There is all sorts of information that you could provide:

- why do you believe that your machine was hacked? You seem to think that 
someone at your ISP did whatever was done. Why do you believe that to be true? 
Why would someone at your ISP want to do this? Why would someone at you ISP be 
better able to do this than some random bad person out on the Internet?

- you say that whatever happened was done by your ISP even though you had no 
Internet connection. Why do you believe that this is even possible? Why do you 
believe that you had no Internet connection? If you had no Internet connection, 
how is it that someone at your ISP would have been able to access the machine? 
Where is the machine actually located?

- you say that your pf rules were flushed. Why do you believe that they were 
ever loaded in the first place? Can you demonstrate that the rules were in 
place at one point in time and that they are no longer in place later? Have you 
tried rebooting the machine and then immediately checking to see if the rules 
are there or not?

- you say that you suspect that your ISP used some sort of “Layer 2 by using 
mac spoofing/mac target” technique. Please say more about “some sort of” - what 
sort of? Why do you believe that this technique, whatever it is, might work? 
Can you even provide a basic explanation of how this technique, whatever it is, 
might have been used to hack your machine or is this just a theory with no 
evidence to support it.

There are lots of other questions you could answer. For example, what messages 
appear in your log files that support your theory? Even a list of the evidence 
that you see that supports your theory might help. It almost sounds like you 
are saying that you cannot figure out how whatever happened occurred so it must 
have been someone at your ISP. That is a pretty big leap to make without some 
evidence that actually points at your ISP.

-Danny

> On Jul 28, 2015, at 18:00 , Wong Peter <[email protected]> wrote:
> 
> What information you all require?
> 
> On Tue, Jul 28, 2015 at 10:28 PM, Giancarlo Razzolini <[email protected]>
> wrote:
> 
>> Em 28-07-2015 06:17, Wong Peter escreveu:
>>> Dear All,
>>> 
>>> Recently, I'm realized that my openbsd firewall router was not usable
>>> anymore due to pf rules had changed by using carp and pfsync mechanism.
>>> 
>>> Here is my prove.
>>> 
>>> I'm tried to reinstall the whole machine and plugged in the modem LAN
>> cable
>>> to NIC card. All my written pf rules was flush and changed. This happen
>>> even without internet connection(No IP address assign).
>>> 
>>> I'm suspected this is did by my ISP. I'm believed my openbsd machine was
>>> located same subnet with their machine.
>>> 
>>> I'm even tried to disable carp protocol but my pf rules still get flushed
>>> out.
>>> How this can happen?
>>> How to prevent it?
>>> How my ISP can synchronize its pf rules to my machine without IP assign?
>>> I'm suspect they achieved at Layer 2 by using mac spoofing/mac target to
>> my
>>> machine.
>>> net.inet.carp.allow=0
>>> 
>>> Please help. Very urgent.
>>> 
>>> 
>>> 
>>> 
>>> 
>>> 
>> You use a very controversial subject in order to draw attention in the
>> hope that someone will help you. And not only you can't manage to give a
>> shred of evidence to support your claim, as you can't even manage to
>> provide enough information for some good soul on this list to help you.
>> Come back when you sorted this out.
>> 
>> Cheers,
>> Giancarlo Razzolini
>> 
> 
> 
> 
> -- 
> Linux

Reply via email to