Re: arpwatch on OpenBSD vm misinterpreting data?

2019-09-10 Thread Theo de Raadt
Paul Hanson  wrote:

> > That arpwatch notice just shows that there was a packet from an IP address
> > that hadn't been seen before. What makes you think it's a spoofing attempt?
> 
> The newly advertised IP used the same mac as the default gateway.
> 
> > Something like this might be seen if e.g. a new IP address was added on the
> > default gateway router.
> 
> This would be the most "comforting" rationale though I would expect my 
> hosting provider to be more forthcoming about an infrastructure change. 

and precisely what does this have to do with OpenBSD?



Re: arpwatch on OpenBSD vm misinterpreting data?

2019-09-10 Thread Paul Hanson
> That arpwatch notice just shows that there was a packet from an IP address
> that hadn't been seen before. What makes you think it's a spoofing attempt?

The newly advertised IP used the same mac as the default gateway.

> Something like this might be seen if e.g. a new IP address was added on the
> default gateway router.

This would be the most "comforting" rationale though I would expect my hosting 
provider to be more forthcoming about an infrastructure change. 

Additionally, traffic was observed via TCP80 and TCP443 testing the 
configuration of HTTP and TLS protocols. Leading me to believe the IP was not 
benign.

> A tcpdump from the same time that the arpwatch notice was triggered might give
> a clearer picture. Without knowing more about the network config I couldn't
> say for sure, but it's quite possible that the hosting provider does protect
> against arp shenanigans.

Agreed that tcpdump would be useful though I would expect arpwatch to be just 
as reliable. 

I have no doubt my hosting provider has certain protections in place. I've been 
a customer for a number of months with this being the first alert.

Thanks,
Paul



Re: arpwatch on OpenBSD vm misinterpreting data?

2019-09-10 Thread Stuart Henderson
On 2019-09-09, Paul Hanson  wrote:
> TLDR; - Arpwatch new station alert showed arp spoofing attempt. Cloud
> hosting provider is adamant that arpwatch is misinterpreting data.
>
> OpenBSD 6.5 vm running in a cloud hosting provider:
>
> WEB# uname -a
> OpenBSD WEB 6.5 GENERIC.MP#3 amd64
>
> Arpwatch installed:
>
> WEB# pkg_info arpwatch | grep Information
> Information for inst:arpwatch-2.1a15p19
>
> Received arpwatch notification:
>
> WEB# grep arpwatch /var/log/daemon
> Aug 29 10:43:57 WEB arpwatch: new station 2.2.3.12 00:00:00:00:00:01
>
> Checked arp table and found the mac address matched that of the default 
> gateway.
>
> WEB# arp -a
> Host   Ethernet AddressNetif ExpireFlags
> 2.2.2.100:00:00:00:00:01vio0 9m30s
> web22:22:22:22:22:22vio0 permanent l

That arpwatch notice just shows that there was a packet from an IP address
that hadn't been seen before. What makes you think it's a spoofing attempt?
Something like this might be seen if e.g. a new IP address was added on the
default gateway router.

> Later watching arp traffic showed typical conversations between the
> host and default gateway. No other arp traffic was observed.
>
> WEB# tcpdump -lnettt -i vio0 arp
>
> I'm interested to hear feedback from misc@ as I didn't get a response
> from the arpwatch list. Is there a log or config I should check?
> Perhaps another utility to consider? Is my cloud hosting provider
> misinterpreting data? Do you suppose they had unplanned & unannounced
> maintenance? Anything else?

A tcpdump from the same time that the arpwatch notice was triggered might give
a clearer picture. Without knowing more about the network config I couldn't
say for sure, but it's quite possible that the hosting provider does protect
against arp shenanigans.




arpwatch on OpenBSD vm misinterpreting data?

2019-09-09 Thread Paul Hanson
TLDR; - Arpwatch new station alert showed arp spoofing attempt. Cloud hosting 
provider is adamant that arpwatch is misinterpreting data.

OpenBSD 6.5 vm running in a cloud hosting provider:

WEB# uname -a
OpenBSD WEB 6.5 GENERIC.MP#3 amd64

Arpwatch installed:

WEB# pkg_info arpwatch | grep Information
Information for inst:arpwatch-2.1a15p19

Received arpwatch notification:

WEB# grep arpwatch /var/log/daemon
Aug 29 10:43:57 WEB arpwatch: new station 2.2.3.12 00:00:00:00:00:01

Checked arp table and found the mac address matched that of the default gateway.

WEB# arp -a
Host   Ethernet AddressNetif ExpireFlags
2.2.2.100:00:00:00:00:01vio0 9m30s
web22:22:22:22:22:22vio0 permanent l

I proceeded to look at pf (host firewall) logs. While I don't log drops there 
were a number of requests to tcp80 and tcp443. Parsing relayd logs showed none 
of the requests passed protocol security filtering.

Beyond this, I have no way to determine if this arp spoofing was successful. 
Thus I reached out to my hosting provider with this information and their 
response was:

"We have protections in place to defend against such things and therefore 
this style of attack can not be performed on our network. The data you are 
seeing here is a bit misleading. Thank you for your report."

I've only been a customer for a few months and during that time there have been 
no alerts generated by arpwatch. However I don't understand how the data is 
misleading. This is because arpwatch runs in an environment I manage and is 
found to be quite useful. Thus I requested more context as to why the data is 
misleading and their response was:

"It is misinterpreting data. This attack is not possible on our network and 
arpwatch is not relevant to our platform or how it operates."

Support is clearly adamant that their hosting environment is impervious. 
However none of this makes any sense to me. The host is a basic install with no 
custom or one-off configurations.

Later watching arp traffic showed typical conversations between the host and 
default gateway. No other arp traffic was observed.

WEB# tcpdump -lnettt -i vio0 arp

I'm interested to hear feedback from misc@ as I didn't get a response from the 
arpwatch list. Is there a log or config I should check? Perhaps another utility 
to consider? Is my cloud hosting provider misinterpreting data? Do you suppose 
they had unplanned & unannounced maintenance? Anything else?

Thanks,
Paul