Any ideas from anyone what may have occurred here?
I use a device called ‘Fingbox’ to monitor changes on my network. This morning I received an alert that TCP Port 2323 (a telnet port) had been opened (manually) at around 1am while I was sleeping. I can’t see any configuration on port forwarding or firewall in the Omnia where this has been enabled, but using SheildsUp, it verifies that the port is open.
(The other three open ports are IP security cameras)
I’m using openwrt for a longer time and simply swapped my configs to turris.
I prepared a rescue image with my packages & configs and copied it.
Since then forris is deactivated.
ah okai, thxs. So, im going to take a closer look at the foris backend.
Is there an easy way to do a consitent DD image of the mmcblk0p1 device?
Maybe before booting?
Should I start a new Thread?
Well I see possibility to do that but turris os is simply more that just different configuration of openwrt. I think that you are on the path of constant struggle.
No there is not. We have something called rescue image that is in secondary storage (nor). But that is hardwired for factory a and reflash so I don’t think that you can just drop to shell in rescue (you might foud a way but there is no official one). So other option is to break uboot and boot different rootfs. But I think that most simplier is just to do snapshot, mount it and tar content.
Are you behind a NAT? If so then there is little to no chance that anyone will try to breach your honeypot (although that doesn’t mean that you should disable it nor that it’s safe to open ssh to nat network it just means that there is very low chance of any attack happening).
Don’t have a NAT enabled beyond what the default configuration is on the Turris. I looked through all the config settings and I can’t actually identify how you would selectively enable/disable NAT in the Turris… I feel a bit silly that I can’t seem to find this setting on the router…
Router automatically does natting because that is the most expected way. To disable it you just have to configure firewall to no do masquerade on traffic from wan. But that is not what you want.
No what I meant is: is you router behind nat? Not if your router does nat. If your isp doesn’t gives you public ip then you are behind nat for sure. Other option is that although you have configured data collection that no data were sent to us. Or of course there is possibility that there are no attacks at you. Who knows. You can try ti attack your self from somewhere outside just to see if your connection is well configured.
In reality if it’s problem (bug or something) with software then just please wait for Turris OS 3.9 as that release will contain latest version of new implementation called HAAS. Just note on this, with haas collected data are sent to haas service and won’t be visible in project.turris.cz.