• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Lots of nginx errors in logs after upgrade

Scheduled Pinned Locked Moved Problems Installing or Upgrading pfSense Software
41 Posts 11 Posters 83.9k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • T
    TheNarc
    last edited by May 10, 2016, 2:07 PM

    Thanks for that information cshy, it's much appreciated.  I will get in contact with the users of the two offending machines on my network to see whether I can confirm that they are both running Avast.  If my memory serves, it seems quite likely.  I'll provide an update either way when I find out.

    1 Reply Last reply Reply Quote 0
    • M
      mudmanc4
      last edited by May 10, 2016, 3:15 PM

      Why would Avast be scanning within specific port ranges for specific pages? This makes no sense to me.

      1 Reply Last reply Reply Quote 0
      • T
        TheNarc
        last edited by May 10, 2016, 3:45 PM

        I agree, it definitely makes no sense to me either.  But it does seem to be Avast that's behind it.  I've confirmed with 1 of my 2 users that they run Avast.  And here's another thread that seems to implicate it, although again it's frustratingly inconclusive:  https://www.reddit.com/r/techsupport/comments/40v5go/weird_traces_in_firewall_coming_from_my_machine/  Could it be trying to scan the LAN for known web server vulnerabilities?  That would seem outside the purview of free consumer grade AV software.

        1 Reply Last reply Reply Quote 0
        • M
          ms
          last edited by May 10, 2016, 3:54 PM

          I got the exact same errors, also being generated by workstations running Avast. From their sales blurb: "Home Network Security: Is your router set up properly? We’ll tell you. Otherwise, anyone can break into your network and anything connected to it (like your computer, phone, or printer)." FYI, ESET Internet Security 10 also scans your router. I ran it for giggles and it told me my router was probably compromised as it had ports like 443 open lol.

          1 Reply Last reply Reply Quote 0
          • M
            mudmanc4
            last edited by May 10, 2016, 3:57 PM

            If Avast is searching port 8443 for multiples of pages at random, which is most recently well known for plesk panel, which can assist with the hosting of multiples of VM / CT's,  I'll eat a live crocodile. Now this may somehow be, so I'll make sure I have my spork ready. But I doubt I'll need it.

            This is a clear sign there is 'something' even a local webserver (even if one was never intentionally installed locally) which has found it's way into 'something' on the local network or machine, and is looking for something to exploit, buy the known exploitable pages, which have already or should be already downloaded by a script, in many cases.

            These very much the same logs can be found in almost any apache server logs, showing a remote attacker attempting to find something.

            The firewall, pfSense, is now showing you the attempts.

            Again, I'll keep the spork ready to run if I'm proven wrong.

            1 Reply Last reply Reply Quote 0
            • T
              TheNarc
              last edited by May 10, 2016, 4:27 PM

              Whatever it is, I don't like it.  I'll see if I can switch my users off Avast and determine whether that makes a difference.  I believe they also both use the same VPN service, but I don't know which one offhand.  I'll ask them about that too.  Does anyone else seeing these log entries use a VPN service?

              1 Reply Last reply Reply Quote 0
              • T
                TheNarc
                last edited by May 10, 2016, 9:34 PM

                My VPN comment was a red herring; I don't want to waste anyone's time.  I can confirm that both of the machines exhibiting this behavior on my network were running Avast.  Whatever it is, Avast seems to be somehow responsible.

                1 Reply Last reply Reply Quote 0
                • M
                  mudmanc4
                  last edited by May 10, 2016, 9:58 PM

                  @TheNarc:

                  My VPN comment was a red herring; I don't want to waste anyone's time.  I can confirm that both of the machines exhibiting this behavior on my network were running Avast.  Whatever it is, Avast seems to be somehow responsible.

                  At the same time , users who run such things as Avast, generally require them for a reason, in other words the workstation might encounter objects which are specifically designed to create havok, in one way or another.

                  The type of behavior in the above logs, could be easily reconciled with destructive behavior, and as well more than likely, would flag many different means of intrusion prevention.

                  Just think of the chatter this is clogging the network up with alone.

                  /spork on standby

                  1 Reply Last reply Reply Quote 0
                  • R
                    robi
                    last edited by May 11, 2016, 5:45 AM

                    Avast has lots of modules, you can enable/disable them one by one. Moreover, when you install Avast (free edition), you can choose during setup, which modules you want to instal. I always use only the "File protection" module, I don't even install the rest…

                    1 Reply Last reply Reply Quote 0
                    • T
                      TheNarc
                      last edited by May 11, 2016, 2:02 PM

                      Here's another crumb of information explicitly linking Avast to nefarious-looking activity logged in pfSense:  https://www.reddit.com/r/PFSENSE/comments/2s40uz/pfsense_ca/cnm4x87  Specifically:

                      Turns out my gf's laptop has Avast and its "home network security" module runs exploit tests against your network, which can look bad

                      I should also clarify that this activity is far from constant.  Rather, it seems to occur periodically at roughly 24 hour intervals.  I'm going to see if I can have my users disable Avast's "Home Network Security" module and will report back whether the activity still occurs.

                      1 Reply Last reply Reply Quote 0
                      • T
                        TheNarc
                        last edited by May 13, 2016, 2:19 AM

                        Just wanted to report back that it's definitely Avast.  Disabling the Home Network Security module eliminates the log entries in pfSense.

                        1 Reply Last reply Reply Quote 0
                        • C
                          cmb
                          last edited by May 13, 2016, 2:22 AM

                          Interesting, thanks for the feedback. What a dumb feature.. Like scanning your gateway IP daily for old versions of openwebmail among a variety of other things you'll almost certainly never find on a gateway is doing anything useful.

                          1 Reply Last reply Reply Quote 0
                          • P
                            phil.davis
                            last edited by May 13, 2016, 2:40 AM

                            @cmb:

                            Interesting, thanks for the feedback. What a dumb feature.. Like scanning your gateway IP daily for old versions of openwebmail among a variety of other things you'll almost certainly never find on a gateway is doing anything useful.

                            I guess they are attempting to find potential vulnerabilities on typical home routers, where people would have their TP-Link, D-Link, NetGear… home device with old firmware and never realize that it is now open to some (external or internal) attack vector. Of course then there is the question "what can the home user do about it?" - after a couple of [months|years] the manufacturers stop putting out new firmware to close security holes. So the home user is stuck with their perfectly good hardware but out-of-date firmware, and AVAST will tell them about it every week.

                            As the Greek philosopher Isosceles used to say, "There are 3 sides to every triangle."
                            If I helped you, then help someone else - buy someone a gift from the INF catalog http://secure.inf.org/gifts/usd/

                            1 Reply Last reply Reply Quote 0
                            • C
                              cmb
                              last edited by May 13, 2016, 3:31 AM

                              @phil.davis:

                              I guess they are attempting to find potential vulnerabilities on typical home routers, where people would have their TP-Link, D-Link, NetGear… home device with old firmware and never realize that it is now open to some (external or internal) attack vector. Of course then there is the question "what can the home user do about it?" - after a couple of [months|years] the manufacturers stop putting out new firmware to close security holes. So the home user is stuck with their perfectly good hardware but out-of-date firmware, and AVAST will tell them about it every week.

                              True, if it were doing something that looked like it was trying to identify a vulnerable router, I'd understand. That might be a useful feature for typical home users (though yeah, as you noted, they probably wouldn't have any idea what to do if it detected a problem). But I don't think it's looking for anything you'd find on any router. Looks like things that are specific to web servers only, and a short list of uncommon things at that.

                              1 Reply Last reply Reply Quote 0
                              • K
                                kpa
                                last edited by May 13, 2016, 9:59 AM

                                They haven't really thought trough the value and practicality of that feature. Instead of helping to find any real threats it is going to cause more people freak out because there's an unknown scanner probing at multiple hosts on the local network for seemingly random web pages just like a real malware would be.

                                1 Reply Last reply Reply Quote 0
                                • M
                                  mudmanc4
                                  last edited by May 13, 2016, 10:17 AM May 13, 2016, 10:13 AM

                                  @kpa:

                                  They haven't really thought trough the value and practicality of that feature. Instead of helping to find any real threats it is going to cause more people freak out because there's an unknown scanner probing at multiple hosts on the local network for seemingly random web pages just like a real malware would be.

                                  I would like to know what exact version is being used which is probing ports and directories, if anyone can supply me with this info that would be great. I want to see this for myself. Before I find a gator.

                                  Here is a thought about such probing, considering what has been shown here as far as the locations scanned, any basic server admin would have preventative measures in place to prevent such activities, even if it's only fail2ban. Rendering the utility useless.

                                  1 Reply Last reply Reply Quote 0
                                  • T
                                    TheNarc
                                    last edited by May 13, 2016, 3:43 PM

                                    I'll check with my users, but I think they're running the latest release (and I'm sure this feature is in the latest release), which seems to be 11.2.2262.

                                    1 Reply Last reply Reply Quote 0
                                    • M
                                      Mithrondil
                                      last edited by May 20, 2016, 8:32 AM May 19, 2016, 7:15 PM

                                      I have the same problem, and I have win7, using Firefox 64bit, and I have avast antivirus installed.
                                      So whats the conclusion on this matter, if its avast antivirus thats doing the scanning, can it be concidered normal or is a clean install of pfsense recommended?

                                      Also, is nginx a legit part of the pfsense install? Or how did this end up on my pfsense?

                                      1 Reply Last reply Reply Quote 0
                                      • K
                                        kpa
                                        last edited by May 19, 2016, 8:11 PM

                                        Everything so far says that it is in fact Avast that does the scanning. See if you can turn off the module/service in Avast that does the scanning. Yes, Nginx is now the web server in pfsense that implements the webgui and other related services. It used to be lighttpd in pfSense 2.2.* but was changed for 2.3.*.

                                        1 Reply Last reply Reply Quote 0
                                        • M
                                          mudmanc4
                                          last edited by May 19, 2016, 8:23 PM

                                          Interesting how this just started to be noticed in the logs. Or no one has bothered to look before now in this scenario.

                                          1 Reply Last reply Reply Quote 0
                                          25 out of 41
                                          • First post
                                            25/41
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                                            This community forum collects and processes your personal information.
                                            consent.not_received