Apple Event: May 7th at 7 am PT

Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

Firewall - stealth mode connection attempts from AEBS to computer

Console log is packed with Info messages realted to connection attempts from AEBS router. Is that normal?


also, system profiler states: Firewall Logging: No / Stealth Mode: No. Why the discrepancy?

MacBook Pro, Mac OS X (10.6.7), assorted apple products

Posted on Feb 29, 2012 8:58 PM

Reply
Question marked as Best reply

Posted on Feb 29, 2012 9:52 PM

chriswalsh wrote:


Console log is packed with Info messages realted to connection attempts from AEBS router. Is that normal?

Yes, if you've enabled stealth mode. If you are behind a router which does NAT (and I believe all of them do it nowadays), you don't need stealth mode.

31 replies

Mar 2, 2012 8:42 AM in response to fane_j

fane_j wrote:


What he is saying is that his network device (Airport, or, en1) is talking to itself through the router instead of through loopback.

What he said was:

Mar 12 03:08:47 laptop Firewall[61]: Stealth Mode connection attempt to UDP 192.168.0.23:63923 from 192.168.0.1:53


Notice that the IP address is the same for both of them.

IP address 192.168.0.23 (presumably that of his Mac) is not the same as IP address 192.168.0.1 (presumably that of his router/access point). Port 53 is the "well known" port for DNS, which must use what he calls the "main network interface" to reach his ISP's (or any other non-local) DNS server through the router/access point.


He also seems to be confusing mDNSResponder (used by Bonjour on UDP port 5353) with DNS. Like DNS, Bonjour would be useless if implemented through loopback -- its function is device discovery on the local area network the device (here, the Mac) is a part of, so it must of necessity 'talk' to the router to see what else is connected to it.


Terry Lambert was correct; you may have misunderstood the technical term in question.

Calling UDP "connectionless protocol" is technically correct, but not in the not-so-technical sense he used it -- UDP clearly requires a network connection & there is nothing wrong with or buggy about logging a connection attempt on a UDP port.


He sort of figures out some of this in his discussion of Windows file sharing (SMB), like that 192.168.0.1 is the IP address of his router rather than the one in use by his en1 interface on his Mac, but he still seems fairly confused about what network traffic is coming from his LAN vs. WAN connection, & which device on his LAN is responsible for which part of the local traffic, & about OS X specific networking in general.


That may not be true but this appears to be his only post to ASC so it is hard to say much about his opinion other than it doesn't make a very convincing argument for any alleged "bad design" issues in the logs.

Mar 2, 2012 4:27 PM in response to R C-R

(1)

R C-R wrote:


He also seems to have concluded that UDP's lack of a handshake protocol makes it a "connectionless" protocol, which makes no sense -- any data transferred over a network obviously requires a connection.

(2)

R C-R wrote:


Calling UDP "connectionless protocol" is technically correct […]

My friend, my advice -- and there's no reason why you should take it -- is this: Sometimes, discretion is the better part of valour. A bon entendeur…

Mar 2, 2012 6:18 PM in response to fane_j

Thanks for sticking with me - appreciated. Apologies - I thought I had explain the network set-up, which is:


Airport Extreme Base Station connected to ISP via PPPoE (NAT set to on). Mac connected to AEBS via ethernet. Mac FW stealthmode set to on (I know that's unnecessary when sat behind the router)


The entry did appear in the APPFIREWALL.LOG

date 10:05:21 -MacBook-Pro Firewall[71]: 33300 Deny ICMP:8.0 67.149.105.183 in via ppp0


I don't recall which applications were in use at the time (How to find out?) - I've looked in other logs but unable to find any corresponding entries at the same time, but nothing, other than:


SYSTEM.LOG

date 10:04:19 -MacBook-Pro WebProcess[188]: Periodic CFURLCache Insert stats (iters: 360) - Tx time:0.366685, # of Inserts: 2, # of bytes written: 35668, Did shrink: NO, Size of cache-file: 52389888, Num of Failures: 1


KERNEL.LOG

date 10:03:57 -MacBook-Pro kernel[0]: PPPoE inputdata: unexpected control packet on unit = 0

Mar 3, 2012 3:01 AM in response to mariotheplumber

Alright, then let's get some facts.


First, find out what's your public IP address. If you use Google, you can just type in Google's search field "what's my ip", and Google will tell you. Note it.


Then, in Terminal, issue the command


$ ifconfig


($ stands for your prompt, whatever it might be, you don't type it)


This should return your network devices. Do you see any designated "ppp0"? One of your devices should have the status "active" (usually it's en0, if you're wired to the router, or en1, if you're w/less). Check the IP listed for "inet". Is it the same as your public IP?

Mar 3, 2012 5:04 AM in response to mariotheplumber

You have not answered fane_j's question about seeing any network devices designated as "ppp0" -- "gif0" is not the same thing.


Also note that two network devices are involved here, your Mac & your AEBS. In general, your AEBS will supply the public IP address to the outside world & that is the one Google (or whatever) should show. You should be able to confirm that using Airport Utility:


Open the utility, select your AEBS (if not already selected) & click the "Manual Setup" button. The last line of the "Summary" tab should show the IP address it presents to the outside world, & should agree with what Google shows.

Mar 3, 2012 8:36 AM in response to mariotheplumber

I don't think the mention of the "<POINTOPOINT,MULTICAST>" flag means anything relevant. I have the same flag for my gif0 device & I do not have any PPP services, devices, etc. enabled or present anywhere on my network.


It might be different if you saw a "RUNNING" flag for the gif0 device but I assume you would have mentioned that by now if you had, right?


Can you explain what it is that you are looking for?

Anything that might have been misunderstood, not clearly explained, or left out of the discussion that might yield a clue about the cause of the log entries or what they mean.


I can't compare anything directly to my network setup because I don't use DSL or PPPoE since my service is via a cable modem. I don't normally have stealth mode enabled on any of my Macs but I've temporarily enabled it. So far, I do not see any log entries like yours. So all I can really do is compare the behavior & settings of my AEBS to yours in a limited way.

Mar 3, 2012 3:09 PM in response to mariotheplumber

chriswalsh wrote:


en0 is active


Other network interfaces are inactive.


gif0: flags<POINTOPOINT,MULTICAST

Everything is as expected. Gif (generic tunnel interface) is not relevant (it's used for VPN), and its flag is down anyway.


So here's my problem.


(1) On one hand, this,

date 10:05:21 -MacBook-Pro Firewall[71]: 33300 Deny ICMP:8.0 67.149.105.183 in via ppp0


date 10:03:57 -MacBook-Pro kernel[0]: PPPoE inputdata: unexpected control packet on unit = 0


says you're getting traffic over the PPP interface.


(2) On the other, everything else you posted -- your set-up, your ifconfig return -- says you don't have a PPP interface.


I can only imagine one way of reconciling (1) and (2) -- the dates are wrong. That is, that the lines above come from an earlier log, when your Mac was connected through PPPoE. Otherwise, I'm completely stumped.


If you're getting now in your logs lines with "via ppp0", and you check in Terminal


$ ifconfig ppp0


and get


ifconfig: interface ppp0 does not exist


and your router is not set to log its status to your Mac, then something is very wrong indeed.

Mar 3, 2012 5:50 PM in response to fane_j

VPN actually uses "tun0" when it's connected & doesn't appear when VPN is off. OK, so no problem with that.


if config ppp0 - returns : interface ppp0 does not exist….Which again is what I'd expect unless connected via ppp0.


Anyway, apologies because after thinking about it - I'm fairly sure those 2 log entries are from a date when I did connect directly via ppp0 in order to test internal cabling.


So I'm happy, just wish I thought about it earlier and not wasted your time. Many thanks - much appreciated. Off now to try and resole my login conundrum.

Firewall - stealth mode connection attempts from AEBS to computer

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple ID.