TLDR; - Arpwatch new station alert showed arp spoofing attempt. Cloud hosting provider is adamant that arpwatch is misinterpreting data.
OpenBSD 6.5 vm running in a cloud hosting provider: WEB# uname -a OpenBSD WEB 6.5 GENERIC.MP#3 amd64 Arpwatch installed: WEB# pkg_info arpwatch | grep Information Information for inst:arpwatch-2.1a15p19 Received arpwatch notification: WEB# grep arpwatch /var/log/daemon Aug 29 10:43:57 WEB arpwatch: new station 2.2.3.12 00:00:00:00:00:01 Checked arp table and found the mac address matched that of the default gateway. WEB# arp -a Host Ethernet Address Netif Expire Flags 2.2.2.1 00:00:00:00:00:01 vio0 9m30s web 22:22:22:22:22:22 vio0 permanent l I proceeded to look at pf (host firewall) logs. While I don't log drops there were a number of requests to tcp80 and tcp443. Parsing relayd logs showed none of the requests passed protocol security filtering. Beyond this, I have no way to determine if this arp spoofing was successful. Thus I reached out to my hosting provider with this information and their response was: "We have protections in place to defend against such things and therefore this style of attack can not be performed on our network. The data you are seeing here is a bit misleading. Thank you for your report." I've only been a customer for a few months and during that time there have been no alerts generated by arpwatch. However I don't understand how the data is misleading. This is because arpwatch runs in an environment I manage and is found to be quite useful. Thus I requested more context as to why the data is misleading and their response was: "It is misinterpreting data. This attack is not possible on our network and arpwatch is not relevant to our platform or how it operates." Support is clearly adamant that their hosting environment is impervious. However none of this makes any sense to me. The host is a basic install with no custom or one-off configurations. Later watching arp traffic showed typical conversations between the host and default gateway. No other arp traffic was observed. WEB# tcpdump -lnettt -i vio0 arp I'm interested to hear feedback from misc@ as I didn't get a response from the arpwatch list. Is there a log or config I should check? Perhaps another utility to consider? Is my cloud hosting provider misinterpreting data? Do you suppose they had unplanned & unannounced maintenance? Anything else? Thanks, Paul