Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Had my pfSense been compromised?

    Firewalling
    11
    79
    13.7k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • jimpJ
      jimp Rebel Alliance Developer Netgate
      last edited by

      I can't remember the last time I saw one marked short. It might be a fragment.

      Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

      Need help fast? Netgate Global Support!

      Do not Chat/PM for help!

      1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator
        last edited by

        But the question is why is marked pass?

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.7.2, 24.11

        1 Reply Last reply Reply Quote 0
        • jimpJ
          jimp Rebel Alliance Developer Netgate
          last edited by

          If it's a fragment that is part of an existing connection, it would be passed. It might be that the state recently expired or was purged for some other reason so it was passed in but NAT didn't get applied, for example.

          Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

          Need help fast? Netgate Global Support!

          Do not Chat/PM for help!

          A 1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator
            last edited by johnpoz

            I doubt its frag, since that is a different counter - see my output from
            pfctl -s info

            above.

            From the logs he lists I doubt its part of an existing connection.. From everything I find short should be dropped, so why is it logged as if it passed?

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.7.2, 24.11

            1 Reply Last reply Reply Quote 0
            • jimpJ
              jimp Rebel Alliance Developer Netgate
              last edited by

              I'm not sure, unless it's being misinterpreted by filterlog.

              If you can reproduce it reliably, you could capture the pflog output directly and pipe it through tcpdump (as described on https://www.openbsd.org/faq/pf/logging.html ) and see if that agrees.

              Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

              Need help fast? Netgate Global Support!

              Do not Chat/PM for help!

              1 Reply Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator
                last edited by

                I can not tried to reporduce it, but you could prob for sure feed short packets via packet creation tool to try and duplicated the problem.

                But seems a few users are seeing a bunch of them - as you can see from my counters I have only ever seen 2 of them... But don't recall ever seeming in the the log as pass.. will keep an eye if that counter goes up and see what my log says since feeding all logs to syslog now for retention.. But if get a chance will try and duplicate a short to pfsense and see if can try and see what it logs.

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                1 Reply Last reply Reply Quote 0
                • A
                  ASIC @jimp
                  last edited by

                  @jimp I have PfBlockerNG installed, and GeoIP Asia IP list, which includes 103.240.140.10, and it is applied as denied outbound connections on LAN, so there cannot be any existing connection to that IP.Clipboard01.jpg

                  1 Reply Last reply Reply Quote 0
                  • NogBadTheBadN
                    NogBadTheBad
                    last edited by

                    @ASIC said in Had my pfSense been compromised?:

                    103.240.140.10

                    Are you blocking Hong Kong ?

                    andy@mac-pro ~ % whois 103.240.140.10
                    % IANA WHOIS server
                    % for more information on IANA, visit http://www.iana.org
                    % This query returned 1 object

                    refer: whois.apnic.net

                    inetnum: 103.0.0.0 - 103.255.255.255
                    organisation: APNIC
                    status: ALLOCATED

                    whois: whois.apnic.net

                    changed: 2011-02
                    source: IANA

                    whois.apnic.net

                    % [whois.apnic.net]
                    % Whois data copyright terms http://www.apnic.net/db/dbcopyright.html

                    % Information related to '103.240.140.1 - 103.240.142.255'

                    % Abuse contact for '103.240.140.1 - 103.240.142.255' is 'abuse@clear-ddos.com'

                    inetnum: 103.240.140.1 - 103.240.142.255
                    netname: CTCL-HK
                    descr: ClearDDoS Technologies
                    country: HK
                    admin-c: CTCL1-AP
                    tech-c: CTCL1-AP
                    status: ASSIGNED NON-PORTABLE
                    mnt-by: MAINT-CTCL-HK
                    mnt-irt: IRT-CTCL-HK
                    last-modified: 2014-09-28T08:41:28Z
                    source: APNIC

                    irt: IRT-CTCL-HK
                    address: Flat C, 23/F, Lucky Plaza,, 315-321 Lockhart Road, Wan Chai, Hong Kong, Hongkong Hongkong 999999
                    e-mail: abuse@clear-ddos.com
                    abuse-mailbox: abuse@clear-ddos.com
                    admin-c: CTCL1-AP
                    tech-c: CTCL1-AP
                    auth: # Filtered
                    mnt-by: MAINT-CTCL-HK
                    last-modified: 2013-08-06T10:03:29Z
                    source: APNIC

                    role: CLEARDDOS TECHNOLOGY CO LIMITED administrator
                    address: Flat C, 23/F, Lucky Plaza,, 315-321 Lockhart Road, Wan Chai, Hong Kong, Hongkong Hongkong 999999
                    country: HK
                    phone: +86 755 8453 0553
                    fax-no: +86 755 8453 0553
                    e-mail: abuse@clear-ddos.com
                    admin-c: CTCL1-AP
                    tech-c: CTCL1-AP
                    nic-hdl: CTCL1-AP
                    mnt-by: MAINT-CTCL-HK
                    last-modified: 2013-08-06T10:03:28Z
                    source: APNIC

                    % This query was served by the APNIC Whois Service version 1.88.15-46 (WHOIS-UK4)

                    andy@mac-pro ~ %

                    Andy

                    1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                    A 1 Reply Last reply Reply Quote 0
                    • A
                      ASIC @NogBadTheBad
                      last edited by

                      @NogBadTheBad said in Had my pfSense been compromised?:

                      @ASIC said in Had my pfSense been compromised?:

                      103.240.140.10

                      Are you blocking Hong Kong ?

                      Yes, I am.

                      1 Reply Last reply Reply Quote 0
                      • NogBadTheBadN
                        NogBadTheBad
                        last edited by

                        Just thought I'd check as some people think Hong Kong is China ☺

                        Andy

                        1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                        1 Reply Last reply Reply Quote 0
                        • H
                          hulleyrob
                          last edited by

                          Its also interesting that we all saw clear DDOS technologies as passed in our logs and no-one else.

                          Ive not seen any other IP addresses associated with this problem.

                          1 Reply Last reply Reply Quote 0
                          • jimpJ
                            jimp Rebel Alliance Developer Netgate
                            last edited by

                            I've looked through the pf source code and any place I see where PFRES_SHORT (short) reason gets set is only associated with the PF_DROP (block) action. So I'm not quite sure why it is being logged as a pass. The only difference is that when scrub is enabled, the code path that does packet normalization sets things slightly differently, so maybe that affects how the log entry is interpreted, but the packet is still dropped on that code path.

                            Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                            Need help fast? Netgate Global Support!

                            Do not Chat/PM for help!

                            1 Reply Last reply Reply Quote 1
                            • johnpozJ
                              johnpoz LAYER 8 Global Moderator
                              last edited by johnpoz

                              Is there anyway to make sure they are logged as blocked vs pass?

                              Yeah everything I was reading is short should be blocked, so not sure why they are logged as pass either.. Odd.. While I do have some hits in the counter for short via the info command.. I can not find anything in the logs on my syslog showing them... But then again those might of been before sending to syslog, and the counter has not gone up in the week since last did, still showing only 2.

                              If someone is seeing a lot of them, possible they could turn off scrub for testing to see if they are now logged blocked.

                              An intelligent man is sometimes forced to be drunk to spend time with his fools
                              If you get confused: Listen to the Music Play
                              Please don't Chat/PM me for help, unless mod related
                              SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                              H 1 Reply Last reply Reply Quote 0
                              • H
                                hulleyrob @johnpoz
                                last edited by

                                @johnpoz ive not seen anymore since the day three of us all saw them.

                                B 1 Reply Last reply Reply Quote 0
                                • B
                                  bchan @hulleyrob
                                  last edited by

                                  @hulleyrob said in Had my pfSense been compromised?:

                                  @johnpoz ive not seen anymore since the day three of us all saw them.

                                  I saw them on 11 & 14Oct and then not anymore.

                                  H 1 Reply Last reply Reply Quote 0
                                  • kiokomanK
                                    kiokoman LAYER 8
                                    last edited by kiokoman

                                    maybe there is an explanation here @johnpoz
                                    http://openbsd-archive.7691.n7.nabble.com/pf-logs-def-short-pass-in-but-should-say-block-td192809.html

                                    ̿' ̿'\̵͇̿̿\з=(◕_◕)=ε/̵͇̿̿/'̿'̿ ̿
                                    Please do not use chat/PM to ask for help
                                    we must focus on silencing this @guest character. we must make up lies and alter the copyrights !
                                    Don't forget to Upvote with the 👍 button for any post you find to be helpful.

                                    johnpozJ provelsP 2 Replies Last reply Reply Quote 0
                                    • H
                                      hulleyrob @bchan
                                      last edited by

                                      @bchan was only on the 13th for me. But reading the link below from 2012 it looks like it is just a issue that it is being displayed as a pass and was actually blocked which is the best scenario for what we are seeing.

                                      1 Reply Last reply Reply Quote 0
                                      • johnpozJ
                                        johnpoz LAYER 8 Global Moderator @kiokoman
                                        last edited by

                                        @kiokoman

                                        That clearly seems some how related for sure, but no responses and its quite old from 2012.. But yeah good find..

                                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                                        If you get confused: Listen to the Music Play
                                        Please don't Chat/PM me for help, unless mod related
                                        SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                                        1 Reply Last reply Reply Quote 0
                                        • provelsP
                                          provels @kiokoman
                                          last edited by

                                          @kiokoman Poor Leonardo. Unappreciated in his own time.

                                          Peder

                                          MAIN - pfSense+ 24.11-RELEASE - Adlink MXE-5401, i7, 16 GB RAM, 64 GB SSD. 500 GB HDD for SyslogNG
                                          BACKUP - pfSense+ 23.01-RELEASE - Hyper-V Virtual Machine, Gen 1, 2 v-CPUs, 3 GB RAM, 8GB VHDX (Dynamic)

                                          1 Reply Last reply Reply Quote 0
                                          • johnpozJ johnpoz referenced this topic on
                                          • First post
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.