Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Open Ports on New Installation

    Scheduled Pinned Locked Moved Firewalling
    14 Posts 5 Posters 2.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B
      BrucexLing
      last edited by

      I am new to pfSense and I hope I can get some help on what is probably a very naïve question.  I have just done a fresh install of 2.3.1-RELEASE(amd64)/nanobsd(4g) and configured WAN and LAN.  Computers on the LAN can now successfully access the internet.  At this stage I thought I should do a port scan from outside my domain using MXToolbox, and this seems to be indicating that all ports are open for incoming connection attempts to my domain.  I thought that all incoming ports should be blocked by default so I am presently confused.  Any help here would be most welcomed.

      1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator
        last edited by

        Not sure what your scanning - but clearly it would be impossible for ALL Ports to be open.  Which ports showed open?  For something to be open something has to be listening, so its just plain impossible for them "all" to be open.

        Yes out of the box there are no port forwards, there are no wan firewall rules so nothing would be open.  Why don't you post up this can you did.  So for example here is my scan.

        
        GRC Port Authority Report created on UTC: 2016-07-19 at 15:21:21
        
        Results from scan of ports: 0-1055
        
            1 Ports Open
            0 Ports Closed
         1055 Ports Stealth
        ---------------------
         1056 Ports Tested
        
        NO PORTS were found to be CLOSED.
        
        The port found to be OPEN was: 443
        
        Other than what is listed above, all ports are STEALTH.
        
        TruStealth: FAILED - NOT all tested ports were STEALTH,
                           - NO unsolicited packets were received,
                           - A PING REPLY (ICMP Echo) WAS RECEIVED.
        
        

        As you can see from the attached rules and the scan results above and graphic only port open is 443, which I have open on purpose because I run openvpn on this port to get around locations that might block udp 1194, etc.

        scan.jpg
        scan.jpg_thumb

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        1 Reply Last reply Reply Quote 0
        • B
          BrucexLing
          last edited by

          Many thanks johnpoz for your feedback.  On a previous install of pfSense I did progress to creating a couple of port forwards, eg. including 3389, and these both worked as expected.  After observing what seemed to be open ports I decided to do a complete reinstall of pfSense and test for open ports before creating any Port Forwards or Rules and that is where I am now.  Default SheildsUp probing reports the following:

          ----------------------------------------------------------------------
          
          GRC Port Authority Report created on UTC: 2016-07-19 at 23:07:05
          
          Results from scan of ports: 0, 21-23, 25, 79, 80, 110, 113, 
                                      119, 135, 139, 143, 389, 443, 445, 
                                      1002, 1024-1030, 1720, 5000
          
             26 Ports Open
              0 Ports Closed
              0 Ports Stealth
          ---------------------
             26 Ports Tested
          
          ALL PORTS tested were found to be: OPEN.
          
          TruStealth: FAILED - NOT all tested ports were STEALTH,
                             - NO unsolicited packets were received,
                             - NO Ping reply (ICMP Echo) was received.
          
          ----------------------------------------------------------------------
          

          I seem to have jumped on the wrong train at the beginning of this journey.  I am sorry for my pre-newbie experience here.

          1 Reply Last reply Reply Quote 0
          • B
            BrucexLing
            last edited by

            With your prompting johnpoz I have just discovered the ShieldsUp graphic report for all ports that might shed light on my problem. (apart from me, which I think is the main problem)

            Does the mix of ports open and stealth suggest how I should progress my issue?

            Re-running the ShieldUp utility produces similar but not identical results.

            PortProbe1.jpg
            PortProbe1.jpg_thumb

            1 Reply Last reply Reply Quote 0
            • K
              kpa
              last edited by

              Does your pfSense have a public IP address on its WAN? If it's behind another NAT router the open ports are caused by this other router. Compare the reported WAN address in the Webgui against what the GRC page reports as its idea of your IP address.

              1 Reply Last reply Reply Quote 0
              • B
                BrucexLing
                last edited by

                Thank you kpa for your feedback.  My WAN address is definitely a public IP address.  It is assigned by my satellite ISP.  It is reflected in both the pfSense Webgui and the GRC record of IP.

                1 Reply Last reply Reply Quote 0
                • DerelictD
                  Derelict LAYER 8 Netgate
                  last edited by

                  That scan is certainly not of a pfSense install in the default configuration. It would return nothing (all "stealth") on all ports. It is scanning or receiving results from something upstream of you.

                  Diagnostics > Packet capture on interface WAN. Set the number of packets to 0. Start it, run a Shields up scan, and stop it.

                  You will probably not see any of those attempts hit your WAN. You certainly won't see the TCP SYNACKs that GRC is seeing leaving your WAN.

                  Chattanooga, Tennessee, USA
                  A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                  DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                  Do Not Chat For Help! NO_WAN_EGRESS(TM)

                  1 Reply Last reply Reply Quote 0
                  • PippinP
                    Pippin
                    last edited by

                    Yeah ^^^
                    Could also connect only a PC directly to satellite modem and scan again, probably the same result.

                    I gloomily came to the ironic conclusion that if you take a highly intelligent person and give them the best possible, elite education, then you will most likely wind up with an academic who is completely impervious to reality.
                    Halton Arp

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator
                      last edited by

                      That clearly is not pfsense with those ports open, its something in front of pfsense or something you have forwarded too.  Pfsense sure not going to be listening on 445, ftp and telnet…  135 and 139 etc..

                      Not sure what your scanning there Bruce but it sure and the hell is not pfsense ;)

                      Derelict suggestion right on the money - I would highly suggest you sniff and then scan.. you would see something like this if packets are actually making it to pfsense.

                      portscan.jpg
                      portscan.jpg_thumb

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      1 Reply Last reply Reply Quote 0
                      • B
                        BrucexLing
                        last edited by

                        Thanks guys for putting me straight.  I will come up to speed with interpreting packet capture soon.  In the mean time I have just swapped back to an old Billion router and run a ShieldsUp and of course got the same open port pattern as before.  There must be something going on in the satellite delivery of internet that I am yet to understand.  My WAN IP is definitely a Class C Public address.  I will follow this up with the provider.  Thanks again for your helpful words.

                        1 Reply Last reply Reply Quote 0
                        • johnpozJ
                          johnpoz LAYER 8 Global Moderator
                          last edited by

                          To be honest the ports you showing open are quite common ports than an ISP would block..  1002 for example is old MS netmeeting locator service port.  Port 1720 is also a netmeeting used port. 5000 UPnP, etc.  I could see many a isp blocking those..  And the typical server ports, 21-23 and 80,443 and 25,110,143 all email related inbound. etc. etc..

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                          1 Reply Last reply Reply Quote 0
                          • DerelictD
                            Derelict LAYER 8 Netgate
                            last edited by

                            That is just a quick scan GRC does of common ports. The other scan with the bands of blocks is more telling of some automated system.

                            I am guessing that a satellite provider does not want internet noise actually using transponder time so they are just eating inbound connections before they go up to the satellite and making them go away. Though I would probably RST them instead of SYNACK them. They might have their reasons.

                            I would also search your provider's help for inbound connections and port forwards and see what they have to say.

                            Chattanooga, Tennessee, USA
                            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                            Do Not Chat For Help! NO_WAN_EGRESS(TM)

                            1 Reply Last reply Reply Quote 0
                            • johnpozJ
                              johnpoz LAYER 8 Global Moderator
                              last edited by

                              ^ yeah that makes complete sense Derelict why send the traffic up to the sat, back down to the subscriber to just to be denied. But what is the point of giving the user a public IP if they are not going to allow unsolicated inbound traffic to them.  Why not just put them behind a nat, and let them have some sort of interface/portal to setup the forwards they need?  What system in place do they use to check if port is open before allowing the traffic to the actual user?

                              I have no experience with sat connections.  Off to do some reading ;)

                              But I for sure could understand them not wanting to send noise eating up valuable sat time/bandwidth, etc.

                              An intelligent man is sometimes forced to be drunk to spend time with his fools
                              If you get confused: Listen to the Music Play
                              Please don't Chat/PM me for help, unless mod related
                              SG-4860 24.11 | Lab VMs 2.8, 24.11

                              1 Reply Last reply Reply Quote 0
                              • B
                                BrucexLing
                                last edited by

                                My provider responded with the following explanation:

                                The effect is due to the Transparent Performance Enhancing Proxy (TPEP). If the Transport Protocol (TP) component of TPEP were to be turned off for your service, the effect would disappear. However, the performance of your service would also take a dive.

                                1 Reply Last reply Reply Quote 0
                                • First post
                                  Last post
                                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.