Do you have anything defined as a DMZ node/ipaddress on the firewall?
On Fri, Jan 31, 2020 at 3:53 PM Ed Greshko <ed.gres...@greshko.com> wrote:
>
> On 2020-02-01 04:56, Samuel Sieb wrote:
> > On 1/31/20 12:35 PM, Ed Greshko wrote:
> >> On 2020-02-01 04:31, Samuel Sieb wrote:
> >>> Your original post was completely clear.  However, something is happening 
> >>> on your network that you aren't aware of.  The fact that you are getting 
> >>> connections from an external IP address means that somehow there is a 
> >>> path from the external internet to this computer.  It's possible that 
> >>> another computer on your network could somehow be routing incoming 
> >>> packets to the computer, but the outgoing ones have to be following the 
> >>> default route to the default gateway.  An interesting split routing.  
> >>> tcpdump (or wireshark) will give you the mac address and if it doesn't 
> >>> match your gateway, you will have to track down which computer has that 
> >>> mac.
> >>
> >> And in that regard the "arp" command may be useful.  That is if one is 
> >> aware of what IP addresses on
> >> the LAN belong to what devices.
> >
> > I thought about that, but it's only useful for mapping back from the MAC 
> > address and that would only work if the computers are talking directly 
> > using local addresses.  Only the attacking computer would have an arp entry 
> > for the target computer.  If the target does not normally have any 
> > communication with the attacker, it won't have an entry for it.  If he has 
> > access to the gateway computer, then that would more likely have an arp 
> > entry for the attacker.
>
> Well since arp is only on the LAN and since LAN communication is arp based 
> the tcpdump packets will
> have the MAC address of the device on the local network from which the ssh 
> packets were routed through.
>
> Normally, that would be the MAC of the gateway/firewall (assuming they are 
> the same).  But at least one
> would know the previous hop.
>
> >
> > One more thing I just thought of, depending on the network structure, the 
> > incoming packets could also be coming through the default gateway which 
> > would be even more difficult to track down.  But without the MAC address, 
> > it's all just speculation.
>
> And if the incoming packets have the MAC address of the default gw and the 
> default gw is also the firewall
> then that would indicate the firewall is not doing what the OP thinks it is 
> doing.
>
> --
> The key to getting good answers is to ask good questions.
> _______________________________________________
> users mailing list -- users@lists.fedoraproject.org
> To unsubscribe send an email to users-le...@lists.fedoraproject.org
> Fedora Code of Conduct: 
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: 
> https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org
_______________________________________________
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org

Reply via email to