Keeps the Chinese from trying to hack into Blue Iris. I've had zero attempts from China since I installed it. All my cams are on an internal subnet and not accessible from the Internet. Hopefully I am safe.
Well, I think you could think it in this way instead, if u have cameras (non-official I guess) and u havent checked these in deepth. They are in the same zone as your blue iris server so have protection on the wan edge and dns, i would not be so sure that u are so secure
Always best to have cameras on seperate vlan, especially when they are usually also outside.
However, pfblocker and suricata is really good to have on fw of course
Ps. If neccessary to have it on same vlan, full drop in the fw for the cameras ip range (if no local ntp I guess ntp to specific src is ok)
That is odd. You are using a vpn and still see them trying to connect. Luckily I am only seeing UI3 I have and old phone logins etc but nothing suspicious.
But then I dont understand what pfblocker adds for value if the attempts are for BI from WAN and you havent publish it externally?
Pfblocker should not be used on wan interface in general if no public services are published. So if you have vpn, you csn add a pfblocker rule for only that port so to speak.
No one has gained access but I'm still concerned and prefer that people in China, Russia and whatever other country I choose to block do not get past my router. Simple as that.
My BI server has 2 network interfaces. One for the cams (192.168.5.XX) and the other for Internet. (192.168.1.xx).
No one has gained access but I'm still concerned and prefer that people in China, Russia and whatever other country I choose to block do not get past my router. Simple as that.
My BI server has 2 network interfaces. One for the cams (192.168.5.XX) and the other for Internet. (192.168.1.xx).
Not sure it adds much safety although it's better than default. If you block by IP, what about the Chinese hacker who detects the camera and uses a proxy service eg a server based in the US to circumvent IP based Geolocation restrictions?
Best way is to make sure your camera is not visible or accessible to the wider internet either directly or by exploit / back door. That way, there's nothing to go after. Certain OSINT Tools will soon find your cameras IP's and sub addresses if they are visible to the internet even if popular search engines show no results.
Most connection attempts are from bots randomly scanning ports. If you set up a honeypot on a server that captures IP's you'd literally see hundreds of connection attempts a day. Some open ports get more than others, and no port is exempt.