Skip to content

Enhancement: firewall-rules (additional) setup #142

@jonix-jonixsson

Description

@jonix-jonixsson

Suggestion: when the honeypot is setup, add firewall rule(s) so an outside attacker cannot connect to the router via the honeypot, this ought to apply when the honeypot is located on a DMZ (where it has an address of (e.g.) 192.168.x.x (black-net IPs) ,nad the router has IP 192.168.x.1 (a usual address..)
There was someone of us who saw an ssh-attempt to connect from the honeypot to his/hers router/gateway-IP , and that kind of connection ought to be blocked with a firewall rule.
Can a installation question be made if the router will be located on a DMZ, or if it will be directly connected to (wild) internet ,and the result of the question will create and (eventual) rule?
It _is_possible that the ISP can use non-routeable IP-range for their customers and NAT that range (e.g. 10.x.x.x range)

It may be hypothetical, but possible to perform this kind of "relay" attack

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions