Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    ip address silently blocked

    Scheduled Pinned Locked Moved Firewalling
    35 Posts 4 Posters 2.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • lifeboyL
      lifeboy @johnpoz
      last edited by

      @johnpoz, I'm definitely not using that address space. This is a client that used to connect to services running behind that firewalls in question.

      If I sniff that traffic on the WAN, that address doesn't show up, so the traffic is not reaching WAN port according to the sniffer.

      However (and this is the perplexing issue), if I disable the firewall, the traffic is routed / NAT'ed to the destination.

      9305e2af-0aee-4b86-92ad-a07b21680850-image.png

      How can that be?

      johnpozJ 1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator @lifeboy
        last edited by johnpoz

        @lifeboy said in ip address silently blocked:

        I'm definitely not using that address space.

        What?? Dude how do you have a client behind pfsense with a public IP..

        So that is an external IP trying to get to your resources? Your going to have to be a bit more clear on what is happening.. From your OP.. sounded like that was a client behind pfsense trying to go somewhere..

        If that is some external IP out on the internet trying to hit your pfsense IP.. And you don't see it on a sniff of your wan.. Then NO its never going to be able to get to something behind pfsense..

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        lifeboyL 1 Reply Last reply Reply Quote 0
        • lifeboyL
          lifeboy @johnpoz
          last edited by

          @johnpoz said in ip address silently blocked:

          @lifeboy said in ip address silently blocked:

          I'm definitely not using that address space.

          What?? Dude how do you have a client behind pfsense with a public IP..

          So that is an external IP trying to get to your resources? Your going to have to be a bit more clear on what is happening.. From your OP.. sounded like that was a client behind pfsense trying to go somewhere..

          Not sure why anyone would assume that a public IP is on the LAN side... but apologies for not stating that explicitely.

          If that is some external IP out on the internet trying to hit your pfsense IP.. And you don't see it on a sniff of your wan.. Then NO its never going to be able to get to something behind pfsense..

          Indeed. Let's just explore what happens with imcp packets.

          1. When I ping the gateway of the WAN network from the client's machine that cannot reach any services on the inside of our firewalled network, the response is normal.
          2. When I ping the firewall WAN address, I get no response (timeout)
          3. When I ping that same address from anywhere else (I tried quite a few networks), I get a response (I have a rule allowing icmp)
          4. There is no log entry of the failed ping, but the others (successful ones) are logged.
          5. My default deny rule logs, so I expect that failed ping to be in there if it were blocked, but it's not
          6. If I disable the firewall under https://<myfirewall>/system_advanced_firewall.php by ticking the "disable firewall" checkbox, the ping response is correct.

          So I can only conclude that some built-in check blocks that address, but I can't find which one. Which pfSense services block traffic silently?

          johnpozJ 1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator @lifeboy
            last edited by johnpoz

            @lifeboy said in ip address silently blocked:

            My default deny rule logs, so I expect that failed ping to be in there if it were blocked, but it's not

            Its not going to be there if it never gets there!

            Sniff on your wan when you do your ping test - do you see the ping get there?

            The only way it would not be in the firewall log is it never gets there, or you have something like snort or something blocking it. So the firewall never actually saw it to say block or allow.

            Other thing that could cause what your seeing is you have a rule blocking - set to not log. Do you have any rules in floating? Sniff is always best place to start - so you KNOW for sure if traffic is getting to pfsense or not. I would guess you have a floating rule blocking it set to not log. Maybe a pfblocker rule? Based on geoip or reputation or some other list your loading?

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            lifeboyL 1 Reply Last reply Reply Quote 0
            • lifeboyL
              lifeboy @johnpoz
              last edited by lifeboy

              @johnpoz I sniff the WAN port, but it's doens't get there.

              It's clear it doesn't get there. But if it gets there when I disable the firewall, then it's something the firewall does that blocks it, not so?

              I don't have snort installed.

              If it was one firewall doing this I'd suspect some rule or config, but 2 different ones makes me suspect it's something else.

              johnpozJ GertjanG 2 Replies Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator @lifeboy
                last edited by johnpoz

                @lifeboy said in ip address silently blocked:

                I sniff the WAN port, but it's doens't get there.

                Sniff has zero to do with firewall on or off.. If its not getting there, its not getting there - nothing pfsense can do - can not answer, can not forward if it doesn't see the traffic. Can not allow, can not block.

                Sniff would see the traffic before it ever gets to the firewall. The traffic is viewed via a sniff before it would be passed up the stack to the firewall. It is via the interface and what the interface sees or puts on the wire.. In front of any firewall your running on that interface.

                network -- interface - sniff -- firewall (pfsense)

                As traffic enters the interface from the network - if your sniffing you would see traffic no matter what your firewall or any application up the stack would do with the traffic. Outbound, firewall could stop the traffic from being put on the network before the sniffer would see it.. But if you see it via the sniff - then it was put on the wire outbound, etc.

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.8, 24.11

                1 Reply Last reply Reply Quote 0
                • GertjanG
                  Gertjan @lifeboy
                  last edited by Gertjan

                  @lifeboy
                  Example of what @johnpoz said above :
                  When I snif on my WAN with these settings :

                  1c601b3a-cac3-4911-bdf9-66430f8d23d1-image.png

                  = I selected WAN, IPv4 and "ICMP"

                  I have a lot of results, and it tells me that 'something' locally is pinging some one on the net.
                  The something is the dpinger process that constantly pings a remote device so it can 'mesure' my uplink (WAN) connection.
                  This is a default configuration case.
                  The remote device is a host that I choose myself : one of my own web server, hosted somewhere on the Internet.

                  15:45:35.050123 IP 198.23.119.36 > 192.168.10.3: ICMP echo request, id 21026, seq 24371, length 8
                  15:45:35.050158 IP 192.168.10.3 > 198.23.119.36: ICMP echo reply, id 21026, seq 24371, length 8
                  15:45:35.164477 IP 192.168.10.3 > 188.165.53.87: ICMP echo request, id 2264, seq 46975, length 9
                  15:45:35.187540 IP 188.165.53.87 > 192.168.10.3: ICMP echo reply, id 2264, seq 46975, length 9
                  15:45:35.666470 IP 192.168.10.3 > 188.165.53.87: ICMP echo request, id 2264, seq 46976, length 9
                  15:45:35.689982 IP 188.165.53.87 > 192.168.10.3: ICMP echo reply, id 2264, seq 46976, length 9
                  15:45:36.167471 IP 192.168.10.3 > 188.165.53.87: ICMP echo request, id 2264, seq 46977, length 9
                  15:45:36.190547 IP 188.165.53.87 > 192.168.10.3: ICMP echo reply, id 2264, seq 46977, length 9
                  15:45:36.669470 IP 192.168.10.3 > 188.165.53.87: ICMP echo request, id 2264, seq 46978, length 9
                  15:45:36.692864 IP 188.165.53.87 > 192.168.10.3: ICMP echo reply, id 2264, seq 46978, length 9
                  15:45:37.170470 IP 192.168.10.3 > 188.165.53.87: ICMP echo request, id 2264, seq 46979, length 9
                  15:45:37.193307 IP 188.165.53.87 > 192.168.10.3: ICMP echo reply, id 2264, seq 46979, length 9
                  15:45:37.437407 IP 169.45.119.36 > 192.168.10.3: ICMP echo request, id 2101, seq 48249, length 8
                  15:45:37.437426 IP 192.168.10.3 > 169.45.119.36: ICMP echo reply, id 2101, seq 48249, length 8
                  15:45:37.672470 IP 192.168.10.3 > 188.165.53.87: ICMP echo request, id 2264, seq 46980, length 9
                  15:45:37.694874 IP 188.165.53.87 > 192.168.10.3: ICMP echo reply, id 2264, seq 46980, length 9
                  

                  198.23.119.36 = 24.77.17c6.ip4.static.sl-reverse.com : dono who that is, but he pinged 'me', and 'I' replied. He pings me a lot .....

                  "192.168.10.3" (192.168.10.1) is my upstream ISP router. 192.168.10.3 is my pfSense WAN IP, it's an RFC1918.

                  My ISP routes all traffic, everything, to 192.168.1.3, my pfSense WAN IP.

                  188.165.53.87 is the IP my dpinger process "WAN checker" is using as the gateway check device.

                  When I start to ping to my WAN IP from some remote location (a remote dedicated server) using 188.165.201.123, I see :

                  15:50:15.500120 IP 188.165.201.123 > 192.168.10.3: ICMP echo request, id 28246, seq 11, length 64
                  15:50:15.500132 IP 192.168.10.3 > 188.165.201.123: ICMP echo reply, id 28246, seq 11, length 64
                  

                  I understand that you don't care about all this ping stuff. I'm just showing what I send on one side, and receive on the other side.

                  So :
                  Do you have an upstream router ?
                  What are the NAT rules you use ?

                  edit : Troubleshooting NAT Port Forwards

                  No "help me" PM's please. Use the forum, the community will thank you.
                  Edit : and where are the logs ??

                  lifeboyL 1 Reply Last reply Reply Quote 0
                  • lifeboyL
                    lifeboy @Gertjan
                    last edited by lifeboy

                    @Gertjan

                    I'm now contacting the client to run a ping from her side again to do another packet capture on the WAN port. I'll do that with the firewall enabled and disabled.

                    The fact is that she cannot even ping the WAN ip address, whereas the rest of the world apparently can.
                    When the firewall is disabled, she can ping the WAN port. Forget all the rest: The problem is essentially just that.

                    Can you ping 197.214.117.194 ? She can't (this is the one firewall)
                    Can you ping 197.214.119.130 ? Sha can't (this is the other firewall)

                    She can ping the first FW's gateway address, 197.214.117.193 as well as the second FW's gateway 197.214.119.129.

                    ALSO: This was not a problem yesterday, but today it suddenly is.

                    johnpozJ 1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator @lifeboy
                      last edited by johnpoz

                      Your firewall being on or off would have zero to do with traffic getting to that IP...

                      In like 30 some years in the business - have never seen such a thing.. A sniff always happens before the firewall in the stack.. If not seeing it via sniff, its not getting there. Or you sniff is messed up - wrong filtering, wrong interface, etc.

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      lifeboyL 1 Reply Last reply Reply Quote 0
                      • lifeboyL
                        lifeboy @johnpoz
                        last edited by lifeboy

                        @johnpoz said in ip address silently blocked:

                        Your firewall being on or off would have zero to do with traffic getting to that IP...

                        In like 30 some years in the business - have never seen such a thing..

                        neither have I in about as many years :-)

                        A sniff always happens before the firewall in the stack.. If not seeing it via sniff,
                        its not getting there. Or you sniff is messed up - wrong filtering, wrong
                        interface, etc.

                        Here's the pfSense packet capture with the firewall enabled:

                        16:54:40.059933 IP 197.214.117.194 > 197.214.117.193: ICMP echo request, id 36805, seq 32265, length 9
                        16:54:40.060261 IP 197.214.117.193 > 197.214.117.194: ICMP echo reply, id 36805, seq 32265, length 9
                        16:54:40.561928 IP 197.214.117.194 > 197.214.117.193: ICMP echo request, id 36805, seq 32266, length 9
                        16:54:40.562254 IP 197.214.117.193 > 197.214.117.194: ICMP echo reply, id 36805, seq 32266, length 9
                        16:54:41.063930 IP 197.214.117.194 > 197.214.117.193: ICMP echo request, id 36805, seq 32267, length 9
                        16:54:41.064256 IP 197.214.117.193 > 197.214.117.194: ICMP echo reply, id 36805, seq 32267, length 9
                        16:54:41.565932 IP 197.214.117.194 > 197.214.117.193: ICMP echo request, id 36805, seq 32268, length 9
                        16:54:41.566259 IP 197.214.117.193 > 197.214.117.194: ICMP echo reply, id 36805, seq 32268, length 9
                        

                        And here it is with the firewall disabled:

                        16:59:30.846247 IP 197.214.117.193 > 197.214.117.194: ICMP echo reply, id 36805, seq 32843, length 9
                        16:59:31.045781 IP 102.218.142.79 > 197.214.117.194: ICMP echo request, id 1, seq 167, length 40
                        16:59:31.045795 IP 197.214.117.194 > 102.218.142.79: ICMP echo reply, id 1, seq 167, length 40
                        16:59:31.347906 IP 197.214.117.194 > 197.214.117.193: ICMP echo request, id 36805, seq 32844, length 9
                        16:59:31.348233 IP 197.214.117.193 > 197.214.117.194: ICMP echo reply, id 36805, seq 32844, length 9
                        16:59:31.849904 IP 197.214.117.194 > 197.214.117.193: ICMP echo request, id 36805, seq 32845, length 9
                        16:59:31.850229 IP 197.214.117.193 > 197.214.117.194: ICMP echo reply, id 36805, seq 32845, length 9
                        16:59:32.050159 IP 102.218.142.79 > 197.214.117.194: ICMP echo request, id 1, seq 168, length 40
                        16:59:32.050168 IP 197.214.117.194 > 102.218.142.79: ICMP echo reply, id 1, seq 168, length 40
                        16:59:32.351906 IP 197.214.117.194 > 197.214.117.193: ICMP echo request, id 36805, seq 32846, length 9
                        16:59:32.352389 IP 197.214.117.193 > 197.214.117.194: ICMP echo reply, id 36805, seq 32846, length 9
                        

                        Here's a screenshot from the client, first part where the firewall is enabled, second part where it's disabled.

                        70a4f09b-98cc-485f-94ba-50d00143cb70-image.png

                        So clearly the firewall is blocking the icmp packets from that address 102.218.142.79.

                        But not from other addresses:
                        (with the firewall packet filter enabled)

                        df9e0db0-c5f5-4e43-9cf1-0b93f023c7cd-image.png

                        johnpozJ 1 Reply Last reply Reply Quote 0
                        • johnpozJ
                          johnpoz LAYER 8 Global Moderator @lifeboy
                          last edited by

                          @lifeboy said in ip address silently blocked:

                          So clearly the firewall is blocking the icmp packets from that address.

                          That is not what I see - how can firewall block what it doesn't see? Again if pfsense doesn't see the traffic how can it do anything with it.. The firewall being on or off has nothing to do with what traffic is seen by the interface.

                          Run your wan traffic through a switch/tap and mirror/span the port so you can sniff outside of pfsense. To see if traffic is actually put on the wire towards pfsense wan.

                          But have never on any device let alone pfsense ever see firewall have any effect on what your sniffing. Sniff is taken from the interface before the "firewall" even sees it to block or allow.

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                          lifeboyL 1 Reply Last reply Reply Quote 0
                          • lifeboyL
                            lifeboy @johnpoz
                            last edited by lifeboy

                            @johnpoz, fair enough, but how do you explain that the minute the firewall packet filter is disabled, the traffic is seen and a ping returned?

                            Also, why is only that ip address getting a timeout, when every other address I have tried is passed by the filters and a response sent back to a ping?

                            Also, the on firewall is a physical metal (Sun X2100) machine, whereas the other is a VM on Proxmox. Both have the exact same behaviour.

                            I'll see what I can do to sniff the traffic on the metal box from the switch.

                            NogBadTheBadN johnpozJ 2 Replies Last reply Reply Quote 0
                            • NogBadTheBadN
                              NogBadTheBad @lifeboy
                              last edited by NogBadTheBad

                              @lifeboy Why are you seeing traffic from 197.214.117.193 going to 197.214.117.194 through the firewall, aren't they both on the same subnet past the pfSense interface?

                              Screenshot 2021-09-09 at 16.31.35.png

                              Andy

                              1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                              1 Reply Last reply Reply Quote 0
                              • johnpozJ
                                johnpoz LAYER 8 Global Moderator @lifeboy
                                last edited by johnpoz

                                @lifeboy said in ip address silently blocked:

                                but how do you explain that the minute the firewall packet filter is disabled, the traffic is seen and a ping returned?

                                I don't - all I can say in 30 some years doing this stuff have never in my life seen a firewall have anyway to control what a sniff sees or doesn't see. If your sniff is not seeing it - then its not there.. Why its not there.. No idea. But nothing can happen with that traffic on pfsense if the traffic is not there.

                                197.214.117.193 going to 197.214.117.194 through the firewall,

                                That is not going through the firewall - he is sniffing on the wan.. And that is his dpinger pinging his gateway would be my take on that.. Better filtering on his sniff so he doesn't see that noise, and only sees the source of the pings would of been better idea. For all we know he didn't see the traffic because he filled up his 100 packets before pings even started ;)

                                An intelligent man is sometimes forced to be drunk to spend time with his fools
                                If you get confused: Listen to the Music Play
                                Please don't Chat/PM me for help, unless mod related
                                SG-4860 24.11 | Lab VMs 2.8, 24.11

                                lifeboyL 1 Reply Last reply Reply Quote 0
                                • lifeboyL
                                  lifeboy @johnpoz
                                  last edited by lifeboy

                                  @johnpoz said in ip address silently blocked:

                                  @lifeboy said in ip address silently blocked:

                                  but how do you explain that the minute the firewall packet filter is disabled, the traffic is seen and a ping returned?

                                  I don't - all I can say in 30 some years doing this stuff have never in my life seen a firewall have anyway to control what a sniff sees or doesn't see. If your sniff is not seeing it - then its not there.. Why its not there.. No idea. But nothing can happen with that traffic on pfsense if the traffic is not there.

                                  Well, the traffic is there the moment I disable the packet filter. So the packet filter is somehow involved in this, that much is clear.

                                  197.214.117.193 going to 197.214.117.194 through the firewall,

                                  That is not going through the firewall - he is sniffing on the wan.. And that is his dpinger pinging his gateway would be my take on that.. Better filtering on his sniff so he doesn't see that noise, and only sees the source of the pings would of been
                                  better idea.

                                  Yes, it is dpinger. I didn't filter it out on purpose, simple because I want to see everthing for the duration of the capture, since I'm dealing with an unknown here.

                                  For all we know he didn't see the traffic because he filled up his 100 packets before pings even started ;)

                                  Nope, not the case. I first started the ping (with "ping -t"), then I started capturing and stopped it again. I then disabled the packet filter on pfSense, the ping started getting replies and I captured packets again. In the second capture, the address is present, in the first not. But I did say this all quite clearly and presented the details. It seems people don't read clearly?

                                  My suspicion is that this is some regression that has been introduced in the 2.5.2. This address is pretty close to a bogon network range 102.218.0.0/17. Are bogon network packets just silently dropped?

                                  As a test I have now disabled "Block bogon networks" on the WAN port and lo and behold, pings now are being responded to. As soon as I enable it again, they time out.

                                  I suspect that instead of 102.218.0.0/17 being blocked, 102.218.0.0/16 is being blocked. I cannot find an authoritive list of bogon networks though. Can someone help with that?

                                  lifeboyL 1 Reply Last reply Reply Quote 0
                                  • lifeboyL
                                    lifeboy @lifeboy
                                    last edited by lifeboy

                                    To answer my own question: https://<firewall>/diag_tables.php and select bogon to view the list. In there 102.218.0.0/17 is listed, but no matches for 102.218.142.79, so there seems to be a buggy bogon filter.

                                    johnpozJ 1 Reply Last reply Reply Quote 0
                                    • johnpozJ
                                      johnpoz LAYER 8 Global Moderator @lifeboy
                                      last edited by johnpoz

                                      @lifeboy said in ip address silently blocked:

                                      there seems to be a buggy bogon filter.

                                      And again even if was bogon - firewall is after sniff!! Nothing you can do in the firewall has anything to do with what you see on the interface via a sniff.. Just doesn't work that way..

                                      Here
                                      https://docs.netgate.com/pfsense/en/latest/diagnostics/packetcapture/index.html

                                      "For incoming traffic, captures will show traffic that arrives on an interface on the firewall regardless of whether that traffic will be blocked by the firewall configuration"

                                      alt text

                                      If you say it works when not doing bogon - has your bogon be updated recently? Look in diagnostic tables for what cidrs are listed in bogon for pfsense..

                                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                                      If you get confused: Listen to the Music Play
                                      Please don't Chat/PM me for help, unless mod related
                                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                                      lifeboyL 1 Reply Last reply Reply Quote 0
                                      • lifeboyL
                                        lifeboy @johnpoz
                                        last edited by

                                        @johnpoz, look I really don't care about the semantics of what you're explaining (which is not wrong) ...

                                        The fact is that when I turn bogon filtering off, the packets are allowed, and when I turn it back on, the packets silently are blocked. pfSense does that. It has nothing to do with how or whether I sniff the traffic or not.

                                        So, how to do file a bug report?

                                        johnpozJ 1 Reply Last reply Reply Quote 0
                                        • johnpozJ
                                          johnpoz LAYER 8 Global Moderator @lifeboy
                                          last edited by johnpoz

                                          So did you validate what is in pfsense bogon table, look under diag, tables bogon. maybe yours is old..

                                          I don't see that listed..

                                          bogon.jpg

                                          Should show you when last updated
                                          updated.jpg

                                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                                          If you get confused: Listen to the Music Play
                                          Please don't Chat/PM me for help, unless mod related
                                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                                          lifeboyL 1 Reply Last reply Reply Quote 0
                                          • lifeboyL
                                            lifeboy @johnpoz
                                            last edited by lifeboy

                                            @johnpoz, I explained in detail in my previous reply that I did interrogate the list and didn't find a match. I even speculated that it the /17 might be a filtered as a /16, so again: Why are why going in circles?

                                            bogon filter on: nothing is "seen" by pfSense' packet capture tool. pings time out.
                                            bogon filter off: packets are recording by the packet filter. pings get a reply.

                                            Conclusion: There's a problem with the bogon filter.

                                            Clear enough?

                                            Please don't be obnoxious about this, even if you're a global moderator.

                                            johnpozJ 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.