IP blocked in Rules but still accessing FTP
-
Without your rules there is no way for us to help you - clearly your doing it wrong or it would be blocked is the simple answer.
Please post your floating tab if anything is in there and you wan tab. And your port forwards would be helpful in seeing how your forwarding ftp into your network in the first place.
-
I've attached the two screens requested.
-
Well looks like your missing some stuff in your wan.. And what is in remote management and remotemangement ports?
-
RemoteManagement is an alias with a couple of fixed IP addresses we use to access pfsense from outside our LAN (setup by pfSense support btw).
What's missing from the WAN? pfSense is running in transparent mode (bridge mode?) and not as a router. That may be why it looks like it's missing some things.
-
well for one rule that would even allow ftp? Looks like that is not the full rule set.. Looks like there more under that from the bottom of that screenshot.
And why would you allow to wan net?? Seems odd - shouldn't it be wan address?
-
Yes there were more rules. I only copied the rules set down to the level that showed the block for "Badguys". The IP I'm trying to block is listed in that alias so it should stop at that point regardless of the rules below it. I was just showing that there weren't any rules above it that should have allowed it to pass. Once it hits this block the rest of the rules don't matter.
WAN net (set up by pfSense support) allows access to the pfSense settings when in transparent mode. Should it be an IP? I don't know. Since pfSense support set it up and they're smarter than I am, I left it the way they had it.
-
From my FTP server. I get hit every few min.
(001914)5/7/2015 15:47:34 PM - (not logged in) (71.232.46.105)> 220-Thank you for visiting namehere ftp server.
(001914)5/7/2015 15:47:34 PM - (not logged in) (71.232.46.105)> 220 All actions are logged.
(001914)5/7/2015 15:47:34 PM - (not logged in) (71.232.46.105)> SSH-2.0-libssh2_1.4.1
(001914)5/7/2015 15:47:34 PM - (not logged in) (71.232.46.105)> 500 Syntax error, command unrecognized.
(001914)5/7/2015 15:47:37 PM - (not logged in) (71.232.46.105)> disconnected.
(001915)5/7/2015 15:54:15 PM - (not logged in) (157.7.237.232)> Connected on port 22, sending welcome message…And from my "badguys" alias as seen on the rules, they're blocked. So how did they get to the FTP? They should have been blocked long before they got down to the port settings for the FTP connection.
-
Dude. FTP is NOT SSH. Sigh. WTF.
(001914)5/7/2015 15:47:34 PM - (not logged in) (71.232.46.105)> SSH-2.0-libssh2_1.4.1
(001915)5/7/2015 15:54:15 PM - (not logged in) (157.7.237.232)> Connected on port 22, sending welcome message… -
WAN net is the entire subnet your WAN interface is part of. WAN address is just the IP address used by your WAN.
My personal view is that you should ignore this guy or you will be playing whack-a-mole with him and other bots forever. Let them knock on your door. Just ignore them. However, the challenge in this situation is how is he getting in in the first place? We still haven't seen anything that shows the link between pfSense and your FTP server, no FTP rule, no port-forward. Are you using an IP alias or is your FTP server listening on your WAN IP address?
Dude. FTP is NOT SSH. Sigh. WTF.
Regardless, how is this IP getting past the firewall?
-
@KOM:
Dude. FTP is NOT SSH. Sigh. WTF.
Regardless, how is this IP getting past the firewall?
How? Because the "remotemanagement" allow rule is before "badguys" block. Useless.
-
Dude. FTP is NOT SSH. Sigh. WTF.
Of course not. He's connected to my FTP server already when he's entering the SSH command. He should have never been able to connect to my FTP server if his IP was blocked. He should have never been able to get to the FTP prompt to attempt to enter the SSH command.
-
Kindly go Google the difference between SSH and FTP. You don't have any FTP server there. libssh is not FTP and port 22 is not FTP either. Also your rules ordering is wrong, as noted above.
-
@KOM:
Dude. FTP is NOT SSH. Sigh. WTF.
Regardless, how is this IP getting past the firewall?
How? Because the "remotemanagement" allow rule is before "badguys" block. Useless.
I don't understand. Remotemanagement only lists two fixed IPs for granting access. He isn't from either of those IPs. How is that making it useless?
-
I don't understand. Remotemanagement only lists two fixed IPs for granting access.
Apparently not. Also, those pfBlocker rules are just whacky. I really don't think you have a clue what you are doing.
-
OK, I've attached more rules. You will see the bottom on is FTP but by being on the bottom, only access that hasn't already been blocked should get down the rule set this far. And yes, there is an FTP server, and yes, I know the difference, and yes, he's attempting to enter SSH commands on and FTP connection, and no, he shouldn't have gotten that far to do so and that's what I'm trying to figure out. How did he get to the bottom of the rule list if there's a specific block for his IP at the top of the list (right below Remotemanagement which only passes two IPs).
-
I don't understand. Remotemanagement only lists two fixed IPs for granting access.
Apparently not. Also, those pfBlocker rules are just whacky. I really don't think you have a clue what you are doing.
The pfBlocker rules are created by pfBlocker, not me. None of them are giving a pass to this guy's IPs. They're all blocks.
-
Let me repeat the port 22 is NOT FTP and libssh does NOT support FTP at all. What server are those logs from?
The pfBlocker rules are created by pfBlocker, not me. None of them are giving a pass to this guy's IPs. They're all blocks.
Yeah. Based on your whacky misconfiguration that's apparently trying to block the entire world.
OK, I've attached more rules.
Yeah. Looking at that censored mess… humble suggestion: go ditch that frenzy and restart from scratch. Or perhaps better hire someone for the job.
-
Port 22 is indeed routed to the FTP server and the FTP server is listening on that port as well as others. FTPFileZilla is the FTP server running.
And while you call this a "whacky misconfiguration", I'll point out again that support from pfSense has reviewed the configuration. Chris himself set up parts of it.
And yes, blocking most of the world would be just fine with me because our business isn't a world-wide business.
-
Sigh.
1/ No, port 22 is NOT routed to the FTP server. Not per the rules you posted.
2/ Oh, sure. Call me dalai lama.
3/ No. There's this implicit block all rule. Allow what you need from where you need ONLY. The rest is blocked. Not this ridiculous overhead with millions of table entries.Of course, when you keep sticking allow everyone from everywhere to anywhere any protocol in random places between some more random disabled rules, throw in a bunch of inexplicable rules with some random IP as destination, mix that with bunch more aliases to obfuscate the whole mess, then this most likely won't work properly, and you'll get people accessing what they shouldn't.
Those rules are frickin' unmaintainable mess with no logical ordering.
-
Yeah. Looking at that censored mess… humble suggestion: go ditch that frenzy and restart from scratch. Or perhaps better hire someone for the job.
LOL. So I should hire someone better than the guy who wrote pfsense? Right. Look, I get it, you enjoy punking up on me. Fine. But what you say sorta falls apart when you say things like Chris doesn't know how to setup his own software. If you think that little of him, why are you running his software in the first place? Can we stop the bully-bash and get back to the question of how an IP is able to reach the FTP server to even attempt his SSH command there? Of course it won't work, it's an FTP sever. That's beside the point.