On Fri, 6 Sep 2019 11:56:18 -0700 (PDT), user pc
<
peterco...@gmail.com> declaimed the
following:
>But that would include posting ip address of home network for possible
>hackers to hack my network. Is there another way to do it?
Unless your home network is very badly configured, all it should show
is a PRIVATE LAN IP number, provided by your router. Normal routers
(cable/DSL/etc.) perform NAT (network address translation) -- internal
(LAN) addresses are never passed outside (if they are, you have a bad
router, and would be causing confusion as every model of the same router
uses the same IP addresses on the LAN side).
And, unless you've opened ports on your router, it should also be
running a firewall which blocks unsolicited inbound connection attempts.
Mainly because the NAT table will not have an entry saying "routerIP/port#"
translates to "LAN IP/port#". Opening a port tells the router than anything
it sees coming in with that port# as destination will be sent to whatever
internal LAN IP was specified to handle it. OR you have a DMZ node -- and
the router is configured to send ALL unsolicited inbound traffic to that
single computer (the "opened ports", at least on my router, can have a
different computer for each port listed -- so a port 80 webserver could be
on one computer while a NNTP server is on another... and any other port is
dropped unless a DMZ catch-all is defined)
md_admin@microdiversity:~$ netstat -na
Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address Foreign Address State
tcp 0 0
0.0.0.0:22 0.0.0.0:* LISTEN
tcp 0 0
127.0.0.1:3306 0.0.0.0:* LISTEN
tcp 0 0
0.0.0.0:80 0.0.0.0:* LISTEN
tcp 0 64
192.168.1.252:22 192.168.1.66:50592 ESTABLISHED
tcp6 0 0 :::22 :::* LISTEN
tcp6 0 0 :::80 :::* LISTEN
udp 0 0
0.0.0.0:5353 0.0.0.0:*
udp 0 0
0.0.0.0:68 0.0.0.0:*
udp 0 0
0.0.0.0:36950 0.0.0.0:*
udp6 0 0 :::5353 :::*
udp6 0 0 :::49137 :::*
raw6 0 0 :::58 :::* 7
Active UNIX domain sockets (servers and established)
Proto RefCnt Flags Type State I-Node Path
unix 2 [ ] DGRAM 8448
/run/systemd/journal/syslog
{REST of UNIX domain excluded}
md_admin@microdiversity:~$ sudo route -n
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use
Iface
0.0.0.0 192.168.1.254 0.0.0.0 UG 202 0 0
eth0
192.168.1.0 0.0.0.0 255.255.255.0 U 202 0 0
eth0
md_admin@microdiversity:~$
Go ahead -- try to ping/traceroute my R-Pi server using that
information.
--
Wulfraed Dennis Lee Bieber AF6VN
wlf...@ix.netcom.com http://wlfraed.microdiversity.freeddns.org/