Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Has my SG-1100 been pwned?

    General pfSense Questions
    8
    15
    1.2k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D
      DominikHoffmann
      last edited by

      Coming back home from a long-weekend trip to parts with very poor internet connectivity I discovered that I couldn’t log into my SG-1100:

      Screen Shot 2021-05-10 at 10.04.21 AM.png ![alt text](image url)

      Immediately after a power-cycle I was again unable to log in. Seven hours later, my login credentials work. My password possesses similar data entropy as this one: !d2MnYm4tptqj!E. 1Password considers that “excellent.” It would rule out a brute-force attack.

      Also, my ability to log into my Linksys Velop system (in bridge mode) is intermittent. Immediately after my return, I was unable to authenticate for connection to the WiFi network using my established password. A couple of hours ago it worked. Now it again is failing.

      What should I do. I have very limited cybersecurity experience and no forensic skills. I was going to reset the SG-1100 to factory settings and import the last known good settings file. Would I have to reinstall the firmware image from scratch, too?

      A KOMK GertjanG 3 Replies Last reply Reply Quote 0
      • A
        amarcino @DominikHoffmann
        last edited by

        @dominikhoffmann

        Have you reviewed the logs to see if there was a login while you were away?

        D 1 Reply Last reply Reply Quote 1
        • D
          DominikHoffmann @amarcino
          last edited by

          @amarcino: Well, the authentication logs show this:

          Screen Shot 2021-05-10 at 12.14.35 PM.png

          Not sure, how truly scary this is. Password-ssh is disabled.

          A 1 Reply Last reply Reply Quote 0
          • A
            amarcino @DominikHoffmann
            last edited by

            @dominikhoffmann
            Are you allowing SSH access to your device remotely (across the Wan)?

            D 1 Reply Last reply Reply Quote 0
            • D
              DominikHoffmann @amarcino
              last edited by

              @amarcino: Yes, I do. Through a password-protected private-public key pair, only.

              A VioletDragonV 2 Replies Last reply Reply Quote 0
              • A
                amarcino @DominikHoffmann
                last edited by amarcino

                @dominikhoffmann

                Well then you are going to have people/bots or whatever banging away at it.

                You could create a firewall rule to block those IP's. You will have to create a list and use that named list in the rule. It is going to get very big though.

                Have you looked any of them up?

                p.s. I have this turned off on mine, because I don't want to deal with the garbage. If I am away from home, and some fault in my network occurs, I just deal with it when I get back through console access.

                You have to weigh for yourself the balance of convenience and security. If is something you really must have, I would suggest changing the port for ssh access. That might slow them down a bit.

                provelsP 1 Reply Last reply Reply Quote 1
                • provelsP
                  provels
                  last edited by

                  FWIW - You may want to enable OpenVPN for remote management and then only enable it as needed. Any open port will get bot-scanned.

                  Peder

                  MAIN - pfSense+ 24.11-RELEASE - Adlink MXE-5401, i7, 16 GB RAM, 64 GB SSD. 500 GB HDD for SyslogNG
                  BACKUP - pfSense+ 23.01-RELEASE - Hyper-V Virtual Machine, Gen 1, 2 v-CPUs, 3 GB RAM, 8GB VHDX (Dynamic)

                  D 1 Reply Last reply Reply Quote 2
                  • D
                    DominikHoffmann @provels
                    last edited by

                    @provels, @amarcino: I am aware of that and am letting the built-in defenses take care of it.

                    At this point I am mostly interested in learning about the cause for what I saw this morning. Could it have been so overwhelming that the GUI on the LAN side was unable to authenticate because of that, rather than a maliciously changed password?

                    A 1 Reply Last reply Reply Quote 0
                    • provelsP
                      provels @amarcino
                      last edited by

                      @amarcino said in Has my SG-1100 been pwned?:

                      I would suggest changing the port for ssh access. That might slow them down a bit.

                      Again FWIW, I tried running my OpenVPN on a random high port and found I could not access it from some locations. Likely ISP blocked. That's why I switched back to 1194 (and 443).

                      Peder

                      MAIN - pfSense+ 24.11-RELEASE - Adlink MXE-5401, i7, 16 GB RAM, 64 GB SSD. 500 GB HDD for SyslogNG
                      BACKUP - pfSense+ 23.01-RELEASE - Hyper-V Virtual Machine, Gen 1, 2 v-CPUs, 3 GB RAM, 8GB VHDX (Dynamic)

                      1 Reply Last reply Reply Quote 0
                      • A
                        amarcino @DominikHoffmann
                        last edited by amarcino

                        @dominikhoffmann

                        I suppose it could.

                        Basic Port Scan info

                        1 Reply Last reply Reply Quote 2
                        • KOMK
                          KOM @DominikHoffmann
                          last edited by

                          @dominikhoffmann I very much doubt you were hacked. If you were, they're certainly the most helpful hacker group in the way they put your old password back.

                          There is more likely a benign reason for what you saw. I would never open ssh to the world. Either put it behind OpenVPN or modify your NAT rule so that it only passes traffic from a known source location, like your home or office desktop.

                          Don't worry about bots & scanners. Just let your defenses do their thing and ignore the log spam.

                          1 Reply Last reply Reply Quote 1
                          • VioletDragonV
                            VioletDragon @DominikHoffmann
                            last edited by

                            @dominikhoffmann exposing SSH to the Internet and not terminating it correctly is a no no. Change default Port and disabling Password Logins is recommended. Use Public Keys instead but I highly recommend using OpenVPN for remote management. Don't expose SSH without configuring it properly

                            P 1 Reply Last reply Reply Quote 0
                            • stephenw10S
                              stephenw10 Netgate Administrator
                              last edited by

                              Yup. Use a VPN if you have to open it to any source address.

                              1 Reply Last reply Reply Quote 0
                              • P
                                pastic @VioletDragon
                                last edited by

                                @violetdragon
                                Hi, what would "terminating it correctly" mean in this context?

                                1 Reply Last reply Reply Quote 0
                                • GertjanG
                                  Gertjan @DominikHoffmann
                                  last edited by

                                  @dominikhoffmann said in Has my SG-1100 been pwned?:

                                  I discovered that I couldn’t log into my SG-1100:

                                  In that case - do nothing - and switch over right away to the second access :
                                  That could be the SSH access (has to be setup up before) - or the console, which always works.
                                  The menu shows up ?
                                  Use option 11 - (restart the GUI part).

                                  @dominikhoffmann said in Has my SG-1100 been pwned?:

                                  Now it again is failing.

                                  Time to regain access and do what admin always do :
                                  By looking at the dashboard you'll learn nothing. The dashboard is there for the times when all is ok.
                                  Look at the - all the - logs.
                                  You should always be looking at the logs. Eventually, you'll know what messages are normal.
                                  The day things go south, you'll know what messages are new, and you know what happened.

                                  @dominikhoffmann said in Has my SG-1100 been pwned?:

                                  rather than a maliciously changed password?

                                  They would have to use the certificate to gain access, first.
                                  Just ise the classic 1234 password for GUI access.
                                  Lock down the GUI access to a trusted LAN - do not let non trusted devices access this LAN, and use a OpenVPN access if you need to do some remote admmining of pfSense. See the Youtube => Netgate => OpenVPN vdeos (even the old ones).

                                  No "help me" PM's please. Use the forum, the community will thank you.
                                  Edit : and where are the logs ??

                                  1 Reply Last reply Reply Quote 1
                                  • First post
                                    Last post
                                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.