last edited by

      Hmmm.

      EDIT:

      Thinking it would work as a great tool in debugging issues related to pfsense and give the IT-admins a better insight of whats going on in their environments.

      1 Reply Last reply Reply Quote 0
      • L
        lowprofile
        last edited by

        Hi guys

        Just want to share some info.

        I am going away from pfsense. PFsense is a great firewall but all these buggy versions out there have cost me $$$$ - 2.2* has been so unstable and i've lost the trust to pfsense.

        Regarding DDoS, pfsense cannot handle a simple flood SYN. In 2.2* it got more worse. You can spend many weeks in tuning, tweaking etc, but then you will then have a system which is unreliable at the end. Too much core changing.

        I managed to get it somehow 80% resistent to SYN floods in 2.1.5, but it had its sideaffects. I now experienced unstability generel.

        I've tried fortigate VM appliance with 1gb ram and 1core (trial) - i was surprised how stable it was with same hardware (virtual) You have a special option to block SYN/ICMP/FIN etc floods. Very simple option. See screenshot.

        I used 10min to install it and further 10min to set it up. Activated the ddos policy. and bingo i had a stable setup. I know fortigate cost much more, but most of the appliances are built on linux or freebsd. I have concluded the pfsense does lack this crucial "feature" and protection.

        No more packet drop, even the attack was on +100mbit SYN flood. Very stable, not a single drop in ping.
        Sad to say, but this has proven the source to the issue = PFsense.

        I am now investing in a proper firewall. VM or box, doesnt matter, it just wont be PFsense. I liked pfsense untill i got these issues and some serious stability issues in newer versions. Time to move on.  ;)

        ddosfortigate.PNG
        ddosfortigate.PNG_thumb

        1 Reply Last reply Reply Quote 0
        • N
          Nullity
          last edited by

          @lowprofile:

          Hi guys

          Just want to share some info.

          I am going away from pfsense. PFsense is a great firewall but all these buggy versions out there have cost me $$$$ - 2.2* has been so unstable and i've lost the trust to pfsense.

          Regarding DDoS, pfsense cannot handle a simple flood SYN. In 2.2* it got more worse. You can spend many weeks in tuning, tweaking etc, but then you will then have a system which is unreliable at the end. Too much core changing.

          I managed to get it somehow 80% resistent to SYN floods in 2.1.5, but it had its sideaffects. I now experienced unstability generel.

          I've tried fortigate VM appliance with 1gb ram and 1core (trial) - i was surprised how stable it was with same hardware (virtual) You have a special option to block SYN/ICMP/FIN etc floods. Very simple option. See screenshot.

          I used 10min to install it and further 10min to set it up. Activated the ddos policy. and bingo i had a stable setup. I know fortigate cost much more, but most of the appliances are built on linux or freebsd. I have concluded the pfsense does lack this crucial "feature" and protection.

          No more packet drop, even the attack was on +100mbit SYN flood. Very stable, not a single drop in ping.
          Sad to say, but this has proven the source to the issue = PFsense.

          I am now investing in a proper firewall. VM or box, doesnt matter, it just wont be PFsense. I liked pfsense untill i got these issues and some serious stability issues in newer versions. Time to move on.  ;)

          I love you to bro.

          Thanks for trying to spread some negativity and get a pfSense vs Fortigate fight going on your way out. You will be missed.

          Please correct any obvious misinformation in my posts.
          -Not a professional; an arrogant ignoramous.

          1 Reply Last reply Reply Quote 0
          • N
            NOYB
            last edited by

            @lowprofile:

            Hi guys

            Just want to share some info.

            I am going away from pfsense. PFsense is a great firewall but all these buggy versions out there have cost me $$$$ - 2.2* has been so unstable and i've lost the trust to pfsense.

            Regarding DDoS, pfsense cannot handle a simple flood SYN. In 2.2* it got more worse. You can spend many weeks in tuning, tweaking etc, but then you will then have a system which is unreliable at the end. Too much core changing.

            I managed to get it somehow 80% resistent to SYN floods in 2.1.5, but it had its sideaffects. I now experienced unstability generel.

            I've tried fortigate VM appliance with 1gb ram and 1core (trial) - i was surprised how stable it was with same hardware (virtual) You have a special option to block SYN/ICMP/FIN etc floods. Very simple option. See screenshot.

            I used 10min to install it and further 10min to set it up. Activated the ddos policy. and bingo i had a stable setup. I know fortigate cost much more, but most of the appliances are built on linux or freebsd. I have concluded the pfsense does lack this crucial "feature" and protection.

            No more packet drop, even the attack was on +100mbit SYN flood. Very stable, not a single drop in ping.
            Sad to say, but this has proven the source to the issue = PFsense.

            I am now investing in a proper firewall. VM or box, doesnt matter, it just wont be PFsense. I liked pfsense untill i got these issues and some serious stability issues in newer versions. Time to move on.  ;)

            If I were using pfSense in a business environment I'd be right behind you.

            That a disgruntled employee, dissatisfied customer, or unscrupulous competitor, could take a business behind pfSense offline with such a small amount of traffic would be a really scary and unacceptable risk.  And that the pfSense team doesn't really seem to be very engaged in figuring it out so it can be fixed doesn't instill any confidence that it will be fixed anytime soon.  In fact it indicates that they either have no idea what's causing the issue, or that they do know and know there is no timely fix on the horizon.  So down play it.  Just multiplies the sentiment.

            1 Reply Last reply Reply Quote 0
            • H
              Harvy66
              last edited by

              You may want to re-evaluate PFSense in the future. Big performance changes in 3.0, hopefully this stuff will get fixed and it will be done with.

              1 Reply Last reply Reply Quote 0
              • N
                Nullity
                last edited by

                @NOYB:

                If I were using pfSense in a business environment I'd be right behind you.

                That a disgruntled employee, dissatisfied customer, or unscrupulous competitor, could take a business behind pfSense offline with such a small amount of traffic would be a really scary and unacceptable risk.  And that the pfSense team doesn't really seem to be very engaged in figuring it out so it can be fixed doesn't instill any confidence that it will be fixed anytime soon.  In fact it indicates that they either have no idea what's causing the issue, or that they do know and know there is no timely fix on the horizon.  So down play it.  Just multiplies the sentiment.

                I have been assuming that this is not actually a problem, and that FreeBSD/pfSense is fully capable of withstanding this attack if configured properly.

                Honestly, when I first found pfSense I bought into the "omg, SuperNetAdmin must use this!", but after a few months, the GUI's limitations were obvious even to a networking newbie like me.

                I like this community though. I hope it doesn't crumble…

                Please correct any obvious misinformation in my posts.
                -Not a professional; an arrogant ignoramous.

                1 Reply Last reply Reply Quote 0
                • N
                  NOYB
                  last edited by

                  I wouldn't run a business network on assumptions.

                  1 Reply Last reply Reply Quote 0
                  • H
                    Harvy66
                    last edited by

                    FreeBSD is a good platform. Even PFSense moves forward slowly, as long as it keeps moving forward. It works good enough for me. If I ever stopped using PFSense, I'd probably just switch to FreeBSD/PCBSD and learn how to configure things directly or use packages if they exist.

                    1 Reply Last reply Reply Quote 0
                    • T
                      tim.mcmanus
                      last edited by

                      I run pfSense on multiple WANs and LANs on the same box for my business.  I'm also hosting multiple web servers and mail servers.  Never once taken down by any attacks.

                      What are you doing to subject yourself to these kinds of attacks, and why hasn't your ISP done anything to mitigate them?

                      I used to work for an MSP that resold and supported FortiGates and thought they sucked.  I tore most of them out and replaced them with pfSense.

                      I just received some additional equipment to build a Security Onion appliance that I'm going to mirror two WAN ports into.  I could easily integrate Snort on pfSense to use the barnyard database on the SO appliance to most likely mitigate the whole SYN attack.  After I'm done building it, it would be interesting to test.  Plus I'd be able to capture and inspect every packet coming in.  I'm also interested to see if it takes out the MikroTik switch in front of pfSense first.

                      1 Reply Last reply Reply Quote 0
                      • N
                        NOYB
                        last edited by

                        @tim.mcmanus:

                        What are you doing to subject yourself to these kinds of attacks, and why hasn't your ISP done anything to mitigate them?

                        Wow!  Yeah it must be the attackie's fault.  After all certainly no one would do such a thing without provocation.

                        • Certainly if a business has an employee that becomes disgruntled it is without a doubt the businesses fault.
                        • Certainly if a business has a customer that becomes dissatisfied it is without a doubt the businesses fault.
                        • Certainly if a business has an unscrupulous competitor it is without a doubt the businesses fault.

                        Really?  You expect a business to rely on ISP to protect against a low bandwidth attack such as this.  A business could be down for days before being able to get an ISP to take meaningful action.  Sure hope that it is not pfSense position that an ISP should protect a business from such a low bandwidth attack so their product doesn't have to.

                        1 Reply Last reply Reply Quote 0
                        • K
                          kejianshi
                          last edited by

                          I'm really seeing the logic in the point that others talked about, several times actually…

                          The end users firewall really isn't the place to stop or mitigate a DDOS.

                          1 Reply Last reply Reply Quote 0
                          • S
                            Supermule Banned
                            last edited by

                            CMB accused me of beeing the guy behind the forum downtime yesterday.

                            That saddened me…

                            Just because I say and keep saying that there is a major flaw in the way pf handles packets, then I must be the guy taking the forum down. :(

                            He asked for pcaps and I told him they were available for download in this thread. Didnt hear from him again.

                            I need to get somebody with the right debugging tools involved in this.

                            1 Reply Last reply Reply Quote 0
                            • K
                              kejianshi
                              last edited by

                              Hard to know who is doing it now isn't it?

                              1 Reply Last reply Reply Quote 0
                              • M
                                mer
                                last edited by

                                @Harvy66:

                                FreeBSD is a good platform. Even PFSense moves forward slowly, as long as it keeps moving forward. It works good enough for me. If I ever stopped using PFSense, I'd probably just switch to FreeBSD/PCBSD and learn how to configure things directly or use packages if they exist.

                                This is the opposite of what I've done.  I've been using FreeBSD as my desktop for a long time (yes, since the 3.3 days), with a couple of Windows machines in home network.  Dual homed, PF (not IPFW) enabled.  Requirements are simple enough that the network diagram fits on a single page, so rules are straight forward.    OpenBSD documentation for PF is excellent, some differences as the FreeBSD version lags/differs, but close enough.  I went to a SG2440 just to minimize downtime for the rest of the computers when I wanted to upgrade.

                                1 Reply Last reply Reply Quote 0
                                • D
                                  doktornotor Banned
                                  last edited by

                                  @NOYB:

                                  And that the pfSense team doesn't really seem to be very engaged in figuring it out so it can be fixed doesn't instill any confidence that it will be fixed anytime soon.  In fact it indicates that they either have no idea what's causing the issue, or that they do know and know there is no timely fix on the horizon.  So down play it.  Just multiplies the sentiment.

                                  As I have pointed out - when you are dissatisfied with the way a vendor handles a perceived security issue, then do a proper full disclosure. This thread is at page 18 with about zero useful information. ("Oh noes, pfS suxxx", "PM me to get p0wn3d", "Watch this YT video to see pfS GUI die" or "I had a nice talk with Mr. Unknown" and similar noise does not count as useful, really.)

                                  1 Reply Last reply Reply Quote 0
                                  • S
                                    Supermule Banned
                                    last edited by

                                    Then why dont you enlist and try to help if you are that good?

                                    And then we can shower the thread with useful information and make a full disclosure?

                                    1 Reply Last reply Reply Quote 0
                                    • D
                                      doktornotor Banned
                                      last edited by

                                      Enlist for what? PM me to get p0wn3d and I'll produce another YT video? Kidding, right…  ::) There are these FreeBSD mailing lists or https://www.freebsd.org/security/ if you think it's a security issue.

                                      1 Reply Last reply Reply Quote 0
                                      • DerelictD
                                        Derelict LAYER 8 Netgate
                                        last edited by

                                        DEFCON's coming up.  Give a presentation and take down their shit.  I think they rely on BSD/pf.  Want attention?  That'll get it.

                                        Chattanooga, Tennessee, USA
                                        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                        Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                        1 Reply Last reply Reply Quote 0
                                        • L
                                          lowprofile
                                          last edited by

                                          @Nullity:

                                          I love you to bro.

                                          Thanks for trying to spread some negativity and get a pfSense vs Fortigate fight going on your way out. You will be missed.

                                          No fight here. Try to understand my decision. I can't run a business with these conditions. I hope it will get better in future, but i can't wait. I made a PoC which conclude the obvious issue… = pfsense.

                                          @kejianshi:

                                          I'm really seeing the logic in the point that others talked about, several times actually…

                                          The end users firewall really isn't the place to stop or mitigate a DDOS.

                                          You are 100% right, thats why you should read my post again.  :)

                                          @tim.mcmanus:

                                          I run pfSense on multiple WANs and LANs on the same box for my business.  I'm also hosting multiple web servers and mail servers.  Never once taken down by any attacks.

                                          What are you doing to subject yourself to these kinds of attacks, and why hasn't your ISP done anything to mitigate them?

                                          My conclusion was not based on a home connection where hosting game servers.

                                          I am located in a prof. datacenter with DDoS protection from Arbor trough upstream provider. My pipe never gets exhausted, and i can resist any attack except low bandwidth SYN/TCP ACK flood.
                                          It just go trough the protection, the attack is too small. I know pfsense is not a mitigating box, for that i do have Arbor. but if it can't stop/drop/handle these small SYN flood unless you do some "dirty" tweaking and make 1 new TCP rule pr. rule… then it is not this worth. too much "noisy" and still not perfect.

                                          I am hosting several servers, webservers, exchange, etc. (customers) When you have public services then your network will be a victim of this type of attacks, soon or later.
                                          I will be watching PFsense releases in future, but at this moment there is too much negative to say, regarding new updates, SYN flood handling, crashes etc.

                                          PFsense team should make a feature to better handling SYN flood, like fortigate and 1287 other vendors, a policy with features for type of attack and a threshold. At this moment one have to make 1 new TCP rule along with existing rule, and make limitations in many fields... too much to administer and too much can go wrong.

                                          1 Reply Last reply Reply Quote 0
                                          • S
                                            Supermule Banned
                                            last edited by

                                            Thats not whats happening.

                                            I will take you down, but you can helt in logging and whatever you can do in the other. Options I dohnt have since I know little of FreeBSD, but I know you are a contributor to a lot of things, so why not help out. Usually it takes 5-10 mins to get the captures needed to disect whats going on.

                                            Try to be positive :)

                                            @doktornotor:

                                            Enlist for what? PM me to get p0wn3d and I'll produce another YT video? Kidding, right…  ::) There are these FreeBSD mailing lists or https://www.freebsd.org/security/ if you think it's a security issue.

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.