The Wiert Corner – irregular stream of stuff

Jeroen W. Pluimers on .NET, C#, Delphi, databases, and personal interests

  • My badges

  • Twitter Updates

  • My Flickr Stream

  • Pages

  • All categories

  • Enter your email address to subscribe to this blog and receive notifications of new posts by email.

    Join 1,860 other subscribers

Archive for the ‘Firewall’ Category

Block 185.235.84.0/22 (which ad broker criteo – used by WetterOnline/WeerOnline/others port-scans) via Sven222@Friendica Social Network

Posted by jpluimers on 2024/10/31

[Wayback/Archive] Friendica Social Network | Sven222 @ Friendica Social Network:

Also, falls jemand UFW am laufen hat und keinen Bock auf criteo hat:
edited: UFW Regel nach Hinweis aus Kommentaren angepasst.
ufw deny out from any to 185.235.84.0/22

Or [Wayback/Archive] Tobias Klausmann: “@sven222 Bei mir ist nftables …” – mas.to:

@sven222 Bei mir ist nftables statt ufw, ich hab dann das hier gemacht:

ip daddr 185.235.84.0/22 tcp dport 443 jump rd
ip daddr 185.235.84.0/22 tcp dport 80 jump rd

rd” it eine chain, die normal rejectet (also wie “port ist zu” aussieht), aber bei hohen Paketraten zu “drop” wechselt.

Oh, and WetterOnline were the ones that forced the German state weather agency to limit the usability of their free app: [Wayback/Archive] BGH-Urteil: Staatlicher Wetterdienst muss Gratis-App beschränken | heise online.

For that reason alone, WetterOnline and their obvious local brands are blocked here, as is criteo.

If you want to read more: [Wayback/Archive] WetterOnline | DE – Criteo.com

--jeroen

Posted in Firewall, Power User | Leave a Comment »

Figuring out what domains/IPs to whitelist for installing/updating winget sources and packages

Posted by jpluimers on 2024/07/25

A few years ago I asked for some help figuring out what to whitelist so that winget can update its sources and install packages.

This is how I found out.

The queste started with [Wayback/Archive] Need help trying to figure out what domains/IPs to whitelist for installing packages · Discussion #2304 · microsoft/winget-cli

Read the rest of this entry »

Posted in Batch-Files, Development, Firewall, Fritz!, Fritz!Box, Hardware, Network-and-equipment, Power User, Scripting, Software Development, Windows, Windows 10, Windows 11, winget | Leave a Comment »

Fritz!Box: domeinen in de whitelist om TV-West op de PC te kunnen zien

Posted by jpluimers on 2024/01/05

Deze moet je in een Fritz!Box zetten om TV-West op een PC te kunnen:

cloudfront.net
omroepwest.bbvms.com
i.regiogroei.cloud
static.regiogroei.cloud
cdn.primed.io
omroepwest.nl

Via [Wayback/Archive] Jeroen Wiert Pluimers on Twitter: “Zet deze domain in je @AVM_NL #FritzBox op de whitelist om TV West van @omroepwest op je PC te kunnen bekijken: cloudfront.net
omroepwest.bbvms.com i.regiogroei.cloud static.regiogroei.cloud cdn.primed.io omroepwest.nl” / Twitter

–jeroen

Read the rest of this entry »

Posted in Firewall, Fritz!, Fritz!Box, Hardware, Infrastructure, Internet, Network-and-equipment, Power User | Leave a Comment »

Did not realise that a 2018 Mikrotik vulnerability made it to the top of the CBL (SMTP composite black list) warning page for quite some months as the first ever device

Posted by jpluimers on 2021/07/02

Having it accidentally made it to the CBL (Composite Blocking List – Wikipedia) a long time ago, I discovered the page started with (WayBack link mine):

IMPORTANT: Many CBL/XBL listings are caused by a vulnerability in Mikrotik routers. If you have a Mikrotik router, please check out the [WayBack] Mikrotik blog on this subject and follow the instructions before attempting to remove your CBL listing.

It wasn’t one of my Mikrotik devices, as first of all they had all being patched out of the box from a really empty internal network before being externally exposed to the internet or more busy internal networks, and second because the CBL entry was a one off on one specific day where someone used our guest network.

Some CBL entries in the range where it was displayed, quite a while after CVE-2018-14847 became public:

If you want to try for yourself or harden it: [WayBack] Exploiting Mikrotik for Good ? | Syed Jahanzaib Personal Blog to Share Knowledge !

So I did some more digging.

First of all, it seems that if you ever had an infected Mikrotik system, then you have to factory reset it, then upgrade and configure from scratch. Otherwise at least the SOCKS and Web proxy services can still send out spam: [Archive.is] spammer behind mikrotik or mikrotik is the spammer : sysadmin. There, the best advice was

aliterCogitare, Jr. Sysadmin: 

Your mikrotik has been compromised then, I would suggest either going on site and rebuilding the router from scratch, or looking at a few things:

  1. Check System -> Scheduler for any schedules running( that you haven’t configured yourself)

  2. Check Systems -> scripts for any installed scripts that are running and delete, also look for running jobs and terminate them.

  3. Finally check the file explorer for any suspicious files or scripts, and delete any you find. A default library should look like this: flash (the partition) -pub -skins anything else that you havent put there yourself, Delete.

Anything else that I have mentioned above should be empty. Also you need to re-evaluate the security of your network. If you happen to be on site, reset the router and remove the default configuration on the boot prompt. Create two rules:

  • Allow input chain source IP from your default local network, if i remember correctly its 192.168.88.0/24

  • create an explicit drop rule on input chain for all interfaces and addresses + ports

  • disable IP – services except winbox Finally work your way up on what your network needs step by step by creating rules to accept traffic. And be sure to put your explicit rule on the bottom of the list by drag-and-dropping. That is all I can say, I hope I could be of help.

This means the advice in these two links might not be enough:

Another helpful resource [WayBack] Router Sending Spam – MikroTik which discusses the firewall rules, socks and web proxy services.

Second, there are a truckload of these devices around: [WayBack] Thousands of Compromised MikroTik Routers Send Traffic to Attackers and [WayBack] Thousands of MikroTik routers are snooping on user traffic | ZDNet write that in September 2018, at least 7500 devices were known infected and about 370-thousand endpoints vulnerable.

Third, you should be able to use [WayBack] Manual:Tools/Netwatch – MikroTik Wiki to check if you are on the CBL: [WayBack] Probing CBL blacklist – MikroTik.

Read the rest of this entry »

Posted in Firewall, Internet, MikroTik, Power User, routers, SPAM | Leave a Comment »

networking – Whitelist Windows Update Servers – Super User

Posted by jpluimers on 2020/07/31

For my link archive: networking – Whitelist Windows Update Servers – Super User

Because there are brain dead routers that do not allow for wildcards, or whitelisting only a certain protocol for a URL, call windowsupdate.microsoft.com a URL, but then also accept http://www.windowsupdate.microsoft.com.

–jeroen

Posted in Firewall, Infrastructure, Power User, Windows | Leave a Comment »

Windows FireWall administration: I need to put some time in learning netsh

Posted by jpluimers on 2018/07/16

It seems netsh is something different than bash or csh as it is the command-line interface to many (all?) Windows Firewall settings.

So I need to put some time into learning it.

This gives you all the names of firewall rules, ready for text searching it (with find, grep, etc):

netsh advfirewall firewall show rule name=all

An alternative might be PowerShell as it too has a lot of Windows Firewall plumbing: [WayBackHow to manage the Windows firewall settings with PowerShell – James O’Neill’s blog

Choices, choices.

–jeroen

via: [WayBackwindows firewall – How can I use netsh to find a rule using a pattern – Server Fault

Posted in Firewall, Power User, Windows | Leave a Comment »

Windows Firewall: Block rules take precedence over Allow rules

Posted by jpluimers on 2018/05/07

Reminder to self for Windows Firewall: Block rules take precedence over Allow rules (see * below as actually it is even more complex); [WayBackFirewall Rule Properties Page: General Tab has

Firewall rules are evaluated in the following order:

  1. Allow if secure with Override block rules selected in the Customize Allow if Secure Settings dialog box.
  2. Block the connection.
  3. Allow the connection.
  4. Default profile behavior (allow or block as specified on the applicable Profile tab of the Windows Firewall with Advanced Security Properties dialog box).

Within each category, rules are evaluated from the most specific to the least specific. A rule that specifies four criteria is selected over a rule that specifies only three criteria.

Which means that this will block TCP port 1024 traffic to bar.exe:

The Block rules are inserted by Windows if you click “Cancel” on a dialog like this (note the lowercase path, despite the application being at C:\Program Files (x86)\Foo\Bar.exe):

Read the rest of this entry »

Posted in Firewall, Infrastructure, Power User, Windows | 1 Comment »

iptables debugging « \1

Posted by jpluimers on 2017/11/28

Using the TRACE target: [WayBackiptables debugging « \1 via [WayBack] iptables Debugging using the TRACE chain – Kristian Köhntopp – Google+

Docs:

TRACE
This target marks packes so that the kernel will log every rule which match the packets as those traverse the tables, chains,
rules. (The ipt_LOG or ip6t_LOG module is required for the logging.) The packets are logged with the string prefix: “TRACE:
tablename:chainname:type:rulenum ” where type can be “rule” for plain rule, “return” for implicit rule at the end of a user
defined chain and “policy” for the policy of the built in chains.
It can only be used in the raw table.

Way more details in the linked article.

–jeroen

Posted in *nix, *nix-tools, Firewall, Infrastructure, iptables, Power User | Leave a Comment »

Posted by jpluimers on 2017/06/30

It’s such an all time classic from 2006 that people even kept scans of the original 2006 Computer World publication by [WayBack] John Klossner.

Over the last few years, it has done its round over the internet a few times, so I did some digging for the scans, colour and mono originals.

Data security versus Human Error.

In this corner, we have firewalls, encryption, antivirus software, etc. And in this corner, we have Dave!!

[WayBackJohn Klossner Cartoons: Computer World has the original black and white version: it’s even a gif!

Way better than the scan from paper: [WayBackShackF00 » Weekend Round-up: Google Issues and a Sad-but-True Comic

In 2014, Spiceworks re-ran the black and white one: [WayBackAnd in THIS corner we have Dave! (Funny cartoon) – IT Security – Spiceworks

In 2015, Wombat Security published a coloured version on social media, and even bigger too: not just large, huge as well (:

–jeroen

via: [WayBack] Dave – CodeProject – Google+

Read the rest of this entry »

Posted in Encryption, Firewall, Fun, Power User, Security | Leave a Comment »

Batch file to open a specific TCP port in Windows 7 / 2008 Server and up

Posted by jpluimers on 2015/09/18

Thanks to the answer by Kevin Richardson on How to open ports on Windows firewall through batch file, I wrote this batch file that uses the add command of the Netsh AdvFirewall Firewall Commands which requires Admin privileges to run:


:: open port (first argument passed to batch script, second argument is description)
:checkPrivileges
net file 1>nul 2>nul
if '%errorlevel%' == '0' ( goto :gotPrivileges ) else ( goto :getPrivileges )
:isNotAdmin
:getPrivileges
echo You need to be admin running with an elevated security token to run %0
goto :exit
:isAdmin
:gotPrivileges
netsh advfirewall firewall add rule name="Open Port %1 for %2" dir=in action=allow protocol=TCP localport=%1
:exit
::pause
exit /b

–jeroen

via: How to open ports on Windows firewall through batch file – Stack Overflow

Posted in Firewall, Infrastructure, Microsoft Surface on Windows 7, Power User, Windows, Windows 7, Windows 8, Windows 8.1, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2 | Leave a Comment »