Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Echo Devices all generating blocks for TCP:RA & TCP:PA

    Scheduled Pinned Locked Moved Firewalling
    17 Posts 3 Posters 1.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • C
      ck42
      last edited by

      Ahh...that may explain why I'm see a good bit of this type of traffic on my phone (work from home).
      Appreciate you going out of your way to check the Echo traffic!

      1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator
        last edited by

        Well that did not take long - but these are FA..

        0_1534261929935_outofstate.png

        That is my show.. Trying to close session. Now that "could" be duplicated because of wifi?? But I doubt it - or more like just misconfigured application/service. Hey I didn't get my answer to my FA.. So going to send it again..

        If you look at time stamps - its looks like retrans on the FA, see how the timestamps back off in time between..

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        1 Reply Last reply Reply Quote 0
        • C
          ck42
          last edited by

          All of mine are either PA or RA.
          Looking closer at it, both Echos are only PA...and the two dots are a combination of RA and PA.
          No FA's at all on mine.

          1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator
            last edited by johnpoz

            RA would be a reset..

            I let it run like this for a while to see what and amount seeing..

            edit: Yeah seeing some more
            0_1534266366286_more.png

            You would really have to watch the full conversation via say a sniff to try and figure out what is going on when the connections goes to close.. And where its breaking down, prob going to be without knowing what is happening inside the conversation.. Could just be bad coding..

            To be honest as long as things are working, I would prob just turn off the default logging so you don't see this sort of stuff. If you wanting to catch stuff that might be required you could log block just SYN.. So you would see if say application needs to talk on port XYZ, and you don't have XYZ open.. But you wouldn't see all this out of state noise.

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            1 Reply Last reply Reply Quote 0
            • C
              ck42
              last edited by

              Yeah, really not feeling like doing a bunch of packet peeking to chase this down when the devices appear to be working anyway.
              I'll try changing the default to just block SYNs. Sounds like the easiest way of dealing with this.

              Thanks!

              1 Reply Last reply Reply Quote 0
              • C
                ck42
                last edited by

                Okay...spent enough time trying to figure this next step out.
                I've never needed to play with the firewall rules TCP flags before...and I'm not quite getting how to set this up using the "set" and "out of" checkboxes.

                I found one older posting that came REALLY REALLY close to explaining it well enough...but it left just enough ambiguity that I can't be sure.

                This woudl be for my Default 'catch all' Reject logged rule on the LAN interface:
                I know I need to set the SYN on the "set" checkboxes.
                I think I need to set just the ACK box on the "out of" checkboxes

                Is this correct?
                Essentially, I just want to match the initial Syn flag when the handshake starts...and not the other handshake packets that also happen to have the SYN flag set.

                1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator
                  last edited by johnpoz

                  You do understand your default deny is still there right, your just not logging it ;) If all you want to block so you can log the syn, is the syn set..

                  Here is rule I have on wan to catch the syn attempts.

                  0_1534273485745_logsyn.png

                  If this is on your lan - you can set reject, but I would never suggest you reject on wan for unsolicited traffic to any port.

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  1 Reply Last reply Reply Quote 0
                  • C
                    ck42
                    last edited by ck42

                    Yep, I understand the implicit final block. :)
                    This will just be my catchall rule to log unallowed LAN traffic...except now it will only reject/log that same traffic with the SYN flag...and cut out all the out of band noise.
                    For what should be obvious reasons, I'd NEVER 'Reject' on the WAN side. 😱

                    But...question - How does this checkbox combo work? Like I mentioned, the 'set' part makes sense....but how exactly is the 'out of' SYN option working here?

                    EDIT: Found something on this FINALLY!

                    "The first row controls which flags must be set to match the rule. The second row defines the list of flags that will be consulted on the packet to look for a match"

                    So....based on this, it seems like in the "out of" row, I should select RST and PSH as well, right?

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator
                      last edited by

                      no your only looking for stuff that has syn set.. When syn is set. So you care if S and PSH set? Why do you care if syn and psh are set.. As long as syn is set is all you care for, so you want to look at packets for SYN, is it set.. Great. log it.

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      1 Reply Last reply Reply Quote 0
                      • C
                        ck42
                        last edited by ck42

                        You're right....somewhere along the line, my logic went completely sideways!
                        I've got it set now with the last rule on the LAN side being a Reject ANY/ANY with the "set/out of" boxes checked for SYN.
                        ...and for testing, set it to log to make sure it's catching the stuff I want it to catch.

                        If that is working, then I'll stop logging on that rule and then create another Reject rule to catch and log everything that makes it past that new SYN rule.

                        EDIT: Actually, that new rule will just end up catching the 'normal' stuff that I do want to log....all of the non-TCP:RA/PA packets. Okay...I think this is where I starting going sideways earlier...while trying to figure out a way to prevent this. Somehow, I need to create a rule that specifically matches TCP:PA/RA packets...and ONLY those.

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.