Junky
August 4th, 2003, 20:42
Hi all,
Something interesting happened tonight, and I could use a little help.
Here is the story...
I recently setup an OpenBSD firewall (with help from this community - thanks):
[My PF rules are shown in my only other mail on this forum - PF Newby.]
ISP
|
|
dhcp
LinksysRouter
static
192.168.1.1
|
|
192.168.1.4
vr0
OpenBSD
xl0
192.168.255.1
|
|
192.168.255.2
InternalMachine
As it happens (and has been proved), the Linksys router appears to be performing most of the filtering, and scans from sites like grc.com show me running in 'full stealth' mode on all ports.
Anyway, I noticed tonight a breif spell where my connection seemed to slow down a little. I thought nothing of it, but when checking my OpenBSD pfctl -s info stats, it showed blocked packets!
Now I was a little surprised, since this is the first time I've seen unexpected packets arrive at my OpenBSD machine (except when I placed it into a DMZ by ammending the linksys router config - to test my OpenBSD rules initially).
It suggests (?) that bogus packets have traversed the linksys router only
to be stopped by OpenBSD ( ;-) ).
TCPdump showed a number of entries:
block in on vr0: 192.168.1.5.137 > 192.168.1.255.137: udp68
Given that:
i. vr0 faces the linksys router.
ii. No other devices were active on the router (except obviously the WAN
port to the cable modem and OpenBSD to one of the LAN ports).
iii. I have not used 192.168.1.5 anywhere within my network (or
192.168.1.x for that matter).
I looked in /etc/services and noted port 137 corresponds to netbios -n.
Has anyone got any thoughts on this?
I am very inexperienced in these matters but I think this means
somehow a spoofed private IP address got through the linksys firewall,
for the purpose of a netbios network (.255 ?) type scan...???
Or then again I could be totally wrong!
Whatever it was, OpenBSD stopped it, and that makes me happy ;-)
Cheers
Junky
Something interesting happened tonight, and I could use a little help.
Here is the story...
I recently setup an OpenBSD firewall (with help from this community - thanks):
[My PF rules are shown in my only other mail on this forum - PF Newby.]
ISP
|
|
dhcp
LinksysRouter
static
192.168.1.1
|
|
192.168.1.4
vr0
OpenBSD
xl0
192.168.255.1
|
|
192.168.255.2
InternalMachine
As it happens (and has been proved), the Linksys router appears to be performing most of the filtering, and scans from sites like grc.com show me running in 'full stealth' mode on all ports.
Anyway, I noticed tonight a breif spell where my connection seemed to slow down a little. I thought nothing of it, but when checking my OpenBSD pfctl -s info stats, it showed blocked packets!
Now I was a little surprised, since this is the first time I've seen unexpected packets arrive at my OpenBSD machine (except when I placed it into a DMZ by ammending the linksys router config - to test my OpenBSD rules initially).
It suggests (?) that bogus packets have traversed the linksys router only
to be stopped by OpenBSD ( ;-) ).
TCPdump showed a number of entries:
block in on vr0: 192.168.1.5.137 > 192.168.1.255.137: udp68
Given that:
i. vr0 faces the linksys router.
ii. No other devices were active on the router (except obviously the WAN
port to the cable modem and OpenBSD to one of the LAN ports).
iii. I have not used 192.168.1.5 anywhere within my network (or
192.168.1.x for that matter).
I looked in /etc/services and noted port 137 corresponds to netbios -n.
Has anyone got any thoughts on this?
I am very inexperienced in these matters but I think this means
somehow a spoofed private IP address got through the linksys firewall,
for the purpose of a netbios network (.255 ?) type scan...???
Or then again I could be totally wrong!
Whatever it was, OpenBSD stopped it, and that makes me happy ;-)
Cheers
Junky