Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Had my pfSense been compromised?

    Scheduled Pinned Locked Moved Firewalling
    79 Posts 11 Posters 14.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ
      johnpoz LAYER 8 Global Moderator
      last edited by

      I can not tried to reporduce it, but you could prob for sure feed short packets via packet creation tool to try and duplicated the problem.

      But seems a few users are seeing a bunch of them - as you can see from my counters I have only ever seen 2 of them... But don't recall ever seeming in the the log as pass.. will keep an eye if that counter goes up and see what my log says since feeding all logs to syslog now for retention.. But if get a chance will try and duplicate a short to pfsense and see if can try and see what it logs.

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.8, 24.11

      1 Reply Last reply Reply Quote 0
      • A
        ASIC @jimp
        last edited by

        @jimp I have PfBlockerNG installed, and GeoIP Asia IP list, which includes 103.240.140.10, and it is applied as denied outbound connections on LAN, so there cannot be any existing connection to that IP.Clipboard01.jpg

        1 Reply Last reply Reply Quote 0
        • NogBadTheBadN
          NogBadTheBad
          last edited by

          @ASIC said in Had my pfSense been compromised?:

          103.240.140.10

          Are you blocking Hong Kong ?

          andy@mac-pro ~ % whois 103.240.140.10
          % IANA WHOIS server
          % for more information on IANA, visit http://www.iana.org
          % This query returned 1 object

          refer: whois.apnic.net

          inetnum: 103.0.0.0 - 103.255.255.255
          organisation: APNIC
          status: ALLOCATED

          whois: whois.apnic.net

          changed: 2011-02
          source: IANA

          whois.apnic.net

          % [whois.apnic.net]
          % Whois data copyright terms http://www.apnic.net/db/dbcopyright.html

          % Information related to '103.240.140.1 - 103.240.142.255'

          % Abuse contact for '103.240.140.1 - 103.240.142.255' is 'abuse@clear-ddos.com'

          inetnum: 103.240.140.1 - 103.240.142.255
          netname: CTCL-HK
          descr: ClearDDoS Technologies
          country: HK
          admin-c: CTCL1-AP
          tech-c: CTCL1-AP
          status: ASSIGNED NON-PORTABLE
          mnt-by: MAINT-CTCL-HK
          mnt-irt: IRT-CTCL-HK
          last-modified: 2014-09-28T08:41:28Z
          source: APNIC

          irt: IRT-CTCL-HK
          address: Flat C, 23/F, Lucky Plaza,, 315-321 Lockhart Road, Wan Chai, Hong Kong, Hongkong Hongkong 999999
          e-mail: abuse@clear-ddos.com
          abuse-mailbox: abuse@clear-ddos.com
          admin-c: CTCL1-AP
          tech-c: CTCL1-AP
          auth: # Filtered
          mnt-by: MAINT-CTCL-HK
          last-modified: 2013-08-06T10:03:29Z
          source: APNIC

          role: CLEARDDOS TECHNOLOGY CO LIMITED administrator
          address: Flat C, 23/F, Lucky Plaza,, 315-321 Lockhart Road, Wan Chai, Hong Kong, Hongkong Hongkong 999999
          country: HK
          phone: +86 755 8453 0553
          fax-no: +86 755 8453 0553
          e-mail: abuse@clear-ddos.com
          admin-c: CTCL1-AP
          tech-c: CTCL1-AP
          nic-hdl: CTCL1-AP
          mnt-by: MAINT-CTCL-HK
          last-modified: 2013-08-06T10:03:28Z
          source: APNIC

          % This query was served by the APNIC Whois Service version 1.88.15-46 (WHOIS-UK4)

          andy@mac-pro ~ %

          Andy

          1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

          A 1 Reply Last reply Reply Quote 0
          • A
            ASIC @NogBadTheBad
            last edited by

            @NogBadTheBad said in Had my pfSense been compromised?:

            @ASIC said in Had my pfSense been compromised?:

            103.240.140.10

            Are you blocking Hong Kong ?

            Yes, I am.

            1 Reply Last reply Reply Quote 0
            • NogBadTheBadN
              NogBadTheBad
              last edited by

              Just thought I'd check as some people think Hong Kong is China ☺

              Andy

              1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

              1 Reply Last reply Reply Quote 0
              • H
                hulleyrob
                last edited by

                Its also interesting that we all saw clear DDOS technologies as passed in our logs and no-one else.

                Ive not seen any other IP addresses associated with this problem.

                1 Reply Last reply Reply Quote 0
                • jimpJ
                  jimp Rebel Alliance Developer Netgate
                  last edited by

                  I've looked through the pf source code and any place I see where PFRES_SHORT (short) reason gets set is only associated with the PF_DROP (block) action. So I'm not quite sure why it is being logged as a pass. The only difference is that when scrub is enabled, the code path that does packet normalization sets things slightly differently, so maybe that affects how the log entry is interpreted, but the packet is still dropped on that code path.

                  Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                  Need help fast? Netgate Global Support!

                  Do not Chat/PM for help!

                  1 Reply Last reply Reply Quote 1
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator
                    last edited by johnpoz

                    Is there anyway to make sure they are logged as blocked vs pass?

                    Yeah everything I was reading is short should be blocked, so not sure why they are logged as pass either.. Odd.. While I do have some hits in the counter for short via the info command.. I can not find anything in the logs on my syslog showing them... But then again those might of been before sending to syslog, and the counter has not gone up in the week since last did, still showing only 2.

                    If someone is seeing a lot of them, possible they could turn off scrub for testing to see if they are now logged blocked.

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    H 1 Reply Last reply Reply Quote 0
                    • H
                      hulleyrob @johnpoz
                      last edited by

                      @johnpoz ive not seen anymore since the day three of us all saw them.

                      B 1 Reply Last reply Reply Quote 0
                      • B
                        bchan @hulleyrob
                        last edited by

                        @hulleyrob said in Had my pfSense been compromised?:

                        @johnpoz ive not seen anymore since the day three of us all saw them.

                        I saw them on 11 & 14Oct and then not anymore.

                        H 1 Reply Last reply Reply Quote 0
                        • kiokomanK
                          kiokoman LAYER 8
                          last edited by kiokoman

                          maybe there is an explanation here @johnpoz
                          http://openbsd-archive.7691.n7.nabble.com/pf-logs-def-short-pass-in-but-should-say-block-td192809.html

                          ̿' ̿'\̵͇̿̿\з=(◕_◕)=ε/̵͇̿̿/'̿'̿ ̿
                          Please do not use chat/PM to ask for help
                          we must focus on silencing this @guest character. we must make up lies and alter the copyrights !
                          Don't forget to Upvote with the 👍 button for any post you find to be helpful.

                          johnpozJ provelsP 2 Replies Last reply Reply Quote 0
                          • H
                            hulleyrob @bchan
                            last edited by

                            @bchan was only on the 13th for me. But reading the link below from 2012 it looks like it is just a issue that it is being displayed as a pass and was actually blocked which is the best scenario for what we are seeing.

                            1 Reply Last reply Reply Quote 0
                            • johnpozJ
                              johnpoz LAYER 8 Global Moderator @kiokoman
                              last edited by

                              @kiokoman

                              That clearly seems some how related for sure, but no responses and its quite old from 2012.. But yeah good find..

                              An intelligent man is sometimes forced to be drunk to spend time with his fools
                              If you get confused: Listen to the Music Play
                              Please don't Chat/PM me for help, unless mod related
                              SG-4860 24.11 | Lab VMs 2.8, 24.11

                              1 Reply Last reply Reply Quote 0
                              • provelsP
                                provels @kiokoman
                                last edited by

                                @kiokoman Poor Leonardo. Unappreciated in his own time.

                                Peder

                                MAIN - pfSense+ 24.11-RELEASE - Adlink MXE-5401, i7, 16 GB RAM, 64 GB SSD. 500 GB HDD for SyslogNG
                                BACKUP - pfSense+ 23.01-RELEASE - Hyper-V Virtual Machine, Gen 1, 2 v-CPUs, 3 GB RAM, 8GB VHDX (Dynamic)

                                1 Reply Last reply Reply Quote 0
                                • johnpozJ johnpoz referenced this topic on
                                • First post
                                  Last post
                                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.