On Tue, Jan 23, 2001 at 11:45:28AM -0500, Gord Mc . Pherson wrote:
> Hi,
> 
>   Perhaps 'iptraf' or 'netwatch' (both available on freshmeat) and 'netstat' could 
>be used to identify what/who is generating the traffic on your system. I'd also 
>concur with a previous comment about 'portsentry', since it's possible to spoof an 
>address and have portsentry block it.. it there for becomes an effective tool for a 
>hacker to use as a DoS. For example, I could find out what your ISP's DNS servers 
>are, spoof those addresses and have your portsentry block them. This would cut you 
>off from the net until you manually corrected it.

Ipchains (and I would assume iptables) has a log feature that will log any
packets that hit any rule with a -l in it, for instance, here was a guy
trying ftp: 

Jan 18 15:21:00 marvin kernel: Packet log: input DENY eth1 PROTO=6 213.51.164.222:3336 
24.14.189.245:21 L=48 S=0x00 I=15284 F=0x4000 T=117 SYN (#9)
Jan 18 15:21:03 marvin kernel: Packet log: input DENY eth1 PROTO=6 213.51.164.222:3336 
24.14.189.245:21 L=48 S=0x00 I=15347 F=0x4000 T=118 SYN (#9)

another trying sunrpc:

Jan 18 22:16:10 marvin kernel: Packet log: input REJECT eth1 PROTO=6 
211.116.51.17:2100 24.14.189.245:111 L=60 S=0x00 I=33380 F=0x4000 T=51 SYN (#13)

yet another trying DNS (comming from another dns server, hrmm)

Jan 23 03:43:00 marvin kernel: Packet log: input DENY eth1 PROTO=6 148.235.3.71:53 
24.14.189.245:53 L=40 S=0x00 I=39426 F=0x0000 T=27 SYN (#10)

You get the idea. No special software needed, just good 'ole ipchains.

BTW: Could you try to keep lines to <80 characters? (Nevermind the fact that 
I just broke that rule with the firewall logs).

-- 
Jordan Bettis <http://www.hafd.org/~jordanb/>
Showing up is 80% of life.
                -- Woody Allen


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to