• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

WAN block bogon IPv6 networks

Scheduled Pinned Locked Moved Firewalling
15 Posts 3 Posters 1.0k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • G
    gambit100
    last edited by Mar 14, 2024, 4:35 PM

    I have "WAN block bogon IPv6 networks" entries in my pfsense firewall about 1/second. The bogon rule is selected only on the WAN interface and not on the LAN interface. I can suppress the log entries but I'm wondering why I'm getting them. I've seen similar discussions regarding DHCP but they seemed to indicate it was because the LAN bogon rule was enabled.

    So my question is: is a log entry like this 1/second normal and could it be related to DHCP, possibly something I don't have configured correctly.

    Last 200 Firewall Log Entries. (Maximum 200)
    Mar 14 12:08:29 WAN block bogon IPv6 networks from WAN (11002) [fe80::2bc:60ff:fe92:4419] [ff02::1:2] Options
    Mar 14 12:08:29 WAN block bogon IPv6 networks from WAN (11002) [fe80::2bc:60ff:fe92:4419] [ff02::2] Options
    Mar 14 12:08:31 WAN block bogon IPv6 networks from WAN (11002) [fe80::2bc:60ff:fe92:4419] [ff02::1:ff92:4419] Options
    Mar 14 12:08:31 WAN block bogon IPv6 networks from WAN (11002) [fe80::2bc:60ff:fe92:4419] [ff02::2] Options
    Mar 14 12:08:31 WAN block bogon IPv6 networks from WAN (11002) [fe80::2bc:60ff:fe92:4419] [ff02::1:2] Options
    Mar 14 12:08:32 WAN block bogon IPv6 networks from WAN (11002) [fe80::2bc:60ff:fe92:4419] [ff02::1:ff92:4419] Options
    Mar 14 12:08:32 WAN block bogon IPv6 networks from WAN (11002) [fe80::2bc:60ff:fe92:4419] [ff02::2] Options
    Mar 14 12:08:33 WAN block bogon IPv6 networks from WAN (11002) [fe80::2bc:60ff:fe92:4419] [ff02::1:2] Options
    Mar 14 12:08:33 WAN block bogon IPv6 networks from WAN (11002) [fe80::2bc:60ff:fe92:4419] [ff02::1:ff92:4419] Options
    Mar 14 12:08:37 WAN block bogon IPv6 networks from WAN (11002) [fe80::2bc:60ff:fe92:4419] [ff02::2] Options
    Mar 14 12:08:37 WAN block bogon IPv6 networks from WAN (11002) [fe80::2bc:60ff:fe92:4419] [ff02::1:2] Options
    Mar 14 12:08:40 WAN block bogon IPv6 networks from WAN (11002) [fe80::2bc:60ff:fe92:4419] [ff02::1:2] Options

    Thanks

    G 1 Reply Last reply Mar 14, 2024, 6:26 PM Reply Quote 0
    • G
      Gertjan @gambit100
      last edited by Mar 14, 2024, 6:26 PM

      @gambit100

      Your upstream router, ISP, of fellow ISP clients 'can' send traffic that arrive at your gate == WAN interface. This happens (all the time). It's the so called "Internet back ground noise". Its traffic coming into your WAN so its very likely that 'you' are not the origin of this traffic. Al always, "it's the others".

      Solutions :
      Remove the bogons list ...
      Make the bogon rule not to log ....

      ( No, I'm not proposing you to to go check your upstream router - or ISP clients or your ISP why they are doing this, but feel free ^^ )

      The traffic itself is pretty inoffensive : what is ff02::o2

      No "help me" PM's please. Use the forum, the community will thank you.
      Edit : and where are the logs ??

      G N 2 Replies Last reply Mar 14, 2024, 6:40 PM Reply Quote 0
      • G
        gambit100 @Gertjan
        last edited by Mar 14, 2024, 6:40 PM

        @Gertjan Thanks for the. I suppressed the log entries so I can see other events if the come in. It's odd it's always from the same source but not odd enough I was to ask my ISP>

        G 1 Reply Last reply Mar 14, 2024, 6:55 PM Reply Quote 0
        • G
          Gertjan @gambit100
          last edited by Mar 14, 2024, 6:55 PM

          @gambit100 said in WAN block bogon IPv6 networks:

          I was to ask my ISP

          Don't.
          Chances are great it will go like this :
          You (asking ISP) : I use this router now that permits me to see 'things' ...
          They : Use our equipment [ don't use unsupported equipment ! ]. You won't see a thing anymore ...

          No "help me" PM's please. Use the forum, the community will thank you.
          Edit : and where are the logs ??

          N 1 Reply Last reply Mar 16, 2024, 4:14 PM Reply Quote 0
          • N
            NightlyShark @Gertjan
            last edited by Mar 16, 2024, 12:49 PM

            @Gertjan See here. Its IPv6 multicast. Do you by any chance have an ISP TV package?

            G G 2 Replies Last reply Mar 16, 2024, 1:17 PM Reply Quote 0
            • G
              Gertjan @NightlyShark
              last edited by Mar 16, 2024, 1:17 PM

              @NightlyShark said in WAN block bogon IPv6 networks:

              See here.

              Yeah; nice example.

              @NightlyShark said in WAN block bogon IPv6 networks:

              Do you by any chance have an ISP TV package?

              @work : no - way. The ISP router has TV (probably ?) capabilities but not using it. Anyway, it's behind the pfSense WAN, so "I don't care".

              @home : yes - but same thing : I don't look or log pfSense firewall's default 'block' mode packets. I've seen the "internet background noice" since the .... a very long time ;)
              I get dossed ? Oh boy .. problem. I'll go work in the garden then. I have a good firewall - that's why we are here - so I can do other thinks.

              Strange packets 'toking' on my front door = WAN, that's like the doorbell of my front door of the house : it's annoying, so I shut down the bell, and friends drop by using the back door anyway.

              No "help me" PM's please. Use the forum, the community will thank you.
              Edit : and where are the logs ??

              N 2 Replies Last reply Mar 16, 2024, 1:23 PM Reply Quote 1
              • N
                NightlyShark @Gertjan
                last edited by Mar 16, 2024, 1:23 PM

                @Gertjan It is not unheard of to have an ISP sub-node (net cabin on the side-walk) get hacked and/or infected, and start to work as an attack node for a botnet or something. If you are not using explicitly IPv6 multicasting, it is best to disable it globally by a floating rule, for both the in and out directions. Same thing applies for outgoing multicast (and service broadcast) packets.
                7cfa9972-d6bf-43ca-942f-6d162f00e608-image.png

                G 1 Reply Last reply Mar 16, 2024, 2:09 PM Reply Quote 0
                • G
                  Gertjan @NightlyShark
                  last edited by Gertjan Mar 16, 2024, 2:10 PM Mar 16, 2024, 2:09 PM

                  @NightlyShark

                  Not saying the contrary.
                  But when a list with stop rules is better as the default non logging "STOP here" WAN rule ?
                  Are some of your floating WAN rules logging ? That itself is already a risk : incoming, not wanted traffic generates CPU cycles. Throw a boatload of unwanted traffic (DOS) at your WAN, and the system starts to so some serious logging which means means disk activity (disk fills up : a major issue !!), serious processor activity ....

                  Bad traffic from a guy at the other side of the planet, or bad traffic coming from the cabinet in front of my house : it's all bad traffic and blocked.
                  Multi what ? 😊

                  No part of the out of the box experience, as I had to change some pfSense files, but my pfSense GUI is not listening on the WAN interface ( ! ). Neither the SSH demon. Nor unbound. No NTP .... did I forget one ?
                  So, even if the firewall takes a break : no processes are listing on some port on the WAN interface ...
                  Easy to test drive : shut down pf and see what happens [ disclaimer here : don't do this at home if you have something to lose ]. So, if "they" still manage to get in now : they have earned it.

                  No "help me" PM's please. Use the forum, the community will thank you.
                  Edit : and where are the logs ??

                  N 2 Replies Last reply Mar 16, 2024, 2:15 PM Reply Quote 0
                  • N
                    NightlyShark @Gertjan
                    last edited by NightlyShark Mar 16, 2024, 2:15 PM Mar 16, 2024, 2:15 PM

                    @Gertjan This is an outgoing rule (the one that logs), not incoming. The other rules have to do with CoDel Limiter and PfBlocker-ng, none create logs.

                    1 Reply Last reply Reply Quote 1
                    • N
                      NightlyShark @Gertjan
                      last edited by NightlyShark Mar 16, 2024, 2:19 PM Mar 16, 2024, 2:18 PM

                      @Gertjan Also, PfSense, unless configured otherwise, internally listens to all interfaces and all VIPs. It's the firewall that stops all incoming connections at WAN. PfSense even listens to 127.0.0.1 and ::1. If you manage to install stunnel and create one between an extra IP on the LAN interface and 127.0.0.1, you will be able to see it. You can also see it if you choose the option "Disable all packet filtering".

                      G 1 Reply Last reply Mar 16, 2024, 2:26 PM Reply Quote 0
                      • G
                        Gertjan @NightlyShark
                        last edited by Mar 16, 2024, 2:26 PM

                        @NightlyShark
                        I know ^^
                        That's why I test with pf shut down, and "do things" with my system so nothing 'listens' anymore on the interface calls "WAN".
                        Call it an extra safety net.

                        Maybe I'm parano after all ^^

                        No "help me" PM's please. Use the forum, the community will thank you.
                        Edit : and where are the logs ??

                        1 Reply Last reply Reply Quote 0
                        • N
                          NightlyShark @Gertjan
                          last edited by Mar 16, 2024, 2:33 PM

                          @Gertjan said in WAN block bogon IPv6 networks:

                          @work : no - way. The ISP router has TV (probably ?) capabilities but not using it. Anyway, it's behind the pfSense WAN, so "I don't care".

                          @home : yes - but same thing : I don't look or log pfSense firewall's default 'block' mode packets. I've seen the "internet background noice" since the .... a very long time ;)
                          I get dossed ? Oh boy .. problem. I'll go work in the garden then. I have a good firewall - that's why we are here - so I can do other thinks.

                          Strange packets 'toking' on my front door = WAN, that's like the doorbell of my front door of the house : it's annoying, so I shut down the bell, and friends drop by using the back door anyway.

                          Make no misunderstanding, in order to be reasonably secure with any setup (no matter how good the software) it all boils down to configuration. (I don't mean this in an insulting way, just a piece of advice) you need to drop the "I have PfSense, b***h, so I don't care" attitude and closely examine your setup. The biggest mistakes in all fields and of all magnitudes in life are almost always made when someone overestimates a choice they made and gets complacent and when someone underestimates the dangers of a situation. PfSense is not an intelligent being that has studied human computer networking and is your slave and will do anything for you, kinda like that Black Mirror episode with the cookies. It's a machine that YOU have the responsibility to know how to control and monitor.

                          Anyway, the ISP CPE is not "behind PfSense WAN", it's "in front". Behind would mean you connected one of the ISP routers' LAN ports to your PfSense LAN...

                          1 Reply Last reply Reply Quote 0
                          • G
                            gambit100 @NightlyShark
                            last edited by Mar 16, 2024, 3:58 PM

                            @NightlyShark Thanks for the link to IPV6 multicast. So "ff02::1:2 all DHCP agents" is a multicast to DHCP agents which still seems to point to IPV6 DHCP from my ISP to my network. As far as I know, I have no need for IPV6 so I may look into turning if off on my network, assuming it's currently enabled. I don't have an ISP TV package. I stream using a Roku on my LAN.

                            N 1 Reply Last reply Mar 16, 2024, 4:11 PM Reply Quote 1
                            • N
                              NightlyShark @gambit100
                              last edited by Mar 16, 2024, 4:11 PM

                              @gambit100 I am naturally suspicious of appliances... I would consider putting the Roku in a separate VLAN (unless bandwidth becomes a consideration, ie 4k 120Hz HDR streaming or something, in which case, you would need a Layer 3 switch for your VLANs). I have most of my network setup that way. It gives me the ability to have different rules for my LAN (where my physical servers and my PC are), my bridges (virtual interfaces that all my proxmox VMs use to talk to each other and spin up MACVLAN docker containers, each with it's own IP), my security equipment (NVR, doorbells, cameras), various WiFi subnets (guest with captive portal, trusted, admin), my living room TV subnet, my IOT devices... I can even use NordVPN for some subnets and my ISP for others that way. It also reduces inter-device noise a lot (imagine all those devices responding to each others' advertisements and broadcasts)... I don't know your whole network setup, but it is good practice to use separation of concerns whenever possible.

                              1 Reply Last reply Reply Quote 0
                              • N
                                NightlyShark @Gertjan
                                last edited by Mar 16, 2024, 4:14 PM

                                @Gertjan Oh god... I replied to you before, while meaning to reply to the OP and never checked... facepalm

                                1 Reply Last reply Reply Quote 0
                                1 out of 15
                                • First post
                                  1/15
                                  Last post
                                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                                  This community forum collects and processes your personal information.
                                  consent.not_received