Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    PfSense trying shady connections?

    Scheduled Pinned Locked Moved General pfSense Questions
    30 Posts 9 Posters 5.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • KOMK
      KOM
      last edited by

      NTP can be ruled out by switching from the default pool to a specific address from the pool.  pfBlocker can be disabled.  I'll be really surprised if the hits keep happening after these changes.

      1 Reply Last reply Reply Quote 0
      • ?
        A Former User
        last edited by

        Leaving NTP as is now, we'll see if attempts stop without pfBlocker

        1 Reply Last reply Reply Quote 0
        • G
          garyd9
          last edited by

          @campusantu:

          The IPs resolve to a0.org.afilias-nst.info.

          Can someone please explain what is going on?

          Duh.  I can't believe I overlooked this.

          Isn't a0.org-afilias-nst.info a root server for the .org TLD?  If so, ANYTHING trying to get a DNS resolution for a *.org name would be causing hits to that machine.

          1 Reply Last reply Reply Quote 0
          • ?
            A Former User
            last edited by

            Yes but then why those IP seems to be THAT bad, source of spam and control center of call-home malware, just because they resolve to some random .org? Plus, I'm not getting errors from any other host

            1 Reply Last reply Reply Quote 0
            • BBcan177B
              BBcan177 Moderator
              last edited by

              hehe …  wow... Anyone who thinks the pfBlockerNG pkg is making requests on its own to any IP other than to MaxMind or Alexa is smoking something good… please share :)  The pkg will only make request to URLs that the user adds as Lists/Feeds...

              http://afilias.info/about-us

              Afilias is the world’s second largest Internet domain name registry, with more than 20 million names under management. Afilias powers a wide variety of top-level domains, and will soon support hundreds of new TLDs (top level domains) now preparing for launch, including TLDs for cities, brands, communities and generic terms. Afilias’ specialized technology makes Internet addresses more accessible and useful through a wide range of applications, including Internet domain registry services, Managed DNS and Mobile & Web services like goMobi® and DeviceAtlas®.
              and the kicker:

              Afilias' DNS system provides for the resolution for billions of queries for over 20M domain names today on a globally diverse and secure platform.

              And apart from what TrendMicro says, those IPs are not listed in any Blocklists or Threat Intel Sources that I can find…

              "Experience is something you don't get until just after you need it."

              Website: http://pfBlockerNG.com
              Twitter: @BBcan177  #pfBlockerNG
              Reddit: https://www.reddit.com/r/pfBlockerNG/new/

              1 Reply Last reply Reply Quote 0
              • H
                Harvy66
                last edited by

                Toss this in the bin of "My brand firewall says I'm getting DDOS'd by RST packets at a rate of one per minute."? Overly sensitive "feel good" "look I'm blocking stuff"?

                1 Reply Last reply Reply Quote 0
                • ?
                  A Former User
                  last edited by

                  Never used it, so unfortunately it's just plain ignorance, you don't want that shared, do you? ;)
                  While I'm still not sure why in the entire network only pfSense is being blocked for that, is the list you mentioned viewable/editable? I uninstalled pfBlocker and plan not to reinstall it for 24/48h just to confirm it's that, so I can't see myself. Sure enough I didn't add that url to any list, must be one of the defaults, just want to confirm

                  @Harvy66:

                  Toss this in the bin of "My brand firewall says I'm getting DDOS'd by RST packets at a rate of one per minute."? Overly sensitive "feel good" "look I'm blocking stuff"?

                  I'd gladly accept that, I was curious about why. Plus, it wouldn't be the first time a server gets hacked and a link/ISO replaced with another one…

                  Thanks  :)

                  1 Reply Last reply Reply Quote 0
                  • G
                    garyd9
                    last edited by

                    it's not pfblocker.  It's DNS.

                    I'm assuming that you have pfsense configured as default, meaning that it'll be a DNS Resolver (and not a forwarder.)  So, when pfsense (or any machine using pfsense for DNS) wants to resolve a FQDN that ends with ".org", this is what happens:

                    First, "unbound" (the name of the program that's doing DNS resolution) will query the "root servers" to find out the name of a machine that can resolve domain names that end with .org.  Those root servers are configured within unbound (but not seen in the interface.)  One of those root servers sees that you want to resolving something.org, so it points you to the authority for ".org"  In somewhat readable format, that response looks like this:

                    
                    ;; AUTHORITY SECTION:
                    org.                    639     IN      SOA     a0.org.afilias-nst.info. noc.afilias-nst.info. 2012137076 1800 900 604800 86400
                    
                    

                    See that hostname?  Look familiar?

                    That just tells unbound to ask a0.org.afilias-nst.info or noc.afilias-nst.info for more information (as they are authorities for all domain names that end with .org.)

                    There's nothing going wrong here.  It's working fine.  If unbound is blocked from contacting a0.org.afilias-nst.info, it'll just ask noc.afilias-nst.info instead.

                    BTW, in an extremely odd twist of being right for the wrong reasons:  It really IS ntp causing that alert.  ntp is trying to resolve "0.pfsense.ntp.org", which kicks off the sequence through DNS.

                    1 Reply Last reply Reply Quote 0
                    • BBcan177B
                      BBcan177 Moderator
                      last edited by

                      @campusantu:

                      I uninstalled pfBlocker and plan not to reinstall it for 24/48h just to confirm it's that, so I can't see myself.

                      Lets just say that I kinda have an understanding about the inerds of the pfBlockerNG package code… and if there was some hidden malicious IP being requested by the package itself I would know. Any non-believers can goto gitHub and review all the open sourced package code and let me know so it can be removed :^)

                      As for Lists/Feeds... You can add additional IP and DNSBL Feeds to the package, and these are the only URLs that the package will pull, except for MaxMind (Used for the GeoIP database) and Alexa (Used for DNSBL Whitelisting)...

                      In looking at these IPs with tcpiputils.com [ 199.19.56.1 and 199.249.120.1 ]

                      http://www.tcpiputils.com/browse/ip-address/199.19.56.1
                      http://www.tcpiputils.com/browse/ip-address/199.249.120.1

                      199.19.56.1    is listing 1 Mail server  and 3 Name Servers at that IP.
                      199.249.120.1 is listing 2 Mail servers and 3 Name Servers at that IP.

                      So something on your LAN is making requests to these IPs. I assume that since you installed pfSense, that your using the DNS Resolver. If its in "Resolver" mode, than DNS requests are going out to the 13 Root DNS servers for DNS Resolution which then goes down the tree to find the correct DNS Resolution for each request.

                      Your "ASUS" was probably set to your ISP DNS server, or Google DNS which uses their own DNS cache for lookups so it may be that it resolved differently and was not previously noticable.

                      If you can run a packet capture and review the those pcaps you will find out whats going on exactly in your network, as of right now, its all speculation.

                      I have sent TrendMicro and Afilias a tweet to see if they have listed those two IPs in err… Will post back once I hear something...

                      "Experience is something you don't get until just after you need it."

                      Website: http://pfBlockerNG.com
                      Twitter: @BBcan177  #pfBlockerNG
                      Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                      1 Reply Last reply Reply Quote 0
                      • ?
                        A Former User
                        last edited by

                        @garyd9:

                        I'm assuming that you have pfsense configured as default, meaning that it'll be a DNS Resolver (and not a forwarder.)

                        Yes, as already said but probably was lost in the messages. I superficially assumed it would ask the router instead of trying itself, gave little weight to the dns section when skimming through settings. Seems like at 2am I'm not that awake anymore.. Can you guess what time is it here now?  ;D

                        @BBcan177:

                        Lets just say that I kinda have an understanding about the inerds of the pfBlockerNG package code… and if there was some hidden malicious IP being requested by the package itself I would know. Any non-believers can goto gitHub and review all the open sourced package code and let me know so it can be removed :^)

                        I thought more about a modified ISO, like what happened with linux mint months ago, I know pfSense and its packages are extensively used so someone would have found out already :)

                        @BBcan177:

                        So something on your LAN is making requests to these IPs. I assume that since you installed pfSense, that your using the DNS Resolver. If its in "Resolver" mode, than DNS requests are going out to the 13 Root DNS servers for DNS Resolution which then goes down the tree to find the correct DNS Resolution for each request.

                        Well then I guess it's pfSense itself since nothing relies on it. It's the new guy in the block :P

                        @BBcan177:

                        Your "ASUS" was probably set to your ISP DNS server, or Google DNS which uses their own DNS cache for lookups so it may be that it resolved differently and was not previously noticable.

                        If you can run a packet capture and review the those pcaps you will find out whats going on exactly in your network, as of right now, its all speculation.

                        Yep, Google DNS. Will run wireshark when I'll have time, maybe during the weekend.

                        I'll wait for your response about the tweet, and report back when I run wireshark.

                        Thank you all for the help  :)

                        1 Reply Last reply Reply Quote 0
                        • KOMK
                          KOM
                          last edited by

                          Lets just say that I kinda have an understanding about the inerds of the pfBlockerNG package code…

                          The iNerd, coming soon from Apple!  ;D

                          1 Reply Last reply Reply Quote 0
                          • johnpozJ
                            johnpoz LAYER 8 Global Moderator
                            last edited by

                            So this feel good tool your running on your router that says it blocks stuff to bad places..  It doesn't even list what port it blocked??

                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                            If you get confused: Listen to the Music Play
                            Please don't Chat/PM me for help, unless mod related
                            SG-4860 24.11 | Lab VMs 2.8, 24.11

                            1 Reply Last reply Reply Quote 0
                            • ?
                              A Former User
                              last edited by

                              @johnpoz:

                              So this feel good tool your running on your router that says it blocks stuff to bad places..  It doesn't even list what port it blocked??

                              Erm… Nope. I'd hope it says something more in the logs, but the record was already out of it. I'll get a request blocked when I'm home, to see if it gets there. Keep in mind it's not the standard router firewall

                              1 Reply Last reply Reply Quote 0
                              • johnpozJ
                                johnpoz LAYER 8 Global Moderator
                                last edited by

                                If it does not list the port the traffic is going to to its completely pointless to even log it as blocked..  And if they are blocking the netblocks that the root servers are on that is a huge problem.. I would open a ticket with them about that for sure.

                                An intelligent man is sometimes forced to be drunk to spend time with his fools
                                If you get confused: Listen to the Music Play
                                Please don't Chat/PM me for help, unless mod related
                                SG-4860 24.11 | Lab VMs 2.8, 24.11

                                1 Reply Last reply Reply Quote 0
                                • dennypageD
                                  dennypage
                                  last edited by

                                  @BBcan177:

                                  Lets just say that I kinda have an understanding about the inerds of the pfBlockerNG package code…

                                  Really?  :)

                                  1 Reply Last reply Reply Quote 0
                                  • ?
                                    A Former User
                                    last edited by

                                    @johnpoz:

                                    If it does not list the port the traffic is going to to its completely pointless to even log it as blocked..  And if they are blocking the netblocks that the root servers are on that is a huge problem.. I would open a ticket with them about that for sure.

                                    Ok so the connection doesn't get logged on syslog, seems like the AiProtection is just entirely separate. I'll look into opening the ticket or opening a pull request for the port to be added to the mailed details. Meanwhile I found the IP mentioned in other threads on this forum and on twitter and google, saying it's a botnet sinkhole, even if the posts are quite old. Still not convinced they're not bad , even if it's not pfSense fault :P

                                    Edit: took a look at merlinwrt sources, seems like that part comes from a precompiled module, so pull request is a no-go

                                    1 Reply Last reply Reply Quote 0
                                    • G
                                      garyd9
                                      last edited by

                                      A botnet sink running on a TLD root server?  That's an interesting thought, and a bit frightening.  That hostname is queried millions of times a day to find .org domain name servers, and if it's compromised… that's not a happy thought.  (Yes, my own configuration returned that server as an .org TLD server.. and I have DNSSEC enabled and active.)

                                      It really makes you wonder just how fragile the whole thing could be...

                                      1 Reply Last reply Reply Quote 0
                                      • ?
                                        A Former User
                                        last edited by

                                        @garyd9:

                                        A botnet sink running on a TLD root server?  That's an interesting thought, and a bit frightening.  That hostname is queried millions of times a day to find .org domain name servers, and if it's compromised… that's not a happy thought.  (Yes, my own configuration returned that server as an .org TLD server.. and I have DNSSEC enabled and active.)

                                        It really makes you wonder just how fragile the whole thing could be...

                                        I don't know what to say at this point…  :-
                                        I tried the other afilias ips on trend micro web reputation, they're untested. Anything else we can do to verify/disprove?

                                        1 Reply Last reply Reply Quote 0
                                        • BBcan177B
                                          BBcan177 Moderator
                                          last edited by

                                          @KOM:

                                          Lets just say that I kinda have an understanding about the inerds of the pfBlockerNG package code…

                                          The iNerd, coming soon from Apple!  ;D

                                          Next time i will be more visceral and provide a horrific pic to support my thoughts :)      s/inerds/innards/
                                          ps - This is not a spelling bee…  :P

                                          "Experience is something you don't get until just after you need it."

                                          Website: http://pfBlockerNG.com
                                          Twitter: @BBcan177  #pfBlockerNG
                                          Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                                          1 Reply Last reply Reply Quote 0
                                          • RonpfSR
                                            RonpfS
                                            last edited by

                                            http://www.urbandictionary.com/define.php?term=iNerd

                                            2.4.5-RELEASE-p1 (amd64)
                                            Intel Core2 Quad CPU Q8400 @ 2.66GHz 8GB
                                            Backup 0.5_5, Bandwidthd 0.7.4_4, Cron 0.3.7_5, pfBlockerNG-devel 3.0.0_16, Status_Traffic_Totals 2.3.1_1, System_Patches 1.2_5

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.