Many thanks for the explanation.
I really appreciate your answer and you gave to me a start point
to research more on this subject. I will try to find some books
in hope to expand my knowledge on this are.

Kind regards,
Cristian

On Sat, Jun 18, 2022 at 12:42 PM Janne Johansson <icepic...@gmail.com> wrote:
>
> Den lör 18 juni 2022 kl 11:17 skrev Cristian Danila <clau...@postmail.ro>:
> > Good day! Does anyone know if OpenBSD(7.1) has the capability to be hidden
> > against a pingscan(nmap -sn xxx.xxx.xxx.xxx)?
> > In PF I have only 2 rules to block everything:
> > block in quick all
> > block out quick all
> >
> > This is a fresh OpenBSD7.1 with no other configuration in place.
> > The only thing set is the default interface vic0 to allow dhcp
> >
> > By running a test with nmap -sn 192.168.121.131 I see this:
> > Starting Nmap 7.92(https://nmap.org)at 2022-06-18 11:52 GTB Daylight Time
> > Nmap scan report for 192.168.121.131
> > Host is up (0.00s latency).
> > MAC Address: 00:0C:29:C3:D9:A7 (VMware)
> > Nmap done: 1 IP address (1 host up) scanned in 0.46 seconds
> >
> > On scanned host I see this by running tcpdump -i vic0
> > 09:51:40.913770 arp who-has 192.168.121.131 tell 192.168.121.1
> > 09:51:40.913795 arp reply 192.168.121.131 is-at 00:0c:29:c3:d9:a7
>
> arp is done "outside" of pf, that is why you see the arp exchange.
> nmap lists this as "I know things about the hosts" and while it calls
> it a "ping scan", it really hasn't got much in common with icmp pings,
> but rather does an arp request and says that all hosts that respond
> are "up". I'm sure a box can be all kinds of broken and still send out
> arp replies, so you have to adapt your expectations of what "up" means
> here. (first sentence on 'man nmap' on the part where it says what -sn
> does is informative I guess?)
> So while you can see an ethernet device with a mac and an IP does
> exist on the local network, that is all you get.
>
> Then if you have "block in all" in PF no icmp, no tcp, no udp from any
> host will get to the targets ip stack.
>
> The arp resolution is only visible for boxes on the same network, so
> if I was to nmap from remote (assuming your gateway/router/fw allowed
> the traffic) then the entity doing arp would be your gateway/router/fw
> and not my box. Hence, I would not learn anything at all about your
> machine except that it looks down from remote, but your
> gateway/router/firewall would "learn" the info shown above in the nmap
> output.
>
> If you REALLY wanted to not be visible even on the local ethernet,
> then down the ethernet interface and do not put an ip on it. It would
> also not be usable, but this is more or less what your PF config is
> saying anyhow.
>
> > I am thinking(please correct me if I am wrong) that not all the traffic
> > passes through pf hence this is why is not blocked.
>
> Sort of. arp is more like being on a lower level than the later ip
> traffic for which pf will block all.
>
> > I would appreciate if someone could provide me a technical answer on this,
> > even recommend me a book to read or docs regarding it.
>
> https://en.wikipedia.org/wiki/Address_Resolution_Protocol
>
> --
> May the most significant bit of your life be positive.

Reply via email to