Blocked Connections Skyrocketing

Comments

26 comments

  • Avatar
    parsoli

    Oh, one important fact.  99% of the inbound traffic is UDP....

     

    Timestamp
    Source
    Destination
    Destination Port
    Upload
    Download
    Status
     
    8:36 AM
     
    23.82.78.39
     
    WAN
    UDP 43830 - - Blocked  
    8:36 AM
     
    37.120.216.82
     
    WAN
    UDP 43830 - - Blocked  
    8:36 AM
    144.48.104.74
     
    WAN
    UDP 43830 - - Blocked  
    8:36 AM
    23.82.75.184
     
    WAN
    UDP 50183 - - Blocked  
    8:36 AM
    192.99.4.226
     
    WAN
    UDP 50183 - - Blocked  
    8:36 AM
    172.107.198.122
     
    WAN
    UDP 50183 - - Blocked  
    8:35 AM
    23.82.78.39
     
    WAN
    UDP 58118 - - Blocked  
    8:35 AM
    37.120.216.82
     
    WAN
    UDP 58118 - - Blocked  
    8:35 AM
    144.48.104.74
     
    WAN
    UDP 58118 - - Blocked  
    8:35 AM
    45.134.144.11
     
    WAN
    UDP 5060 - - Blocked  
    8:35 AM
    103.145.13.243
     
    WAN
    TCP 5038 - - Blocked  
    8:35 AM
    23.19.219.123
     
    WAN
    UDP 33131 - - Blocked  
    8:35 AM
    192.99.7.194
     
    WAN
    UDP 33131 - - Blocked  
    8:35 AM
    172.107.198.98
     
    WAN
    UDP 33131 - - Blocked  
    8:35 AM
    23.82.78.39
     
    WAN
    UDP 43830 - - Blocked  
    8:35 AM
    37.120.216.82
     
    WAN
    UDP 43830 - - Blocked  
    8:35 AM
    144.48.104.74
     
    WAN
    UDP 43830 - - Blocked  
    8:35 AM
    23.82.75.184
     
    WAN
    UDP 50183 - - Blocked
    0
    Comment actions Permalink
  • Avatar
    Firewalla

    If you see traffic getting blocked, you should not worry about them. If you have a public IP address, you will get poked by different people or organizations ... I don't think anything can be done either.

     

    0
    Comment actions Permalink
  • Avatar
    parsoli

    I guess part of my concern is that it's valid traffic that the firewalla needs to broker between the source and destination and that the connections aren't being honored.  If a device on my internal network reaches out to an external device and that device spins up a UDP connection to further interact with the internal device.

    0
    Comment actions Permalink
  • Avatar
    James Willhoite

    I noticed something similar lately. I want from having maybe 12K blocks in 24 Hours to over 1.5M in 24 hours. They seem to be doing a port scan. Firewalla is blocking them, but weird it has happened all of a sudden. (Within the last few days/weeks)

    1
    Comment actions Permalink
  • Avatar
    parsoli

    Thanks James.  So do you find your ports are UDP and high in the range like mine shown above?  5 digits?  If so, I wouldn't call it scanning, i'd call it something is blocking normal UDP usage.

    Many IP addresses I see are from my webcam vendor, Wyze.  And it's as if when my camera tries to connect to their services, they need to connect back over a UDP port in that high ephemeral range but cannot.....as Firewalla is blocking it.

    1
    Comment actions Permalink
  • Avatar
    James Willhoite

    No mine are TCP, and it would be a port scan as they are sequential and not really random.

    0
    Comment actions Permalink
  • Avatar
    Chris Hewitt

    And this, fine friends, is why we all have Firewalla devices. Malicious traffics is being blocked from your network. Isn’t this what you want?

    1
    Comment actions Permalink
  • Avatar
    parsoli

    Yea, of course.  However in my case, the UDP traffic is expected return traffic from head-end servers that broker communication flow with my web camera devices.

    1
    Comment actions Permalink
  • Avatar
    James Willhoite

    I noticed with one of the last updates that the port forward is only allowing incoming traffic. My Webserver allows port 80 and 443 to come in, but when it is going out (system software updates, etc) then Firewalla is blocking those outbound connections. For instance I use LetsEncrypt. My certificates were expiring because the Firewalla blocked those outbound connections. I had to specifically list the ip/domain for lets encrypt to allow to be able to communicate with them. 

    When I look at the Network flow for that device and open up one of the blocked connections and clicked on "Why is this blocked" it doesn't list anything. I just noticed the Port and the Direction. Then noticed under the rules that "Traffic from internet, Local Port 80, Inbound only, Always". 

    0
    Comment actions Permalink
  • Avatar
    Firewalla

    The open port rules should be in both directions if you use port forwarding and tap on "automatically open port on the firewalla". Did you do that? If you did, then please send help@firewalla.com and we can help you.

    0
    Comment actions Permalink
  • Avatar
    James Willhoite

    These were set up when I first got my Firewalla Gold (over a year ago). I went to Network > NAT Settings > Port Forwarding > "Add Port Forwarding"

    Your logic put those rules in place. Maybe need to remove and reapply? Like I said, those rules have been in place since I first put the Gold into production and have not had any issue. It's even gotten down to some local devices get blocked from accessing port 80 or 443 on that device. Not all devices though, just a select few and the Diagnose does not produce any results.

    0
    Comment actions Permalink
  • Avatar
    Support Team

    @James,

    Are there any other rules added to web server recently? This port forwarding rule should only impact inbound traffic only since the beginning. There may be other rules related to the outbound blocking issue.

     

    If you send email to help@firewalla.com and share us remote support, we can remotely debug the issue.

     

    Thanks,

    0
    Comment actions Permalink
  • Avatar
    James Willhoite

    Nope. Nothing has changed since day one. I will try removing the port forward and re add. Maybe a update to the software sometime caused a small issue.
    The only change really made was to allow the letsencrypt.org website but besides that, nothing has changed with that device.

    1
    Comment actions Permalink
  • Avatar
    Support Team

    Sure, if it still doesn't work, we'd like to debug remotely.

    0
    Comment actions Permalink
  • Avatar
    James Willhoite

    I just filed a Ticket. Removing of port forward and a reboot seemed to help but now having issues of port 22 in the allowed list, but still being blocked.

    0
    Comment actions Permalink
  • Avatar
    Richard Aldridge

    I'm seeing inbound IP blocks to my firewalla from 108.181.24.49 to random UDP ports on my WAN but always with a source port of 10001. In any given 24 period, I'm seeing over 500k blocks. Another IP of 192.99.160.133 has had over 200k blocks in the same period. Same random UDP port and source port of 10001. It's basically a DDOS attack without the distributed part. And it's causing issues on my network. This has been happening for weeks and maybe months. Any idea what's happening here?

    1
    Comment actions Permalink
  • 0
    Comment actions Permalink
  • Avatar
    parsoli

    You both running Wyze Cameras? This is expected behavior if so. What makes you think it’s. DDNS attack? My Wyzecams talk to those same networks that Wyze uses to broker connections to cameras

    0
    Comment actions Permalink
  • Avatar
    Kyle

    No Wyze cameras.

    0
    Comment actions Permalink
  • Avatar
    parsoli

    Interesting. My Wyze connect to that same subnet. Do you have any cameras on your network?

    0
    Comment actions Permalink
  • Avatar
    Kyle

    No, but if I switch to my LTE hotspot the issue goes away.

    0
    Comment actions Permalink
  • Avatar
    parsoli

    And if you type that ip address into flow, what device is it communicating with?

    0
    Comment actions Permalink
  • Avatar
    Richard Aldridge

    I've been seeing this for months too.  95% of my traffic being blocked.  Have three cams.

    https://forums.wyze.com/t/udp-packet-flood-from-wyze-ip-addresses/222071/3

    0
    Comment actions Permalink
  • Avatar
    Firewalla

    Are all the blocks coming from outside of your network? when the block happens, does your device still work?

    0
    Comment actions Permalink
  • Avatar
    Richard Aldridge

    Yes, all from outside.  And I do have a ticket open regarding random network loss.  I'm wondering if it's related.

    0
    Comment actions Permalink
  • Avatar
    Firewalla

    If your random network loss is not the WYZE devices, then it is likely not related to the blocks. 

    0
    Comment actions Permalink

Please sign in to leave a comment.