are packets being spoofed/hijacked?

Unanswered Question
May 9th, 2008

Hi,

The following are from syslogs on ASA5510 firewall. Are the following TCP sessions being spoofed in the SYN phase?

07:40:25: %ASA-4-419002: Duplicate TCP SYN from Inside: 192.168.1.170/3229 to outside:82.42.69.140/4219 with different initial sequence number

(I can not find who has IP 192.168.1.170. Trend Micro shows no one on the LAN .170

The following shows an original udp payload, yet there seems to be a ICMP transmission.

ASA-4-313005 : No matching connection for ICMP error message: icmp src outside: 76.189.113.82 dst inside: 207.105.y.x (type 3, code 1) on outside interface: Original payload: udp src 207.105.y.x/3919 dst 192.168.1.100/49593

I have this problem too.
0 votes
  • 1
  • 2
  • 3
  • 4
  • 5
Overall Rating: 0 (0 ratings)
Loading.
aghaznavi Thu, 05/15/2008 - 14:28

Because connection limits are configured for a good reason, this system log message could indicate a possible DoS attack, in which case the source of the traffic could likely be a spoofed IP address. If the source IP address is not totally random, identifying the source and blocking it using an access-list might help. In other cases, getting sniffer traces and analyzing the source of the traffic would help in isolating unwanted traffic from legitimate traffic.

saidfrh Fri, 05/16/2008 - 08:50

Is it best to sniff the traffic on the LAN or in between the perimeter router and the firewall?

Actions

This Discussion