Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Had my pfSense been compromised?

    Scheduled Pinned Locked Moved Firewalling
    79 Posts 11 Posters 15.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • jimpJ
      jimp Rebel Alliance Developer Netgate
      last edited by

      I'm not sure, unless it's being misinterpreted by filterlog.

      If you can reproduce it reliably, you could capture the pflog output directly and pipe it through tcpdump (as described on https://www.openbsd.org/faq/pf/logging.html ) and see if that agrees.

      Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

      Need help fast? Netgate Global Support!

      Do not Chat/PM for help!

      1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator
        last edited by

        I can not tried to reporduce it, but you could prob for sure feed short packets via packet creation tool to try and duplicated the problem.

        But seems a few users are seeing a bunch of them - as you can see from my counters I have only ever seen 2 of them... But don't recall ever seeming in the the log as pass.. will keep an eye if that counter goes up and see what my log says since feeding all logs to syslog now for retention.. But if get a chance will try and duplicate a short to pfsense and see if can try and see what it logs.

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        1 Reply Last reply Reply Quote 0
        • A
          ASIC @jimp
          last edited by

          @jimp I have PfBlockerNG installed, and GeoIP Asia IP list, which includes 103.240.140.10, and it is applied as denied outbound connections on LAN, so there cannot be any existing connection to that IP.Clipboard01.jpg

          1 Reply Last reply Reply Quote 0
          • NogBadTheBadN
            NogBadTheBad
            last edited by

            @ASIC said in Had my pfSense been compromised?:

            103.240.140.10

            Are you blocking Hong Kong ?

            andy@mac-pro ~ % whois 103.240.140.10
            % IANA WHOIS server
            % for more information on IANA, visit http://www.iana.org
            % This query returned 1 object

            refer: whois.apnic.net

            inetnum: 103.0.0.0 - 103.255.255.255
            organisation: APNIC
            status: ALLOCATED

            whois: whois.apnic.net

            changed: 2011-02
            source: IANA

            whois.apnic.net

            % [whois.apnic.net]
            % Whois data copyright terms http://www.apnic.net/db/dbcopyright.html

            % Information related to '103.240.140.1 - 103.240.142.255'

            % Abuse contact for '103.240.140.1 - 103.240.142.255' is 'abuse@clear-ddos.com'

            inetnum: 103.240.140.1 - 103.240.142.255
            netname: CTCL-HK
            descr: ClearDDoS Technologies
            country: HK
            admin-c: CTCL1-AP
            tech-c: CTCL1-AP
            status: ASSIGNED NON-PORTABLE
            mnt-by: MAINT-CTCL-HK
            mnt-irt: IRT-CTCL-HK
            last-modified: 2014-09-28T08:41:28Z
            source: APNIC

            irt: IRT-CTCL-HK
            address: Flat C, 23/F, Lucky Plaza,, 315-321 Lockhart Road, Wan Chai, Hong Kong, Hongkong Hongkong 999999
            e-mail: abuse@clear-ddos.com
            abuse-mailbox: abuse@clear-ddos.com
            admin-c: CTCL1-AP
            tech-c: CTCL1-AP
            auth: # Filtered
            mnt-by: MAINT-CTCL-HK
            last-modified: 2013-08-06T10:03:29Z
            source: APNIC

            role: CLEARDDOS TECHNOLOGY CO LIMITED administrator
            address: Flat C, 23/F, Lucky Plaza,, 315-321 Lockhart Road, Wan Chai, Hong Kong, Hongkong Hongkong 999999
            country: HK
            phone: +86 755 8453 0553
            fax-no: +86 755 8453 0553
            e-mail: abuse@clear-ddos.com
            admin-c: CTCL1-AP
            tech-c: CTCL1-AP
            nic-hdl: CTCL1-AP
            mnt-by: MAINT-CTCL-HK
            last-modified: 2013-08-06T10:03:28Z
            source: APNIC

            % This query was served by the APNIC Whois Service version 1.88.15-46 (WHOIS-UK4)

            andy@mac-pro ~ %

            Andy

            1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

            A 1 Reply Last reply Reply Quote 0
            • A
              ASIC @NogBadTheBad
              last edited by

              @NogBadTheBad said in Had my pfSense been compromised?:

              @ASIC said in Had my pfSense been compromised?:

              103.240.140.10

              Are you blocking Hong Kong ?

              Yes, I am.

              1 Reply Last reply Reply Quote 0
              • NogBadTheBadN
                NogBadTheBad
                last edited by

                Just thought I'd check as some people think Hong Kong is China ☺

                Andy

                1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                1 Reply Last reply Reply Quote 0
                • H
                  hulleyrob
                  last edited by

                  Its also interesting that we all saw clear DDOS technologies as passed in our logs and no-one else.

                  Ive not seen any other IP addresses associated with this problem.

                  1 Reply Last reply Reply Quote 0
                  • jimpJ
                    jimp Rebel Alliance Developer Netgate
                    last edited by

                    I've looked through the pf source code and any place I see where PFRES_SHORT (short) reason gets set is only associated with the PF_DROP (block) action. So I'm not quite sure why it is being logged as a pass. The only difference is that when scrub is enabled, the code path that does packet normalization sets things slightly differently, so maybe that affects how the log entry is interpreted, but the packet is still dropped on that code path.

                    Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                    Need help fast? Netgate Global Support!

                    Do not Chat/PM for help!

                    1 Reply Last reply Reply Quote 1
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator
                      last edited by johnpoz

                      Is there anyway to make sure they are logged as blocked vs pass?

                      Yeah everything I was reading is short should be blocked, so not sure why they are logged as pass either.. Odd.. While I do have some hits in the counter for short via the info command.. I can not find anything in the logs on my syslog showing them... But then again those might of been before sending to syslog, and the counter has not gone up in the week since last did, still showing only 2.

                      If someone is seeing a lot of them, possible they could turn off scrub for testing to see if they are now logged blocked.

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      H 1 Reply Last reply Reply Quote 0
                      • H
                        hulleyrob @johnpoz
                        last edited by

                        @johnpoz ive not seen anymore since the day three of us all saw them.

                        B 1 Reply Last reply Reply Quote 0
                        • B
                          bchan @hulleyrob
                          last edited by

                          @hulleyrob said in Had my pfSense been compromised?:

                          @johnpoz ive not seen anymore since the day three of us all saw them.

                          I saw them on 11 & 14Oct and then not anymore.

                          H 1 Reply Last reply Reply Quote 0
                          • kiokomanK
                            kiokoman LAYER 8
                            last edited by kiokoman

                            maybe there is an explanation here @johnpoz
                            http://openbsd-archive.7691.n7.nabble.com/pf-logs-def-short-pass-in-but-should-say-block-td192809.html

                            ̿' ̿'\̵͇̿̿\з=(◕_◕)=ε/̵͇̿̿/'̿'̿ ̿
                            Please do not use chat/PM to ask for help
                            we must focus on silencing this @guest character. we must make up lies and alter the copyrights !
                            Don't forget to Upvote with the 👍 button for any post you find to be helpful.

                            johnpozJ provelsP 2 Replies Last reply Reply Quote 0
                            • H
                              hulleyrob @bchan
                              last edited by

                              @bchan was only on the 13th for me. But reading the link below from 2012 it looks like it is just a issue that it is being displayed as a pass and was actually blocked which is the best scenario for what we are seeing.

                              1 Reply Last reply Reply Quote 0
                              • johnpozJ
                                johnpoz LAYER 8 Global Moderator @kiokoman
                                last edited by

                                @kiokoman

                                That clearly seems some how related for sure, but no responses and its quite old from 2012.. But yeah good find..

                                An intelligent man is sometimes forced to be drunk to spend time with his fools
                                If you get confused: Listen to the Music Play
                                Please don't Chat/PM me for help, unless mod related
                                SG-4860 24.11 | Lab VMs 2.8, 24.11

                                1 Reply Last reply Reply Quote 0
                                • provelsP
                                  provels @kiokoman
                                  last edited by

                                  @kiokoman Poor Leonardo. Unappreciated in his own time.

                                  Peder

                                  MAIN - pfSense+ 24.11-RELEASE - Adlink MXE-5401, i7, 16 GB RAM, 64 GB SSD. 500 GB HDD for SyslogNG
                                  BACKUP - pfSense+ 23.01-RELEASE - Hyper-V Virtual Machine, Gen 1, 2 v-CPUs, 3 GB RAM, 8GB VHDX (Dynamic)

                                  1 Reply Last reply Reply Quote 0
                                  • johnpozJ johnpoz referenced this topic on
                                  • First post
                                    Last post
                                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.