On Mon, Oct 14, 2002 at 11:15:11PM -0700, Ray Olszewski wrote: > >O.K. full log entry: > >Oct 14 14:46:06 skilderhus kernel: Packet log: input DENY eth0 PROTO=1 > >10.131.224.1:3 62.243.222.62:1 L=56 S=0x00 I=41957 F=0x0000 T=243 (#9) > > OK. It's what I guessed above ... an icmp "host unreachable" message. > There's probably a secret decoder ring for this stuff online somewhere, but > I use a book.
Wow! A *book*... cool ;) > Here's the pieces: > > PROTO=1 protocol 1 is icmp > 10.131.224.1:3 10.131.224.1 is the source IP, of course; > the "port" is the icmp message type, 3=Destination > unreachable > 62.243.222.62:1 62.243.222.62 is the destination IP, as usual; > the "port" is the icmp message code, 1=host > unreachable Right. Gotta look up an icmp code 'translation' guide... any good links anyone? > Without seeing the content of the packet (which does not get logged), we > have no way to know what host this is about. If there is some IP address > (or block of them) you are having trouble reaching, this may be why. No trouble connecting, not to my knowledge anyway. I'm not on that lan, and really only have anything to do with the server and the dach box... > Or, > since the source address is a private address, it may be that someone has > his internal network misconfigured in a somewhat bizarre fashion, and you > are getting icmp packets that are replying to someone else's connection > attempts. Or (let's be paranoid for a moment) someone else is spoofing your > external IP address as the source of some packets, and you are getting the > replies. Hmmm... grep PROTO=1 messages gives a sh*tload of lines. Every one is "input DENY eth0", that is, coming from the outside. I know (from the httpd-logs on the server) that the 'neighborhood' 62.243.222 is positively swamped with infected windows servers. > Are the various "<some-ip>" entries all private addresses like subnet 10, > or are some of them from real (public) IP addresses? If the second, what > are some of the sources? I've put a sorted/uniq'ed list of yesterday's and today's instances at the bottom, but yeah they all look pretty private, with the exception of the 65.82.107.120 (and maybe some of the 172...s ?) > >The Dachstein box has a LAN and a DMZ, with a web/mail/dns/ftp server, > >behind it. None of the IPs logged show in the server's logs. Perhaps a little more info should go here: lan: 192.168.0.0/24 dmz: 10.0.1.0/24 AFAIK nobody on the lan runs anything other than 'regular' (couple linux, mostly w$) hosts. The server in the dmz is SuSE 7.3 > >> Probably none of the above. PROTO=1 means icmp, and "port" 5 (it's > >really a > >> message type, not a port, when icmp is involved) means it is an icmp > >> redirect packet. The packet should be telling you that this host is not > >the > >> preferred route to some destination. Whether this means a problem with > >> your routing table or someone else's is unknowable from the information > >you > >> have provided. > > > >I don't think there's a problem with my box's routing table, meaning > >that the clients on the lan have no problems connecting to the net or > >the dmz/server. Also there are no problems connecting to the server from > >'outside'... It's been running with the current config for months. > > I'm not sure, but I think that if your end ignores the redirects, the other > end will still route for you ... they are a suggestion, not an order. So > you can, probably, safely disregard these messages. Hmmm... The only one that knows anything (about computers anyway) on the lan, is on vacation ATM. I should prolly ask him whether everything's o.k. when he gets back... Thanks for the info/effort. Jon Clausen Today's harvest: 10.1.0.1 10.1.1.22 10.114.128.1 10.130.128.1 *) 10.134.224.1 10.2.128.1 *) 10.217.192.1 *) 10.219.224.1 10.25.116.1 10.46.60.1 10.59.224.1 10.62.52.1 10.62.60.1 10.68.0.1 10.80.128.1 192.168.120.4 192.168.246.142 192.168.9.202 Yesterday's: 10.130.128.1 *) 10.131.224.1 10.133.52.1 10.2.128.1 *) 10.217.192.1 *) 10.22.28.1 10.3.32.1 10.52.72.1 10.52.96.1 10.58.144.1 10.75.16.1 172.16.11.1 172.16.193.1 172.17.82.106 172.22.32.3 172.26.49.9 192.168.129.3 192.168.147.98 192.168.246.54 192.168.247.110 192.168.247.158 192.168.247.22 192.168.9.193 65.82.107.120 *) present both today and yesterday ------------------------------------------------------- This sf.net email is sponsored by:ThinkGeek Welcome to geek heaven. http://thinkgeek.com/sf ------------------------------------------------------------------------ leaf-user mailing list: [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/leaf-user SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html