Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Block cameras from everything but email

    Scheduled Pinned Locked Moved Firewalling
    29 Posts 6 Posters 1.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • X
      xman111
      last edited by

      this is what the packet capture is doing when it failed.. the camera I am testing from is 192.168.50.2

      10:33:14.395859 IP 192.168.10.80.57019 > 192.168.50.8.554: tcp 0
      10:33:14.396028 IP 192.168.10.80.50639 > 192.168.50.6.554: tcp 0
      10:33:14.396408 IP 192.168.10.80.39079 > 192.168.50.7.554: tcp 0
      10:33:14.396525 IP 192.168.10.80.39079 > 192.168.50.7.554: tcp 0
      10:33:14.396647 IP 192.168.10.80.50639 > 192.168.50.6.554: tcp 0
      10:33:14.396834 IP 192.168.10.80.50639 > 192.168.50.6.554: tcp 0
      10:33:14.396890 IP 192.168.10.80.39079 > 192.168.50.7.554: tcp 0
      10:33:14.397185 IP 192.168.50.7.554 > 192.168.10.80.39079: tcp 1448
      10:33:14.397277 IP 192.168.50.7.554 > 192.168.10.80.39079: tcp 1448
      10:33:14.397399 IP 192.168.50.7.554 > 192.168.10.80.39079: tcp 1448
      10:33:14.397591 IP 192.168.50.7.554 > 192.168.10.80.39079: tcp 1448
      10:33:14.397783 IP 192.168.50.7.554 > 192.168.10.80.39079: tcp 980
      10:33:14.397824 IP 192.168.10.80.39079 > 192.168.50.7.554: tcp 0
      10:33:14.397977 IP 192.168.10.80.39079 > 192.168.50.7.554: tcp 0
      10:33:14.398281 IP 192.168.10.80.39079 > 192.168.50.7.554: tcp 0
      10:33:14.398433 IP 192.168.50.8.554 > 192.168.10.82.41703: tcp 1448
      10:33:14.398555 IP 192.168.50.8.554 > 192.168.10.82.41703: tcp 1448
      10:33:14.398709 IP 192.168.50.8.554 > 192.168.10.82.41703: tcp 1448
      10:33:14.398900 IP 192.168.50.8.554 > 192.168.10.82.41703: tcp 1448
      10:33:14.399019 IP 192.168.10.82.41703 > 192.168.50.8.554: tcp 0
      10:33:14.399093 IP 192.168.50.8.554 > 192.168.10.82.41703: tcp 1448
      10:33:14.399284 IP 192.168.50.8.554 > 192.168.10.82.41703: tcp 1424
      10:33:14.399476 IP 192.168.50.8.554 > 192.168.10.82.41703: tcp 1448
      10:33:14.399483 IP 192.168.50.5.554 > 192.168.10.100.52699: tcp 1460
      10:33:14.399668 IP 192.168.50.8.554 > 192.168.10.82.41703: tcp 1448
      10:33:14.399675 IP 192.168.50.5.554 > 192.168.10.100.52699: tcp 1460
      10:33:14.399682 IP 192.168.50.8.554 > 192.168.10.82.41703: tcp 1448
      10:33:14.399800 IP 192.168.10.100.52699 > 192.168.50.5.554: tcp 0
      10:33:14.399858 IP 192.168.50.5.554 > 192.168.10.100.52699: tcp 1460
      10:33:14.399894 IP 192.168.10.82.41703 > 192.168.50.8.554: tcp 0
      10:33:14.400050 IP 192.168.50.8.554 > 192.168.10.82.41703: tcp 1448
      10:33:14.400059 IP 192.168.50.8.554 > 192.168.10.82.41703: tcp 500
      10:33:14.400066 IP 192.168.50.5.554 > 192.168.10.100.52699: tcp 1460
      10:33:14.400074 IP 192.168.10.82.41703 > 192.168.50.8.554: tcp 0
      10:33:14.400168 IP 192.168.10.100.52699 > 192.168.50.5.554: tcp 0
      10:33:14.400242 IP 192.168.50.5.554 > 192.168.10.100.52699: tcp 1460
      10:33:14.400407 IP 192.168.10.82.41703 > 192.168.50.8.554: tcp 0
      10:33:14.400434 IP 192.168.50.5.554 > 192.168.10.100.52699: tcp 1364
      10:33:14.400442 IP 192.168.50.6.554 > 192.168.10.82.42077: tcp 1448
      10:33:14.400450 IP 192.168.50.5.554 > 192.168.10.100.52699: tcp 1460
      10:33:14.400530 IP 192.168.10.100.52699 > 192.168.50.5.554: tcp 0
      10:33:14.400586 IP 192.168.50.6.554 > 192.168.10.82.42077: tcp 1448
      10:33:14.400777 IP 192.168.50.5.554 > 192.168.10.100.52699: tcp 1460
      10:33:14.400899 IP 192.168.10.82.42077 > 192.168.50.6.554: tcp 0
      10:33:14.400916 IP 192.168.10.100.52699 > 192.168.50.5.554: tcp 0
      10:33:14.400966 IP 192.168.50.6.554 > 192.168.10.82.42077: tcp 1448
      10:33:14.400975 IP 192.168.50.6.554 > 192.168.10.82.42077: tcp 1448
      10:33:14.401157 IP 192.168.50.5.554 > 192.168.10.100.52699: tcp 1460
      10:33:14.401349 IP 192.168.50.6.554 > 192.168.10.82.42077: tcp 1448
      10:33:14.401356 IP 192.168.50.5.554 > 192.168.10.100.52699: tcp 1460
      10:33:14.401412 IP 192.168.10.82.42077 > 192.168.50.6.554: tcp 0
      10:33:14.401458 IP 192.168.10.100.52699 > 192.168.50.5.554: tcp 0
      10:33:14.401542 IP 192.168.50.6.554 > 192.168.10.82.42077: tcp 1424
      10:33:14.401551 IP 192.168.50.5.554 > 192.168.10.100.52699: tcp 1460
      10:33:14.401733 IP 192.168.50.6.554 > 192.168.10.82.42077: tcp 1448
      10:33:14.401832 IP 192.168.10.82.42077 > 192.168.50.6.554: tcp 0
      10:33:14.401925 IP 192.168.50.5.554 > 192.168.10.100.52699: tcp 1364
      10:33:14.401934 IP 192.168.50.6.554 > 192.168.10.82.42077: tcp 1448
      10:33:14.402039 IP 192.168.10.100.52699 > 192.168.50.5.554: tcp 0
      10:33:14.402115 IP 192.168.50.5.554 > 192.168.10.100.52699: tcp 1460
      10:33:14.402132 IP 192.168.50.7.554 > 192.168.10.82.49980: tcp 1448
      10:33:14.402211 IP 192.168.10.82.42077 > 192.168.50.6.554: tcp 0
      10:33:14.402257 IP 192.168.50.7.554 > 192.168.10.82.49980: tcp 1448
      10:33:14.402307 IP 192.168.50.6.554 > 192.168.10.82.42077: tcp 1448
      10:33:14.402316 IP 192.168.50.5.554 > 192.168.10.100.52699: tcp 1460
      10:33:14.402326 IP 192.168.50.5.554 > 192.168.10.100.52699: tcp 44
      10:33:14.402384 IP 192.168.50.7.554 > 192.168.10.82.49980: tcp 1448
      10:33:14.402424 IP 192.168.10.100.52699 > 192.168.50.5.554: tcp 0
      10:33:14.402493 IP 192.168.50.6.554 > 192.168.10.82.42077: tcp 1448
      10:33:14.402574 IP 192.168.50.7.554 > 192.168.10.82.49980: tcp 1448
      10:33:14.402685 IP 192.168.50.6.554 > 192.168.10.82.42077: tcp 468
      10:33:14.402710 IP 192.168.10.82.49980 > 192.168.50.7.554: tcp 0
      10:33:14.402766 IP 192.168.50.7.554 > 192.168.10.82.49980: tcp 1448
      10:33:14.402776 IP 192.168.50.7.554 > 192.168.10.82.49980: tcp 1424
      10:33:14.402919 IP 192.168.10.82.42077 > 192.168.50.6.554: tcp 0
      10:33:14.403058 IP 192.168.10.82.49980 > 192.168.50.7.554: tcp 0
      10:33:14.403324 IP 192.168.10.82.49980 > 192.168.50.7.554: tcp 0
      10:33:14.403377 IP 192.168.10.82.42077 > 192.168.50.6.554: tcp 0
      10:33:14.403539 IP 192.168.50.7.554 > 192.168.10.82.49980: tcp 1448
      10:33:14.403727 IP 192.168.50.7.554 > 192.168.10.82.49980: tcp 1448
      10:33:14.403917 IP 192.168.50.7.554 > 192.168.10.82.49980: tcp 1448
      10:33:14.403924 IP 192.168.50.7.554 > 192.168.10.82.49980: tcp 1448
      10:33:14.404109 IP 192.168.50.7.554 > 192.168.10.82.49980: tcp 624
      10:33:14.404131 IP 192.168.10.82.49980 > 192.168.50.7.554: tcp 0
      10:33:14.404329 IP 192.168.10.82.49980 > 192.168.50.7.554: tcp 0
      10:33:14.404520 IP 192.168.10.82.49980 > 192.168.50.7.554: tcp 0
      10:33:14.406888 IP 192.168.50.7.554 > 192.168.10.82.49980: tcp 1448
      10:33:14.406946 IP 192.168.50.7.554 > 192.168.10.82.49980: tcp 1448
      10:33:14.407069 IP 192.168.50.7.554 > 192.168.10.82.49980: tcp 1448
      10:33:14.407260 IP 192.168.50.7.554 > 192.168.10.82.49980: tcp 1448
      10:33:14.407452 IP 192.168.50.7.554 > 192.168.10.82.49980: tcp 1448
      10:33:14.407459 IP 192.168.50.7.554 > 192.168.10.82.49980: tcp 1424
      10:33:14.408767 IP 192.168.10.82.49980 > 192.168.50.7.554: tcp 0
      10:33:14.409925 IP 192.168.50.2.554 > 192.168.10.100.52696: tcp 1460
      10:33:14.410014 IP 192.168.50.2.554 > 192.168.10.100.52696: tcp 1460
      10:33:14.410135 IP 192.168.10.100.52696 > 192.168.50.2.554: tcp 0
      10:33:14.410148 IP 192.168.50.2.554 > 192.168.10.100.52696: tcp 1460
      10:33:14.410339 IP 192.168.50.2.554 > 192.168.10.100.52696: tcp 1460
      10:33:14.410360 IP 192.168.10.100.52696 > 192.168.50.2.554: tcp 0
      10:33:14.410531 IP 192.168.50.2.554 > 192.168.10.100.52696: tcp 1460

      1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator
        last edited by

        there is not traffic to any 587 that I see… What is this .554 at 192.168.50.2?? That would be RTSP... Zero to do with mail... There is no traffic that I see in that dump dest to 587.. No no that rule wouldn't allow anything.

        How does your camera know where to send the mail?  Does it resolve mail.shaw.ca - if so from where your rules do not allow for dns to anywhere, not even pfsense IP.  So unless your putting in a IP In the camera to send mail to it would never be able to resolve where to even send mail.

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.7.2, 24.11

        1 Reply Last reply Reply Quote 0
        • X
          xman111
          last edited by

          John,

          i probably could have cleaned up that traffic a little.  i have a Firetv in my kitchen that constantly streams RTSP on port 554 from my cameras so we can watch them on the TV.  Here is the config screen from the camera, i just blacked out my email and user names.  It's weird that it can go through with the any/any but not with the smtp rule..

          camera2.png
          camera2.png_thumb

          1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator
            last edited by

            Well any any it could do dns..

            How how does your camera figure out what IP mail.shaw.ca is when your rules do not allow for any dns traffic.

            Your any any rule would allow it.  Does your camera point to pfsense or something else for dns.. You have to allow it to lookup mail.shaw.ca or no its never going to work.

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.7.2, 24.11

            1 Reply Last reply Reply Quote 0
            • X
              xman111
              last edited by

              John,

              soon as I allowed DNS, it worked instantly.  Thank you so much, another problem you solved.  Can I ask you one more thing.  No matter what I do, i cannot get encrypted mail working with the cameras.  How important is that when they are all but blocked and connecting to my home ISP for mail?

              thanks again man!!

              ps. looked at the camera and the only setting was gateway and it was 192.168.50.1 the camera vlan

              1 Reply Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator
                last edited by

                Did your camera get IP via dhcp, if not maybe it uses default something for dns like 8.8.8.8 many a device does this.

                If your not using encryption then the auth to send mail is more than likely being sent in the clear.  Which since your using your own isp prob doesn't go far, etc.  But it is very bad practice to be sure.  Why don't you sniff and see if your password is sent in clear?  Just sniff to port 587 and have it send a test mail or something.  Then download that sniff into wireshark and look if it sends your password in the clear.

                All comes down to how tight your tinfoil hat is.. If your going to send in the clear prob wouldn't use your main email account.. Use a sub account with different password, etc.

                If I had to guess to why encryption not working would be your camera doesn't trust the cert being presented, etc.  You could test and see this with testing from cli access to your mail server and seeing what cert is presented…  I can show you how to do that if you want.

                Does your smtp server even require auth before sending.  Some ISP mail servers when your coming from their own network do not require auth, etc.

                edit:  Another option if your isp allows outbound out on 25 is to just have the iot device drop off the mail on the dest smtp server directly to your address.. Sometimes that will work as well - then does not require auth..

                Your sending directly to the MX record for the domain your sending to - so for example if sending a gmail address..

                ; QUESTION SECTION:
                ;gmail.com.                    IN      MX

                ;; ANSWER SECTION:
                gmail.com.              3600    IN      MX      20 alt2.gmail-smtp-in.l.google.com.
                gmail.com.              3600    IN      MX      40 alt4.gmail-smtp-in.l.google.com.
                gmail.com.              3600    IN      MX      30 alt3.gmail-smtp-in.l.google.com.
                gmail.com.              3600    IN      MX      5 gmail-smtp-in.l.google.com.
                gmail.com.              3600    IN      MX      10 alt1.gmail-smtp-in.l.google.com.

                So for the smtp server you would put in gmail-smtp-in.l.google.com and 25..  But many an IP block 25 outbound to other smtp servers so that might not work, etc.

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                1 Reply Last reply Reply Quote 0
                • X
                  xman111
                  last edited by

                  thanks for the answer John, i will go through this and figure out what is going on and what I am comfortable with.

                  1 Reply Last reply Reply Quote 0
                  • X
                    xman111
                    last edited by

                    turns out I was able to get the Gmail with encryption working now after that dns entry so thanks again!

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator
                      last edited by

                      Yup things tend to need DNS to work ;) heheheeh

                      See lots of threads where internet doesn't work have a any any rule!!

                      No you have a tcp any rule.. So kind of hard to lookup www.google.com when DNS is udp ;)

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                      1 Reply Last reply Reply Quote 0
                      • X
                        xman111
                        last edited by

                        apparently, thanks John!

                        1 Reply Last reply Reply Quote 0
                        • W
                          wkearney99
                          last edited by

                          @johnpoz:

                          But many an IP block 25 outbound to other smtp servers so that might not work, etc.

                          Correct, many ISPs won't pass outbound port 25 traffic.  For those you generally have to use an upstream provider via secure SMTP connections on port 587.  It does not have to be the ISP, it can be any SMTP server on which you have access.  Bearing in mind that if your upstream provider's DNS records don't match your domain then you might have spam filtering problems on the receiving side.  But for stuff like cameras that's a pretty unlikely issue.

                          So run an internal SMTP relay (configured to use an upstream relay, if necessary), configure the cameras to use it and then block the cameras from ever using the outbound firewall ports.  The you'll have a choke-point at which you can monitor/log or otherwise 'manage' any messages devices inside your network want to send via e-mail.

                          1 Reply Last reply Reply Quote 0
                          • DerelictD
                            Derelict LAYER 8 Netgate
                            last edited by

                            Port 587 is the submit port, not 537.

                            Chattanooga, Tennessee, USA
                            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                            Do Not Chat For Help! NO_WAN_EGRESS(TM)

                            1 Reply Last reply Reply Quote 0
                            • W
                              wkearney99
                              last edited by

                              @Derelict:

                              Port 587 is the submit port, not 537.

                              Thank you, edited for correction.  Must've been lack of coffee for that one…

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.