On Dec 31 2006 15:17, Hylton Conacher(ZR1HPC) wrote:
>Subject: [opensuse] Intrusion attempt?

Hardly.

> I have seen the following popup on my /var/log/messages and wonder what it
> could be especially as my current box has the IP of 10.0.0.14:
>
> Dec 31 15:03:09 Spy kernel: SFW2-INext-DROP-DEFLT-INV IN=eth0 OUT=
                                                    ^^^

What we see here seems to be matching -m conntrack --ctstate INVALID.

> MAC=00:40:f4:cf:bc:a7:00:02:96:48:71:87:08:00 SRC=208.184.36.73 
> DST=10.0.0.14

As you figured out, dst=10.0.0.14 is quite unlikely to be routable from 
208.184.36.73. Your ISP does not change that (heh - hopefully!)

73.36.184.208.in-addr.arpa domain name pointer 208.184.36.73.available.
Whois says:
IMR Worldwide PTY LTD MFN-N298--208-184-36-64-27 (NET-208-184-36-64-1)
                                  208.184.36.64 - 208.184.36.95

"""IMR Worldwide Pty Ltd , an Australian-based company, has formed a new
partnership with Taylor Nelson Sofres to establish a joint venture 
specialising in market research focussing on the Internet.""" So you 
know who that is.

> LEN=56 TOS=0x00 PREC=0x00 TTL=61 ID=50579 PROTO=TCP SPT=80 DPT=1202 

It is highly unlikely that said box targeted you. The source port is 80, 
usually for HTTP, plus you've got a Pty Ltd.

> WINDOW=8192
> RES=0x00 ACK SYN URGP=0 OPT (020405980101080A08A2DBAD01976D81)

This however is strange. It would mean you got a spurious SYN ACK in 
your connection. Which can't be, since the connection is unknown 
(INVALID, see above). The option string says: maximum segment size is 
0x598 (1432), and some other bits not covered by RFC 793.

All in all my conclusion is: The packet you received is valid, as part 
of _you_ establishing a connection (probably visiting a webpage with 
ads), however, for some __strange__ reason, the connection is INVALID.


I have seen similar strange things with iptables/netfilter recently -- 
established connections just went INVALID for no apparent reason, yet 
they continued to be listed as ESTABLISHED in `conntrack -L`.

What you can do in the short term: post the results of `iptables-save`, 
it might reveal some oddity I just stumbled over yesterday. In the long 
term, upgrading to iptables 1.3.7 (suser-jengelh) might solve the 
problem, the more if iptables-save shows what I think it could show.

> ========================================================================
> Using SuSE 9.2 Professional with KDE and Mozilla Mail 1.7.13
> Linux user # 229959 at http://counter.li.org
> ========================================================================

I'll take notice. I don't have a repo for that, so iptables 1.3.7 only 
for SUSE 10.2 (and most likely downwards compatible with 10.1 and 
older).



        -`J'
-- 
-- 
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to