>> > `watch` isn't going to help too much unless you're looking at it. Append
>> > the output to some log file instead. I chose netstat because its output
>> > looked easier to parse with a stupid regexp.
>> >
>> >  while true; do
>> >    netstat -antp | grep ':993 ' >> mystery.log;
>> >    sleep 1;
>> >  done;
>> >
>> > You'll want to change the port -- I tested to make sure that was really
>> > logging my Thunderbird connections.
>>
>> I'm still getting the blocked outbound requests to port 3680 on my
>> firewall and I'm running the above script (changed 993 to 3680) on the
>> local system indicated by SRC in the firewall log, but mystery.log
>> remains empty.  I tested the script with other ports and it seems to
>> be working fine.
>>
>> Also the MAC indicated in the firewall log is 14 blocks long and the
>> local system in question has a MAC address 6 blocks long according to
>> ifconfig, but the 6 blocks from ifconfig do match 6 of the blocks
>> reported by the firewall.
>>
>> Does this make sense to anyone?
>
> Does not make sense to me, sorry.  :-(
>
> Have you tried running the script on lsof instead?

OK I changed 'netstat -antp' to 'lsof -i'.

- Grant

Reply via email to