SSH open on red by default?

Hi,

I found the thread here and as I have the same issue and theres no real solution I want to discuss this again.

To try to block it I set an input drop rule for port 22 on red.

  • What does your IPFire setup look like (if possible, draw a simple diagram of it)?

The IPFire is a mini pc with 4 LAN ports located between the internet router on red and two subnets (green - the internal server network and blue (wifi and ethernet clients bridged over 2 ports))

  • How is IPFire’s RED interface connected to the internet?

It’s a Fritzbox which forwards all ports to IPFire (Exposed Host)

  • Which IPFire version are you running on?

Installed Core 185, Imported our template config and updated to Core 186.

  • Are there any 3rd party scripts or modifications to IPFire in place? If so, which ones?

No, there aren’t.

  • What (vulnerability) scanner did you use to spot the issue? What did it display precisely?

I simply tried to connect port 22 of the public IP and succeeded.

  • On IPFire, what is the output of iptables -L -n -v?

I cropped some parts (forward/output/empty chains) to not reach the post limit.

Chain INPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination
    0     0 IPSBYPASS  0    --  *      *       0.0.0.0/0            0.0.0.0/0            mark match 0xc0000000/0xc0000000
65579   21M BADTCP     6    --  *      *       0.0.0.0/0            0.0.0.0/0
75573   22M CUSTOMINPUT  0    --  *      *       0.0.0.0/0            0.0.0.0/0
75573   22M HOSTILE    0    --  *      *       0.0.0.0/0            0.0.0.0/0
70474   21M BLOCKLISTIN !1    --  *      *       0.0.0.0/0            0.0.0.0/0
72235   22M GUARDIAN   0    --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 OVPNBLOCK  0    --  tun+   *       0.0.0.0/0            0.0.0.0/0
72235   22M IPS_INPUT  0    --  *      *       0.0.0.0/0            0.0.0.0/0            mark match 0x0/0xc0000000
23623 2839K IPTVINPUT  0    --  *      *       0.0.0.0/0            0.0.0.0/0
23623 2839K ICMPINPUT  0    --  *      *       0.0.0.0/0            0.0.0.0/0
23623 2839K LOOPBACK   0    --  *      *       0.0.0.0/0            0.0.0.0/0
17695 2393K CAPTIVE_PORTAL  0    --  *      *       0.0.0.0/0            0.0.0.0/0
17695 2393K CONNTRACK  0    --  *      *       0.0.0.0/0            0.0.0.0/0
 1310  134K DHCPGREENINPUT  0    --  green0 *       0.0.0.0/0            0.0.0.0/0
 4037  263K DHCPBLUEINPUT  0    --  blue0  *       0.0.0.0/0            0.0.0.0/0
 5315  387K TOR_INPUT  0    --  *      *       0.0.0.0/0            0.0.0.0/0
 5315  387K LOCATIONBLOCK  0    --  *      *       0.0.0.0/0            0.0.0.0/0
 5315  387K IPSECINPUT  0    --  *      *       0.0.0.0/0            0.0.0.0/0
 5315  387K GUIINPUT   0    --  *      *       0.0.0.0/0            0.0.0.0/0
 5209  380K WIRELESSINPUT  0    --  *      *       0.0.0.0/0            0.0.0.0/0            ctstate NEW
 5198  377K OVPNINPUT  0    --  *      *       0.0.0.0/0            0.0.0.0/0
 5198  377K INPUTFW    0    --  *      *       0.0.0.0/0            0.0.0.0/0
  943  109K REDINPUT   0    --  *      *       0.0.0.0/0            0.0.0.0/0
  943  109K POLICYIN   0    --  *      *       0.0.0.0/0            0.0.0.0/0

Chain BADTCP (2 references)
 pkts bytes target     prot opt in     out     source               destination
 3930  215K RETURN     0    --  lo     *       0.0.0.0/0            0.0.0.0/0
    0     0 PSCAN      6    --  *      *       0.0.0.0/0            0.0.0.0/0            tcp flags:0x3F/0x29
    0     0 PSCAN      6    --  *      *       0.0.0.0/0            0.0.0.0/0            tcp flags:0x3F/0x37
    4   240 PSCAN      6    --  *      *       0.0.0.0/0            0.0.0.0/0            tcp flags:0x3F/0x3F
    0     0 PSCAN      6    --  *      *       0.0.0.0/0            0.0.0.0/0            tcp flags:0x3F/0x01
    0     0 PSCAN      6    --  *      *       0.0.0.0/0            0.0.0.0/0            tcp flags:0x06/0x06
    0     0 PSCAN      6    --  *      *       0.0.0.0/0            0.0.0.0/0            tcp flags:0x03/0x03
    1    60 PSCAN      6    --  *      *       0.0.0.0/0            0.0.0.0/0            tcp flags:0x3F/0x00
   17  1222 NEWNOTSYN  6    --  *      *       0.0.0.0/0            0.0.0.0/0            tcp flags:!0x17/0x02 ctstate NEW

Chain CAPTIVE_PORTAL_CLIENTS (0 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 RETURN     17   --  *      *       0.0.0.0/0            0.0.0.0/0            udp dpt:53 limit: up to 3kb/s burst 1mb mode srcip
    0     0 RETURN     6    --  *      *       0.0.0.0/0            0.0.0.0/0            tcp dpt:53 limit: up to 3kb/s burst 1mb mode srcip
    0     0 DROP       0    --  *      *       0.0.0.0/0            0.0.0.0/0

Chain CONNTRACK (3 references)
 pkts bytes target     prot opt in     out     source               destination
 244K  113M ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0            ctstate ESTABLISHED
    9   716 CTINVALID  0    --  *      *       0.0.0.0/0            0.0.0.0/0            ctstate INVALID
    8  2244 ACCEPT     1    --  *      *       0.0.0.0/0            0.0.0.0/0            ctstate RELATED

Chain CTINVALID (1 references)
 pkts bytes target     prot opt in     out     source               destination
    9   716 LOG        0    --  *      *       0.0.0.0/0            0.0.0.0/0            limit: avg 10/sec burst 5 LOG flags 0 level 4 prefix "DROP_CTINVALID "
    9   716 DROP       0    --  *      *       0.0.0.0/0            0.0.0.0/0            /* DROP_CTINVALID */

Chain CUSTOMFORWARD (1 references)
 pkts bytes target     prot opt in     out     source               destination

Chain CUSTOMINPUT (1 references)
 pkts bytes target     prot opt in     out     source               destination

Chain CUSTOMOUTPUT (1 references)
 pkts bytes target     prot opt in     out     source               destination

Chain DHCPBLUEINPUT (1 references)
 pkts bytes target     prot opt in     out     source               destination
 3933  253K DHCPINPUT  0    --  blue0  *       0.0.0.0/0            0.0.0.0/0

Chain DHCPBLUEOUTPUT (1 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 DHCPOUTPUT  0    --  *      blue0   0.0.0.0/0            0.0.0.0/0

Chain DHCPGREENINPUT (1 references)
 pkts bytes target     prot opt in     out     source               destination
 1297  133K DHCPINPUT  0    --  green0 *       0.0.0.0/0            0.0.0.0/0

Chain DHCPGREENOUTPUT (1 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 DHCPOUTPUT  0    --  *      green0  0.0.0.0/0            0.0.0.0/0

Chain DHCPINPUT (2 references)
 pkts bytes target     prot opt in     out     source               destination
   32 10526 ACCEPT     17   --  *      *       0.0.0.0/0            0.0.0.0/0            udp spt:68 dpt:67
    0     0 ACCEPT     6    --  *      *       0.0.0.0/0            0.0.0.0/0            tcp spt:68 dpt:67

Chain DHCPOUTPUT (2 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 ACCEPT     17   --  *      *       0.0.0.0/0            0.0.0.0/0            udp spt:67 dpt:68
    0     0 ACCEPT     6    --  *      *       0.0.0.0/0            0.0.0.0/0            tcp spt:67 dpt:68

Chain GUIINPUT (1 references)
 pkts bytes target     prot opt in     out     source               destination
  106  6360 ACCEPT     6    --  green0 *       0.0.0.0/0            0.0.0.0/0            tcp dpt:444

Chain HOSTILE (3 references)
 pkts bytes target     prot opt in     out     source               destination
   31  1380 HOSTILE_DROP_IN  0    --  red0   *       0.0.0.0/0            0.0.0.0/0            match-set XD src
    0     0 HOSTILE_DROP_OUT  0    --  *      red0    0.0.0.0/0            0.0.0.0/0            match-set XD dst

Chain HOSTILE_DROP_IN (1 references)
 pkts bytes target     prot opt in     out     source               destination
 3338  149K DROP       0    --  *      *       0.0.0.0/0            0.0.0.0/0            /* DROP_HOSTILE */

Chain HOSTILE_DROP_OUT (1 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 DROP       0    --  *      *       0.0.0.0/0            0.0.0.0/0            /* DROP_HOSTILE */

Chain ICMPINPUT (1 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 ACCEPT     1    --  *      *       0.0.0.0/0            0.0.0.0/0            icmptype 8

Chain INPUTFW (1 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 DROP       6    --  red0   *       0.0.0.0/0            192.168.100.2        tcp dpt:22
    0     0 ACCEPT     6    --  *      *       192.168.1.240/29     192.168.1.1          tcp dpt:444
    0     0 ACCEPT     6    --  *      *       192.168.10.240/29    192.168.1.1          tcp dpt:444
    0     0 ACCEPT     6    --  *      *       192.168.1.240/29     192.168.10.1         tcp dpt:444
    0     0 ACCEPT     6    --  *      *       192.168.10.240/29    192.168.10.1         tcp dpt:444
    0     0 ACCEPT     6    --  green0 *       192.168.1.0/24       192.168.1.1          multiport dports 139,444
    0     0 ACCEPT     17   --  green0 *       192.168.1.0/24       192.168.1.1          multiport dports 53,137:138,123
    0     0 ACCEPT     6    --  blue0  *       192.168.10.0/24      192.168.10.1         multiport dports 139,444
   34  2074 ACCEPT     17   --  blue0  *       192.168.10.0/24      192.168.10.1         multiport dports 53,137:138,123
    0     0 ACCEPT     6    --  *      *       10.16.1.8/30         0.0.0.0/0            tcp dpt:444
    0     0 ACCEPT     17   --  red0   *       0.0.0.0/0            192.168.100.2        udp dpts:1194:1198
    0     0 ACCEPT     6    --  *      *       192.168.1.5          0.0.0.0/0            multiport dports 21,20,80,443,990,989,4434
    0     0 ACCEPT     6    --  *      *       192.168.1.15         0.0.0.0/0            multiport dports 21,20,80,443,990,989,4434
    0     0 ACCEPT     6    --  *      *       192.168.1.10         0.0.0.0/0            multiport dports 21,20,80,443,990,989,4434
    0     0 ACCEPT     6    --  *      *       192.168.1.4          0.0.0.0/0            multiport dports 21,20,80,443,990,989,4434
    0     0 ACCEPT     6    --  *      *       192.168.1.11         0.0.0.0/0            multiport dports 21,20,80,443,990,989,4434
    0     0 ACCEPT     17   --  *      *       192.168.1.5          0.0.0.0/0            udp dpt:123
    0     0 ACCEPT     17   --  *      *       192.168.1.15         0.0.0.0/0            udp dpt:123
    0     0 ACCEPT     17   --  *      *       192.168.1.10         0.0.0.0/0            udp dpt:123
    0     0 ACCEPT     17   --  *      *       192.168.1.4          0.0.0.0/0            udp dpt:123
    0     0 ACCEPT     17   --  *      *       192.168.1.11         0.0.0.0/0            udp dpt:123
    0     0 ACCEPT     1    --  *      *       192.168.1.5          0.0.0.0/0
    0     0 ACCEPT     1    --  *      *       192.168.1.15         0.0.0.0/0
    0     0 ACCEPT     1    --  *      *       192.168.1.10         0.0.0.0/0
    0     0 ACCEPT     1    --  *      *       192.168.1.4          0.0.0.0/0
    0     0 ACCEPT     1    --  *      *       192.168.1.11         0.0.0.0/0
    0     0 ACCEPT     6    --  *      *       192.168.1.5          0.0.0.0/0            multiport dports 143,993,25,465,587,995,110
    0     0 ACCEPT     6    --  *      *       192.168.1.15         0.0.0.0/0            multiport dports 143,993,25,465,587,995,110
    0     0 ACCEPT     6    --  *      *       192.168.1.10         0.0.0.0/0            multiport dports 143,993,25,465,587,995,110
    0     0 ACCEPT     6    --  *      *       192.168.1.4          0.0.0.0/0            multiport dports 143,993,25,465,587,995,110
    0     0 ACCEPT     6    --  *      *       192.168.1.11         0.0.0.0/0            multiport dports 143,993,25,465,587,995,110
    0     0 ACCEPT     0    --  *      *       192.168.1.11         192.168.10.0/24
    0     0 ACCEPT     0    --  *      *       192.168.1.10         192.168.10.0/24
    0     0 ACCEPT     0    --  *      *       192.168.1.15         192.168.10.0/24
    0     0 ACCEPT     6    --  *      *       192.168.10.128/26    0.0.0.0/0            multiport dports 21,20,80,443,990,989,4434
    0     0 ACCEPT     17   --  *      *       192.168.10.128/26    0.0.0.0/0            udp dpt:123
    0     0 ACCEPT     1    --  *      *       192.168.10.128/26    0.0.0.0/0
    0     0 ACCEPT     6    --  *      *       192.168.10.128/26    0.0.0.0/0            multiport dports 143,993,25,465,587,995,110
    0     0 ACCEPT     17   --  blue0  *       192.168.10.0/24      0.0.0.0/0            udp dpts:1194:1198
    0     0 ACCEPT     6    --  *      *       192.168.10.52        0.0.0.0/0            multiport dports 21,20,80,443,990,989,4434
    0     0 ACCEPT     6    --  *      *       192.168.10.51        0.0.0.0/0            multiport dports 21,20,80,443,990,989,4434
    0     0 ACCEPT     6    --  *      *       192.168.10.53        0.0.0.0/0            multiport dports 21,20,80,443,990,989,4434
    0     0 ACCEPT     6    --  *      *       192.168.10.54        0.0.0.0/0            multiport dports 21,20,80,443,990,989,4434
    0     0 ACCEPT     6    --  *      *       192.168.10.55        0.0.0.0/0            multiport dports 21,20,80,443,990,989,4434
    0     0 ACCEPT     6    --  *      *       192.168.10.71        0.0.0.0/0            multiport dports 21,20,80,443,990,989,4434
    0     0 ACCEPT     6    --  *      *       192.168.10.81        0.0.0.0/0            multiport dports 21,20,80,443,990,989,4434
    0     0 ACCEPT     6    --  *      *       192.168.10.72        0.0.0.0/0            multiport dports 21,20,80,443,990,989,4434
    0     0 ACCEPT     6    --  *      *       192.168.10.82        0.0.0.0/0            multiport dports 21,20,80,443,990,989,4434
    0     0 ACCEPT     6    --  *      *       192.168.10.56        0.0.0.0/0            multiport dports 21,20,80,443,990,989,4434
    0     0 ACCEPT     6    --  *      *       192.168.10.57        0.0.0.0/0            multiport dports 21,20,80,443,990,989,4434
    0     0 ACCEPT     6    --  *      *       192.168.10.58        0.0.0.0/0            multiport dports 21,20,80,443,990,989,4434
    0     0 ACCEPT     6    --  *      *       192.168.10.59        0.0.0.0/0            multiport dports 21,20,80,443,990,989,4434
    0     0 ACCEPT     6    --  *      *       192.168.10.73        0.0.0.0/0            multiport dports 21,20,80,443,990,989,4434
    0     0 ACCEPT     6    --  *      *       192.168.10.83        0.0.0.0/0            multiport dports 21,20,80,443,990,989,4434
    0     0 ACCEPT     17   --  *      *       192.168.10.52        0.0.0.0/0            udp dpt:123
    0     0 ACCEPT     17   --  *      *       192.168.10.51        0.0.0.0/0            udp dpt:123
    0     0 ACCEPT     17   --  *      *       192.168.10.53        0.0.0.0/0            udp dpt:123
    0     0 ACCEPT     17   --  *      *       192.168.10.54        0.0.0.0/0            udp dpt:123
    0     0 ACCEPT     17   --  *      *       192.168.10.55        0.0.0.0/0            udp dpt:123
    0     0 ACCEPT     17   --  *      *       192.168.10.71        0.0.0.0/0            udp dpt:123
    0     0 ACCEPT     17   --  *      *       192.168.10.81        0.0.0.0/0            udp dpt:123
    0     0 ACCEPT     17   --  *      *       192.168.10.72        0.0.0.0/0            udp dpt:123
    0     0 ACCEPT     17   --  *      *       192.168.10.82        0.0.0.0/0            udp dpt:123
    0     0 ACCEPT     17   --  *      *       192.168.10.56        0.0.0.0/0            udp dpt:123
    0     0 ACCEPT     17   --  *      *       192.168.10.57        0.0.0.0/0            udp dpt:123
    0     0 ACCEPT     17   --  *      *       192.168.10.58        0.0.0.0/0            udp dpt:123
    0     0 ACCEPT     17   --  *      *       192.168.10.59        0.0.0.0/0            udp dpt:123
    0     0 ACCEPT     17   --  *      *       192.168.10.73        0.0.0.0/0            udp dpt:123
    0     0 ACCEPT     17   --  *      *       192.168.10.83        0.0.0.0/0            udp dpt:123
    0     0 ACCEPT     1    --  *      *       192.168.10.52        0.0.0.0/0
    0     0 ACCEPT     1    --  *      *       192.168.10.51        0.0.0.0/0
    0     0 ACCEPT     1    --  *      *       192.168.10.53        0.0.0.0/0
    0     0 ACCEPT     1    --  *      *       192.168.10.54        0.0.0.0/0
    0     0 ACCEPT     1    --  *      *       192.168.10.55        0.0.0.0/0
    0     0 ACCEPT     1    --  *      *       192.168.10.71        0.0.0.0/0
    0     0 ACCEPT     1    --  *      *       192.168.10.81        0.0.0.0/0
    0     0 ACCEPT     1    --  *      *       192.168.10.72        0.0.0.0/0
    0     0 ACCEPT     1    --  *      *       192.168.10.82        0.0.0.0/0
    0     0 ACCEPT     1    --  *      *       192.168.10.56        0.0.0.0/0
    0     0 ACCEPT     1    --  *      *       192.168.10.57        0.0.0.0/0
    0     0 ACCEPT     1    --  *      *       192.168.10.58        0.0.0.0/0
    0     0 ACCEPT     1    --  *      *       192.168.10.59        0.0.0.0/0
    0     0 ACCEPT     1    --  *      *       192.168.10.73        0.0.0.0/0
    0     0 ACCEPT     1    --  *      *       192.168.10.83        0.0.0.0/0
    0     0 ACCEPT     0    --  *      *       192.168.1.240/29     192.168.10.0/24
    0     0 ACCEPT     0    --  *      *       192.168.1.240/29     192.168.1.0/24
    0     0 ACCEPT     0    --  *      *       192.168.10.240/29    192.168.10.0/24
    0     0 ACCEPT     0    --  *      *       192.168.10.240/29    192.168.1.0/24
    0     0 ACCEPT     0    --  *      *       10.16.1.8/30         0.0.0.0/0
    0     0 ACCEPT     6    --  *      *       192.168.10.101       0.0.0.0/0            multiport dports 21,20,80,443,990,989,4434
    0     0 ACCEPT     17   --  *      *       192.168.10.101       0.0.0.0/0            udp dpt:123
    0     0 ACCEPT     1    --  *      *       192.168.10.101       0.0.0.0/0
    0     0 ACCEPT     6    --  *      *       192.168.10.101       0.0.0.0/0            tcp dpt:4001
    0     0 ACCEPT     6    --  *      *       192.168.10.103       0.0.0.0/0            tcp dpt:40001

Chain IPSBYPASS (3 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 CONNMARK   0    --  *      *       0.0.0.0/0            0.0.0.0/0            CONNMARK save mask 0x7fffffff

Chain IPS_FORWARD (1 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 NFQUEUE    0    --  red0   red0    0.0.0.0/0            0.0.0.0/0            NFQUEUE balance 0:3 bypass cpu-fanout

Chain IPS_INPUT (1 references)
 pkts bytes target     prot opt in     out     source               destination
48612   19M NFQUEUE    0    --  red0   *       0.0.0.0/0            0.0.0.0/0            NFQUEUE balance 0:3 bypass cpu-fanout

Chain IPS_OUTPUT (1 references)
 pkts bytes target     prot opt in     out     source               destination
49695 5169K NFQUEUE    0    --  *      red0    0.0.0.0/0            0.0.0.0/0            NFQUEUE balance 0:3 bypass cpu-fanout

Chain LOG_DROP (0 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 LOG        0    --  *      *       0.0.0.0/0            0.0.0.0/0            limit: avg 10/sec burst 5 LOG flags 0 level 4
    0     0 DROP       0    --  *      *       0.0.0.0/0            0.0.0.0/0

Chain LOG_REJECT (0 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 LOG        0    --  *      *       0.0.0.0/0            0.0.0.0/0            limit: avg 10/sec burst 5 LOG flags 0 level 4
    0     0 REJECT     0    --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-port-unreachable

Chain LOOPBACK (3 references)
 pkts bytes target     prot opt in     out     source               destination
 5928  446K ACCEPT     0    --  lo     *       0.0.0.0/0            0.0.0.0/0
 5928  446K ACCEPT     0    --  *      lo      0.0.0.0/0            0.0.0.0/0
    0     0 SPOOFED_MARTIAN  0    --  *      *       127.0.0.0/8          0.0.0.0/0
    0     0 SPOOFED_MARTIAN  0    --  *      *       0.0.0.0/0            127.0.0.0/8

Chain NEWNOTSYN (1 references)
 pkts bytes target     prot opt in     out     source               destination
   17  1222 LOG        0    --  *      *       0.0.0.0/0            0.0.0.0/0            limit: avg 10/sec burst 5 LOG flags 0 level 4 prefix "DROP_NEWNOTSYN "
   17  1222 DROP       0    --  *      *       0.0.0.0/0            0.0.0.0/0            /* DROP_NEWNOTSYN */

Chain OVPNBLOCK (3 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 RETURN     1    --  *      *       0.0.0.0/0            0.0.0.0/0            ctstate RELATED

Chain OVPNINPUT (1 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 ACCEPT     17   --  red0   *       0.0.0.0/0            0.0.0.0/0            udp dpt:1196

Chain POLICYFWD (1 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 LOG        0    --  *      *       0.0.0.0/0            0.0.0.0/0            limit: avg 10/sec burst 5 LOG flags 0 level 4 prefix "DROP_FORWARD "
    0     0 DROP       0    --  *      *       0.0.0.0/0            0.0.0.0/0            /* DROP_FORWARD */

Chain POLICYIN (1 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 DROP       17   --  *      *       0.0.0.0/0            0.0.0.0/0            udp dpt:514
   11  1294 ACCEPT     0    --  green0 *       0.0.0.0/0            0.0.0.0/0
    0     0 ACCEPT     0    --  blue0  *       0.0.0.0/0            0.0.0.0/0
    0     0 LOG        0    --  *      *       0.0.0.0/0            0.0.0.0/0            limit: avg 10/sec burst 5 LOG flags 0 level 4 prefix "DROP_INPUT "
    0     0 DROP       0    --  *      *       0.0.0.0/0            0.0.0.0/0            /* DROP_INPUT */

Chain POLICYOUT (1 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 DROP       0    --  *      *       0.0.0.0/0            0.0.0.0/0            /* DROP_OUTPUT */

Chain PSCAN (7 references)
 pkts bytes target     prot opt in     out     source               destination
    5   300 LOG        6    --  *      *       0.0.0.0/0            0.0.0.0/0            limit: avg 10/sec burst 5 /* DROP_TCP PScan */ LOG flags 0 level 4 prefix "DROP_TCP Scan "
    0     0 LOG        17   --  *      *       0.0.0.0/0            0.0.0.0/0            limit: avg 10/sec burst 5 /* DROP_UDP PScan */ LOG flags 0 level 4 prefix "DROP_UDP Scan "
    0     0 LOG        1    --  *      *       0.0.0.0/0            0.0.0.0/0            limit: avg 10/sec burst 5 /* DROP_ICMP PScan */ LOG flags 0 level 4 prefix "DROP_ICMP Scan "
    0     0 LOG        0    -f  *      *       0.0.0.0/0            0.0.0.0/0            limit: avg 10/sec burst 5 /* DROP_FRAG PScan */ LOG flags 0 level 4 prefix "DROP_FRAG Scan "
    5   300 DROP       0    --  *      *       0.0.0.0/0            0.0.0.0/0            /* DROP_PScan */

Chain REDINPUT (1 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 SPOOFED_MARTIAN  0    --  red0   *       192.168.100.2        0.0.0.0/0

Chain SPOOFED_MARTIAN (3 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 LOG        0    --  *      *       0.0.0.0/0            0.0.0.0/0            limit: avg 10/sec burst 5 LOG flags 0 level 4 prefix "DROP_SPOOFED_MARTIAN "
    0     0 DROP       0    --  *      *       0.0.0.0/0            0.0.0.0/0            /* DROP_SPOOFED_MARTIAN */

Chain WIRELESSFORWARD (1 references)
 pkts bytes target     prot opt in     out     source               destination
 6875  433K RETURN     0    --  blue0  *       192.168.10.0/24      0.0.0.0/0
    0     0 LOG        0    --  blue0  *       0.0.0.0/0            0.0.0.0/0            LOG flags 0 level 4 prefix "DROP_Wirelessforward "
    0     0 DROP       0    --  blue0  *       0.0.0.0/0            0.0.0.0/0            /* DROP_Wirelessforward */

Chain WIRELESSINPUT (1 references)
 pkts bytes target     prot opt in     out     source               destination
 3994  249K RETURN     0    --  blue0  *       192.168.10.0/24      0.0.0.0/0
   11  3626 LOG        0    --  blue0  *       0.0.0.0/0            0.0.0.0/0            LOG flags 0 level 4 prefix "DROP_Wirelessinput "
   11  3626 DROP       0    --  blue0  *       0.0.0.0/0            0.0.0.0/0            /* DROP_Wirelessinput */
  • On IPFire, what is the output of ifconfig?
blue0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet 192.168.10.1  netmask 255.255.255.0  broadcast 0.0.0.0
        ether xx:xx:xx:xx:xx:xx  txqueuelen 1000  (Ethernet)
        RX packets 59207  bytes 17884966 (17.0 MiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 51396  bytes 8086875 (7.7 MiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

blue0p0: flags=4099<UP,BROADCAST,MULTICAST>  mtu 1500
        ether xx:xx:xx:xx:xx:xx  txqueuelen 1000  (Ethernet)
        RX packets 4611  bytes 622489 (607.8 KiB)
        RX errors 0  dropped 1  overruns 0  frame 0
        TX packets 1165  bytes 153748 (150.1 KiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
        device memory 0x81600000-816fffff

blue0p1: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        ether xx:xx:xx:xx:xx:xx  txqueuelen 1000  (Ethernet)
        RX packets 55782  bytes 18169645 (17.3 MiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 50230  bytes 7933073 (7.5 MiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
        device memory 0x81300000-813fffff

green0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet 192.168.1.1  netmask 255.255.255.0  broadcast 0.0.0.0
        ether xx:xx:xx:xx:xx:xx  txqueuelen 1000  (Ethernet)
        RX packets 55205  bytes 40454916 (38.5 MiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 86078  bytes 44589286 (42.5 MiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
        device memory 0x81900000-819fffff

imq0: flags=195<UP,BROADCAST,RUNNING,NOARP>  mtu 1500
        ether xx:xx:xx:xx:xx:xx  txqueuelen 32  (Ethernet)
        RX packets 219488  bytes 69190421 (65.9 MiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 219488  bytes 69190421 (65.9 MiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

lo: flags=73<UP,LOOPBACK,RUNNING>  mtu 65536
        inet 127.0.0.1  netmask 255.0.0.0
        loop  txqueuelen 1000  (Local Loopback)
        RX packets 5858  bytes 438046 (427.7 KiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 5858  bytes 438046 (427.7 KiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

red0: flags=67<UP,BROADCAST,RUNNING>  mtu 1500
        inet 192.168.100.2  netmask 255.255.255.0  broadcast 0.0.0.0
        ether xx:xx:xx:xx:xx:xx  txqueuelen 1000  (Ethernet)
        RX packets 219490  bytes 69193277 (65.9 MiB)
        RX errors 0  dropped 48752  overruns 0  frame 0
        TX packets 137785  bytes 60705800 (57.8 MiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
        device memory 0x81c00000-81cfffff

tun0: flags=4305<UP,POINTOPOINT,RUNNING,NOARP,MULTICAST>  mtu 1400
        inet 10.16.1.1  netmask 255.255.255.255  destination 10.16.1.2
        unspec 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00  txqueuelen 500  (UNSPEC)
        RX packets 0  bytes 0 (0.0 B)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 0  bytes 0 (0.0 B)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

I set rule 1 to drop ssh requests but this has no effect. Also rules 2,3 and 7 seem not to be required as these services are allowed by default… Can I change this?

  • When did the problem occur? Is it reproducible? If so, which steps are needed to be taken?

Everytime when the ssh service is enabled.

Hallo @hensch

Welcome to the IPFire community

Have you modified the ssh entry for your IPFire from the default setting of port 222 to port 22 which can be done via the ssh WUI page.

When you say that you succeeded in connecting to the ssh port 22 was this connecting to your IPFire ssh system or do you have other ssh servers in your network.

If you stop the fritzbox from forwarding all ports what happens to the ssh connection attempt.
Does the fritzbox have an ssh server connection?

1 Like

Extending this thought, have you tried to reach the SSH server on your public address? What system answers, IPFire or FritzBox?

Yes, i set it to 22 via the option in the WUI.

I only tested if the IPFire SSH service is reachable over internet when it is active.

I’ve got another ssh server behind the IPFire (Port 33 on red forwarded to port 22 of one device in the green network). This is working as expected.

If I disable the port forwarding I’d expect the IPFire to be unreachable. I’m accessing it remotely via VPN at the moment.

I connected to [public IP]:22 via ssh and the IPFire answered.

I just checked my system with several online port checkers.
All signal ‘closed’, even with setting SSH port to 22.

I rebooted the IPFire one more time and the port is closed now, even without the drop rule. This is weird.

I’ll watch it in the future and check the other IPFire systems later if the port is open.

Yes it is weird. We really would like to understand what is happening with this when people experience it so it can be fixed.

Unfortunately none of the IPFire developers have ever experienced the problems and no one has identified how to reproduce the problem and so far none of the log info provided by any of the users experiencing the problem has helped to give any clues on what might be occurring.

and let us know if it comes back again.

1 Like

In older versions of suricata was a bug that may bypass the local firewall if suricata has crashed.

Which IPFire version did you use and is IPS (Suricata) enabled?

2 Likes

As i mentioned in Post 1, I freshly installed core 185. Then I imported a template backup (created with core 17x) and then i updated to core 186. IPS is enabled.