Block private networks - something from cable-modem is blocked, but what is it?
-
Yes its possible to see rfc1918 inside your ISP network.. Not really good setup - but sure your ISP can do that..
Something clearly talked to it.. Or it wouldn't send back syn,ack
Its odd that your not seeing any syn in the capture..
Even when you only capture 1 IP you would see it the SYN, sent to that IP..
I guess its possible you missed the syn on the first part of the sniff. But the other times in the sniff are minutes latter 2528 and 3329 seconds.. And are to different source ports. 2901 is first conv, then 6129 and then 6911.. You should be seeing the syn in those sniffs. Unless they didn't flow through your wan.. I would validate that is actually your cable modem.. You should be able to access its status page of yours and look to what the mac is..
Here see where I send syn, and it sends back syn.ack.. I shows from 100.2 since I have a vip on my wan for talking to the cable modem specifically.
-
@johnpoz said in Block private networks - something from cable-modem is blocked, but what is it?:
I would validate that is actually your cable modem.. You should be able to access its status page of yours and look to what the mac is..
According to my modems gui, all the MACs start with 54.
But what you say is way above what I can cope with knowledge wise.
I also found that in the modem log:
Wed Nov 04 10:17:46 2020 Critical (3) SYNC Timing Synchronization failure - Loss of Sync;CM-MAC=54:67:51:3a:30:64;CMTS-MAC=00:01:5c:a4:ca:58;CM-QOS=1.1;CM-VER=3.0; Wed Nov 04 13:10:42 2020 Critical (3) SYNC Timing Synchronization failure - Failed to acquire QAM/QPSK symbol timing;;CM-MAC=54:67:51:3a:30:64;CMTS-MAC=00:01:5c:a4:ca:58;CM-QOS=1.1;CM-VER=3.0; Wed Nov 04 13:10:42 2020 Warning (5) MDD message timeout;CM-MAC=54:67:51:3a:30:64;CMTS-MAC=00:01:5c:a4:ca:58;CM-QOS=1.1;CM-VER=3.0; Wed Nov 04 13:10:49 2020 Critical (3) SYNC Timing Synchronization failure - Failed to acquire QAM/QPSK symbol timing;;CM-MAC=54:67:51:3a:30:64;CMTS-MAC=00:01:5c:a4:ca:58;CM-QOS=1.1;CM-VER=3.0; Wed Nov 04 13:10:49 2020 Warning (5) MDD message timeout;CM-MAC=54:67:51:3a:30:64;CMTS-MAC=00:01:5c:a4:ca:58;CM-QOS=1.1;CM-VER=3.0; Wed Nov 04 13:13:36 2020 Critical (3) SYNC Timing Synchronization failure - Failed to acquire QAM/QPSK symbol timing;;CM-MAC=54:67:51:3a:30:64;CMTS-MAC=00:01:5c:a4:ca:58;CM-QOS=1.1;CM-VER=3.0; Wed Nov 04 13:13:36 2020 Critical (3) Received Response to Broadcast Maintenance Request, But no Unicast Maintenance opportunities received - T4 time out;CM-MAC=54:67:51:3a:30:64;CMTS-MAC=00:01:5c:a4:ca:58;CM-QOS=1.1;CM-VER=3.0; Wed Nov 04 13:14:03 2020 Critical (3) SYNC Timing Synchronization failure - Failed to acquire QAM/QPSK symbol timing;;CM-MAC=54:67:51:3a:30:64;CMTS-MAC=00:01:5c:a4:ca:58;CM-QOS=1.1;CM-VER=3.0; Wed Nov 04 13:14:03 2020 Critical (3) Received Response to Broadcast Maintenance Request, But no Unicast Maintenance opportunities received - T4 time out;CM-MAC=54:67:51:3a:30:64;CMTS-MAC=00:01:5c:a4:ca:58;CM-QOS=1.1;CM-VER=3.0; Wed Nov 04 13:14:31 2020 Critical (3) SYNC Timing Synchronization failure - Failed to acquire QAM/QPSK symbol timing;;CM-MAC=54:67:51:3a:30:64;CMTS-MAC=00:01:5c:a4:ca:58;CM-QOS=1.1;CM-VER=3.0; Wed Nov 04 13:14:31 2020 Critical (3) Received Response to Broadcast Maintenance Request, But no Unicast Maintenance opportunities received - T4 time out;CM-MAC=54:67:51:3a:30:64;CMTS-MAC=00:01:5c:a4:ca:58;CM-QOS=1.1;CM-VER=3.0; Wed Nov 04 13:14:39 2020 Critical (3) SYNC Timing Synchronization failure - Failed to acquire QAM/QPSK symbol timing;;CM-MAC=54:67:51:3a:30:64;CMTS-MAC=00:01:5c:a4:ca:58;CM-QOS=1.1;CM-VER=3.0; Wed Nov 04 13:14:51 2020 Critical (3) Received Response to Broadcast Maintenance Request, But no Unicast Maintenance opportunities received - T4 time out;CM-MAC=54:67:51:3a:30:64;CMTS-MAC=00:01:5c:a4:ca:58;CM-QOS=1.1;CM-VER=3.0; Wed Nov 04 13:14:51 2020 Notice (6) TLV-11 - unrecognized OID;CM-MAC=54:67:51:3a:30:64;CMTS-MAC=00:01:5c:a4:ca:58;CM-QOS=1.1;CM-VER=3.0; Wed Nov 04 13:20:17 2020 Notice (6) TLV-11 - unrecognized OID;CM-MAC=54:67:51:3a:30:64;CMTS-MAC=00:01:5c:a4:ca:58;CM-QOS=1.1;CM-VER=3.0; Wed Nov 04 13:20:17 2020 Critical (3) TLV-11 - Illegal Set operation failed;CM-MAC=54:67:51:3a:30:64;CMTS-MAC=00:01:5c:a4:ca:58;CM-QOS=1.1;CM-VER=3.0; Wed Nov 04 13:21:17 2020 Notice (6) TLV-11 - unrecognized OID;CM-MAC=54:67:51:3a:30:64;CMTS-MAC=00:01:5c:a4:ca:58;CM-QOS=1.1;CM-VER=3.0; Wed Nov 04 13:25:30 2020 Notice (6) SW Download INIT - Via NMS Wed Nov 04 13:27:24 2020 Notice (6) SW download Successful - Via NMS Time Not Established Critical (3) No Ranging Response received - T3 time-out Time Not Established Notice (6) Honoring MDD; IP provisioning mode = IPv4 Wed Nov 04 13:28:23 2020 Warning (5) DHCP WARNING - Non-critical field invalid in response ;CM-MAC=54:67:51:3a:30:64;CMTS-MAC=00:01:5c:a4:ca:58;CM-QOS=1.1;CM-VER=3.0; Wed Nov 04 13:28:23 2020 Warning (5) Missing BP Configuration Setting TLV Type: 17.8;CM-MAC=54:67:51:3a:30:64;CMTS-MAC=00:01:5c:a4:ca:58;CM-QOS=1.1;CM-VER=3.0; Wed Nov 04 13:28:23 2020 Warning (5) Missing BP Configuration Setting TLV Type: 17.9;CM-MAC=54:67:51:3a:30:64;CMTS-MAC=00:01:5c:a4:ca:58;CM-QOS=1.1;CM-VER=3.0; Wed Nov 04 13:28:25 2020 Notice (6) TLV-11 - unrecognized OID;CM-MAC=54:67:51:3a:30:64;CMTS-MAC=00:01:5c:a4:ca:58;CM-QOS=1.1;CM-VER=3.0; Thu Nov 05 04:26:03 2020 Critical (3) SYNC Timing Synchronization failure - Loss of Sync;CM-MAC=54:67:51:3a:30:64;CMTS-MAC=00:01:5c:a4:ca:58;CM-QOS=1.1;CM-VER=3.0; Thu Nov 05 04:38:49 2020 Critical (3) Started Unicast Maintenance Ranging - No Response received - T3 time-out;CM-MAC=54:67:51:3a:30:64;CMTS-MAC=00:01:5c:a4:ca:58;CM-QOS=1.1;CM-VER=3.0; Thu Nov 05 14:17:48 2020 Critical (3) SYNC Timing Synchronization failure - Loss of Sync;CM-MAC=54:67:51:3a:30:64;CMTS-MAC=00:01:5c:a4:ca:58;CM-QOS=1.1;CM-VER=3.0;
-
@Bob-Dig said in Block private networks - something from cable-modem is blocked, but what is it?:
CMTS-MAC=00:01:5c:a4:ca:58
And then there is this in the log..
CM-MAC=54:67:51:3a:30
Ok I have set this blocked on mine, and setup logging of it - lets see if see any odd traffic in mine... I didn't have blocking on before.. I don't see the need too.. If a stray rfc1918 hits one of my port forwards - who cares.. It could only be someone on my local ISP network ;) Its not best practice sure - but don't like seeing it in my rule listing ;)
The only thing open to public that is not locked down to specific source IPs in my ntp server..
edit: This sort of noise is why I had it turned off ;)
-
@johnpoz said in Block private networks - something from cable-modem is blocked, but what is it?:
rfc1918
There is another thread ongoing right now that discusses an Apple product (a HDTV ?) using typical 192.168.a.b IP's while this IP/network doesn't even exist locally.
Like if some HDTV process uses hard coded local IP's ... and your modem is answering back ?
(ok, this is a wild shot ) -
But why wouldn't he see the syn?
The only curious thing I see in his sniff is why no syn? Doesn't make any sense that the CM would continue to try an answer something from long time ago.. It should just stop after a few retries after it sees a syn.. And doesn't get an answer back from its syn,ack..
And he is not in promiscuous mode - so its not like he would see stuff not sent to his specific IP and mac..
Its a strange sniff - but tell you what after a few minutes of that block being enabled (with logging) I remember why I had turned it off - just freaking noise..
-
@johnpoz said in Block private networks - something from cable-modem is blocked, but what is it?:
If a stray rfc1918 hits one of my port forwards - who cares.. It could only be someone on my local ISP network ;)
My e-mail-server has less security, if the host is local and also I am behind CG-NAT. So I think I better block it.
So I will block and see if aynthing happens.
@johnpoz said in Block private networks - something from cable-modem is blocked, but what is it?:
And your 100.65.132.65 06:bc:5d is Apple, inc.. I assume your running pfsense on an apple?
It is an used intel Fujitsu Siemens D3045-A11 GS 1 Quad Port Full Profile.
Edit: Sry, the MAC is a spoofed one (for getting a new internet-IP from my ISP). -
@Bob-Dig said in Block private networks - something from cable-modem is blocked, but what is it?:
the MAC is a spoofed one (for getting a new internet-IP from my ISP).
Yeah that normally works.. Guess it doesn't matter what vendor you use when you spoof it..
-
@johnpoz I used https://www.hellion.org.uk/cgi-bin/randmac.pl so had no clue.
-
@johnpoz said in Block private networks - something from cable-modem is blocked, but what is it?:
Yes its possible to see rfc1918 inside your ISP network.. Not really good setup - but sure your ISP can do that..
There's no technical reason why not, so long as they don't let it escape. I have seen the 10.x.x.x block used in the past with my ISP, though not lately. Also, one of the reasons Comcast was moving to IPv6 is they were running out of rfc1918 addresses to use for internal networks and management. One advantage is it makes it harder for someone to attach their network. It also conserves public addresses for customers to use.
-
Yeah "technically" you can do it - doesn't mean its "good" idea ;)
If you don't have enough IPv4 for your ROUTING devices, that route traffic to and from the public internet - you prob shouldn't be in the ISP business ;) hehehee
-
An ISP has more than just routing to worry about. I have a cable modem, which has an address, I used to have a separate telephone terminal and 3 TV boxes. They were all, at least initially, using IPv4, so that's 5 separate device addresses, before even getting to my own public address. I doubt I was the only customer with only 1 device. As of last week, I have a new IPTV system, where the phone and Internet are in one box and the 3 TVs are on my network behind pfsense, but now everything uses IPv6.
-
They can give your TV an rfc1918 IPv4 address.. or a CGnat address. Not talking about the other shit devices on their network or their customers devices. I'm talking about their routers inline with routing traffic from their customers to the public internet..
If they are so tight on public IPv4 space.. Saving the small amount of IPv4 while they give their customer a public seems pointless.
I could see if your on CGnat already - then sure as you route through the isp network, all of those IPs might be non public.. But nothing sucks more than seeing public, and then rfc1918, then public again when tracing trying to figure out what is going on ;)
Technically you can do it sure - but not good idea.. Could see it as a idea to make a few bucks I guess.. Some guy said hey we can stop using this /X public space we are using on our internal routers and sell those IPs to the customer at $X an ip per month ;) Hope he got a good bonus for doing that ;)
-
@Bob-Dig: do you have either Snort or Suricata installed on your box with an instance configured on your WAN interface? If so, the default setup of both of those packages will enable promiscuous mode on the NIC.
Still, the traffic is curious if the other non-RFC1918 address is your assigned WAN IP.
-
@johnpoz said in Block private networks - something from cable-modem is blocked, but what is it?:
They can give your TV an rfc1918 IPv4 address.. or a CGnat address.
I don't know what addresses they used on the cable side of those devices, as it wasn't visible to me. However, the TVs all have a GUA IPv6 address within my prefix. I don't recall them ever using NAT for customers on the cable network, though it was used on the cell network. These days, they use 464XLAT to provide IPv4 on an IPv6 only network. My ISP is one that has provided IPv6 for years, initially with 6to4 and 6rd tunnels, but about 5 years native.
-
@bmeeks said in Block private networks - something from cable-modem is blocked, but what is it?:
@Bob-Dig: do you have either Snort or Suricata installed on your box with an instance configured on your WAN interface?
Have Suricata installed but not running on WAN.
-
My comment about rfc1918 in the trace was to his comment that his friend with a public IPv4 address not cgnat address seeing rfc1918 in traceroute.
While yes you can see that - it not all that common.. Other than maybe in small ma and pop type isps in my opinion.. Worked for major ISP/MSP for 10+ years.. All public facing devices have public IPs on them.. We use rfc1918 internally..
Customers would notice I would think if when tracing to stuff we host in the DC for them from the public if when they enter the DC they saw rfc1918 before their IP ;)
-
my ISP to google.de
1 * * * 2 172.17.128.30 (172.17.128.30) 7.073 ms 9.381 ms 5.628 ms 3 192.168.230.64 (192.168.230.64) 7.865 ms 10.381 ms 8.171 ms 4 172.17.77.44 (172.17.77.44) 7.353 ms 9.464 ms 7.554 ms 5 cable-62-117-4-10.cust.telecolumbus.net (62.117.4.10) 8.846 ms 15.413 ms 9.344 ms 6 google.bcix.de (193.178.185.100) 22.072 ms 30.275 ms 23.219 ms 7 108.170.241.173 (108.170.241.173) 25.980 ms 108.170.241.204 (108.170.241.204) 23.059 ms 108.170.241.140 (108.170.241.140) 25.443 ms 8 209.85.255.214 (209.85.255.214) 25.016 ms 209.85.254.157 (209.85.254.157) 22.981 ms * 9 108.170.234.11 (108.170.234.11) 28.215 ms 209.85.244.159 (209.85.244.159) 29.941 ms 30.650 ms 10 108.170.236.248 (108.170.236.248) 28.514 ms 24.873 ms 28.758 ms 11 108.170.251.129 (108.170.251.129) 27.836 ms 108.170.252.1 (108.170.252.1) 30.410 ms 108.170.251.129 (108.170.251.129) 29.376 ms 12 66.249.94.245 (66.249.94.245) 29.435 ms 66.249.95.169 (66.249.95.169) 29.522 ms 28.633 ms 13 zrh04s06-in-f131.1e100.net (172.217.16.131) 27.943 ms 28.008 ms 28.338 ms
my neighbors ISP to google.de
1 192.168.178.1 (192.168.178.1) 39.613 ms 2.098 ms 2.508 ms 2 192.0.0.1 (192.0.0.1) 7.509 ms 7.649 ms 8.196 ms 3 62.214.39.49 (62.214.39.49) 11.928 ms 7.572 ms 7.818 ms 4 62.214.37.158 (62.214.37.158) 13.972 ms 62.214.37.134 (62.214.37.134) 25.504 ms 62.214.37.158 (62.214.37.158) 14.496 ms 5 72.14.222.28 (72.14.222.28) 14.041 ms 15.752 ms 89.246.109.250 (89.246.109.250) 27.607 ms 6 108.170.253.68 (108.170.253.68) 15.083 ms 108.170.253.50 (108.170.253.50) 16.507 ms 108.170.253.34 (108.170.253.34) 15.434 ms 7 66.249.95.169 (66.249.95.169) 18.556 ms 108.170.226.49 (108.170.226.49) 15.644 ms 15.429 ms 8 172.253.50.100 (172.253.50.100) 19.143 ms zrh04s06-in-f131.1e100.net (172.217.16.131) 27.156 ms 172.253.50.100 (172.253.50.100) 18.900 ms
Oops, 192.0.0.1 is not RFC 1918 (192.168.178.1 is my neighbors local LAN) so I was wrong.
-
@johnpoz said in Block private networks - something from cable-modem is blocked, but what is it?:
Technically you can do it sure - but not good idea.. Could see it as a idea to make a few bucks I guess.. Some guy said hey we can stop using this /X public space we are using on our internal routers and sell those IPs to the customer at $X an ip per month ;) Hope he got a good bonus for doing that ;)
Nah...he probably got a coffee mug with the company logo on it, and if he was really lucky, a $20 gift card for Amazon or Lowes ... . But both of those would show up at the end of the year on his W2 as taxable income . The executive in marketing who took the idea and implemented it got a 6-figure annual bonus, though.
Can you tell I worked in the Fortune 500 world for too long?
-
Hehe.... Yeah that is true... One of my colleagues got an IPad as a gift at a company function.. Gift my ass it showed up on his W2 ;)
So couple years ago.. They were asking for ideas for quick influx of cash.. Talking to my boss, I said you know we are only using a small fraction of our /16 public space.. With no plans of that changing anytime soon.. So we sold off a small portion for $250K.. Well the so called benefit of any sales you do your suppose to get 10%... Well that 250K is pure bottom line profit, I ended up getting $5k.. And I had to do all the work in the movement of the IPs, etc. Guess should of just kept my mouth shut ;)
Then they wanted to sell off more.. This time I asked my boss - so will I get the full 10% this time? He was going to make sure I was taken care of - ended up getting 0... arrgghh.. Not like he got anything either... And I got a great attaboy in the company newsletter though ;) I don't blame him I sure he tried.. But yeah corp world can suck!
Worked on a recent project, completely outside my responsibilities.. Helping them ramp up a customers vpn from 500 concurrent users to 10K concurrent users start of covid.. That went online in less than 2 weeks.. So freaking lightening fast for corp world and all the change control, etc. etc.. .. I got a $100 amazon gift card for that ;) hehehe
-
@Bob-Dig said in Block private networks - something from cable-modem is blocked, but what is it?:
192.0.0.1 (192.0.0.1) 7.509 ms 7.649 ms 8.196 ms
Oh they are prob using DS-Lite with that address.. That common address when doing ds-lite for transition and use of IPv4 over a IPv6 backbone..
Here is normal where your ISP not doing any sort of nat, not using rfc1918 or cgnat, and not doing anything weird with IPv6 as their backbone with IPv6 being tunneled in it, etc.
Tracing route to google.de [172.217.8.195] over a maximum of 30 hops: 1 <1 ms <1 ms <1 ms sg4860.local.lan [192.168.9.253] 2 12 ms 10 ms 11 ms d4-50-1-135.col.wideopenwest.com [50.4.135.1] 3 14 ms 9 ms 18 ms static-76-73-191-106.knology.net [76.73.191.106]
You can see the first hop to my ISP is public ;)
With those first hop times from your neighbor - take that was one over wireless? 39 ms.. Ugghh
And my isp is nothing huge wowway has less than a million subscribers from the info I can gather.