Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Device Reboot, Not a Kernel Panic

    General pfSense Questions
    5
    18
    1.0k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B
      beachbum2021
      last edited by beachbum2021

      Is there a more detailed report for sudden unscheduled reboots on a SG-3100? I had a random reboot occur and am not getting much detail from the SysLog. I am wondering if there is a DDos attack? I am flooded with these suricata alerts. The Ip traces back to a African ISP.

      4969417b-c0fe-4fa5-bc27-9f564ffcfc4d-image.png

      1 Reply Last reply Reply Quote 0
      • kiokomanK
        kiokoman LAYER 8
        last edited by

        Source: whois.arin.net
        IP Address: 154.21.21.141
        Name: COGENT-154-21-16
        Handle: NET-154-21-0-0-1
        Registration Date: 05/02/92
        Range: 154.21.0.0-154.21.255.255
        Org: PSINet, Inc.Org Handle: PSI-2Address: 2450 N Street NW
        City: Washington
        State/Province: DC
        Postal Code: 20037
        Country: United States

        not from Africa at least, port 0, it's probably some misconfiguration on his side
        I saw it once from an IP trying to connect to my NTP server with port 0, it stopped after a few days
        anyway I don't think this is the reason for your reboot

        ̿' ̿'\̵͇̿̿\з=(◕_◕)=ε/̵͇̿̿/'̿'̿ ̿
        Please do not use chat/PM to ask for help
        we must focus on silencing this @guest character. we must make up lies and alter the copyrights !
        Don't forget to Upvote with the 👍 button for any post you find to be helpful.

        B 1 Reply Last reply Reply Quote 0
        • B
          beachbum2021 @kiokoman
          last edited by

          @kiokoman roger that, thanks for clarifying the source for me. It has finally ended. Sifting through the logs now. If I have anymore random reboots I'll check my M.2 Drive for issues.

          1 Reply Last reply Reply Quote 0
          • GertjanG
            Gertjan
            last edited by

            @beachbum2021 : suricata was analysing traffic on LAN or is it reporting traffic from WAN ?

            No "help me" PM's please. Use the forum, the community will thank you.
            Edit : and where are the logs ??

            B 1 Reply Last reply Reply Quote 0
            • B
              beachbum2021 @Gertjan
              last edited by

              @Gertjan thanks for responding, suricata only run on LAN/OPT1 which are both internal. It is also not actively blocking at this time as I fine tune the rules.

              bmeeksB 1 Reply Last reply Reply Quote 0
              • bmeeksB
                bmeeks @beachbum2021
                last edited by

                @beachbum2021 said in Device Reboot, Not a Kernel Panic:

                @Gertjan thanks for responding, suricata only run on LAN/OPT1 which are both internal. It is also not actively blocking at this time as I fine tune the rules.

                How is that 154.21.21.141 IP address being seen on your LAN interface? With most accepted WAN configurations, it should have never gotten through the WAN to show up on the LAN. In other words, most folks have a "deny all" inbound rule on the WAN. So that means nothing from the WAN gets through to any internal interface unless an internal host initiated the conversation and established a stateful connection with an external host.

                So if Suricata actually saw that traffic on your LAN, then I would be very worried unless you purposefully have a rule on your WAN allowing that traffic inbound.

                B 1 Reply Last reply Reply Quote 1
                • GertjanG
                  Gertjan
                  last edited by

                  @bmeeks : +1

                  No "help me" PM's please. Use the forum, the community will thank you.
                  Edit : and where are the logs ??

                  1 Reply Last reply Reply Quote 0
                  • B
                    beachbum2021 @bmeeks
                    last edited by

                    @bmeeks this is a good point, I will review my rules again to make sure I haven't inadvertently opened a security vulnerability. I haven't had any random reboots since the posting or suricata alerts other than spam internal traffic

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator
                      last edited by

                      Also there is a port 0 block, high up in the rules.. That you wouldn't be able to remove without considerable effort..

                      block drop quick inet proto tcp from any port = 0 to any label "Block traffic from port 0"
                      block drop quick inet proto udp from any port = 0 to any label "Block traffic from port 0"
                      block drop quick inet proto tcp from any to any port = 0 label "Block traffic to port 0"
                      block drop quick inet proto udp from any to any port = 0 label "Block traffic to port 0"
                      block drop quick inet6 proto tcp from any port = 0 to any label "Block traffic from port 0"
                      block drop quick inet6 proto udp from any port = 0 to any label "Block traffic from port 0"
                      block drop quick inet6 proto tcp from any to any port = 0 label "Block traffic to port 0"
                      block drop quick inet6 proto udp from any to any port = 0 label "Block traffic to port 0"
                      

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                      B 1 Reply Last reply Reply Quote 1
                      • B
                        beachbum2021 @johnpoz
                        last edited by

                        @johnpoz current rules
                        9c81b7d4-46a8-4597-9331-605a2c3253f0-image.png

                        1 Reply Last reply Reply Quote 0
                        • johnpozJ
                          johnpoz LAYER 8 Global Moderator
                          last edited by

                          Those are the rules pfsense shows you, there are quite a few hidden rules.

                          If you want to see the full rule set

                          pfctl -sr
                          https://docs.netgate.com/pfsense/en/latest/firewall/pf-ruleset.html

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                          B 1 Reply Last reply Reply Quote 1
                          • B
                            beachbum2021 @johnpoz
                            last edited by

                            @johnpoz i wasnt aware of this, i will open a shell and verify. TYVM

                            1 Reply Last reply Reply Quote 0
                            • johnpozJ
                              johnpoz LAYER 8 Global Moderator
                              last edited by johnpoz

                              I love the comment when you look at
                              /tmp/rules.debug

                              Above those rules ;)

                              # We use the mighty pf, we cannot be fooled.
                              

                              An intelligent man is sometimes forced to be drunk to spend time with his fools
                              If you get confused: Listen to the Music Play
                              Please don't Chat/PM me for help, unless mod related
                              SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                              B 1 Reply Last reply Reply Quote 0
                              • B
                                beachbum2021 @johnpoz
                                last edited by

                                @johnpoz unable to post in text as the site is saying it's spam but i believe these were the rules you were refering to.
                                e575ef2e-7ff5-4316-ac2a-03873ad62371-image.png

                                1 Reply Last reply Reply Quote 0
                                • bmeeksB
                                  bmeeks
                                  last edited by bmeeks

                                  I am beginning to suspect that maybe Suricata is actually on your WAN interface and not your LAN (or else it is on both). Suricata lives between the NIC and the kernel network stack, so when on the WAN it will see traffic before firewall rules have been applied.

                                  However, seeing WAN traffic with a destination of one of your internal RFC1918 IP addresses is weird.

                                  Do you, or did you, by chance have a misconfigured device on your LAN? That would explain this traffic. Because if that device had the 154.21.21.141 IP, it would have sent its traffic to the gateway (pfSense) in order to reach your internal 192.168.1.103 host. Again, on the LAN Suricata would see the traffic before the firewall rules would (for inbound traffic on that interface).

                                  1 Reply Last reply Reply Quote 0
                                  • B
                                    beachbum2021
                                    last edited by

                                    i cant speak for what may have been misconfigured at the time of posting but it's possible I had accidently enabled it at that time but at this moment it's only enabled on the LAN and OPT1 which are both internal. Is it possible that the firewall had crashed before the reboot and logged some free flowing traffic?

                                    7509ac9f-2c89-492c-8220-381b0272f52b-image.png

                                    bmeeksB 1 Reply Last reply Reply Quote 0
                                    • bmeeksB
                                      bmeeks @beachbum2021
                                      last edited by bmeeks

                                      @beachbum2021 said in Device Reboot, Not a Kernel Panic:

                                      i cant speak for what may have been misconfigured at the time of posting but it's possible I had accidently enabled it at that time but at this moment it's only enabled on the LAN and OPT1 which are both internal. Is it possible that the firewall had crashed before the reboot and logged some free flowing traffic?

                                      7509ac9f-2c89-492c-8220-381b0272f52b-image.png

                                      It's just really weird for the traffic to have that 192.168.1.103 address as the destination if the capture was directly off the NIC (which is the way Suricata would have gotten it on the WAN interface by way of libpcap). Traffic on the WAN should normally have the public IP of your firewall as the destination (for most users with NAT).

                                      B 1 Reply Last reply Reply Quote 0
                                      • B
                                        beachbum2021 @bmeeks
                                        last edited by

                                        @bmeeks im with you, i think the IP spam and the reboot are not related and there may have been a temporary misconfiguration. The M.2 drive I installed two weeks ago could have faulted and it's just a coincidences both of these anomalies occurred at the same time. I'm not sure there's much that can be done at this point unless the issue returns in the same facet.

                                        1 Reply Last reply Reply Quote 0
                                        • First post
                                          Last post
                                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.