By default the WAN interface should block everything so if the only rule you have is for a portfoward then something is wrong. Can you post a screenshot of the wan interface rules page?
Also the source in that block rule should be ‘any’ not ‘wan net’. Wan net is the subnet of your wan address which is usually a /32 address, so wan net and wan address usually mean the same thing. This is probably why the rule works when you try it locally but is shown as open when checking externally.
If I set it to “any”, would I still be able to access the WebGUI from my LAN?
You’re right; Shodan.io is telling me they last updated my IP on the same day I made the rule change, except at a time earlier then my implemented rule change.
I think that upon me setting up the port-forwarding for the MC server, it also opened up the Webgui for PFSense, because I explicitely remember being curious and checking Shodan.io BEFORE opening the MC server, to see if there are any existing ports/services open, and it showed “No results found”
So if you visit your public IP from home, it will go to your pfSense box, I can do the same thing and I will see my pfSense box, but if I was to visit my IP from an external devices outside my network, then I cannot reach the pfSense box.
This might have been the case with you. You can double check by using a mobile phone on data to actually confirm your pfSense box is not reachable from the outside.
443 is typically https, or http on port 80. meaning if your connected to the web and its an https page your on.
your system will use 443 to authenticate the handshake by default.
where as if its an insecure http, it will be handed to port 80 by default.
and because you were connected to shodan via an https connection it would see your system as having 443 open until you disconnect from its site.
and guys/girls remember shodan has its used for security, but its also a REAL privacy violation.
every search you make with it is logged and matched to your token id, which is then stored…
i have no idea if they sell the data or just make it into another database they can mine.
but they do log everything so be careful how you use it and who you look up.
i did check with netstat. and your right the browser does connect via a higher port.
after being redirected from port 443.
like i said port 443 is used for https authentication.
unless you change that port or its function.
if you feel up to it. load up wireshark and examine a connection. you will see your browser first connects to 443 of the server your going to browse and the server sends back and saying connect via this port. often up in the +9000 range. then when you send and receive data you do so though the higher port but every message is authenticated by port 443…
so basically port 6000 says can i send/receive. 443 says yes or no.
also if you have it look with tcpview or similar. you should see there’s a listener open by default on 443. for any webpage you visit. and a local high port outgoing to it. netstat just shows you your local outgoing port connection not the destination port.
if your connecting to a different service say a remote login to your own server. then the authentication port will be what ever you set it to, or it sets by default.
First, do you have any floating firewall rules? Those might be allowing the traffic.
Second, the rule to block the web gui should be set to NOT LAN Net (select LAN Net for the source and then tick the match reverse box) to be safe, but can be set to any. Honestly, you shouldn’t even need it as the firewall is deny by default. Having it be WAN Net just means you’re only matching packets that source from just the connected network on the WAN port and not the Internet as a whole.
I found the same thing a few months ago while doing some security research on IP leaks and pfsense serves you from WAN too if you are on lan. Not a huge deal.
Try to https://wan_pfsense_ip:port from inside.
Here’s a pic of netstat -an -4
Firewalls have special sets of rules for controlling internal flow from themselves to interfaces.
So, why did shodan know your internal firewall answers from the wan side?
I can’t know for sure. websockets or webrtc? Browsers are a mess and sonar.js.
Routers can become confused. If you don’t need STP,CDP,SNMP,IGMP → block rules/disable. Routersploit those embedded toys to poke hole perhaps too.
I suppose you can get rid of anti-lockout + lan to all 443 rule. Plan ahead.