Why does vyos router constantly talk to sites like recyber.net

Hi all, my first post here.

I just started using vyos, built a home firewall over the past week, everything works great, even got an openvpn to nordvpn up, following some of the posts here. I forgot the dns masq on vtun0, which stumped me for a bit LOL whoops!

I keep a ssh open to the router, running β€˜sudo iftop -P -i eth0’ to monitor who the vyos router is talking to on the Internet. I see openvpn gets almost all of the traffic, but there is plenty of other traffic, likely ntp, dns, etc.

I’ve noticed that vyos constantly talks to sites like recyber.nΠ΅t, sΠ΅curity.criminalΡ–p.com etc., which are β€œresearch sites” collecting data. I don’t mind contributing research data every once in a while, but not every few seconds. I checked those sites, and they don’t say anything about providing services such as dns, ntp, so I’m wondering what the traffic is for.

I searched both here and the web for vyos and recyber and found nothing, so thought I would ask here.

Thanks, and love VyOS!

you need to check your router. there is nothing built-in to send data to mentioned hosts

Any proof that traffic to those sites is originated by router itself? If possible, share with us how are you analyzing traffic.

Unless openvpn is leaking, all LAN traffic should be routed out the vpn. Anything left should be coming from the router.

A separate issue, I’ve been combing thru logs, and did discover that the dhcp client to my ISP is generating a lot of traffic to the ISP dhcp server:

Feb 27 xxxx:xxxx:30 vyos dhclient[2013]: DHCPREQUEST for xxx.xxx.133.19 on eth0 to xxx.xxx.237.33 port 67
:
Feb 27 xxxx:xxxx:49 vyos dhclient[2013]: message repeated 44 times: [ DHCPREQUEST for xxx.xxx.133.19 on eth0 to xxx.xxx.237.33 port 67]
:
Feb 27 xxxx:xxxx:04 vyos dhclient[2013]: DHCPREQUEST for xxx.xxx.133.19 on eth0 to xxx.xxx.237.33 port 67
:
Feb 27 xxxx:xxxx:35 vyos dhclient[2013]: message repeated 74 times: [ DHCPREQUEST for xxx.xxx.133.19 on eth0 to xxx.xxx.237.33 port 67]
:
Feb 27 xxxx:xxxx:50 vyos dhclient[2013]: DHCPREQUEST for xxx.xxx.133.19 on eth0 to xxx.xxx.237.33 port 67

Okay looks like I misconfigured the firewall. I disconnected everything except the Internet link eth0, and still the world is talking to my router, even though I thought I locked it down. For some reason, I’m really struggling with firewall rules. I’ll get it eventually.

I guess I just don’t understand the vyos firewall at all. I’m running 1.3.0-rc6

I have outside traffic completely locked down, only allow established connections from internal, yet dozens of internet sites keep talking directly to the router. All of those should be dropped.

sudo iftop -P -i eth0

shows internet sites talking to the router almost every second

vyos@vyos# show firewall
 all-ping disable
 broadcast-ping disable
 config-trap disable
 ipv6-receive-redirects disable
 ipv6-src-route disable
 ip-src-route disable
 log-martians enable
 name NORD-IN {
     default-action accept
 }
 name NORD-LOCAL {
     default-action accept
 }
 name NORD-OUT {
     default-action accept
 }
 name OUTSIDE-IN {
     default-action drop
     rule 10 {
         action accept
         state {
             established enable
             related enable
         }
     }
 }
 name OUTSIDE-LOCAL {
     default-action drop
     rule 10 {
         action accept
         state {
             established enable
             related enable
         }
     }
     rule 20 {
         action drop
         icmp {
             type-name echo-request
         }
         protocol icmp
         state {
             new enable
         }
     }
 }
 name OUTSIDE-OUT {
     default-action drop
 }
 name WLAN-IN {
     default-action accept
 }
 name WLAN-LOCAL {
     default-action accept
 }
 receive-redirects disable
 send-redirects enable
 source-validation disable
 syn-cookies enable
 twa-hazards-protection disable
[edit]
vyos@vyos#

I can’t figure out what I’m doing wrong. Feels like the firewall isn’t working.

Here’s a sample from iftop:


                12.5Kb          25.0Kb          37.5Kb          50.0Kb    62.5Kb
└───────────────┴───────────────┴───────────────┴───────────────┴───────────────
wan-uplink:40828           => nordvpn-5727:openvpn       10.3Kb  7.97Kb  4.44Kb
                           <=                            36.9Kb  23.7Kb  11.9Kb
wan-uplink:5070            => 104.156.155.5:52480           0b      0b      0b
                           <=                             160b     32b      9b
wan-uplink:7170            => scanner-03.ch1.censy:65011    0b      0b      0b
                           <=                               0b      0b     10b
wan-uplink:domain          => zg-0224d-10.stretcho:44244    0b      0b      0b
                           <=                               0b      0b      9b
wan-uplink:25423           => recyber.net:56906             0b      0b      0b
                           <=                               0b      0b      8b
wan-uplink:https           => 134-229-47-212.insta:43101    0b      0b      0b
                           <=                               0b      0b      8b
wan-uplink:3423            => recyber.net:58371             0b      0b      0b
                           <=                               0b      0b      8b
wan-uplink:8443            => zg-0224c-3.stretchoi:41531    0b      0b      0b
                           <=                               0b      0b      8b
wan-uplink:8443            => recyber.net:55309             0b      0b      0b
                           <=                               0b      0b      8b
wan-uplink:35526           => ip-193-19-152-20.rad:https    0b      0b      0b
                           <=                               0b     32b      8b
wan-uplink:http-alt        => recyber.net:40397             0b      0b      0b
                           <=                               0b      0b      8b
wan-uplink:3405            => scanner-11.ch1.censy:47029    0b      0b      0b
                           <=                               0b     35b      9b
wan-uplink:2296            => ip-113-250.4vendeta.:54961    0b      0b      0b
                           <=                               0b     32b      8b

I figured it out. iftop isn’t supposed to show dropped packets, but it is, making me think those remote sites are talking to the router.

1 Like