PFBlocker for PFSense

Sparkey

Pulling my weight
Joined
Apr 3, 2015
Messages
237
Reaction score
159
Keeps the Chinese from trying to hack into Blue Iris. I've had zero attempts from China since I installed it. All my cams are on an internal subnet and not accessible from the Internet. Hopefully I am safe.
 
Joined
Aug 29, 2019
Messages
7
Reaction score
8
Location
Sweden
Well, I think you could think it in this way instead, if u have cameras (non-official I guess) and u havent checked these in deepth. They are in the same zone as your blue iris server so have protection on the wan edge and dns, i would not be so sure that u are so secure :)

Always best to have cameras on seperate vlan, especially when they are usually also outside.

However, pfblocker and suricata is really good to have on fw of course

Ps. If neccessary to have it on same vlan, full drop in the fw for the cameras ip range (if no local ntp I guess ntp to specific src is ok)
 

TL1096r

IPCT Contributor
Joined
Jan 28, 2017
Messages
1,223
Reaction score
465
How do you see the Chinese trying to hack your cams on BI? If there is no log in attempts in BI Status connections is there a different location.
 

TL1096r

IPCT Contributor
Joined
Jan 28, 2017
Messages
1,223
Reaction score
465
Status button at the top.
That is odd. You are using a vpn and still see them trying to connect. Luckily I am only seeing UI3 I have and old phone logins etc but nothing suspicious.
 

Sparkey

Pulling my weight
Joined
Apr 3, 2015
Messages
237
Reaction score
159
Cameras are on their own subnet. Login attempts are for BI. BI and server it runs on are protected by an uncrackable passwords.
 

TL1096r

IPCT Contributor
Joined
Jan 28, 2017
Messages
1,223
Reaction score
465
Cameras are on their own subnet. Login attempts are for BI. BI and server it runs on are protected by an uncrackable passwords.
Yes. What do the log in attempts on BI Status - Connections look like? I am just curious. I didn't think it could be accessed.
 
Joined
Aug 29, 2019
Messages
7
Reaction score
8
Location
Sweden
Cameras are on their own subnet. Login attempts are for BI. BI and server it runs on are protected by an uncrackable passwords.
But then I dont understand what pfblocker adds for value if the attempts are for BI from WAN and you havent publish it externally?

Pfblocker should not be used on wan interface in general if no public services are published. So if you have vpn, you csn add a pfblocker rule for only that port so to speak.

So yeah, im also curious now whats going on :)
 

Sparkey

Pulling my weight
Joined
Apr 3, 2015
Messages
237
Reaction score
159
No one has gained access but I'm still concerned and prefer that people in China, Russia and whatever other country I choose to block do not get past my router. Simple as that.

My BI server has 2 network interfaces. One for the cams (192.168.5.XX) and the other for Internet. (192.168.1.xx).

PFBlocker does the job.
 

TL1096r

IPCT Contributor
Joined
Jan 28, 2017
Messages
1,223
Reaction score
465
No one has gained access but I'm still concerned and prefer that people in China, Russia and whatever other country I choose to block do not get past my router. Simple as that.

My BI server has 2 network interfaces. One for the cams (192.168.5.XX) and the other for Internet. (192.168.1.xx).

PFBlocker does the job.
Nice. What are you using to run it. I am trying to find a little computer that might do the job. So do you use vlans or just 2 network cards?
 

NoloC

Getting comfortable
Joined
Nov 24, 2014
Messages
701
Reaction score
454
@Sparkey sounds like you have open ports? Port forwarding generally a bad idea. Any particular reason?

Most of us set up OpenVPN for remote access and do not expose any ports.
 

TL1096r

IPCT Contributor
Joined
Jan 28, 2017
Messages
1,223
Reaction score
465
@Sparkey sounds like you have open ports? Port forwarding generally a bad idea. Any particular reason?

Most of us set up OpenVPN for remote access and do not expose any ports.
That would clear up some confusion. Open ports I did see odd connections. With asus/openvpn seems much better.
 

CCTVCam

Known around here
Joined
Sep 25, 2017
Messages
2,671
Reaction score
3,497
Not sure it adds much safety although it's better than default. If you block by IP, what about the Chinese hacker who detects the camera and uses a proxy service eg a server based in the US to circumvent IP based Geolocation restrictions?

Best way is to make sure your camera is not visible or accessible to the wider internet either directly or by exploit / back door. That way, there's nothing to go after. Certain OSINT Tools will soon find your cameras IP's and sub addresses if they are visible to the internet even if popular search engines show no results.
 

whoami ™

Pulling my weight
Joined
Aug 4, 2019
Messages
230
Reaction score
224
Location
South Florida
Most connection attempts are from bots randomly scanning ports. If you set up a honeypot on a server that captures IP's you'd literally see hundreds of connection attempts a day. Some open ports get more than others, and no port is exempt.
 
Last edited:
Top