Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Filet-O-Firewall suggestions

    Scheduled Pinned Locked Moved NAT
    4 Posts 4 Posters 991 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • A Offline
      arriflex
      last edited by

      Recognizing that UPnP has always been problematic and generally not recommended by security experts it seems as though some researchers have taken the threat to a new level: https://threatpost.com/upnp-trouble-puts-devices-behind-firewall-at-risk/114493/

      What caught my eye was that the demo they did was actually on a pfSense router! In any case, they suggest that a website containing their code can exploit a client browser configured to run javascript into making UPnP requests of the router. A lot of requests. They suggest that, barring outright disabling of UPnP, randomizing UUID and URLs would at least mitigate brute force attacks.

      I utilize pfSense at apartment buildings where UPnP is helpful to tenants with easy port mapping to services through the firewall. It makes my life easier as well. Any suggestions?

      arri

      1 Reply Last reply Reply Quote 0
      • DerelictD Offline
        Derelict LAYER 8 Netgate
        last edited by

        UPnP is disabled by default.

        Everyone who has a brain knows that giving software the ability to install inbound firewall rules without authentication/permission is a bad idea.

        If I were you I'd be giving public IP addresses to your tenants and letting them run their own firewalls.

        If they want a managed solution, they can pay for it.

        Chattanooga, Tennessee, USA
        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
        Do Not Chat For Help! NO_WAN_EGRESS(TM)

        1 Reply Last reply Reply Quote 0
        • jimpJ Offline
          jimp Rebel Alliance Developer Netgate
          last edited by

          Add ACLs to UPnP to limit the ports they can use.

          Also 2.2.5 snapshots have an updated version of miniupnpd which, I believe, has some sort of fix for this.

          Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

          Need help fast? Netgate Global Support!

          Do not Chat/PM for help!

          1 Reply Last reply Reply Quote 0
          • C Offline
            cmb
            last edited by

            @jimp:

            Add ACLs to UPnP to limit the ports they can use.

            This is the best answer regardless.

            @jimp:

            Also 2.2.5 snapshots have an updated version of miniupnpd which, I believe, has some sort of fix for this.

            They added DNS rebinding protection to miniupnpd, which is in the version in 2.2.5 snapshots. That effectively prevents this from being an issue.

            1 Reply Last reply Reply Quote 0
            • First post
              Last post
            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.