<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[how to prevent users for wifi tethering&#x2F;sharing]]></title><description><![CDATA[<p dir="auto">hi,<br />
please any one have any idea how to prevent users to share their internet via wifi tethering.</p>
<p dir="auto">is their any way to do this in pfsense like in mikrotik it can done via TTL but i can't find this kind of option in pfsense but we need this to prevent users to share their internet with other users.</p>
<p dir="auto">please help me on this</p>
]]></description><link>https://forum.netgate.com/topic/172226/how-to-prevent-users-for-wifi-tethering-sharing</link><generator>RSS for Node</generator><lastBuildDate>Thu, 05 Mar 2026 16:37:02 GMT</lastBuildDate><atom:link href="https://forum.netgate.com/topic/172226.rss" rel="self" type="application/rss+xml"/><pubDate>Tue, 17 May 2022 10:59:37 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to how to prevent users for wifi tethering&#x2F;sharing on Mon, 05 Aug 2024 10:57:11 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/colleytech">@<bdi>colleytech</bdi></a> you could use say snort for example</p>
<p dir="auto">As i said 2 years ago.</p>
<blockquote>
<p dir="auto">Other option might be doing something with IPS package..</p>
</blockquote>
<p dir="auto"><a href="https://docs.snort.org/rules/options/non_payload/ttl" target="_blank" rel="noopener noreferrer nofollow ugc">https://docs.snort.org/rules/options/non_payload/ttl</a></p>
<p dir="auto">But different OSes can use different default TTLs, so you would most likely need multiple rules with different values. Unless you knew all the devices on your network used a specific ttl. Which is unlikely in a scenario where such detection would make sense. I could see it as a way to detect users using multiple devices behind another device to circumvent a captive portal for example.</p>
<p dir="auto">Where they have to pay for access or something.  Keep in mind - that it is possible for the natting device to manipulate the traffic so the drop in ttl is not done.. Which would defeat this detection method.</p>
]]></description><link>https://forum.netgate.com/post/1179350</link><guid isPermaLink="true">https://forum.netgate.com/post/1179350</guid><dc:creator><![CDATA[johnpoz]]></dc:creator><pubDate>Mon, 05 Aug 2024 10:57:11 GMT</pubDate></item><item><title><![CDATA[Reply to how to prevent users for wifi tethering&#x2F;sharing on Mon, 05 Aug 2024 07:00:23 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/colleytech">@<bdi>colleytech</bdi></a></p>
<p dir="auto">Manipulating the TTL ? Not that I know of.</p>
]]></description><link>https://forum.netgate.com/post/1179340</link><guid isPermaLink="true">https://forum.netgate.com/post/1179340</guid><dc:creator><![CDATA[Gertjan]]></dc:creator><pubDate>Mon, 05 Aug 2024 07:00:23 GMT</pubDate></item><item><title><![CDATA[Reply to how to prevent users for wifi tethering&#x2F;sharing on Sat, 03 Aug 2024 09:08:48 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/gertjan">@<bdi>Gertjan</bdi></a> anything on this yet?</p>
]]></description><link>https://forum.netgate.com/post/1179180</link><guid isPermaLink="true">https://forum.netgate.com/post/1179180</guid><dc:creator><![CDATA[colleytech]]></dc:creator><pubDate>Sat, 03 Aug 2024 09:08:48 GMT</pubDate></item><item><title><![CDATA[Reply to how to prevent users for wifi tethering&#x2F;sharing on Thu, 23 Jun 2022 11:22:53 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/maherg">@<bdi>maherg</bdi></a></p>
<p dir="auto">Se also <a href="https://forum.netgate.com/topic/172355/block-wi-fi-sharing-through-mobile-hotspot/7">https://forum.netgate.com/topic/172355/block-wi-fi-sharing-through-mobile-hotspot/7</a>.</p>
<p dir="auto">A soon as it becomes 'easy' to write and maintain firewall rules that take in account ttl header values, it will also become easy to pre-set these ttl to 65 129 and 257 on the other, lower side router, the one that shares the connection.<br />
So, pf, the pfSense firewall, will see 64, 128 or 256 and thus detects nothing special.<br />
And for that matter also iptables,or any other firewall you use.</p>
]]></description><link>https://forum.netgate.com/post/1047845</link><guid isPermaLink="true">https://forum.netgate.com/post/1047845</guid><dc:creator><![CDATA[Gertjan]]></dc:creator><pubDate>Thu, 23 Jun 2022 11:22:53 GMT</pubDate></item><item><title><![CDATA[Reply to how to prevent users for wifi tethering&#x2F;sharing on Tue, 17 May 2022 11:29:07 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/maherg">@<bdi>maherg</bdi></a> while its possible to detect a nat via the ttl being lower than default 64, 128, etc. different OSes would/could use a different standard ttl value.  When you go through a router this ttl is lowered by 1.</p>
<p dir="auto">So it is in theory possible to detect a connection that has gone through a router and not directly connected to "your" router.. It is also possible to circumvent that by having the router your using to say share the connection to not lower the ttl of the traffic it sends on.</p>
<p dir="auto">I am not aware of any built in function to filter on non standard ttls.. I would have to look through the advanced options available to see if doing something like that is possible on a firewall rule.  But you have to also be aware of different OSes using different standard ttl values and account for all of those that might be seen with different clients behind your pfsense.</p>
<p dir="auto">edit: from a quick look at the advanced options in firewall rules, I do not see a way to do this by looking at the ttl value.  But you might be able to do it with</p>
<p dir="auto"><a href="https://docs.netgate.com/pfsense/en/latest/firewall/configure.html#source-os" target="_blank" rel="noopener noreferrer nofollow ugc">https://docs.netgate.com/pfsense/en/latest/firewall/configure.html#source-os</a></p>
<p dir="auto">It is "possible" that maybe the finger print that identifies os XYZ would look at the ttl, and if its not the standard for that OS, say it dropped by 1 because of a downstream router handling the traffic (sharing internet).. It might not match and could be filtered.</p>
<p dir="auto">Other option might be doing something with IPS package..</p>
<p dir="auto">Might be a good feature request for future version of pfsense.</p>
]]></description><link>https://forum.netgate.com/post/1042509</link><guid isPermaLink="true">https://forum.netgate.com/post/1042509</guid><dc:creator><![CDATA[johnpoz]]></dc:creator><pubDate>Tue, 17 May 2022 11:29:07 GMT</pubDate></item></channel></rss>