Do you have anything defined as a DMZ node/ipaddress on the firewall?
On Fri, Jan 31, 2020 at 3:53 PM Ed Greshko <ed.gres...@greshko.com> wrote: > > On 2020-02-01 04:56, Samuel Sieb wrote: > > On 1/31/20 12:35 PM, Ed Greshko wrote: > >> On 2020-02-01 04:31, Samuel Sieb wrote: > >>> Your original post was completely clear. However, something is happening > >>> on your network that you aren't aware of. The fact that you are getting > >>> connections from an external IP address means that somehow there is a > >>> path from the external internet to this computer. It's possible that > >>> another computer on your network could somehow be routing incoming > >>> packets to the computer, but the outgoing ones have to be following the > >>> default route to the default gateway. An interesting split routing. > >>> tcpdump (or wireshark) will give you the mac address and if it doesn't > >>> match your gateway, you will have to track down which computer has that > >>> mac. > >> > >> And in that regard the "arp" command may be useful. That is if one is > >> aware of what IP addresses on > >> the LAN belong to what devices. > > > > I thought about that, but it's only useful for mapping back from the MAC > > address and that would only work if the computers are talking directly > > using local addresses. Only the attacking computer would have an arp entry > > for the target computer. If the target does not normally have any > > communication with the attacker, it won't have an entry for it. If he has > > access to the gateway computer, then that would more likely have an arp > > entry for the attacker. > > Well since arp is only on the LAN and since LAN communication is arp based > the tcpdump packets will > have the MAC address of the device on the local network from which the ssh > packets were routed through. > > Normally, that would be the MAC of the gateway/firewall (assuming they are > the same). But at least one > would know the previous hop. > > > > > One more thing I just thought of, depending on the network structure, the > > incoming packets could also be coming through the default gateway which > > would be even more difficult to track down. But without the MAC address, > > it's all just speculation. > > And if the incoming packets have the MAC address of the default gw and the > default gw is also the firewall > then that would indicate the firewall is not doing what the OP thinks it is > doing. > > -- > The key to getting good answers is to ask good questions. > _______________________________________________ > users mailing list -- users@lists.fedoraproject.org > To unsubscribe send an email to users-le...@lists.fedoraproject.org > Fedora Code of Conduct: > https://docs.fedoraproject.org/en-US/project/code-of-conduct/ > List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines > List Archives: > https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org _______________________________________________ users mailing list -- users@lists.fedoraproject.org To unsubscribe send an email to users-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org