• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

pfSense using unreasonable amount of bandwidth while idle

Scheduled Pinned Locked Moved General pfSense Questions
106 Posts 9 Posters 18.8k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • C
    CyberMinion @johnpoz
    last edited by CyberMinion Sep 16, 2020, 7:03 PM Sep 16, 2020, 7:01 PM

    @johnpoz said in pfSense using unreasonable amount of bandwidth while idle:

    well this one
    https://www.spamhaus.org/drop/asndrop.txt

    is a bunch of AS numbers - those would have to be resolved to IP ranges or CIDR blocks..

    Oh..that's interesting. It used to have the IP blocks themselves on that list. I'll remove that one. I should check through all of my lists...it has been almost two years since those were added.

    Why are you loading all these lists? You don't even have any port forwards setup? I just don't get the reason for trying to filter shit when you don't even have anything exposed?

    I don't have any ports forwarded right now although I did in the past. That is partially because I wasn't sure what was wrong on this network. If I regain confidence that nothing is vulnerable or compromised, I will probably open ports again. To be clear, I want to have open ports, but I'd prefer to make sure everything is shipshape before doing that again. It looks like this is probably a benign issue (although I still need to fix it), but I want to get it working properly first, just the same.

    1 Reply Last reply Reply Quote 0
    • J
      johnpoz LAYER 8 Global Moderator
      last edited by johnpoz Sep 16, 2020, 7:09 PM Sep 16, 2020, 7:06 PM

      Vs trying to block the planet, if you are going to open up ports - its better to just limit what can talk to your ports. Example - I have plex open for friends and family. They are all in the US.. So I only allow US Ips to talk to that.. I don't load every possible bad guy list and block them - that is just insane to try and do that..

      When I had someone outside the US, I added that country..

      Sure in a perfect setup would only allow their specific IPs.. But then again they are users - asking them for their IP is like asking a monkey to explain theory of relativity.. And many of them use phones and travel, etc.

      I would really if your not going to just nuke this thing from orbit and start over - which is what I would do.. Is turn off all this list shit..

      You use bad guy lists, when that is the smaller list. Ie you want to serve up stuff to the globe - that is when you filter bad guy lists. Since that is smaller list ;)

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.7.2, 24.11

      C 1 Reply Last reply Sep 21, 2020, 6:29 PM Reply Quote 0
      • C
        CyberMinion @johnpoz
        last edited by Sep 21, 2020, 6:29 PM

        @johnpoz said in pfSense using unreasonable amount of bandwidth while idle:

        Vs trying to block the planet, if you are going to open up ports - its better to just limit what can talk to your ports.
        You use bad guy lists, when that is the smaller list. Ie you want to serve up stuff to the globe - that is when you filter bad guy lists. Since that is smaller list ;)

        At the risk of continuing down the age-old "block the planet" vs whitelist dispute, the problem is, I plan to have incoming connections from six continents. Whitelist management is going to be a much bigger headache than some low-maintenance blacklists.

        I would really if your not going to just nuke this thing from orbit and start over - which is what I would do.. Is turn off all this list shit..

        Yeah, I'm leaning that way. I reverted this unit to a backup from December 2019. After fixing a few small things, it seems to be humming along without issues so far. It does still have the aforementioned fragments of the Suricata package, but hopefully that's irrelevant. After about 4 days, I have yet to notice these garbage DNS queries, although I may have missed some.

        1 Reply Last reply Reply Quote 0
        • J
          johnpoz LAYER 8 Global Moderator
          last edited by Sep 21, 2020, 7:47 PM

          @CyberMinion said in pfSense using unreasonable amount of bandwidth while idle:

          I have yet to notice these garbage DNS queries, although I may have missed some.

          You should have ZERO of those - there is NOTHING that should create dns queries like that.. They can not resolve - they are garbage..

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.7.2, 24.11

          1 Reply Last reply Reply Quote 0
          • C
            CyberMinion
            last edited by Oct 31, 2020, 5:00 AM

            I hate to bump this to the top, but I just wanted to let you know that I have not seen any of this bad behavior from the firewall since restoring from backup. Whatever it was, it seems to be fixed. I just wish I knew the root cause.

            Thank you for your help, everyone!

            1 Reply Last reply Reply Quote 0
            • S
              stephenw10 Netgate Administrator
              last edited by Oct 31, 2020, 2:22 PM

              Mmm, weird. Thanks for following up though. Yeah it would be good to know what it was but that's probably not possible at this point.

              Steve

              1 Reply Last reply Reply Quote 0
              • First post
                Last post
              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                [[user:consent.lead]]
                [[user:consent.not_received]]