are packets being spoofed/hijacked?

Unanswered Question
May 9th, 2008
User Badges:


The following are from syslogs on ASA5510 firewall. Are the following TCP sessions being spoofed in the SYN phase?

07:40:25: %ASA-4-419002: Duplicate TCP SYN from Inside: to outside: with different initial sequence number

(I can not find who has IP Trend Micro shows no one on the LAN .170

The following shows an original udp payload, yet there seems to be a ICMP transmission.

ASA-4-313005 : No matching connection for ICMP error message: icmp src outside: dst inside: 207.105.y.x (type 3, code 1) on outside interface: Original payload: udp src 207.105.y.x/3919 dst

  • 1
  • 2
  • 3
  • 4
  • 5
Overall Rating: 0 (0 ratings)
aghaznavi Thu, 05/15/2008 - 14:28
User Badges:
  • Silver, 250 points or more

Because connection limits are configured for a good reason, this system log message could indicate a possible DoS attack, in which case the source of the traffic could likely be a spoofed IP address. If the source IP address is not totally random, identifying the source and blocking it using an access-list might help. In other cases, getting sniffer traces and analyzing the source of the traffic would help in isolating unwanted traffic from legitimate traffic.

saidfrh Fri, 05/16/2008 - 08:50
User Badges:

Is it best to sniff the traffic on the LAN or in between the perimeter router and the firewall?


This Discussion