Jump to content

What is the point of Inbound and Outbound Connections? Isn't In+Out enough?

Exaco
Go to solution Solved by manikyath,

if you only block inbound communication, your device can still send information to the blocked address, just not receive a reply.

if you only block outbout communication, your device can still receive information from a blocked address, just not send a reply.

 

in the first case, a compromised system can still leak data.

in the second case, a compromised system can still receive commands.

 

it's not because your example application can no longer work, that a specificly crafted application cannot.

Hi there, I am curious why there's an option to choose between In and Out if they both do the exact same thing in the end?

If hacker has access to my server and I block his IP as Outbound = he sees me offline = connection lost.
If hacker has access to my server and I block his IP as Inbound = he sees me offline = connection lost.

Both options give exact same result, so why do we have an option to choose between the two, is there any practical real world use for it?

Link to comment
Share on other sites

Link to post
Share on other sites

Inbound is incoming traffic, meaning someone tries to access your server.

 

Outbound is traffic that goes from your server to someone.

 

If you block incoming ip 7.7.7.7 for example, user with that ip won’t be able to access your server but if you block outbound for that ip, your server won’t be able to reach that ip therefore it cannot access it.

Link to comment
Share on other sites

Link to post
Share on other sites

You highlight damage control aspects. There can be other network-management reasons why you may want to block or control inbound or outbound traffic in certain ways, so it is useful to be able to set them up separately.

Crystal: CPU: i7 7700K | Motherboard: Asus ROG Strix Z270F | RAM: GSkill 16 GB@3200MHz | GPU: Nvidia GTX 1080 Ti FE | Case: Corsair Crystal 570X (black) | PSU: EVGA Supernova G2 1000W | Monitor: Asus VG248QE 24"

Laptop: Dell XPS 13 9370 | CPU: i5 10510U | RAM: 16 GB

Server: CPU: i5 4690k | RAM: 16 GB | Case: Corsair Graphite 760T White | Storage: 19 TB

Link to comment
Share on other sites

Link to post
Share on other sites

if you only block inbound communication, your device can still send information to the blocked address, just not receive a reply.

if you only block outbout communication, your device can still receive information from a blocked address, just not send a reply.

 

in the first case, a compromised system can still leak data.

in the second case, a compromised system can still receive commands.

 

it's not because your example application can no longer work, that a specificly crafted application cannot.

Link to comment
Share on other sites

Link to post
Share on other sites

57 minutes ago, Exaco said:

Hi there, I am curious why there's an option to choose between In and Out if they both do the exact same thing in the end?

If hacker has access to my server and I block his IP as Outbound = he sees me offline = connection lost.
If hacker has access to my server and I block his IP as Inbound = he sees me offline = connection lost.

Both options give exact same result, so why do we have an option to choose between the two, is there any practical real world use for it?

 

Its more complicated than that, as it depends WHERE you are blocking it.

 

For example if you block outbound connections to an IP address on the WAN side, you wont be able to access that IP at all.  However that would not stop that IP address from sending traffic to you, they would just not get a response.  They could still flood you with traffic, so you'd want to block inbound too.

 

There may be cases where you want to block traffic only to/from specific clients on the LAN side, but allow it in general.  You might want to block certain IP address going to a server, but not block the LAN from accessing it. (eg geoblocking on a port forward to your server)

 

 

Router:  Intel N100 (pfSense) WiFi6: Zyxel NWA210AX (1.7Gbit peak at 160Mhz)
WiFi5: Ubiquiti NanoHD OpenWRT (~500Mbit at 80Mhz) Switches: Netgear MS510TXUP, MS510TXPP, GS110EMX
ISPs: Zen Full Fibre 900 (~930Mbit down, 115Mbit up) + Three 5G (~800Mbit down, 115Mbit up)
Upgrading Laptop/Desktop CNVIo WiFi 5 cards to PCIe WiFi6e/7

Link to comment
Share on other sites

Link to post
Share on other sites

49 minutes ago, manikyath said:

if you only block inbound communication, your device can still send information to the blocked address, just not receive a reply.

if you only block outbout communication, your device can still receive information from a blocked address, just not send a reply.

 

in the first case, a compromised system can still leak data.

in the second case, a compromised system can still receive commands.

 

it's not because your example application can no longer work, that a specificly crafted application cannot.

Makes perfect sense now, thanks.

Link to comment
Share on other sites

Link to post
Share on other sites

You also want to consider statefull vs stateless firewalls.   If you look that up, outbound traffic allows inbound traffic that is part of the same connection.   

Link to comment
Share on other sites

Link to post
Share on other sites

Isn't there a control for distinguishing between packets that are "new" vs. packets that are part of an already established connection/relationship?

e.g. if I block inbound packets from WAN to LAN, but one of my devices has sent outbound packets to a site initiating a connection, then responses from that external source are permitted?

I could have sworn I'd seen something about that in one of my older firewall rules (maybe the Edgerouter X), but my current Opnsense box does not seem to have anything like that.

I'm curious because at one point I was trying to block a range of IP addresses on my LAN from accessing anything on the WAN port, and yet pings were going through anyway. (I eventually just went to a "default block all" setup and then allowed the internet-permitted IP range of local machines full access, which worked.)

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×