Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Lots of nginx errors in logs after upgrade

    Scheduled Pinned Locked Moved Problems Installing or Upgrading pfSense Software
    41 Posts 11 Posters 85.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • T
      TheNarc
      last edited by

      Thanks for that information cshy, it's much appreciated.  I will get in contact with the users of the two offending machines on my network to see whether I can confirm that they are both running Avast.  If my memory serves, it seems quite likely.  I'll provide an update either way when I find out.

      1 Reply Last reply Reply Quote 0
      • mudmanc4M
        mudmanc4
        last edited by

        Why would Avast be scanning within specific port ranges for specific pages? This makes no sense to me.

        1 Reply Last reply Reply Quote 0
        • T
          TheNarc
          last edited by

          I agree, it definitely makes no sense to me either.  But it does seem to be Avast that's behind it.  I've confirmed with 1 of my 2 users that they run Avast.  And here's another thread that seems to implicate it, although again it's frustratingly inconclusive:  https://www.reddit.com/r/techsupport/comments/40v5go/weird_traces_in_firewall_coming_from_my_machine/  Could it be trying to scan the LAN for known web server vulnerabilities?  That would seem outside the purview of free consumer grade AV software.

          1 Reply Last reply Reply Quote 0
          • M
            ms
            last edited by

            I got the exact same errors, also being generated by workstations running Avast. From their sales blurb: "Home Network Security: Is your router set up properly? We’ll tell you. Otherwise, anyone can break into your network and anything connected to it (like your computer, phone, or printer)." FYI, ESET Internet Security 10 also scans your router. I ran it for giggles and it told me my router was probably compromised as it had ports like 443 open lol.

            1 Reply Last reply Reply Quote 0
            • mudmanc4M
              mudmanc4
              last edited by

              If Avast is searching port 8443 for multiples of pages at random, which is most recently well known for plesk panel, which can assist with the hosting of multiples of VM / CT's,  I'll eat a live crocodile. Now this may somehow be, so I'll make sure I have my spork ready. But I doubt I'll need it.

              This is a clear sign there is 'something' even a local webserver (even if one was never intentionally installed locally) which has found it's way into 'something' on the local network or machine, and is looking for something to exploit, buy the known exploitable pages, which have already or should be already downloaded by a script, in many cases.

              These very much the same logs can be found in almost any apache server logs, showing a remote attacker attempting to find something.

              The firewall, pfSense, is now showing you the attempts.

              Again, I'll keep the spork ready to run if I'm proven wrong.

              1 Reply Last reply Reply Quote 0
              • T
                TheNarc
                last edited by

                Whatever it is, I don't like it.  I'll see if I can switch my users off Avast and determine whether that makes a difference.  I believe they also both use the same VPN service, but I don't know which one offhand.  I'll ask them about that too.  Does anyone else seeing these log entries use a VPN service?

                1 Reply Last reply Reply Quote 0
                • T
                  TheNarc
                  last edited by

                  My VPN comment was a red herring; I don't want to waste anyone's time.  I can confirm that both of the machines exhibiting this behavior on my network were running Avast.  Whatever it is, Avast seems to be somehow responsible.

                  1 Reply Last reply Reply Quote 0
                  • mudmanc4M
                    mudmanc4
                    last edited by

                    @TheNarc:

                    My VPN comment was a red herring; I don't want to waste anyone's time.  I can confirm that both of the machines exhibiting this behavior on my network were running Avast.  Whatever it is, Avast seems to be somehow responsible.

                    At the same time , users who run such things as Avast, generally require them for a reason, in other words the workstation might encounter objects which are specifically designed to create havok, in one way or another.

                    The type of behavior in the above logs, could be easily reconciled with destructive behavior, and as well more than likely, would flag many different means of intrusion prevention.

                    Just think of the chatter this is clogging the network up with alone.

                    /spork on standby

                    1 Reply Last reply Reply Quote 0
                    • R
                      robi
                      last edited by

                      Avast has lots of modules, you can enable/disable them one by one. Moreover, when you install Avast (free edition), you can choose during setup, which modules you want to instal. I always use only the "File protection" module, I don't even install the rest…

                      1 Reply Last reply Reply Quote 0
                      • T
                        TheNarc
                        last edited by

                        Here's another crumb of information explicitly linking Avast to nefarious-looking activity logged in pfSense:  https://www.reddit.com/r/PFSENSE/comments/2s40uz/pfsense_ca/cnm4x87  Specifically:

                        Turns out my gf's laptop has Avast and its "home network security" module runs exploit tests against your network, which can look bad

                        I should also clarify that this activity is far from constant.  Rather, it seems to occur periodically at roughly 24 hour intervals.  I'm going to see if I can have my users disable Avast's "Home Network Security" module and will report back whether the activity still occurs.

                        1 Reply Last reply Reply Quote 0
                        • T
                          TheNarc
                          last edited by

                          Just wanted to report back that it's definitely Avast.  Disabling the Home Network Security module eliminates the log entries in pfSense.

                          1 Reply Last reply Reply Quote 0
                          • C
                            cmb
                            last edited by

                            Interesting, thanks for the feedback. What a dumb feature.. Like scanning your gateway IP daily for old versions of openwebmail among a variety of other things you'll almost certainly never find on a gateway is doing anything useful.

                            1 Reply Last reply Reply Quote 0
                            • P
                              phil.davis
                              last edited by

                              @cmb:

                              Interesting, thanks for the feedback. What a dumb feature.. Like scanning your gateway IP daily for old versions of openwebmail among a variety of other things you'll almost certainly never find on a gateway is doing anything useful.

                              I guess they are attempting to find potential vulnerabilities on typical home routers, where people would have their TP-Link, D-Link, NetGear… home device with old firmware and never realize that it is now open to some (external or internal) attack vector. Of course then there is the question "what can the home user do about it?" - after a couple of [months|years] the manufacturers stop putting out new firmware to close security holes. So the home user is stuck with their perfectly good hardware but out-of-date firmware, and AVAST will tell them about it every week.

                              As the Greek philosopher Isosceles used to say, "There are 3 sides to every triangle."
                              If I helped you, then help someone else - buy someone a gift from the INF catalog http://secure.inf.org/gifts/usd/

                              1 Reply Last reply Reply Quote 0
                              • C
                                cmb
                                last edited by

                                @phil.davis:

                                I guess they are attempting to find potential vulnerabilities on typical home routers, where people would have their TP-Link, D-Link, NetGear… home device with old firmware and never realize that it is now open to some (external or internal) attack vector. Of course then there is the question "what can the home user do about it?" - after a couple of [months|years] the manufacturers stop putting out new firmware to close security holes. So the home user is stuck with their perfectly good hardware but out-of-date firmware, and AVAST will tell them about it every week.

                                True, if it were doing something that looked like it was trying to identify a vulnerable router, I'd understand. That might be a useful feature for typical home users (though yeah, as you noted, they probably wouldn't have any idea what to do if it detected a problem). But I don't think it's looking for anything you'd find on any router. Looks like things that are specific to web servers only, and a short list of uncommon things at that.

                                1 Reply Last reply Reply Quote 0
                                • K
                                  kpa
                                  last edited by

                                  They haven't really thought trough the value and practicality of that feature. Instead of helping to find any real threats it is going to cause more people freak out because there's an unknown scanner probing at multiple hosts on the local network for seemingly random web pages just like a real malware would be.

                                  1 Reply Last reply Reply Quote 0
                                  • mudmanc4M
                                    mudmanc4
                                    last edited by

                                    @kpa:

                                    They haven't really thought trough the value and practicality of that feature. Instead of helping to find any real threats it is going to cause more people freak out because there's an unknown scanner probing at multiple hosts on the local network for seemingly random web pages just like a real malware would be.

                                    I would like to know what exact version is being used which is probing ports and directories, if anyone can supply me with this info that would be great. I want to see this for myself. Before I find a gator.

                                    Here is a thought about such probing, considering what has been shown here as far as the locations scanned, any basic server admin would have preventative measures in place to prevent such activities, even if it's only fail2ban. Rendering the utility useless.

                                    1 Reply Last reply Reply Quote 0
                                    • T
                                      TheNarc
                                      last edited by

                                      I'll check with my users, but I think they're running the latest release (and I'm sure this feature is in the latest release), which seems to be 11.2.2262.

                                      1 Reply Last reply Reply Quote 0
                                      • M
                                        Mithrondil
                                        last edited by

                                        I have the same problem, and I have win7, using Firefox 64bit, and I have avast antivirus installed.
                                        So whats the conclusion on this matter, if its avast antivirus thats doing the scanning, can it be concidered normal or is a clean install of pfsense recommended?

                                        Also, is nginx a legit part of the pfsense install? Or how did this end up on my pfsense?

                                        1 Reply Last reply Reply Quote 0
                                        • K
                                          kpa
                                          last edited by

                                          Everything so far says that it is in fact Avast that does the scanning. See if you can turn off the module/service in Avast that does the scanning. Yes, Nginx is now the web server in pfsense that implements the webgui and other related services. It used to be lighttpd in pfSense 2.2.* but was changed for 2.3.*.

                                          1 Reply Last reply Reply Quote 0
                                          • mudmanc4M
                                            mudmanc4
                                            last edited by

                                            Interesting how this just started to be noticed in the logs. Or no one has bothered to look before now in this scenario.

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.