Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Allow access to Apple IPs?

    Scheduled Pinned Locked Moved General pfSense Questions
    9 Posts 6 Posters 3.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • V
      Velcro
      last edited by

      IOS seems to want to talk alot out…I am cool with Apple. :-*

      I am trying to allow a rule to all Apple IPs...I read somewhere I think on the pfSense forum that Apple owns the entire 17.x.x.x range.

      How would I capture this in a rule/alias?

      17.0.0.0/24?
      17.0.0.0/36?

      Is this logic sound for a rule?

      Thanks in advance...

      1 Reply Last reply Reply Quote 0
      • GrimsonG
        Grimson Banned
        last edited by

        @V3lcr0:

        17.0.0.0/36?

        Eh? Please read: https://en.wikipedia.org/wiki/Cidr#IPv4_CIDR_blocks

        1 Reply Last reply Reply Quote 0
        • JKnottJ
          JKnott
          last edited by

          You want to allow unrestricted access to Apple?  Ever hear of address spoofing?  Why do you need to even allow them access?  Are they going to be logging into your systems to do what?

          PfSense running on Qotom mini PC
          i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
          UniFi AC-Lite access point

          I haven't lost my mind. It's around here...somewhere...

          1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator
            last edited by

            Apple owns the whole 17/8

            NetRange:      17.0.0.0 - 17.255.255.255
            CIDR:          17.0.0.0/8
            NetName:        APPLE-WWNET
            NetHandle:      NET-17-0-0-0-1
            Parent:          ()
            NetType:        Direct Assignment
            OriginAS:     
            Organization:  Apple Inc. (APPLEC-1-Z)

            Are you blocking outbound access currently?  Out of the box the lan rule is any any.. Where did you come up with /36 that is not a valid IPv4 mask…  /32 is the smallest mask and would be all 32 bits of the address.. Ie host specific..

            But sure you can put your netblocks in an alias and then use that to either block or pass traffic to all networks in the alias.

            You do understand if your device is talking to apple, the return traffic would be allowed by the state.  Why would apple create unsolicited traffic to you that you would want to allow?

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            1 Reply Last reply Reply Quote 0
            • V
              Velcro
              last edited by

              Thanks…/32 being the smallest is clear.

              Grimson - thanks for the link....I have better understanding. Good info but need to read it a few more times to get my head around it! Really appreciate the resource!

              JKnott - I think the address spoofing concern is making me rethink my rule. I am still cool with Apple but not that cool as to trust all their IPs(My thoughts were a broader whitelist approach with out typing individual IP's), especially with the "spoofing" risk. No I don't plan to have them log into my system, nor want them to log into my system (except for auto updates of my software).

              Johnpoz - I am allowing access out on my LAN on port 80 and 443(I tightened the any/any default rule). I get a lot of noise on my log from 17.x.x.x traffic however it appears to be mostly port 123. I found a lot of these 17.x.x.x addresses were in Asia, but changed my "Timeservers" in System -> General to my local pool...following a link you had shared prior(http://www.pool.ntp.org/en/).

              Still not sure why I need to allow port 123 or ICMP on my network today to anyone....everything is working fine. Why allow when I don't need to?

              Where I was going with this is originally was other ports going to 17.x.x.x IP's:

              I found this traffic to 17.x.x.x that I am unclear off.

              When I "google" something from my Safari on an iPad, access is allowed to:
              17.253.25.205:443(Destination) TCP:SEC - This was allowed

              and denied to:
              17.249.72.246:5224(Destination) TCP:S  -This was blocked

              When I "Bing" something:
              All 17.x.x.x:443 or 5224(Destination)                    Nothing is allowed? In fact I don't see logs for these ports.

              I do see logs for these ports, when "Bing"ing
              17.173.254.223:16386(Destination) UDP -This was blocked
              17.173.254.222:16385(Destination)         UDP -This was blocked

              My original thought was to create a rule with a "Destination" that allows 17.0.0.0/8(I think that is how I would have written it?) but I am now thinking this is not needed. Why share with Apple? Everything still works...

              But why does Apple get traffic with my searches with Google(on port 443) and Bing(on any port) doesn't?

              Any thoughts appreciated,
              V

              (FYI with Duckduckgo I get similar blocks as I do with "Bing" on 17.x.x.x. IPs....)

              1 Reply Last reply Reply Quote 0
              • NogBadTheBadN
                NogBadTheBad
                last edited by

                IMO it’s pointless trying to do this as Apple will use CDN servers that don’t use Apple IP address space.

                Andy

                1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                1 Reply Last reply Reply Quote 0
                • JKnottJ
                  JKnott
                  last edited by

                  My original thought was to create a rule with a "Destination" that allows 17.0.0.0/8(I think that is how I would have written it?) but I am now thinking this is not needed. Why share with Apple? Everything still works…

                  Normal firewall operation allows all outgoing connections, so you'll be able to reach Apple without allowing 17.0.0.0 /8 in.

                  PfSense running on Qotom mini PC
                  i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                  UniFi AC-Lite access point

                  I haven't lost my mind. It's around here...somewhere...

                  1 Reply Last reply Reply Quote 0
                  • bingo600B
                    bingo600
                    last edited by

                    @NogBadTheBad:

                    IMO it’s pointless trying to do this as Apple will use CDN servers that don’t use Apple IP address space.

                    +1

                    It's a "moving target"

                    /Bingo

                    If you find my answer useful - Please give the post a 👍 - "thumbs up"

                    pfSense+ 23.05.1 (ZFS)

                    QOTOM-Q355G4 Quad Lan.
                    CPU  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                    LAN  : 4 x Intel 211, Disk  : 240G SAMSUNG MZ7L3240HCHQ SSD

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator
                      last edited by

                      Port 5224 is Plesk license updates (outgoing connections only).. Do you run that on your network?  Also listed as HP vm console port, etc.

                      udp 123 would be anything setting time.. A lot of apple devices will point to apple for time hard coded.. Many things could have ntp coded… My freaking smart lightbulds like to got to uk.pool.ntp.org etc.. Even when I hand out local ntp server via dhcp.. They don't care they are hard coded - and Im in the US.. So I juts redirect that fqdn to my local ntp server IP via host override.  As to icmp - again many things might ping something out on the net to see if they have internet access..

                      In your home network seems pointless to not allow outbound for devices you trust to run on your network.  If your curious or paranoid then log it and look into what the traffic is..  I log all my iot devices outbound access.. They normally do dns queries to hard coded 8.8.8.8 for example, they phone home to amazon CDN on https, etc.  If I saw them sending traffic to china might be a bit perplexed and look into that for sure.

                      Your 16385-6 is Apple FaceTime, Apple Game Center (RTP/RTCP)

                      Trying to block ports is going to turn into a wack a mole game.. Oh shit this doesn't work, open that.. Oh shit that doesn't work open this.. Oh why do my iot devices not work on the schedule I set - well shit I was blocking them from setting time, etc. etc.

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      1 Reply Last reply Reply Quote 0
                      • First post
                        Last post
                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.