Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Port 0 seems to sneak by firewall logging.

    Scheduled Pinned Locked Moved Firewalling
    10 Posts 4 Posters 999 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • P
      pete.s.
      last edited by pete.s.

      I have a lot of these logs in my firewall log.
      Last rule is a rule that blocks everything on my WAN interface without logging. I made this so I could easily enable the log when troubleshooting but otherwise won't be bothered by everyone probing the firewall.

      But these still show up:
      pfsense_firewall_log_problem.png

      I tried to search for traffic to port 0 but I couldn't find much.

      Why do I see these when I block everything without logging?

      Also tried to put in a rule that would block port 0 specifically, but that is impossible.

      JKnottJ 1 Reply Last reply Reply Quote 0
      • DerelictD
        Derelict LAYER 8 Netgate
        last edited by

        Because it is an automatic rule quite high in the rule set.

        Look at /tmp/rules.debug in that case.

        Looks like the firewall just doing its job.

        Chattanooga, Tennessee, USA
        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
        Do Not Chat For Help! NO_WAN_EGRESS(TM)

        P 1 Reply Last reply Reply Quote 1
        • P
          pete.s. @Derelict
          last edited by

          @Derelict said in Port 0 seems to sneak by firewall logging.:

          Because it is an automatic rule quite high in the rule set.

          Look at /tmp/rules.debug in that case.

          Looks like the firewall just doing its job.

          Thanks, I found it. It's this one:

          block log quick inet proto { tcp, udp } from any to any port = 0 tracker 1000000115 label "Block traffic to port 0"
          

          Is this hard coded into the source code or is there someway to change these automatic rules?

          1 Reply Last reply Reply Quote 0
          • DerelictD
            Derelict LAYER 8 Netgate
            last edited by Derelict

            Not really. There isn't any reason to want to not block traffic to or from port 0.

            You can disable logging of the blocks here:

            Status > System Logs, Settings, Log packets matched from the default pass rules put in the ruleset

            But I'm not sure why you would want to.

            Chattanooga, Tennessee, USA
            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
            Do Not Chat For Help! NO_WAN_EGRESS(TM)

            P 1 Reply Last reply Reply Quote 0
            • P
              pete.s. @Derelict
              last edited by

              @Derelict said in Port 0 seems to sneak by firewall logging.:

              Not really. There isn't any reason to want to block traffic to or from port 0.

              You can disable logging of the blocks here:

              Status > System Logs, Settings, Log packets matched from the default pass rules put in the ruleset

              But I'm not sure why you would want to.

              Thanks @Derelict.

              Well, the WAN interface is probed constantly so I don't want to log that. I want to log the blocks on the other interfaces though.

              But I'll do it the other way around. I remove all logging by default block rules and put in a last rule for logging where I want to log.

              1 Reply Last reply Reply Quote 0
              • JKnottJ
                JKnott @pete.s.
                last edited by

                @pete-s

                ????

                Why are you hiding the time?

                PfSense running on Qotom mini PC
                i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                UniFi AC-Lite access point

                I haven't lost my mind. It's around here...somewhere...

                P 1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator
                  last edited by

                  @JKnott said in Port 0 seems to sneak by firewall logging.:

                  Why are you hiding the time?

                  hehehe great question - inquiring minds need to know! ;)

                  wanttoknow.jpg

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  1 Reply Last reply Reply Quote 1
                  • P
                    pete.s. @JKnott
                    last edited by

                    @JKnott said in Port 0 seems to sneak by firewall logging.:

                    @pete-s

                    ????

                    Why are you hiding the time?

                    So you wanna know why I hid the time but you haven't asked why I didn't hide the source IP and what the source IP is?

                    The plot thickens...

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator
                      last edited by johnpoz

                      Know exactly what it is ;)

                      www.arbor-observatory.com.

                      Its their netscout scanner.. Is a given you would hide your dest IP.. As to why not hide the source - because its not your, and doesn't give away any sort of info.. So makes sense to not block it.

                      What doesn't really make a lot of sense is blocking the time - unless you think we could look into their logs at that exact time and see who they were scanning ;) hehehe Which I would bet would be thousands and thousands of IP at that exact same second ;)

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      P 1 Reply Last reply Reply Quote 0
                      • P
                        pete.s. @johnpoz
                        last edited by

                        @johnpoz said in Port 0 seems to sneak by firewall logging.:

                        What doesn't really make a lot of sense is blocking the time - unless you think we could look into their logs at that exact time and see who they were scanning ;) hehehe

                        The power of The Moderator and Inquiring Minds shall not be underestimated 😎

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.