Portsentry blocked my internet connection to two systems

The name of the pictureThe name of the pictureThe name of the pictureClash Royale CLAN TAG#URR8PPP











up vote
0
down vote

favorite












PROBLEM:



Portsentry was blocking the internet connection of both systems I had it installed on. I could connect to the network but I got no internet or network and route revealed that there was nothing connected even though the gui showed me connected to the network. ifconfig showed that I had no local ip assigned to the system.



My router keeps calling my systems and I have millions of iptables denied in my logs from the router trying something with my systems, I don't know what it's doing.



My router is Sagemcom I don't know more about it.



I couldn't access my router from either system.(192.168.1.254)



I uninstalled portsentry and I got internet connection back and everything back to normal.



Here's my config file:



# PortSentry Configuration
#
# $Id: portsentry.conf.Debian,v 1.6 2001/07/19 21:02:20 agx Exp $
#
# Original portsentry.conf by Craig H. Rowland <crowland@psionic.com>
# modified for Debian by Guido Guenther <agx@debian.org>
#
# IMPORTANT NOTE: You CAN NOT put spaces between your port arguments.
#
# The default ports will catch a large number of common probes
#
# All entries must be in quotes.


#######################
# Port Configurations #
#######################
#
#
# Some example port configs for classic and basic Stealth modes
#
# I like to always keep some ports at the "low" end of the spectrum.
# This will detect a sequential port sweep really quickly and usually
# these ports are not in use (i.e. tcpmux port 1)
#
# ** X-Windows Users **: If you are running X on your box, you need to be sure
# you are not binding PortSentry to port 6000 (or port 2000 for OpenWindows users).
# Doing so will prevent the X-client from starting properly.
#
# These port bindings are *ignored* for Advanced Stealth Scan Detection Mode.
#

# Un-comment these if you are really anal:
TCP_PORTS="1,7,9,11,15,70,79,80,109,110,111,119,138,139,143,512,513,514,515,540,635,1080,1524,2000,2001,4000,4001,5742,6000,6001,6667,12345,12346,20034,27665,30303,32771,32772,32773,32774,31337,40421,40425,49724,54320"
UDP_PORTS="1,7,9,66,67,68,69,111,137,138,161,162,474,513,517,518,635,640,641,666,700,2049,31335,27444,34555,32770,32771,32772,32773,32774,31337,54321"
#
# Use these if you just want to be aware:
#TCP_PORTS="1,11,15,79,111,119,143,540,635,1080,1524,2000,5742,6667,12345,12346,20034,27665,31337,32771,32772,32773,32774,40421,49724,54320"
#UDP_PORTS="1,7,9,69,161,162,513,635,640,641,700,37444,34555,31335,32770,32771,32772,32773,32774,31337,54321"
#
# Use these for just bare-bones
#TCP_PORTS="1,11,15,110,111,143,540,635,1080,1524,2000,12345,12346,20034,32771,32772,32773,32774,49724,54320"
#UDP_PORTS="1,7,9,69,161,162,513,640,700,32770,32771,32772,32773,32774,31337,54321"

###########################################
# Advanced Stealth Scan Detection Options #
###########################################
#
# This is the number of ports you want PortSentry to monitor in Advanced mode.
# Any port *below* this number will be monitored. Right now it watches
# everything below 1024.
#
# On many Linux systems you cannot bind above port 61000. This is because
# these ports are used as part of IP masquerading. I don't recommend you
# bind over this number of ports. Realistically: I DON'T RECOMMEND YOU MONITOR
# OVER 1024 PORTS AS YOUR FALSE ALARM RATE WILL ALMOST CERTAINLY RISE. You've been
# warned! Don't write me if you have have a problem because I'll only tell
# you to RTFM and don't run above the first 1024 ports.
#
#
ADVANCED_PORTS_TCP="1024"
ADVANCED_PORTS_UDP="1024"
#
# This field tells PortSentry what ports (besides listening daemons) to
# ignore. This is helpful for services like ident that services such
# as FTP, SMTP, and wrappers look for but you may not run (and probably
# *shouldn't* IMHO).
#
# By specifying ports here PortSentry will simply not respond to
# incoming requests, in effect PortSentry treats them as if they are
# actual bound daemons. The default ports are ones reported as
# problematic false alarms and should probably be left alone for
# all but the most isolated systems/networks.
#
# Default TCP ident and NetBIOS service
ADVANCED_EXCLUDE_TCP="113,139"
# Default UDP route (RIP), NetBIOS, bootp broadcasts.
ADVANCED_EXCLUDE_UDP="520,138,137,67"


######################
# Configuration Files#
######################
#
# Hosts to ignore
IGNORE_FILE="/etc/portsentry/portsentry.ignore"
# Hosts that have been denied (running history)
HISTORY_FILE="/var/lib/portsentry/portsentry.history"
# Hosts that have been denied this session only (temporary until next restart)
BLOCKED_FILE="/var/lib/portsentry/portsentry.blocked"

##############################
# Misc. Configuration Options#
##############################
#
# DNS Name resolution - Setting this to "1" will turn on DNS lookups
# for attacking hosts. Setting it to "0" (or any other value) will shut
# it off.
RESOLVE_HOST = "1"

###################
# Response Options#
###################
# Options to dispose of attacker. Each is an action that will
# be run if an attack is detected. If you don't want a particular
# option then comment it out and it will be skipped.
#
# The variable $TARGET$ will be substituted with the target attacking
# host when an attack is detected. The variable $PORT$ will be substituted
# with the port that was scanned.
#
##################
# Ignore Options #
##################
# These options allow you to enable automatic response
# options for UDP/TCP. This is useful if you just want
# warnings for connections, but don't want to react for
# a particular protocol (i.e. you want to block TCP, but
# not UDP). To prevent a possible Denial of service attack
# against UDP and stealth scan detection for TCP, you may
# want to disable blocking, but leave the warning enabled.
# I personally would wait for this to become a problem before
# doing though as most attackers really aren't doing this.
# The third option allows you to run just the external command
# in case of a scan to have a pager script or such execute
# but not drop the route. This may be useful for some admins
# who want to block TCP, but only want pager/e-mail warnings
# on UDP, etc.
#
#
# 0 = Do not block UDP/TCP scans.
# 1 = Block UDP/TCP scans.
# 2 = Run external command only (KILL_RUN_CMD)

BLOCK_UDP="1"
BLOCK_TCP="1"

###################
# Dropping Routes:#
###################
# This command is used to drop the route or add the host into
# a local filter table.
#
# The gateway (333.444.555.666) should ideally be a dead host on
# the *local* subnet. On some hosts you can also point this at
# localhost (127.0.0.1) and get the same effect. NOTE THAT
# 333.444.555.66 WILL *NOT* WORK. YOU NEED TO CHANGE IT!!
#
# ALL KILL ROUTE OPTIONS ARE COMMENTED OUT INITIALLY. Make sure you
# uncomment the correct line for your OS. If you OS is not listed
# here and you have a route drop command that works then please
# mail it to me so I can include it. ONLY ONE KILL_ROUTE OPTION
# CAN BE USED AT A TIME SO DON'T UNCOMMENT MULTIPLE LINES.
#
# NOTE: The route commands are the least optimal way of blocking
# and do not provide complete protection against UDP attacks and
# will still generate alarms for both UDP and stealth scans. I
# always recommend you use a packet filter because they are made
# for this purpose.
#

# Generic
#KILL_ROUTE="/sbin/route add $TARGET$ 333.444.555.666"

# Generic Linux
#KILL_ROUTE="/sbin/route add -host $TARGET$ gw 333.444.555.666"

# Newer versions of Linux support the reject flag now. This
# is cleaner than the above option.
KILL_ROUTE="/sbin/route add -host $TARGET$ reject"

# Generic BSD (BSDI, OpenBSD, NetBSD, FreeBSD)
#KILL_ROUTE="/sbin/route add $TARGET$ 333.444.555.666"

# Generic Sun
#KILL_ROUTE="/usr/sbin/route add $TARGET$ 333.444.555.666 1"

# NEXTSTEP
#KILL_ROUTE="/usr/etc/route add $TARGET$ 127.0.0.1 1"

# FreeBSD
#KILL_ROUTE="route add -net $TARGET$ -netmask 255.255.255.255 127.0.0.1 -blackhole"

# Digital UNIX 4.0D (OSF/1 / Compaq Tru64 UNIX)
#KILL_ROUTE="/sbin/route add -host -blackhole $TARGET$ 127.0.0.1"

# Generic HP-UX
#KILL_ROUTE="/usr/sbin/route add net $TARGET$ netmask 255.255.255.0 127.0.0.1"

##
# Using a packet filter is the PREFERRED. The below lines
# work well on many OS's. Remember, you can only uncomment *one*
# KILL_ROUTE option.
##

# ipfwadm support for Linux
#KILL_ROUTE="/sbin/ipfwadm -I -i deny -S $TARGET$ -o"
#
# ipfwadm support for Linux (no logging of denied packets)
#KILL_ROUTE="/sbin/ipfwadm -I -i deny -S $TARGET$"
#
# ipchain support for Linux
#KILL_ROUTE="/sbin/ipchains -I input -s $TARGET$ -j DENY -l"
#
# ipchain support for Linux (no logging of denied packets)
#KILL_ROUTE="/sbin/ipchains -I input -s $TARGET$ -j DENY"
#
# iptables support for Linux
#KILL_ROUTE="/sbin/iptables -I INPUT -s $TARGET$ -j DROP"
#
# iptables support for Linux with limit and LOG support. Logs only
# a limited number of packets to avoid a denial of service attack.
KILL_ROUTE="/sbin/iptables -I INPUT -s $TARGET$ -j DROP && /sbin/iptables -I INPUT -s $TARGET$ -m limit --limit 3/minute --limit-burst 5 -j LOG --log-level DEBUG --log-prefix 'Portsentry: dropping: '"
#
# For those of you running FreeBSD (and compatible) you can
# use their built in firewalling as well.
#
#KILL_ROUTE="/sbin/ipfw add 1 deny all from $TARGET$:255.255.255.255 to any"
#
#
# For those running ipfilt (OpenBSD, etc.)
# NOTE THAT YOU NEED TO CHANGE external_interface TO A VALID INTERFACE!!
#
#KILL_ROUTE="/bin/echo 'block in log on external_interface from $TARGET$/32 to any' | /sbin/ipf -f -"


###############
# TCP Wrappers#
###############
# This text will be dropped into the hosts.deny file for wrappers
# to use. There are two formats for TCP wrappers:
#
# Format One: Old Style - The default when extended host processing
# options are not enabled.
#
#KILL_HOSTS_DENY="ALL: $TARGET$"

# Format Two: New Style - The format used when extended option
# processing is enabled. You can drop in extended processing
# options, but be sure you escape all '%' symbols with a backslash
# to prevent problems writing out (i.e. %c %h )
#
KILL_HOSTS_DENY="ALL: $TARGET$ : DENY"

###################
# External Command#
###################
# This is a command that is run when a host connects, it can be whatever
# you want it to be (pager, etc.). This command is executed before the
# route is dropped or after depending on the KILL_RUN_CMD_FIRST option below
#
#
# I NEVER RECOMMEND YOU PUT IN RETALIATORY ACTIONS AGAINST THE HOST SCANNING
# YOU!
#
# TCP/IP is an *unauthenticated protocol* and people can make scans appear out
# of thin air. The only time it is reasonably safe (and I *never* think it is
# reasonable) to run reverse probe scripts is when using the "classic" -tcp mode.
# This mode requires a full connect and is very hard to spoof.
#
# The KILL_RUN_CMD_FIRST value should be set to "1" to force the command
# to run *before* the blocking occurs and should be set to "0" to make the
# command run *after* the blocking has occurred.
#
#KILL_RUN_CMD_FIRST = "0"
#
#
#KILL_RUN_CMD="/some/path/here/script $TARGET$ $PORT$ $MODE$"
# for examples see /usr/share/doc/portsentry/examples/


#####################
# Scan trigger value#
#####################
# Enter in the number of port connects you will allow before an
# alarm is given. The default is 0 which will react immediately.
# A value of 1 or 2 will reduce false alarms. Anything higher is
# probably not necessary. This value must always be specified, but
# generally can be left at 0.
#
# NOTE: If you are using the advanced detection option you need to
# be careful that you don't make a hair trigger situation. Because
# Advanced mode will react for *any* host connecting to a non-used
# port below your specified range, you have the opportunity to
# really break things. (i.e someone innocently tries to connect to
# you via SSL [TCP port 443] and you immediately block them). Some
# of you may even want this though. Just be careful.
#
SCAN_TRIGGER="2"

######################
# Port Banner Section#
######################
#
# Enter text in here you want displayed to a person tripping the PortSentry.
# I *don't* recommend taunting the person as this will aggravate them.
# Leave this commented out to disable the feature
#
# Stealth scan detection modes don't use this feature
#
PORT_BANNER="** UNAUTHORIZED ACCESS PROHIBITED *** YOUR CONNECTION ATTEMPT HAS BEEN LOGGED. GO AWAY."

# EOF


I really like this program so I would like to keep using it if anyone can help me figure out what the problem is.



QUESTION:



Do you know why it blocked my router and internet connection to my systems and what I can do to keep using portsentry?



What is the problem here?



How do I whitelist my local network and my router if I can not fix the millions of connects from my router?










share|improve this question

























    up vote
    0
    down vote

    favorite












    PROBLEM:



    Portsentry was blocking the internet connection of both systems I had it installed on. I could connect to the network but I got no internet or network and route revealed that there was nothing connected even though the gui showed me connected to the network. ifconfig showed that I had no local ip assigned to the system.



    My router keeps calling my systems and I have millions of iptables denied in my logs from the router trying something with my systems, I don't know what it's doing.



    My router is Sagemcom I don't know more about it.



    I couldn't access my router from either system.(192.168.1.254)



    I uninstalled portsentry and I got internet connection back and everything back to normal.



    Here's my config file:



    # PortSentry Configuration
    #
    # $Id: portsentry.conf.Debian,v 1.6 2001/07/19 21:02:20 agx Exp $
    #
    # Original portsentry.conf by Craig H. Rowland <crowland@psionic.com>
    # modified for Debian by Guido Guenther <agx@debian.org>
    #
    # IMPORTANT NOTE: You CAN NOT put spaces between your port arguments.
    #
    # The default ports will catch a large number of common probes
    #
    # All entries must be in quotes.


    #######################
    # Port Configurations #
    #######################
    #
    #
    # Some example port configs for classic and basic Stealth modes
    #
    # I like to always keep some ports at the "low" end of the spectrum.
    # This will detect a sequential port sweep really quickly and usually
    # these ports are not in use (i.e. tcpmux port 1)
    #
    # ** X-Windows Users **: If you are running X on your box, you need to be sure
    # you are not binding PortSentry to port 6000 (or port 2000 for OpenWindows users).
    # Doing so will prevent the X-client from starting properly.
    #
    # These port bindings are *ignored* for Advanced Stealth Scan Detection Mode.
    #

    # Un-comment these if you are really anal:
    TCP_PORTS="1,7,9,11,15,70,79,80,109,110,111,119,138,139,143,512,513,514,515,540,635,1080,1524,2000,2001,4000,4001,5742,6000,6001,6667,12345,12346,20034,27665,30303,32771,32772,32773,32774,31337,40421,40425,49724,54320"
    UDP_PORTS="1,7,9,66,67,68,69,111,137,138,161,162,474,513,517,518,635,640,641,666,700,2049,31335,27444,34555,32770,32771,32772,32773,32774,31337,54321"
    #
    # Use these if you just want to be aware:
    #TCP_PORTS="1,11,15,79,111,119,143,540,635,1080,1524,2000,5742,6667,12345,12346,20034,27665,31337,32771,32772,32773,32774,40421,49724,54320"
    #UDP_PORTS="1,7,9,69,161,162,513,635,640,641,700,37444,34555,31335,32770,32771,32772,32773,32774,31337,54321"
    #
    # Use these for just bare-bones
    #TCP_PORTS="1,11,15,110,111,143,540,635,1080,1524,2000,12345,12346,20034,32771,32772,32773,32774,49724,54320"
    #UDP_PORTS="1,7,9,69,161,162,513,640,700,32770,32771,32772,32773,32774,31337,54321"

    ###########################################
    # Advanced Stealth Scan Detection Options #
    ###########################################
    #
    # This is the number of ports you want PortSentry to monitor in Advanced mode.
    # Any port *below* this number will be monitored. Right now it watches
    # everything below 1024.
    #
    # On many Linux systems you cannot bind above port 61000. This is because
    # these ports are used as part of IP masquerading. I don't recommend you
    # bind over this number of ports. Realistically: I DON'T RECOMMEND YOU MONITOR
    # OVER 1024 PORTS AS YOUR FALSE ALARM RATE WILL ALMOST CERTAINLY RISE. You've been
    # warned! Don't write me if you have have a problem because I'll only tell
    # you to RTFM and don't run above the first 1024 ports.
    #
    #
    ADVANCED_PORTS_TCP="1024"
    ADVANCED_PORTS_UDP="1024"
    #
    # This field tells PortSentry what ports (besides listening daemons) to
    # ignore. This is helpful for services like ident that services such
    # as FTP, SMTP, and wrappers look for but you may not run (and probably
    # *shouldn't* IMHO).
    #
    # By specifying ports here PortSentry will simply not respond to
    # incoming requests, in effect PortSentry treats them as if they are
    # actual bound daemons. The default ports are ones reported as
    # problematic false alarms and should probably be left alone for
    # all but the most isolated systems/networks.
    #
    # Default TCP ident and NetBIOS service
    ADVANCED_EXCLUDE_TCP="113,139"
    # Default UDP route (RIP), NetBIOS, bootp broadcasts.
    ADVANCED_EXCLUDE_UDP="520,138,137,67"


    ######################
    # Configuration Files#
    ######################
    #
    # Hosts to ignore
    IGNORE_FILE="/etc/portsentry/portsentry.ignore"
    # Hosts that have been denied (running history)
    HISTORY_FILE="/var/lib/portsentry/portsentry.history"
    # Hosts that have been denied this session only (temporary until next restart)
    BLOCKED_FILE="/var/lib/portsentry/portsentry.blocked"

    ##############################
    # Misc. Configuration Options#
    ##############################
    #
    # DNS Name resolution - Setting this to "1" will turn on DNS lookups
    # for attacking hosts. Setting it to "0" (or any other value) will shut
    # it off.
    RESOLVE_HOST = "1"

    ###################
    # Response Options#
    ###################
    # Options to dispose of attacker. Each is an action that will
    # be run if an attack is detected. If you don't want a particular
    # option then comment it out and it will be skipped.
    #
    # The variable $TARGET$ will be substituted with the target attacking
    # host when an attack is detected. The variable $PORT$ will be substituted
    # with the port that was scanned.
    #
    ##################
    # Ignore Options #
    ##################
    # These options allow you to enable automatic response
    # options for UDP/TCP. This is useful if you just want
    # warnings for connections, but don't want to react for
    # a particular protocol (i.e. you want to block TCP, but
    # not UDP). To prevent a possible Denial of service attack
    # against UDP and stealth scan detection for TCP, you may
    # want to disable blocking, but leave the warning enabled.
    # I personally would wait for this to become a problem before
    # doing though as most attackers really aren't doing this.
    # The third option allows you to run just the external command
    # in case of a scan to have a pager script or such execute
    # but not drop the route. This may be useful for some admins
    # who want to block TCP, but only want pager/e-mail warnings
    # on UDP, etc.
    #
    #
    # 0 = Do not block UDP/TCP scans.
    # 1 = Block UDP/TCP scans.
    # 2 = Run external command only (KILL_RUN_CMD)

    BLOCK_UDP="1"
    BLOCK_TCP="1"

    ###################
    # Dropping Routes:#
    ###################
    # This command is used to drop the route or add the host into
    # a local filter table.
    #
    # The gateway (333.444.555.666) should ideally be a dead host on
    # the *local* subnet. On some hosts you can also point this at
    # localhost (127.0.0.1) and get the same effect. NOTE THAT
    # 333.444.555.66 WILL *NOT* WORK. YOU NEED TO CHANGE IT!!
    #
    # ALL KILL ROUTE OPTIONS ARE COMMENTED OUT INITIALLY. Make sure you
    # uncomment the correct line for your OS. If you OS is not listed
    # here and you have a route drop command that works then please
    # mail it to me so I can include it. ONLY ONE KILL_ROUTE OPTION
    # CAN BE USED AT A TIME SO DON'T UNCOMMENT MULTIPLE LINES.
    #
    # NOTE: The route commands are the least optimal way of blocking
    # and do not provide complete protection against UDP attacks and
    # will still generate alarms for both UDP and stealth scans. I
    # always recommend you use a packet filter because they are made
    # for this purpose.
    #

    # Generic
    #KILL_ROUTE="/sbin/route add $TARGET$ 333.444.555.666"

    # Generic Linux
    #KILL_ROUTE="/sbin/route add -host $TARGET$ gw 333.444.555.666"

    # Newer versions of Linux support the reject flag now. This
    # is cleaner than the above option.
    KILL_ROUTE="/sbin/route add -host $TARGET$ reject"

    # Generic BSD (BSDI, OpenBSD, NetBSD, FreeBSD)
    #KILL_ROUTE="/sbin/route add $TARGET$ 333.444.555.666"

    # Generic Sun
    #KILL_ROUTE="/usr/sbin/route add $TARGET$ 333.444.555.666 1"

    # NEXTSTEP
    #KILL_ROUTE="/usr/etc/route add $TARGET$ 127.0.0.1 1"

    # FreeBSD
    #KILL_ROUTE="route add -net $TARGET$ -netmask 255.255.255.255 127.0.0.1 -blackhole"

    # Digital UNIX 4.0D (OSF/1 / Compaq Tru64 UNIX)
    #KILL_ROUTE="/sbin/route add -host -blackhole $TARGET$ 127.0.0.1"

    # Generic HP-UX
    #KILL_ROUTE="/usr/sbin/route add net $TARGET$ netmask 255.255.255.0 127.0.0.1"

    ##
    # Using a packet filter is the PREFERRED. The below lines
    # work well on many OS's. Remember, you can only uncomment *one*
    # KILL_ROUTE option.
    ##

    # ipfwadm support for Linux
    #KILL_ROUTE="/sbin/ipfwadm -I -i deny -S $TARGET$ -o"
    #
    # ipfwadm support for Linux (no logging of denied packets)
    #KILL_ROUTE="/sbin/ipfwadm -I -i deny -S $TARGET$"
    #
    # ipchain support for Linux
    #KILL_ROUTE="/sbin/ipchains -I input -s $TARGET$ -j DENY -l"
    #
    # ipchain support for Linux (no logging of denied packets)
    #KILL_ROUTE="/sbin/ipchains -I input -s $TARGET$ -j DENY"
    #
    # iptables support for Linux
    #KILL_ROUTE="/sbin/iptables -I INPUT -s $TARGET$ -j DROP"
    #
    # iptables support for Linux with limit and LOG support. Logs only
    # a limited number of packets to avoid a denial of service attack.
    KILL_ROUTE="/sbin/iptables -I INPUT -s $TARGET$ -j DROP && /sbin/iptables -I INPUT -s $TARGET$ -m limit --limit 3/minute --limit-burst 5 -j LOG --log-level DEBUG --log-prefix 'Portsentry: dropping: '"
    #
    # For those of you running FreeBSD (and compatible) you can
    # use their built in firewalling as well.
    #
    #KILL_ROUTE="/sbin/ipfw add 1 deny all from $TARGET$:255.255.255.255 to any"
    #
    #
    # For those running ipfilt (OpenBSD, etc.)
    # NOTE THAT YOU NEED TO CHANGE external_interface TO A VALID INTERFACE!!
    #
    #KILL_ROUTE="/bin/echo 'block in log on external_interface from $TARGET$/32 to any' | /sbin/ipf -f -"


    ###############
    # TCP Wrappers#
    ###############
    # This text will be dropped into the hosts.deny file for wrappers
    # to use. There are two formats for TCP wrappers:
    #
    # Format One: Old Style - The default when extended host processing
    # options are not enabled.
    #
    #KILL_HOSTS_DENY="ALL: $TARGET$"

    # Format Two: New Style - The format used when extended option
    # processing is enabled. You can drop in extended processing
    # options, but be sure you escape all '%' symbols with a backslash
    # to prevent problems writing out (i.e. %c %h )
    #
    KILL_HOSTS_DENY="ALL: $TARGET$ : DENY"

    ###################
    # External Command#
    ###################
    # This is a command that is run when a host connects, it can be whatever
    # you want it to be (pager, etc.). This command is executed before the
    # route is dropped or after depending on the KILL_RUN_CMD_FIRST option below
    #
    #
    # I NEVER RECOMMEND YOU PUT IN RETALIATORY ACTIONS AGAINST THE HOST SCANNING
    # YOU!
    #
    # TCP/IP is an *unauthenticated protocol* and people can make scans appear out
    # of thin air. The only time it is reasonably safe (and I *never* think it is
    # reasonable) to run reverse probe scripts is when using the "classic" -tcp mode.
    # This mode requires a full connect and is very hard to spoof.
    #
    # The KILL_RUN_CMD_FIRST value should be set to "1" to force the command
    # to run *before* the blocking occurs and should be set to "0" to make the
    # command run *after* the blocking has occurred.
    #
    #KILL_RUN_CMD_FIRST = "0"
    #
    #
    #KILL_RUN_CMD="/some/path/here/script $TARGET$ $PORT$ $MODE$"
    # for examples see /usr/share/doc/portsentry/examples/


    #####################
    # Scan trigger value#
    #####################
    # Enter in the number of port connects you will allow before an
    # alarm is given. The default is 0 which will react immediately.
    # A value of 1 or 2 will reduce false alarms. Anything higher is
    # probably not necessary. This value must always be specified, but
    # generally can be left at 0.
    #
    # NOTE: If you are using the advanced detection option you need to
    # be careful that you don't make a hair trigger situation. Because
    # Advanced mode will react for *any* host connecting to a non-used
    # port below your specified range, you have the opportunity to
    # really break things. (i.e someone innocently tries to connect to
    # you via SSL [TCP port 443] and you immediately block them). Some
    # of you may even want this though. Just be careful.
    #
    SCAN_TRIGGER="2"

    ######################
    # Port Banner Section#
    ######################
    #
    # Enter text in here you want displayed to a person tripping the PortSentry.
    # I *don't* recommend taunting the person as this will aggravate them.
    # Leave this commented out to disable the feature
    #
    # Stealth scan detection modes don't use this feature
    #
    PORT_BANNER="** UNAUTHORIZED ACCESS PROHIBITED *** YOUR CONNECTION ATTEMPT HAS BEEN LOGGED. GO AWAY."

    # EOF


    I really like this program so I would like to keep using it if anyone can help me figure out what the problem is.



    QUESTION:



    Do you know why it blocked my router and internet connection to my systems and what I can do to keep using portsentry?



    What is the problem here?



    How do I whitelist my local network and my router if I can not fix the millions of connects from my router?










    share|improve this question























      up vote
      0
      down vote

      favorite









      up vote
      0
      down vote

      favorite











      PROBLEM:



      Portsentry was blocking the internet connection of both systems I had it installed on. I could connect to the network but I got no internet or network and route revealed that there was nothing connected even though the gui showed me connected to the network. ifconfig showed that I had no local ip assigned to the system.



      My router keeps calling my systems and I have millions of iptables denied in my logs from the router trying something with my systems, I don't know what it's doing.



      My router is Sagemcom I don't know more about it.



      I couldn't access my router from either system.(192.168.1.254)



      I uninstalled portsentry and I got internet connection back and everything back to normal.



      Here's my config file:



      # PortSentry Configuration
      #
      # $Id: portsentry.conf.Debian,v 1.6 2001/07/19 21:02:20 agx Exp $
      #
      # Original portsentry.conf by Craig H. Rowland <crowland@psionic.com>
      # modified for Debian by Guido Guenther <agx@debian.org>
      #
      # IMPORTANT NOTE: You CAN NOT put spaces between your port arguments.
      #
      # The default ports will catch a large number of common probes
      #
      # All entries must be in quotes.


      #######################
      # Port Configurations #
      #######################
      #
      #
      # Some example port configs for classic and basic Stealth modes
      #
      # I like to always keep some ports at the "low" end of the spectrum.
      # This will detect a sequential port sweep really quickly and usually
      # these ports are not in use (i.e. tcpmux port 1)
      #
      # ** X-Windows Users **: If you are running X on your box, you need to be sure
      # you are not binding PortSentry to port 6000 (or port 2000 for OpenWindows users).
      # Doing so will prevent the X-client from starting properly.
      #
      # These port bindings are *ignored* for Advanced Stealth Scan Detection Mode.
      #

      # Un-comment these if you are really anal:
      TCP_PORTS="1,7,9,11,15,70,79,80,109,110,111,119,138,139,143,512,513,514,515,540,635,1080,1524,2000,2001,4000,4001,5742,6000,6001,6667,12345,12346,20034,27665,30303,32771,32772,32773,32774,31337,40421,40425,49724,54320"
      UDP_PORTS="1,7,9,66,67,68,69,111,137,138,161,162,474,513,517,518,635,640,641,666,700,2049,31335,27444,34555,32770,32771,32772,32773,32774,31337,54321"
      #
      # Use these if you just want to be aware:
      #TCP_PORTS="1,11,15,79,111,119,143,540,635,1080,1524,2000,5742,6667,12345,12346,20034,27665,31337,32771,32772,32773,32774,40421,49724,54320"
      #UDP_PORTS="1,7,9,69,161,162,513,635,640,641,700,37444,34555,31335,32770,32771,32772,32773,32774,31337,54321"
      #
      # Use these for just bare-bones
      #TCP_PORTS="1,11,15,110,111,143,540,635,1080,1524,2000,12345,12346,20034,32771,32772,32773,32774,49724,54320"
      #UDP_PORTS="1,7,9,69,161,162,513,640,700,32770,32771,32772,32773,32774,31337,54321"

      ###########################################
      # Advanced Stealth Scan Detection Options #
      ###########################################
      #
      # This is the number of ports you want PortSentry to monitor in Advanced mode.
      # Any port *below* this number will be monitored. Right now it watches
      # everything below 1024.
      #
      # On many Linux systems you cannot bind above port 61000. This is because
      # these ports are used as part of IP masquerading. I don't recommend you
      # bind over this number of ports. Realistically: I DON'T RECOMMEND YOU MONITOR
      # OVER 1024 PORTS AS YOUR FALSE ALARM RATE WILL ALMOST CERTAINLY RISE. You've been
      # warned! Don't write me if you have have a problem because I'll only tell
      # you to RTFM and don't run above the first 1024 ports.
      #
      #
      ADVANCED_PORTS_TCP="1024"
      ADVANCED_PORTS_UDP="1024"
      #
      # This field tells PortSentry what ports (besides listening daemons) to
      # ignore. This is helpful for services like ident that services such
      # as FTP, SMTP, and wrappers look for but you may not run (and probably
      # *shouldn't* IMHO).
      #
      # By specifying ports here PortSentry will simply not respond to
      # incoming requests, in effect PortSentry treats them as if they are
      # actual bound daemons. The default ports are ones reported as
      # problematic false alarms and should probably be left alone for
      # all but the most isolated systems/networks.
      #
      # Default TCP ident and NetBIOS service
      ADVANCED_EXCLUDE_TCP="113,139"
      # Default UDP route (RIP), NetBIOS, bootp broadcasts.
      ADVANCED_EXCLUDE_UDP="520,138,137,67"


      ######################
      # Configuration Files#
      ######################
      #
      # Hosts to ignore
      IGNORE_FILE="/etc/portsentry/portsentry.ignore"
      # Hosts that have been denied (running history)
      HISTORY_FILE="/var/lib/portsentry/portsentry.history"
      # Hosts that have been denied this session only (temporary until next restart)
      BLOCKED_FILE="/var/lib/portsentry/portsentry.blocked"

      ##############################
      # Misc. Configuration Options#
      ##############################
      #
      # DNS Name resolution - Setting this to "1" will turn on DNS lookups
      # for attacking hosts. Setting it to "0" (or any other value) will shut
      # it off.
      RESOLVE_HOST = "1"

      ###################
      # Response Options#
      ###################
      # Options to dispose of attacker. Each is an action that will
      # be run if an attack is detected. If you don't want a particular
      # option then comment it out and it will be skipped.
      #
      # The variable $TARGET$ will be substituted with the target attacking
      # host when an attack is detected. The variable $PORT$ will be substituted
      # with the port that was scanned.
      #
      ##################
      # Ignore Options #
      ##################
      # These options allow you to enable automatic response
      # options for UDP/TCP. This is useful if you just want
      # warnings for connections, but don't want to react for
      # a particular protocol (i.e. you want to block TCP, but
      # not UDP). To prevent a possible Denial of service attack
      # against UDP and stealth scan detection for TCP, you may
      # want to disable blocking, but leave the warning enabled.
      # I personally would wait for this to become a problem before
      # doing though as most attackers really aren't doing this.
      # The third option allows you to run just the external command
      # in case of a scan to have a pager script or such execute
      # but not drop the route. This may be useful for some admins
      # who want to block TCP, but only want pager/e-mail warnings
      # on UDP, etc.
      #
      #
      # 0 = Do not block UDP/TCP scans.
      # 1 = Block UDP/TCP scans.
      # 2 = Run external command only (KILL_RUN_CMD)

      BLOCK_UDP="1"
      BLOCK_TCP="1"

      ###################
      # Dropping Routes:#
      ###################
      # This command is used to drop the route or add the host into
      # a local filter table.
      #
      # The gateway (333.444.555.666) should ideally be a dead host on
      # the *local* subnet. On some hosts you can also point this at
      # localhost (127.0.0.1) and get the same effect. NOTE THAT
      # 333.444.555.66 WILL *NOT* WORK. YOU NEED TO CHANGE IT!!
      #
      # ALL KILL ROUTE OPTIONS ARE COMMENTED OUT INITIALLY. Make sure you
      # uncomment the correct line for your OS. If you OS is not listed
      # here and you have a route drop command that works then please
      # mail it to me so I can include it. ONLY ONE KILL_ROUTE OPTION
      # CAN BE USED AT A TIME SO DON'T UNCOMMENT MULTIPLE LINES.
      #
      # NOTE: The route commands are the least optimal way of blocking
      # and do not provide complete protection against UDP attacks and
      # will still generate alarms for both UDP and stealth scans. I
      # always recommend you use a packet filter because they are made
      # for this purpose.
      #

      # Generic
      #KILL_ROUTE="/sbin/route add $TARGET$ 333.444.555.666"

      # Generic Linux
      #KILL_ROUTE="/sbin/route add -host $TARGET$ gw 333.444.555.666"

      # Newer versions of Linux support the reject flag now. This
      # is cleaner than the above option.
      KILL_ROUTE="/sbin/route add -host $TARGET$ reject"

      # Generic BSD (BSDI, OpenBSD, NetBSD, FreeBSD)
      #KILL_ROUTE="/sbin/route add $TARGET$ 333.444.555.666"

      # Generic Sun
      #KILL_ROUTE="/usr/sbin/route add $TARGET$ 333.444.555.666 1"

      # NEXTSTEP
      #KILL_ROUTE="/usr/etc/route add $TARGET$ 127.0.0.1 1"

      # FreeBSD
      #KILL_ROUTE="route add -net $TARGET$ -netmask 255.255.255.255 127.0.0.1 -blackhole"

      # Digital UNIX 4.0D (OSF/1 / Compaq Tru64 UNIX)
      #KILL_ROUTE="/sbin/route add -host -blackhole $TARGET$ 127.0.0.1"

      # Generic HP-UX
      #KILL_ROUTE="/usr/sbin/route add net $TARGET$ netmask 255.255.255.0 127.0.0.1"

      ##
      # Using a packet filter is the PREFERRED. The below lines
      # work well on many OS's. Remember, you can only uncomment *one*
      # KILL_ROUTE option.
      ##

      # ipfwadm support for Linux
      #KILL_ROUTE="/sbin/ipfwadm -I -i deny -S $TARGET$ -o"
      #
      # ipfwadm support for Linux (no logging of denied packets)
      #KILL_ROUTE="/sbin/ipfwadm -I -i deny -S $TARGET$"
      #
      # ipchain support for Linux
      #KILL_ROUTE="/sbin/ipchains -I input -s $TARGET$ -j DENY -l"
      #
      # ipchain support for Linux (no logging of denied packets)
      #KILL_ROUTE="/sbin/ipchains -I input -s $TARGET$ -j DENY"
      #
      # iptables support for Linux
      #KILL_ROUTE="/sbin/iptables -I INPUT -s $TARGET$ -j DROP"
      #
      # iptables support for Linux with limit and LOG support. Logs only
      # a limited number of packets to avoid a denial of service attack.
      KILL_ROUTE="/sbin/iptables -I INPUT -s $TARGET$ -j DROP && /sbin/iptables -I INPUT -s $TARGET$ -m limit --limit 3/minute --limit-burst 5 -j LOG --log-level DEBUG --log-prefix 'Portsentry: dropping: '"
      #
      # For those of you running FreeBSD (and compatible) you can
      # use their built in firewalling as well.
      #
      #KILL_ROUTE="/sbin/ipfw add 1 deny all from $TARGET$:255.255.255.255 to any"
      #
      #
      # For those running ipfilt (OpenBSD, etc.)
      # NOTE THAT YOU NEED TO CHANGE external_interface TO A VALID INTERFACE!!
      #
      #KILL_ROUTE="/bin/echo 'block in log on external_interface from $TARGET$/32 to any' | /sbin/ipf -f -"


      ###############
      # TCP Wrappers#
      ###############
      # This text will be dropped into the hosts.deny file for wrappers
      # to use. There are two formats for TCP wrappers:
      #
      # Format One: Old Style - The default when extended host processing
      # options are not enabled.
      #
      #KILL_HOSTS_DENY="ALL: $TARGET$"

      # Format Two: New Style - The format used when extended option
      # processing is enabled. You can drop in extended processing
      # options, but be sure you escape all '%' symbols with a backslash
      # to prevent problems writing out (i.e. %c %h )
      #
      KILL_HOSTS_DENY="ALL: $TARGET$ : DENY"

      ###################
      # External Command#
      ###################
      # This is a command that is run when a host connects, it can be whatever
      # you want it to be (pager, etc.). This command is executed before the
      # route is dropped or after depending on the KILL_RUN_CMD_FIRST option below
      #
      #
      # I NEVER RECOMMEND YOU PUT IN RETALIATORY ACTIONS AGAINST THE HOST SCANNING
      # YOU!
      #
      # TCP/IP is an *unauthenticated protocol* and people can make scans appear out
      # of thin air. The only time it is reasonably safe (and I *never* think it is
      # reasonable) to run reverse probe scripts is when using the "classic" -tcp mode.
      # This mode requires a full connect and is very hard to spoof.
      #
      # The KILL_RUN_CMD_FIRST value should be set to "1" to force the command
      # to run *before* the blocking occurs and should be set to "0" to make the
      # command run *after* the blocking has occurred.
      #
      #KILL_RUN_CMD_FIRST = "0"
      #
      #
      #KILL_RUN_CMD="/some/path/here/script $TARGET$ $PORT$ $MODE$"
      # for examples see /usr/share/doc/portsentry/examples/


      #####################
      # Scan trigger value#
      #####################
      # Enter in the number of port connects you will allow before an
      # alarm is given. The default is 0 which will react immediately.
      # A value of 1 or 2 will reduce false alarms. Anything higher is
      # probably not necessary. This value must always be specified, but
      # generally can be left at 0.
      #
      # NOTE: If you are using the advanced detection option you need to
      # be careful that you don't make a hair trigger situation. Because
      # Advanced mode will react for *any* host connecting to a non-used
      # port below your specified range, you have the opportunity to
      # really break things. (i.e someone innocently tries to connect to
      # you via SSL [TCP port 443] and you immediately block them). Some
      # of you may even want this though. Just be careful.
      #
      SCAN_TRIGGER="2"

      ######################
      # Port Banner Section#
      ######################
      #
      # Enter text in here you want displayed to a person tripping the PortSentry.
      # I *don't* recommend taunting the person as this will aggravate them.
      # Leave this commented out to disable the feature
      #
      # Stealth scan detection modes don't use this feature
      #
      PORT_BANNER="** UNAUTHORIZED ACCESS PROHIBITED *** YOUR CONNECTION ATTEMPT HAS BEEN LOGGED. GO AWAY."

      # EOF


      I really like this program so I would like to keep using it if anyone can help me figure out what the problem is.



      QUESTION:



      Do you know why it blocked my router and internet connection to my systems and what I can do to keep using portsentry?



      What is the problem here?



      How do I whitelist my local network and my router if I can not fix the millions of connects from my router?










      share|improve this question













      PROBLEM:



      Portsentry was blocking the internet connection of both systems I had it installed on. I could connect to the network but I got no internet or network and route revealed that there was nothing connected even though the gui showed me connected to the network. ifconfig showed that I had no local ip assigned to the system.



      My router keeps calling my systems and I have millions of iptables denied in my logs from the router trying something with my systems, I don't know what it's doing.



      My router is Sagemcom I don't know more about it.



      I couldn't access my router from either system.(192.168.1.254)



      I uninstalled portsentry and I got internet connection back and everything back to normal.



      Here's my config file:



      # PortSentry Configuration
      #
      # $Id: portsentry.conf.Debian,v 1.6 2001/07/19 21:02:20 agx Exp $
      #
      # Original portsentry.conf by Craig H. Rowland <crowland@psionic.com>
      # modified for Debian by Guido Guenther <agx@debian.org>
      #
      # IMPORTANT NOTE: You CAN NOT put spaces between your port arguments.
      #
      # The default ports will catch a large number of common probes
      #
      # All entries must be in quotes.


      #######################
      # Port Configurations #
      #######################
      #
      #
      # Some example port configs for classic and basic Stealth modes
      #
      # I like to always keep some ports at the "low" end of the spectrum.
      # This will detect a sequential port sweep really quickly and usually
      # these ports are not in use (i.e. tcpmux port 1)
      #
      # ** X-Windows Users **: If you are running X on your box, you need to be sure
      # you are not binding PortSentry to port 6000 (or port 2000 for OpenWindows users).
      # Doing so will prevent the X-client from starting properly.
      #
      # These port bindings are *ignored* for Advanced Stealth Scan Detection Mode.
      #

      # Un-comment these if you are really anal:
      TCP_PORTS="1,7,9,11,15,70,79,80,109,110,111,119,138,139,143,512,513,514,515,540,635,1080,1524,2000,2001,4000,4001,5742,6000,6001,6667,12345,12346,20034,27665,30303,32771,32772,32773,32774,31337,40421,40425,49724,54320"
      UDP_PORTS="1,7,9,66,67,68,69,111,137,138,161,162,474,513,517,518,635,640,641,666,700,2049,31335,27444,34555,32770,32771,32772,32773,32774,31337,54321"
      #
      # Use these if you just want to be aware:
      #TCP_PORTS="1,11,15,79,111,119,143,540,635,1080,1524,2000,5742,6667,12345,12346,20034,27665,31337,32771,32772,32773,32774,40421,49724,54320"
      #UDP_PORTS="1,7,9,69,161,162,513,635,640,641,700,37444,34555,31335,32770,32771,32772,32773,32774,31337,54321"
      #
      # Use these for just bare-bones
      #TCP_PORTS="1,11,15,110,111,143,540,635,1080,1524,2000,12345,12346,20034,32771,32772,32773,32774,49724,54320"
      #UDP_PORTS="1,7,9,69,161,162,513,640,700,32770,32771,32772,32773,32774,31337,54321"

      ###########################################
      # Advanced Stealth Scan Detection Options #
      ###########################################
      #
      # This is the number of ports you want PortSentry to monitor in Advanced mode.
      # Any port *below* this number will be monitored. Right now it watches
      # everything below 1024.
      #
      # On many Linux systems you cannot bind above port 61000. This is because
      # these ports are used as part of IP masquerading. I don't recommend you
      # bind over this number of ports. Realistically: I DON'T RECOMMEND YOU MONITOR
      # OVER 1024 PORTS AS YOUR FALSE ALARM RATE WILL ALMOST CERTAINLY RISE. You've been
      # warned! Don't write me if you have have a problem because I'll only tell
      # you to RTFM and don't run above the first 1024 ports.
      #
      #
      ADVANCED_PORTS_TCP="1024"
      ADVANCED_PORTS_UDP="1024"
      #
      # This field tells PortSentry what ports (besides listening daemons) to
      # ignore. This is helpful for services like ident that services such
      # as FTP, SMTP, and wrappers look for but you may not run (and probably
      # *shouldn't* IMHO).
      #
      # By specifying ports here PortSentry will simply not respond to
      # incoming requests, in effect PortSentry treats them as if they are
      # actual bound daemons. The default ports are ones reported as
      # problematic false alarms and should probably be left alone for
      # all but the most isolated systems/networks.
      #
      # Default TCP ident and NetBIOS service
      ADVANCED_EXCLUDE_TCP="113,139"
      # Default UDP route (RIP), NetBIOS, bootp broadcasts.
      ADVANCED_EXCLUDE_UDP="520,138,137,67"


      ######################
      # Configuration Files#
      ######################
      #
      # Hosts to ignore
      IGNORE_FILE="/etc/portsentry/portsentry.ignore"
      # Hosts that have been denied (running history)
      HISTORY_FILE="/var/lib/portsentry/portsentry.history"
      # Hosts that have been denied this session only (temporary until next restart)
      BLOCKED_FILE="/var/lib/portsentry/portsentry.blocked"

      ##############################
      # Misc. Configuration Options#
      ##############################
      #
      # DNS Name resolution - Setting this to "1" will turn on DNS lookups
      # for attacking hosts. Setting it to "0" (or any other value) will shut
      # it off.
      RESOLVE_HOST = "1"

      ###################
      # Response Options#
      ###################
      # Options to dispose of attacker. Each is an action that will
      # be run if an attack is detected. If you don't want a particular
      # option then comment it out and it will be skipped.
      #
      # The variable $TARGET$ will be substituted with the target attacking
      # host when an attack is detected. The variable $PORT$ will be substituted
      # with the port that was scanned.
      #
      ##################
      # Ignore Options #
      ##################
      # These options allow you to enable automatic response
      # options for UDP/TCP. This is useful if you just want
      # warnings for connections, but don't want to react for
      # a particular protocol (i.e. you want to block TCP, but
      # not UDP). To prevent a possible Denial of service attack
      # against UDP and stealth scan detection for TCP, you may
      # want to disable blocking, but leave the warning enabled.
      # I personally would wait for this to become a problem before
      # doing though as most attackers really aren't doing this.
      # The third option allows you to run just the external command
      # in case of a scan to have a pager script or such execute
      # but not drop the route. This may be useful for some admins
      # who want to block TCP, but only want pager/e-mail warnings
      # on UDP, etc.
      #
      #
      # 0 = Do not block UDP/TCP scans.
      # 1 = Block UDP/TCP scans.
      # 2 = Run external command only (KILL_RUN_CMD)

      BLOCK_UDP="1"
      BLOCK_TCP="1"

      ###################
      # Dropping Routes:#
      ###################
      # This command is used to drop the route or add the host into
      # a local filter table.
      #
      # The gateway (333.444.555.666) should ideally be a dead host on
      # the *local* subnet. On some hosts you can also point this at
      # localhost (127.0.0.1) and get the same effect. NOTE THAT
      # 333.444.555.66 WILL *NOT* WORK. YOU NEED TO CHANGE IT!!
      #
      # ALL KILL ROUTE OPTIONS ARE COMMENTED OUT INITIALLY. Make sure you
      # uncomment the correct line for your OS. If you OS is not listed
      # here and you have a route drop command that works then please
      # mail it to me so I can include it. ONLY ONE KILL_ROUTE OPTION
      # CAN BE USED AT A TIME SO DON'T UNCOMMENT MULTIPLE LINES.
      #
      # NOTE: The route commands are the least optimal way of blocking
      # and do not provide complete protection against UDP attacks and
      # will still generate alarms for both UDP and stealth scans. I
      # always recommend you use a packet filter because they are made
      # for this purpose.
      #

      # Generic
      #KILL_ROUTE="/sbin/route add $TARGET$ 333.444.555.666"

      # Generic Linux
      #KILL_ROUTE="/sbin/route add -host $TARGET$ gw 333.444.555.666"

      # Newer versions of Linux support the reject flag now. This
      # is cleaner than the above option.
      KILL_ROUTE="/sbin/route add -host $TARGET$ reject"

      # Generic BSD (BSDI, OpenBSD, NetBSD, FreeBSD)
      #KILL_ROUTE="/sbin/route add $TARGET$ 333.444.555.666"

      # Generic Sun
      #KILL_ROUTE="/usr/sbin/route add $TARGET$ 333.444.555.666 1"

      # NEXTSTEP
      #KILL_ROUTE="/usr/etc/route add $TARGET$ 127.0.0.1 1"

      # FreeBSD
      #KILL_ROUTE="route add -net $TARGET$ -netmask 255.255.255.255 127.0.0.1 -blackhole"

      # Digital UNIX 4.0D (OSF/1 / Compaq Tru64 UNIX)
      #KILL_ROUTE="/sbin/route add -host -blackhole $TARGET$ 127.0.0.1"

      # Generic HP-UX
      #KILL_ROUTE="/usr/sbin/route add net $TARGET$ netmask 255.255.255.0 127.0.0.1"

      ##
      # Using a packet filter is the PREFERRED. The below lines
      # work well on many OS's. Remember, you can only uncomment *one*
      # KILL_ROUTE option.
      ##

      # ipfwadm support for Linux
      #KILL_ROUTE="/sbin/ipfwadm -I -i deny -S $TARGET$ -o"
      #
      # ipfwadm support for Linux (no logging of denied packets)
      #KILL_ROUTE="/sbin/ipfwadm -I -i deny -S $TARGET$"
      #
      # ipchain support for Linux
      #KILL_ROUTE="/sbin/ipchains -I input -s $TARGET$ -j DENY -l"
      #
      # ipchain support for Linux (no logging of denied packets)
      #KILL_ROUTE="/sbin/ipchains -I input -s $TARGET$ -j DENY"
      #
      # iptables support for Linux
      #KILL_ROUTE="/sbin/iptables -I INPUT -s $TARGET$ -j DROP"
      #
      # iptables support for Linux with limit and LOG support. Logs only
      # a limited number of packets to avoid a denial of service attack.
      KILL_ROUTE="/sbin/iptables -I INPUT -s $TARGET$ -j DROP && /sbin/iptables -I INPUT -s $TARGET$ -m limit --limit 3/minute --limit-burst 5 -j LOG --log-level DEBUG --log-prefix 'Portsentry: dropping: '"
      #
      # For those of you running FreeBSD (and compatible) you can
      # use their built in firewalling as well.
      #
      #KILL_ROUTE="/sbin/ipfw add 1 deny all from $TARGET$:255.255.255.255 to any"
      #
      #
      # For those running ipfilt (OpenBSD, etc.)
      # NOTE THAT YOU NEED TO CHANGE external_interface TO A VALID INTERFACE!!
      #
      #KILL_ROUTE="/bin/echo 'block in log on external_interface from $TARGET$/32 to any' | /sbin/ipf -f -"


      ###############
      # TCP Wrappers#
      ###############
      # This text will be dropped into the hosts.deny file for wrappers
      # to use. There are two formats for TCP wrappers:
      #
      # Format One: Old Style - The default when extended host processing
      # options are not enabled.
      #
      #KILL_HOSTS_DENY="ALL: $TARGET$"

      # Format Two: New Style - The format used when extended option
      # processing is enabled. You can drop in extended processing
      # options, but be sure you escape all '%' symbols with a backslash
      # to prevent problems writing out (i.e. %c %h )
      #
      KILL_HOSTS_DENY="ALL: $TARGET$ : DENY"

      ###################
      # External Command#
      ###################
      # This is a command that is run when a host connects, it can be whatever
      # you want it to be (pager, etc.). This command is executed before the
      # route is dropped or after depending on the KILL_RUN_CMD_FIRST option below
      #
      #
      # I NEVER RECOMMEND YOU PUT IN RETALIATORY ACTIONS AGAINST THE HOST SCANNING
      # YOU!
      #
      # TCP/IP is an *unauthenticated protocol* and people can make scans appear out
      # of thin air. The only time it is reasonably safe (and I *never* think it is
      # reasonable) to run reverse probe scripts is when using the "classic" -tcp mode.
      # This mode requires a full connect and is very hard to spoof.
      #
      # The KILL_RUN_CMD_FIRST value should be set to "1" to force the command
      # to run *before* the blocking occurs and should be set to "0" to make the
      # command run *after* the blocking has occurred.
      #
      #KILL_RUN_CMD_FIRST = "0"
      #
      #
      #KILL_RUN_CMD="/some/path/here/script $TARGET$ $PORT$ $MODE$"
      # for examples see /usr/share/doc/portsentry/examples/


      #####################
      # Scan trigger value#
      #####################
      # Enter in the number of port connects you will allow before an
      # alarm is given. The default is 0 which will react immediately.
      # A value of 1 or 2 will reduce false alarms. Anything higher is
      # probably not necessary. This value must always be specified, but
      # generally can be left at 0.
      #
      # NOTE: If you are using the advanced detection option you need to
      # be careful that you don't make a hair trigger situation. Because
      # Advanced mode will react for *any* host connecting to a non-used
      # port below your specified range, you have the opportunity to
      # really break things. (i.e someone innocently tries to connect to
      # you via SSL [TCP port 443] and you immediately block them). Some
      # of you may even want this though. Just be careful.
      #
      SCAN_TRIGGER="2"

      ######################
      # Port Banner Section#
      ######################
      #
      # Enter text in here you want displayed to a person tripping the PortSentry.
      # I *don't* recommend taunting the person as this will aggravate them.
      # Leave this commented out to disable the feature
      #
      # Stealth scan detection modes don't use this feature
      #
      PORT_BANNER="** UNAUTHORIZED ACCESS PROHIBITED *** YOUR CONNECTION ATTEMPT HAS BEEN LOGGED. GO AWAY."

      # EOF


      I really like this program so I would like to keep using it if anyone can help me figure out what the problem is.



      QUESTION:



      Do you know why it blocked my router and internet connection to my systems and what I can do to keep using portsentry?



      What is the problem here?



      How do I whitelist my local network and my router if I can not fix the millions of connects from my router?







      networking security iptables software-installation router






      share|improve this question













      share|improve this question











      share|improve this question




      share|improve this question










      asked 13 mins ago









      somethingSomething

      1,71093057




      1,71093057

























          active

          oldest

          votes











          Your Answer








          StackExchange.ready(function()
          var channelOptions =
          tags: "".split(" "),
          id: "106"
          ;
          initTagRenderer("".split(" "), "".split(" "), channelOptions);

          StackExchange.using("externalEditor", function()
          // Have to fire editor after snippets, if snippets enabled
          if (StackExchange.settings.snippets.snippetsEnabled)
          StackExchange.using("snippets", function()
          createEditor();
          );

          else
          createEditor();

          );

          function createEditor()
          StackExchange.prepareEditor(
          heartbeatType: 'answer',
          convertImagesToLinks: false,
          noModals: true,
          showLowRepImageUploadWarning: true,
          reputationToPostImages: null,
          bindNavPrevention: true,
          postfix: "",
          imageUploader:
          brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
          contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
          allowUrls: true
          ,
          onDemand: true,
          discardSelector: ".discard-answer"
          ,immediatelyShowMarkdownHelp:true
          );



          );













           

          draft saved


          draft discarded


















          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f479004%2fportsentry-blocked-my-internet-connection-to-two-systems%23new-answer', 'question_page');

          );

          Post as a guest



































          active

          oldest

          votes













          active

          oldest

          votes









          active

          oldest

          votes






          active

          oldest

          votes















           

          draft saved


          draft discarded















































           


          draft saved


          draft discarded














          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f479004%2fportsentry-blocked-my-internet-connection-to-two-systems%23new-answer', 'question_page');

          );

          Post as a guest













































































          Popular posts from this blog

          How to check contact read email or not when send email to Individual?

          Bahrain

          Postfix configuration issue with fips on centos 7; mailgun relay