Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Arpwatch positive question.

    Scheduled Pinned Locked Moved pfSense Packages
    4 Posts 2 Posters 1.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • R
      rand4505
      last edited by

      Arpwatch is detecting MAC changes to an ipaddress on random intervals.  There is no manufacturer management software on this server.  Has anyone seen positives like this?

      May 1 10:11:54 kernel: arp: 10.10.1.12 moved from XX:XX:XX:XX:XX:0c to
      XX:XX:XX:XX:XX:08 on bge0
      May 1 10:10:46 kernel: arp: 10.10.1.12 moved from XX:XX:XX:XX:XX:08 to
      XX:XX:XX:XX:XX:0c on bge0

      May 1 07:35:54 kernel: arp: 10.10.1.12 moved from XX:XX:XX:XX:XX:0c to
      XX:XX:XX:XX:XX:08 on bge0

      May 1 07:30:11 kernel: arp: 10.10.1.12 moved from XX:XX:XX:XX:XX:08 to
      XX:XX:XX:XX:XX:0c on bge0

      This repeats all day long, never closer than 1hr15min intervals, and at most double that.

      1 Reply Last reply Reply Quote 0
      • GruensFroeschliG
        GruensFroeschli
        last edited by

        Why are you obfuscating the MAC-addresses O_o

        But the message is pretty much self explaining.
        Check your network for the devices with these MAC-addresses and debug why they have the same IP address.

        We do what we must, because we can.

        Asking questions the smart way: http://www.catb.org/esr/faqs/smart-questions.html

        1 Reply Last reply Reply Quote 0
        • R
          rand4505
          last edited by

          Obfuscation:  You only needed to see that the last part is the one changing.

          And the only device on the network with mac's that have those matching parts are in the same box, and each nic is on a different network.

          1 Reply Last reply Reply Quote 0
          • GruensFroeschliG
            GruensFroeschli
            last edited by

            There's really no point in obfuscating MAC addresses because they are only in your local network visible. No attack surface to be gained here.
            On the other side it helps someone analysing your problem. I could have seen if they are from the same manufacturer (same device?), or if the local administered bit is set, which would be an indication of virtual MACs (eg. CARP).

            Please provide a network diagram how your stuff is set up.
            Obviously somewhere is traffic leaking between your networks.

            In the diagram please don't obfuscate your internal network addresses.
            It does not help your security and makes it harder to wrap ones mind around your setup.
            Also don't leave out "non-critical devices".
            You may think they have no impact, but maybe they do.

            We do what we must, because we can.

            Asking questions the smart way: http://www.catb.org/esr/faqs/smart-questions.html

            1 Reply Last reply Reply Quote 0
            • First post
              Last post
            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.