Navigation

    Netgate Discussion Forum
    • Register
    • Login
    • Search
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search

    RFC1918 "attacking" me

    Firewalling
    2
    7
    193
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • Bob.Dig
      Bob.Dig last edited by Bob.Dig

      Hi guys, something that is making me nervous since I switched my ISP are these connections.

      Capture11.PNG

      My pfSense is running behind another router, so I couldn't use the "Block private networks"-option in interfaces. I recreated this kind of block with floating rules.

      On my WAN-port of my "first" router, I have a public IPv4. This router is only doing the internet connection and telephony and, other then pfSense, there are no devices connected to it.

      Who is able to make those connections shown in the log in the first place?

      I am particularly nervous because for example in my email-server, I can define trusted IP-ranges, which don't have to authenticate as thorough as others, and I defined that range broader. But if I hadn't recreated this RFC1918-block rule, I could face a problem with that.

      Shouldn't the ISP block such traffic in the first place or are they behind it...

      Edit: Now that I am looking closer at my own post, I even can see 192.168.1.8, which would be from my current LAN, but there is no host with that IP on it... really disturbing.

      Gertjan 1 Reply Last reply Reply Quote 0
      • Gertjan
        Gertjan @Bob.Dig last edited by

        @bob-dig

        What/who is, for example, 172.25.0.2 ? A local LAN ?
        Also 192.168.1.0/24.

        @bob-dig said in RFC1918 "attacking" me:

        I even can see 192.168.1.8, which would be my current LAN, but there is no host with that IP on it

        So this is LAN to LAN traffic blocked by a floating rule ? Can we see the rule ?

        You can see what this rule "1606064315" really is. Look at /tmp/rules.debug

        True, a 192.168.1.8 that doesn't exist, in relation to an interface called AA_WAN1_DSL_DTAG ... I don't get it.

        I don't think it is related to your new ISP or upstream router. What is the pfSense WAN network ? An RFC1918, right ?

        Just a wild shot :
        Do you have pfBlokcerNG installed ? What is the Virtual IP Address ? What is the Web Server Interface ?

        @bob-dig said in RFC1918 "attacking" me:

        my email-server, I can define trusted IP-ranges, which don't have to authenticate as

        Don't bother. Everybody authenticates. Especially those you think you know.

        Bob.Dig 1 Reply Last reply Reply Quote 0
        • Bob.Dig
          Bob.Dig @Gertjan last edited by Bob.Dig

          @gertjan pfblocker is using 10.10.10.1.
          Even looking at the ARP Table, there is no 192.168.1.8 on my LAN (192.168.1.0/24). 172.25.0.2 is pfSense behind the first router (172.25.0.1).

          Here is this rule:

          Screenshot_2021-02-02 pfSense localdomain - Firewall Rules Floating Edit.png

          The other WAN shown there is turned off by its connecting device (Bridge) and would use 192.168.178.0/24 if it would be on.

          Gertjan 1 Reply Last reply Reply Quote 0
          • Gertjan
            Gertjan @Bob.Dig last edited by

            @bob-dig said in RFC1918 "attacking" me:

            pfblocker is using 10.10.10.1.

            ..... What is the (pfBlokcerNG) Web Server Interface ?

            Humm.
            I'll join you.
            This is something between strange and scary.

            Bob.Dig 1 Reply Last reply Reply Quote 0
            • Bob.Dig
              Bob.Dig @Gertjan last edited by Bob.Dig

              @gertjan Placeholder IP Address is 127.1.7.7. Couldn't find any other IP-address.
              I mean there were others scanning our public IP before, eBay did.

              But if my ISP is doing it like this, there would be a very thin line between securing their network and eventually spying or fulfilling court orders. This ISP (Deutsche Telekom) is the formally run by the german state ISP, which still runs all their stuff for all the agency's etc and is also germanys biggest ISP I guess.

              1 Reply Last reply Reply Quote 0
              • Bob.Dig
                Bob.Dig last edited by Bob.Dig

                So it looks like my ISP is scanning some ports on a regular basis.

                But especially the IP looking for port 5555 is looking ugly to me.

                I made a dump of another connection attempt from 10.11.128.106 later this day, if you are interested @Gertjan .

                Gertjan 1 Reply Last reply Reply Quote 0
                • Gertjan
                  Gertjan @Bob.Dig last edited by

                  @bob-dig : what about blocking everything, no logging.
                  This is the default after all.
                  If 'they' want to test the firewall, see it as a service. Let's say : you pay for it ^^

                  1 Reply Last reply Reply Quote 0
                  • First post
                    Last post

                  Products

                  • Platform Overview
                  • TNSR
                  • pfSense Plus
                  • Appliances

                  Services

                  • Training
                  • Professional Services

                  Support

                  • Subscription Plans
                  • Contact Support
                  • Product Lifecycle
                  • Documentation

                  News

                  • Media Coverage
                  • Press
                  • Events

                  Resources

                  • Blog
                  • FAQ
                  • Find a Partner
                  • Resource Library
                  • Security Information

                  Company

                  • About Us
                  • Careers
                  • Partners
                  • Contact Us
                  • Legal
                  Our Mission

                  We provide leading-edge network security at a fair price - regardless of organizational size or network sophistication. We believe that an open-source security model offers disruptive pricing along with the agility required to quickly address emerging threats.

                  Subscribe to our Newsletter

                  Product information, software announcements, and special offers. See our newsletter archive to sign up for future newsletters and to read past announcements.

                  © 2021 Rubicon Communications, LLC | Privacy Policy