Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Our Sites become unavailable randomly

    Scheduled Pinned Locked Moved General pfSense Questions
    106 Posts 13 Posters 21.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      muswellhillbilly
      last edited by

      Speaking from my own experience, I seldom tend to do in-place upgrades on old hardware. Rather, I'll choose newer hardware to install an updated version and transfer my configs over. I ran an update once on some old Dell blades and they wouldn't even boot up after that! You say you've had these firewalls in place for two years, yet 2.2.2 has only been out a short while. I assume from this you've performed an in-place update then? Might be worth sourcing some newer tin and see if that solves your problem.

      Otherwise, as mer says, it really could be almost anything given the information provided.

      1 Reply Last reply Reply Quote 0
      • W
        wheemer
        last edited by

        Well I am not going to replace them since I have no budget for that.

        There's no way it was a hardware failure on both boxes at the same time.

        I always update PFsense… I mean why would there be a built in updater if it's not good to use it?

        I think the issue may be related to DNS, we have our DNS on windows boxes and PFSense just passes it through.

        I was hoping there might be something in the UI I could look for but after checking the logs I can't see to find anything.

        1 Reply Last reply Reply Quote 0
        • W
          wheemer
          last edited by

          I have reinstalled from scratch 2.2.2 on my primary box. So far so good, it's been an hour and it's working ok. We will see if it was some problem with an update, time will tell.

          Thanks

          1 Reply Last reply Reply Quote 0
          • H
            Harvy66
            last edited by

            @muswellhillbilly:

            Speaking from my own experience, I seldom tend to do in-place upgrades on old hardware. Rather, I'll choose newer hardware to install an updated version and transfer my configs over. I ran an update once on some old Dell blades and they wouldn't even boot up after that! You say you've had these firewalls in place for two years, yet 2.2.2 has only been out a short while. I assume from this you've performed an in-place update then? Might be worth sourcing some newer tin and see if that solves your problem.

            Otherwise, as mer says, it really could be almost anything given the information provided.

            Usually an issue when your hardware does not support modern standards, AHCI, MSI-X, UEFI, ACPI, etc. These standards have been around for a long time, but many places still sell hardware that does not. Make sure your hardware supports stuff like these and you'll be good for a long time.

            I always research my hardware before purchases and I haven't had any issues in 15+ years. Everything just works. Not to say these standards were around back then, but I always make sure I know what I'm buying to make sure it's as good as it can possibly be.

            1 Reply Last reply Reply Quote 0
            • W
              wheemer
              last edited by

              My backup box has been reinstalled as well…

              I have had no issue on the primary box yet.

              So far so good.

              1 Reply Last reply Reply Quote 0
              • N
                NOYB
                last edited by

                If it happens again you might want to look into possibility the system being compromised or target of a DoS attack.

                1 Reply Last reply Reply Quote 0
                • C
                  cmb
                  last edited by

                  @wheemer:

                  What could this be? And how can this happen on two different boxes?

                  I think there is something wrong with 2.2.2

                  Sounds a lot like the symptoms of an IP or MAC conflict, though could be any number of other problems. It's most definitely not a general problem with 2.2.2.

                  Where rebooting fixes something with symptoms along these lines it's most often because of what rebooting does to the switch(es) and/or router(s) the system is connected to (updating CAM and ARP tables), and nothing to do with actually rebooting.

                  If it happens again, packet capture on WAN filtering on one of the affected public IPs and try to reach one of the sites in question. Stop the capture, see if anything is actually getting there. Are the WAN IPs dropping, or only the CARP IPs?

                  If you're using the common VHIDs 1, 2, 3 etc. on your CARP IPs, I would change those to something significantly higher in the range. VHID determines the virtual MAC and VRRP uses same virtual MAC space. It's possible your provider brought up VRRP using conflicting VHIDs, or you have something else on your network running CARP or VRRP with the same VHID/VRID causing a MAC conflict. Rebooting would temporarily make that system "win back" the MAC in question with the WAN-side switch, but would lose it again at some point.

                  1 Reply Last reply Reply Quote 0
                  • F
                    firewalluser
                    last edited by

                    @wheemer:

                    Well I am not going to replace them since I have no budget for that.

                    There's no way it was a hardware failure on both boxes at the same time.

                    I always update PFsense… I mean why would there be a built in updater if it's not good to use it?

                    I think the issue may be related to DNS, we have our DNS on windows boxes and PFSense just passes it through.

                    I was hoping there might be something in the UI I could look for but after checking the logs I can't see to find anything.

                    Actually you would be surprised at how common it is especially when considering how batches of electronics are made and so having two identical machines ie a small batch exposes you to the same batch of ram chip's batch of cpu's, batch of psu's, and batch of HDD's.

                    I have reinstalled from scratch 2.2.2 on my primary box. So far so good, it's been an hour and it's working ok. We will see if it was some problem with an update, time will tell.

                    Thanks

                    One of my first thoughts would be your machine may have been compromised. Lets face it who virus checks their firewalls/routers?
                    http://krebsonsecurity.com/2015/01/lizard-stresser-runs-on-hacked-home-routers/

                    I'd also suggest rebooting the pfsense boxes after making any config changes just to be sure everything sticks properlys and conflicts dont arise just to be doubly sure as theres a bug which is fixed in 2.2.3 which might have implications for your setup.

                    Capitalism, currently The World's best Entertainment Control System and YOU cant buy it! But you can buy this, or some of this or some of these

                    Asch Conformity, mainly the blind leading the blind.

                    1 Reply Last reply Reply Quote 0
                    • W
                      wheemer
                      last edited by

                      I setup a different server with a clean install of 2.2.2, and imported my config. Everything was working fine over the weekend, however Monday it went down again. The strange thing is that I am always still able to remote desktop in through the box.

                      So some parts of PFSense must not be affected. Also sometimes our webserver sites are offline, yet our email servers webmail works.

                      Again, please keep in mind this configuration was working for a couple years without issue.

                      1 Reply Last reply Reply Quote 0
                      • W
                        wheemer
                        last edited by

                        Our network team from our Fiber is saying that we are not under a denial of service attack… He says everything looks fine and that there is not that much traffic at all.

                        1 Reply Last reply Reply Quote 0
                        • W
                          wheemer
                          last edited by

                          Our website just went down again.

                          Our network teams says there are 55 connections to port 53, our dns server from Russia.

                          I have PFBlockerNG enabled where I am blocking all of russia and all of china.

                          Could this be related to our issue?

                          1 Reply Last reply Reply Quote 0
                          • F
                            firewalluser
                            last edited by

                            What do you logs show? Have you packet captured yet? If so, have you tried some of the packets against a test webserver or firewall?

                            Capitalism, currently The World's best Entertainment Control System and YOU cant buy it! But you can buy this, or some of this or some of these

                            Asch Conformity, mainly the blind leading the blind.

                            1 Reply Last reply Reply Quote 0
                            • W
                              wheemer
                              last edited by

                              I could not see anything in the logs, which makes sense since they should be denied.

                              Our provider has blocked the IP address and everything is back to normal.

                              I do not understand why our PFsense was able to be broken like that though. Seems a little bit unreliable that something as simple as DNS traffic can take down our whole website.

                              1 Reply Last reply Reply Quote 0
                              • T
                                tim.mcmanus
                                last edited by

                                @wheemer:

                                I could not see anything in the logs, which makes sense since they should be denied.

                                Our provider has blocked the IP address and everything is back to normal.

                                I do not understand why our PFsense was able to be broken like that though. Seems a little bit unreliable that something as simple as DNS traffic can take down our whole website.

                                Poorly configured DNS servers are a main source for DDOS attacks.  I won't go into specifics, Google will give you some good reading, but someone can send a DNS query to your DNS server which generates a large response to the "target".

                                I would advise against exposing a DNS server to the internet unless you absolutely need to and deeply understand how to configure it.  IMHO, block port 53 from the WAN and everything should be good.

                                1 Reply Last reply Reply Quote 0
                                • M
                                  mer
                                  last edited by

                                  Tim, you mean "block inbound to port 53 on WAN if it was not generated by LAN", yes?

                                  1 Reply Last reply Reply Quote 0
                                  • T
                                    tim.mcmanus
                                    last edited by

                                    @mer:

                                    Tim, you mean "block inbound to port 53 on WAN if it was not generated by LAN", yes?

                                    Yeah, that makes sense.

                                    I run DNS internally but that bind server also does root queries externally.  No external port 53 access to it (block inbound to port 53 on WAN if it was not generated by LAN).  Script kiddies are always on the lookout for a misconfigured service.

                                    1 Reply Last reply Reply Quote 0
                                    • W
                                      wheemer
                                      last edited by

                                      It's pretty vague to say poorly configured without saying what you mean exactly.

                                      We need port 53 open because we host our external dns.

                                      We have recursion disabled and places like intodns.com say our dns is fine.

                                      1 Reply Last reply Reply Quote 0
                                      • W
                                        wheemer
                                        last edited by

                                        Also our DNS is running from windows 2012 r2 with all updates.

                                        So all PFSense has to do is pass the packets through, yet it still tanks.

                                        1 Reply Last reply Reply Quote 0
                                        • johnpozJ
                                          johnpoz LAYER 8 Global Moderator
                                          last edited by

                                          "We need port 53 open because we host our external dns."

                                          I have to say this is normally a BAD idea - where is your secondary nameserver, on the same network?  Its almost always better to host your dns with a dns service, your registrar, your webhost.  NS should be geographically separated on different netblocks for redundancy, etc..

                                          If you really want to host your own dns - couple of cheap vps can do this nicely.  I have a couple of 6$ a year low end vpses that I run name services off of for domain I was playing with dnssec with since its a shame how many dns services or registrars or even webhosts that don't support dnssec.  Even though pretty sure a few years back it became a requirement for registrars to support it to be accredited.

                                          So there were 55 connections from site you were trying to block.. Was the IP listed in the tables to be blocked?  Did you do a sniff to see what they were doing?  You say your websites when down - where they down because you could not resolve them from the outside or were they down because of a bandwidth issue with the 55 connections to your dns?

                                          Next time it happens, need some actual details, post up your domain and can do a dns query to see if stuff resolves from outside.  Do a sniff are you seeing dns traffic to your ns and are they answering.  Are these sites hosted locally as well?

                                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                                          If you get confused: Listen to the Music Play
                                          Please don't Chat/PM me for help, unless mod related
                                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                                          1 Reply Last reply Reply Quote 0
                                          • T
                                            tim.mcmanus
                                            last edited by

                                            @wheemer:

                                            It's pretty vague to say poorly configured without saying what you mean exactly.

                                            We need port 53 open because we host our external dns.

                                            We have recursion disabled and places like intodns.com say our dns is fine.

                                            This is why:  http://www.circleid.com/posts/20150415_dns_based_ddos_diverse_options_for_attackers/

                                            It doesn't take a lot to use your DNS servers as a contributor to a larger attack.

                                            Your systems could be patched to the teeth, but if you've misconfigured your DNS servers, it doesn't matter.  Traffic will look legit because it seems to be, but the responses from your DNS servers will be inappropriate.

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.