Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Modem-WAN ethernet rule for AT&T bypass allows interrupt manipulation and stateless access

    Scheduled Pinned Locked Moved Firewalling
    5 Posts 1 Posters 534 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • HLPPCH
      HLPPC Galactic Empire
      last edited by HLPPC

      I have had one gaming monitor's kernel corrupted on an AT&T bypass setup. The first setup was with a Ryzen 7 1700X and GTX 1050TI. I was unknowingly changing CPU mappings while tuning and possibly allowed the wrong TX/RX queues on a logical or hard cpu. I believe my GPU was utilized to attack my gaming monitor, or unknowingly caused interrupts against my Nintendo Switch, which passed the interrupts to my gaming monitor over HDMI.

      My second setup is on a Ryzen 5 PRO 3400GE APU (I freed up a PCI express slot). I set up Machdep with separate_txrx sysctl and use_logical_cores sysctl in accordance with this online guide:

      https://lists.freebsd.org/pipermail/dev-commits-src-main/2021-April/003820.html

      Referenced CPU mapping behavior is listed at the end of this posting.

      The issue lies with the Modem-WAN ethernet rule being advised to allow "all" inbound. After changing this rule to 802.1X only, creating IPV4 and ARP L2 block rules and block all other L2 protocol rules, I noticed lots of unauthorized traffic that was magically authorized. Yesterday, the system even went as far as to attack my Television's kernel, causing cursors and menus to pop up. It is an attack point.

      Additionally, because WOL_Magic Packets are enabled on all interfaces by default, my PC kept booting up magically while in sleep mode. This was remedied with the shellcmd utility and command ifconfig igbX -wol on all interfaces.

      Allowing all L2 IPV4 and any other L2 protocol to and from the AT&T router gives people time to hack it and attack your system. While I am not 100% sure this is what happened, as stateless connections were used, it caused damages which were thankfully covered by warranty at Microcenter.

      Some CPU mappings seem to make attacks to the BGW-210 router and GPU/APU easier than others. Fortunately, I have the gall to only have one device plugged in at a time and change my setup every day obsessively. All the while, learning more ways to audit this firewall. PS, ICMP management kind of stinks on pfSense.

        • CPU mapping behaviors

        • 'separate txrx' refers to the separate_txrx sysctl
        • 'use logical' refers to the use_logical_cores sysctl
        • 'INTR CPUS' indicates whether bus_get_cpus(INTR_CPUS) succeeded
        • separate use INTR
        • txrx logical CPUS result

        • -          -       X     RX and TX queues mapped to consecutive physical
          
        •                          cores with RX/TX pairs on same core and excess
          
        •                          of either following
          
        • -          X       X     RX and TX queues mapped to consecutive cores
          
        •                          of any type with RX/TX pairs on same core and
          
        •                          excess of either following
          
        • X          -       X     RX and TX queues mapped to consecutive physical
          
        •                          cores; all RX then all TX
          
        • X          X       X     RX queues mapped to consecutive physical cores
          
        •                          first, then TX queues mapped to L2 neighbor of
          
        •                          the corresponding RX queue if one exists,
          
        •                          otherwise to consecutive physical cores
          
        • -         n/a      -     RX and TX queues mapped to consecutive cores of
          
        •                          any type with RX/TX pairs on same core and excess
          
        •                          of either following
          
        • X         n/a      -     RX and TX queues mapped to consecutive cores of
          
        •                          any type; all RX then all TX
          
      • */
      HLPPCH 1 Reply Last reply Reply Quote 0
      • HLPPCH
        HLPPC Galactic Empire @HLPPC
        last edited by HLPPC

        @HLPPC Also, L2 ethertype rules randomly change order when pressing the save button or rebooting. Which is hot garbage.

        HLPPCH 1 Reply Last reply Reply Quote 0
        • HLPPCH
          HLPPC Galactic Empire @HLPPC
          last edited by

          @HLPPC I also have a static IP block which is constant malicious traffic flooding my system, in addition to the standard AT&T DHCP lease.

          HLPPCH 1 Reply Last reply Reply Quote 0
          • HLPPCH
            HLPPC Galactic Empire @HLPPC
            last edited by

            @HLPPC And to make matters worse I am also using an old realtek card for the MODEM interface. Probably a major cause. 🥵

            HLPPCH 1 Reply Last reply Reply Quote 0
            • HLPPCH
              HLPPC Galactic Empire @HLPPC
              last edited by

              @HLPPC I've also found that it helps to disable all ifconfig options on the MODEM interface and to audit the L2 firewall rules:
              ifconfig igbx -txcsum -rxcsum -txcsum6 -rxcsum6 -lro -tso4 -tso6 -vlanhwcsum -vlanhwtag -vlanmtu -vlanhwfilter -vlanhwtso

              L2.png

              Thanks in the dc for mentioning this vulnerability to me.
              https://derekabdine.com/blog/2022-arris-advisory.html

              1 Reply Last reply Reply Quote 0
              • First post
                Last post
              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.