Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Had my pfSense been compromised?

    Scheduled Pinned Locked Moved Firewalling
    79 Posts 11 Posters 14.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ
      johnpoz LAYER 8 Global Moderator
      last edited by johnpoz

      Ok so from research so fare

      short packets dropped

      Is that that is suppose to mean.. but why does it say passed then?

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.8, 24.11

      1 Reply Last reply Reply Quote 0
      • provelsP
        provels
        last edited by provels

        So there is no outbound traffic to 103.240.140.10 from some device that creates this return Allow temp rule? Since all return traffic is allowed? Create a rule that allows (but logs) all traffic to 103.240.140.10? (LOL, ignore as needed! :)

        Peder

        MAIN - pfSense+ 24.11-RELEASE - Adlink MXE-5401, i7, 16 GB RAM, 64 GB SSD. 500 GB HDD for SyslogNG
        BACKUP - pfSense+ 23.01-RELEASE - Hyper-V Virtual Machine, Gen 1, 2 v-CPUs, 3 GB RAM, 8GB VHDX (Dynamic)

        1 Reply Last reply Reply Quote 0
        • johnpozJ
          johnpoz LAYER 8 Global Moderator
          last edited by

          To be honest I think this is log of traffic that IP or transport header is too short.. But not sure why its saying pass... But I don't think that traffic is actually being passed to anything, not even pfsense.

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.8, 24.11

          1 Reply Last reply Reply Quote 0
          • H
            hulleyrob
            last edited by

            Oct 13 09:14:13 pfSense filterlog: 4294967295,16777216,,0,pppoe0,short,pass,in,4,0x0,,245,35606,0,none,17,udp,27,103.240.140.10,IP_REMOVED,3266,990,7
            Oct 13 09:14:13 pfSense filterlog: 4294967295,16777216,,0,pppoe0,short,pass,in,4,0x0,,245,35608,0,none,17,udp,27,103.240.140.10,IP_REMOVED,2427,389,7
            Oct 13 09:14:13 pfSense filterlog: 4294967295,16777216,,0,pppoe0,short,pass,in,4,0x0,,245,35605,0,none,17,udp,27,103.240.140.10,IP_REMOVED,1862,1025,7
            Oct 13 09:14:13 pfSense filterlog: 4294967295,16777216,,0,pppoe0,short,pass,in,4,0x0,,245,35607,0,none,17,udp,27,103.240.140.10,IP_REMOVED,570,995,7
            Oct 13 09:14:13 pfSense filterlog: 4294967295,16777216,,0,pppoe0,short,pass,in,4,0x0,,245,35604,0,none,17,udp,27,103.240.140.10,IP_REMOVED,493,514,7
            Oct 13 09:14:13 pfSense filterlog: 4294967295,16777216,,0,pppoe0,short,pass,in,4,0x0,,245,35609,0,none,17,udp,27,103.240.140.10,IP_REMOVED,2375,445,7
            Oct 13 09:14:13 pfSense filterlog: 4294967295,16777216,,0,pppoe0,short,pass,in,4,0x0,,245,35602,0,none,17,udp,27,103.240.140.10,IP_REMOVED,162,546,7
            Oct 13 09:14:13 pfSense filterlog: 4294967295,16777216,,0,pppoe0,short,pass,in,4,0x0,,245,35603,0,none,17,udp,27,103.240.140.10,IP_REMOVED,3871,547,7
            

            Here are the entries from my log file.

            1 Reply Last reply Reply Quote 0
            • johnpozJ
              johnpoz LAYER 8 Global Moderator
              last edited by

              So it seems these are short, ie something wrong with them... But the question is why are they getting logged as passed.. If they are short - they should just be dropped.

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              H 1 Reply Last reply Reply Quote 0
              • H
                hulleyrob @johnpoz
                last edited by

                @johnpoz if thats all it is it will be a relief as you saw on the screenshot above it looked like something had opened up all those ports.

                What do I do now, is it worth reporting this somewhere for investigation?

                1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator
                  last edited by

                  I would hope @jimp or @Derelict might be able to give more details of these "short" log entries..

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  1 Reply Last reply Reply Quote 0
                  • jimpJ
                    jimp Rebel Alliance Developer Netgate
                    last edited by

                    I can't remember the last time I saw one marked short. It might be a fragment.

                    Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                    Need help fast? Netgate Global Support!

                    Do not Chat/PM for help!

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator
                      last edited by

                      But the question is why is marked pass?

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      1 Reply Last reply Reply Quote 0
                      • jimpJ
                        jimp Rebel Alliance Developer Netgate
                        last edited by

                        If it's a fragment that is part of an existing connection, it would be passed. It might be that the state recently expired or was purged for some other reason so it was passed in but NAT didn't get applied, for example.

                        Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                        Need help fast? Netgate Global Support!

                        Do not Chat/PM for help!

                        A 1 Reply Last reply Reply Quote 0
                        • johnpozJ
                          johnpoz LAYER 8 Global Moderator
                          last edited by johnpoz

                          I doubt its frag, since that is a different counter - see my output from
                          pfctl -s info

                          above.

                          From the logs he lists I doubt its part of an existing connection.. From everything I find short should be dropped, so why is it logged as if it passed?

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                          1 Reply Last reply Reply Quote 0
                          • jimpJ
                            jimp Rebel Alliance Developer Netgate
                            last edited by

                            I'm not sure, unless it's being misinterpreted by filterlog.

                            If you can reproduce it reliably, you could capture the pflog output directly and pipe it through tcpdump (as described on https://www.openbsd.org/faq/pf/logging.html ) and see if that agrees.

                            Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                            Need help fast? Netgate Global Support!

                            Do not Chat/PM for help!

                            1 Reply Last reply Reply Quote 0
                            • johnpozJ
                              johnpoz LAYER 8 Global Moderator
                              last edited by

                              I can not tried to reporduce it, but you could prob for sure feed short packets via packet creation tool to try and duplicated the problem.

                              But seems a few users are seeing a bunch of them - as you can see from my counters I have only ever seen 2 of them... But don't recall ever seeming in the the log as pass.. will keep an eye if that counter goes up and see what my log says since feeding all logs to syslog now for retention.. But if get a chance will try and duplicate a short to pfsense and see if can try and see what it logs.

                              An intelligent man is sometimes forced to be drunk to spend time with his fools
                              If you get confused: Listen to the Music Play
                              Please don't Chat/PM me for help, unless mod related
                              SG-4860 24.11 | Lab VMs 2.8, 24.11

                              1 Reply Last reply Reply Quote 0
                              • A
                                ASIC @jimp
                                last edited by

                                @jimp I have PfBlockerNG installed, and GeoIP Asia IP list, which includes 103.240.140.10, and it is applied as denied outbound connections on LAN, so there cannot be any existing connection to that IP.Clipboard01.jpg

                                1 Reply Last reply Reply Quote 0
                                • NogBadTheBadN
                                  NogBadTheBad
                                  last edited by

                                  @ASIC said in Had my pfSense been compromised?:

                                  103.240.140.10

                                  Are you blocking Hong Kong ?

                                  andy@mac-pro ~ % whois 103.240.140.10
                                  % IANA WHOIS server
                                  % for more information on IANA, visit http://www.iana.org
                                  % This query returned 1 object

                                  refer: whois.apnic.net

                                  inetnum: 103.0.0.0 - 103.255.255.255
                                  organisation: APNIC
                                  status: ALLOCATED

                                  whois: whois.apnic.net

                                  changed: 2011-02
                                  source: IANA

                                  whois.apnic.net

                                  % [whois.apnic.net]
                                  % Whois data copyright terms http://www.apnic.net/db/dbcopyright.html

                                  % Information related to '103.240.140.1 - 103.240.142.255'

                                  % Abuse contact for '103.240.140.1 - 103.240.142.255' is 'abuse@clear-ddos.com'

                                  inetnum: 103.240.140.1 - 103.240.142.255
                                  netname: CTCL-HK
                                  descr: ClearDDoS Technologies
                                  country: HK
                                  admin-c: CTCL1-AP
                                  tech-c: CTCL1-AP
                                  status: ASSIGNED NON-PORTABLE
                                  mnt-by: MAINT-CTCL-HK
                                  mnt-irt: IRT-CTCL-HK
                                  last-modified: 2014-09-28T08:41:28Z
                                  source: APNIC

                                  irt: IRT-CTCL-HK
                                  address: Flat C, 23/F, Lucky Plaza,, 315-321 Lockhart Road, Wan Chai, Hong Kong, Hongkong Hongkong 999999
                                  e-mail: abuse@clear-ddos.com
                                  abuse-mailbox: abuse@clear-ddos.com
                                  admin-c: CTCL1-AP
                                  tech-c: CTCL1-AP
                                  auth: # Filtered
                                  mnt-by: MAINT-CTCL-HK
                                  last-modified: 2013-08-06T10:03:29Z
                                  source: APNIC

                                  role: CLEARDDOS TECHNOLOGY CO LIMITED administrator
                                  address: Flat C, 23/F, Lucky Plaza,, 315-321 Lockhart Road, Wan Chai, Hong Kong, Hongkong Hongkong 999999
                                  country: HK
                                  phone: +86 755 8453 0553
                                  fax-no: +86 755 8453 0553
                                  e-mail: abuse@clear-ddos.com
                                  admin-c: CTCL1-AP
                                  tech-c: CTCL1-AP
                                  nic-hdl: CTCL1-AP
                                  mnt-by: MAINT-CTCL-HK
                                  last-modified: 2013-08-06T10:03:28Z
                                  source: APNIC

                                  % This query was served by the APNIC Whois Service version 1.88.15-46 (WHOIS-UK4)

                                  andy@mac-pro ~ %

                                  Andy

                                  1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                                  A 1 Reply Last reply Reply Quote 0
                                  • A
                                    ASIC @NogBadTheBad
                                    last edited by

                                    @NogBadTheBad said in Had my pfSense been compromised?:

                                    @ASIC said in Had my pfSense been compromised?:

                                    103.240.140.10

                                    Are you blocking Hong Kong ?

                                    Yes, I am.

                                    1 Reply Last reply Reply Quote 0
                                    • NogBadTheBadN
                                      NogBadTheBad
                                      last edited by

                                      Just thought I'd check as some people think Hong Kong is China โ˜บ

                                      Andy

                                      1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                                      1 Reply Last reply Reply Quote 0
                                      • H
                                        hulleyrob
                                        last edited by

                                        Its also interesting that we all saw clear DDOS technologies as passed in our logs and no-one else.

                                        Ive not seen any other IP addresses associated with this problem.

                                        1 Reply Last reply Reply Quote 0
                                        • jimpJ
                                          jimp Rebel Alliance Developer Netgate
                                          last edited by

                                          I've looked through the pf source code and any place I see where PFRES_SHORT (short) reason gets set is only associated with the PF_DROP (block) action. So I'm not quite sure why it is being logged as a pass. The only difference is that when scrub is enabled, the code path that does packet normalization sets things slightly differently, so maybe that affects how the log entry is interpreted, but the packet is still dropped on that code path.

                                          Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                                          Need help fast? Netgate Global Support!

                                          Do not Chat/PM for help!

                                          1 Reply Last reply Reply Quote 1
                                          • johnpozJ
                                            johnpoz LAYER 8 Global Moderator
                                            last edited by johnpoz

                                            Is there anyway to make sure they are logged as blocked vs pass?

                                            Yeah everything I was reading is short should be blocked, so not sure why they are logged as pass either.. Odd.. While I do have some hits in the counter for short via the info command.. I can not find anything in the logs on my syslog showing them... But then again those might of been before sending to syslog, and the counter has not gone up in the week since last did, still showing only 2.

                                            If someone is seeing a lot of them, possible they could turn off scrub for testing to see if they are now logged blocked.

                                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                                            If you get confused: Listen to the Music Play
                                            Please don't Chat/PM me for help, unless mod related
                                            SG-4860 24.11 | Lab VMs 2.8, 24.11

                                            H 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.