Well, that might be overkill...

Size            File
 19004  services (Mandrake 9)
 11077  services (Bering 1.0)
101481  nmap-services (nmap 3.00)

What I was looking for is a services file with the service ports that
are currently being commonly exploited.  I'm using my Mandrake services
file on my Bering firewall at the moment.

1433, 1434, 445, 53, 80, 443, 8080, 8081, 3128, 25

Some of these are new (newer than 1997) service ports, and new exploits.
I would suspect that a pretty logfile with some human readable
information might cut down on the posts from newbies thinking they have
been hacked.

I know this is not going to work, but here is a cut-and-paste of my
current logfile.  It is in a nice HTML table with the columns lined up.
The Dest Port column has | Description (port#) |

Date   Time     Firewall Rule    Action In I/F Out I/F From IP
Target IP      Protocol Src Port Dest Port 
Feb 21 06:42:11 firewall all2all REJECT local  eth0    12.243.225.129
192.43.244.18  TCP      1772     time (37) 
Feb 21 06:55:22 firewall net2all DROP   eth0   local   211.222.248.167
12.243.225.129 TCP      2006     17300 
Feb 21 06:55:28 firewall net2all DROP   eth0   local   211.222.248.167
12.243.225.129 TCP      2006     17300 
Feb 21 06:55:38 firewall net2all DROP   eth0   local   211.222.248.167
12.243.225.129 TCP      2006     17300 
Feb 21 06:55:50 firewall net2all DROP   eth0   local   211.222.248.167
12.243.225.129 TCP      2006     17300 
Feb 21 11:59:00 firewall net2all DROP   eth0   local   212.64.132.107
12.243.225.129 TCP      42527    microsoft-ds (445) 
Feb 21 12:41:09 firewall net2all DROP   eth0   local   38.112.96.157
12.243.225.129 UDP      1309     ms-sql-m (1434) 
Feb 21 13:54:32 firewall net2all DROP   eth0   local   202.178.156.229
12.243.225.129 UDP      2046     ms-sql-m (1434) 
Feb 21 17:46:56 firewall net2all DROP   eth0   local   160.33.16.238
12.243.225.129 UDP      1233     ms-sql-m (1434) 
Feb 21 21:43:14 firewall net2all DROP   eth0   local   64.124.142.92
12.243.225.129 UDP      3004     ms-sql-m (1434) 
Feb 21 23:33:59 firewall net2all DROP   eth0   local   24.158.21.53
12.243.225.129 TCP      3187     ftp (21) 
Feb 22 00:09:21 firewall net2all DROP   eth0   local   67.210.111.63
12.243.225.129 UDP      2241     ms-sql-m (1434) 
Feb 22 00:55:09 firewall net2all DROP   eth0   local   218.239.215.222
12.243.225.129 TCP      4207     12346 
Feb 22 01:32:22 firewall net2all DROP   eth0   local   128.242.107.15
12.243.225.129 UDP      55555    domain (53) 
Feb 22 03:59:27 firewall net2all DROP   eth0   local   216.118.6.173
12.243.225.129 UDP      1773     ms-sql-m (1434) 
Feb 22 05:44:21 firewall net2all DROP   eth0   local   66.196.20.36
12.243.225.129 UDP      3241     ms-sql-m (1434) 

Some ports are well know for being exploited (see FAQ: Firewall
Forensics (What am I seeing?) for a nice list).  Those would be good to
add to the services file.  Others we just might want to drop.  Either
way, we might want to start with a more modern version of the file.

I guess one question I need answered is, is their a "maintainer" of
ETC.lrp and Weblet.lrp?  If so, should I submit my changes to them?  Or
should I just drop it in patch manager?  Who decides if this is a "good"
change?

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of David
Douthitt
Sent: Tuesday, February 25, 2003 5:26 PM
To: [EMAIL PROTECTED]
Subject: Re: [leaf-devel] Suggestion for ETC.LRP


On 25 Feb 2003 09:53:25 -0500
"Sean E. Covel" <[EMAIL PROTECTED]> wrote:

> I've been testing it on a Mandrake box, and then moved it to my Bering

> box.  The first thing I noticed was the calls to
> getservbyport() wasn't returning the same information.  I took a look 
> at the services file, and saw why.  ITS FROM 1997.  A bit out of date.

> I suggest we update this to something a little more 21st Century.

I have (or had) a file called services.lrp (or something like it) which
contained the extra large services file from (I think) nmap.  You could
try that, but it is at least an order of magnitude larger than the
current /etc/services file.






-------------------------------------------------------
This SF.net email is sponsored by: Scholarships for Techies!
Can't afford IT training? All 2003 ictp students receive scholarships.
Get hands-on training in Microsoft, Cisco, Sun, Linux/UNIX, and more.
www.ictp.com/training/sourceforge.asp

_______________________________________________
leaf-devel mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-devel

Reply via email to