-
-
Notifications
You must be signed in to change notification settings - Fork 707
Abuse complaint from ISP: NetBird client sending unsolicited traffic to CGNAT subnet #3878
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
@mrchupatek thanks for reporting the issue. Can you confirm the version of all peers connecting to the device(s) behind the ISP? |
@mlsmaycon we have different versions of netbird client from 0.42 to latest . This problem is not fixed on all servers where there is netbird |
Is the problem fixed, or does it happen on all servers? If it is still happening, can you send us the bundle file generated by the following command on two nodes (remote and from this ISP): netbird debug for 1m -AS -U If the upload bundle is not supported, just remove the |
The problem still exists. Netbird tries to send data via external interface, but on private network. I am attaching two debug files from different servers where the problem was detected. |
@mlsmaycon As a temporary fix, we block the following via iptables: 10.0.0.0/8 DENY OUT Anywhere on eno1 We’d appreciate a solution on your side that prevents the Netbird client from scanning local networks through the external interface. |
Hi @mrchupatek, I cannot find evidence in the bundles that this is coming from NetBird, unless, for some reason, the issue didn't occur in the time frame when you ran the debug command.
This doesn't look like NetBird traffic, NetBird uses (if not changed) udp/51820 on either side. The listed ports or tcp are not in use. Could it be another application that erroneously uses NetBird's interface IP address?
You can additionally block the CGNAT range on the physical interface or SNAT it. The range in use by NetBird is not supposed to leave the overlay network unless specifically routed elsewhere.
Unfortunately NetBird cannot know which networks are behind which interface, so we need to probe all candidate IPs. |
@lixmal Hi. Nothing else was configured on the server — only the Netbird client was running. |
@jack-shax is the IP |
@mlsmaycon yes |
Sorry @jack-shax , my question was incomplete. This node is a peer within NetBird, right? not a service like netbird management, coturn, signal or relay. |
@mlsmaycon Yes, that’s correct. This is a node (client) in the Netbird network. |
Describe the problem
We received an abuse complaint from our ISP due to NetBird client sending unsolicited UDP and TCP traffic to IPs in the 100.79.0.0/16 CGNAT subnet. The ISP flagged this as a network scan attempt.
This subnet is used internally by NetBird on interface
wt0
, but external probing of CGNAT addresses appears suspicious from the ISP's point of view and may lead to service suspension.To Reproduce
wt0
Expected behavior
NetBird should avoid initiating connections to RFC6598 (CGNAT) IP ranges unless explicitly allowed. At a minimum, this behavior should be configurable.
Are you using NetBird Cloud?
No, using self-hosted NetBird.
NetBird version
Daemon version: 0.44.0
CLI version: 0.44.0
Is any other VPN software installed?
No.
Firewall (UFW) settings
Abuse
Additional context
The text was updated successfully, but these errors were encountered: