-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 21.01.2012 02:39, Michael Mol wrote:
> On Fri, Jan 20, 2012 at 6:34 PM, Grant <emailgr...@gmail.com>
> wrote:
>>>>>>>> My firewall is blocking periodic outbound connections
>>>>>>>> to port 3680 on a Rackspace IP.  How can I find out
>>>>>>>> more about what's going on?  Maybe which program is
>>>>>>>> generating the connection requests?
>>>>>>> 
>>>>>>> Uh, a packet sniffer?
>>>>>>> 
>>>>>>> I have an old laptop here that I have a second
>>>>>>> (cardbus) network card in. Really cheap and cheerful -
>>>>>>> the sort of thing you can pick up on freecycle. It's
>>>>>>> been a while since I've done anything like this, but
>>>>>>> you should be able to stick a box like that between the
>>>>>>> router and the rest of your network, run Wireshark and
>>>>>>> filter on that port. If the connection is encrypted
>>>>>>> then at least you'll see the originating IP.
>>>>>> 
>>>>>> I've actually got the originating local IP from the
>>>>>> shorewall log. I'm just trying to figure out which
>>>>>> program and maybe which user on that system is generating
>>>>>> the outbound requests to port 3680.  Is there any way to
>>>>>> get more info without setting up a new box?
>>>>>> 
>>>>>>> I don't think it's relevant that the IP belongs to
>>>>>>> Rackspace - don't they just hire (virtual) servers to
>>>>>>> anyone that wants one?
>>>>>> 
>>>>>> Yeah I just meant the request could be going to
>>>>>> "anyone".
>>>>>> 
>>>>>> - Grant
>>>>> 
>>>>> Are you running NPDS in your LAN and is it configured to
>>>>> access any sites on rackspace? -- Regards, Mick
>>>> 
>>>> I am not running NPDS.  I looked it up when I was researching
>>>> port 3680 and read about it for the first time.  I know which
>>>> machine is making the requests.  Any way to drill down
>>>> further?
>>> 
>>> If the machine is running linux, then 'watch "lsof -n|grep
>>> TCP|grep 3680"' as root is a sloppy but effective way to find
>>> it. There's probably some way to set up a firewall rule on the
>>> host in question that logs out the user and (possibly) PID of
>>> the connection, but I don't know.
>> 
>> All of my systems run Gentoo. :)  Where does watch come from?
> 
> shortcircuit@saffron ~ $ equery b `which watch` 
> /usr/lib64/portage/pym/portage/package/ebuild/config.py:353: 
> UserWarning: 'cache.metadata_overlay.database' is deprecated: 
> /etc/portage/modules (user_auxdbmodule, modules_file)) * Searching
> for /usr/bin/watch ... sys-process/procps-3.2.8_p11
> (/usr/bin/watch) shortcircuit@saffron ~ $
> 
> Incidentally, does anyone know why all my portage-related
> executions get that 'cache.metadata_overlay.database' warning? I've
> been seeing it for weeks, even on fresh installs. I would have
> assumed a bug like that would have been fixed by now.
> 
> 

You get the warning, because you hat a directory /etc/portage/modules
- - simply remove it (or move it, if you are afraid to break something).
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.18 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBAgAGBQJPGhmmAAoJEJwwOFaNFkYcBFQIAJlWjVqACiqCSxwNnigFvXfa
olRedLttuzZUGcJKsx59gptBeaRxSc/kQ7oEai6QSmFzY7nq5bsz3QMtJEB5QJpo
rOwD844f6pKRKv4GWjCg++1W6LJJcbMs4s0TARLM1+o+uaTC8Lgb/tjdJCov6cWF
Hhl/KxRpdy/mCL/QB7/kOQRL/lDryy23xoxCln8S60xzD8pWQ/HsPdMNKg2LDpOL
RxKyywJQ/y35OTJU60w6vgkPhJnhQQ4WgzrruvsNCSS60t1Mr51XXdmj5ATEChCw
qaxml/3x1eHc4L2j5GekjED0PL2fROOTYujoDlpuTHGTUy5tHNvww+/2upqLf9U=
=t8zl
-----END PGP SIGNATURE-----

Reply via email to