On Tue, Jan 23, 2001 at 11:45:28AM -0500, Gord Mc . Pherson wrote:
> Hi,
> 
>   Perhaps 'iptraf' or 'netwatch' (both available on freshmeat) and 'netstat' 
> could be used to identify what/who is generating the traffic on your system. 
> I'd also concur with a previous comment about 'portsentry', since it's 
> possible to spoof an address and have portsentry block it.. it there for 
> becomes an effective tool for a hacker to use as a DoS. For example, I could 
> find out what your ISP's DNS servers are, spoof those addresses and have your 
> portsentry block them. This would cut you off from the net until you manually 
> corrected it.

Ipchains (and I would assume iptables) has a log feature that will log any
packets that hit any rule with a -l in it, for instance, here was a guy
trying ftp: 

Jan 18 15:21:00 marvin kernel: Packet log: input DENY eth1 PROTO=6 
213.51.164.222:3336 24.14.189.245:21 L=48 S=0x00 I=15284 F=0x4000 T=117 SYN (#9)
Jan 18 15:21:03 marvin kernel: Packet log: input DENY eth1 PROTO=6 
213.51.164.222:3336 24.14.189.245:21 L=48 S=0x00 I=15347 F=0x4000 T=118 SYN (#9)

another trying sunrpc:

Jan 18 22:16:10 marvin kernel: Packet log: input REJECT eth1 PROTO=6 
211.116.51.17:2100 24.14.189.245:111 L=60 S=0x00 I=33380 F=0x4000 T=51 SYN (#13)

yet another trying DNS (comming from another dns server, hrmm)

Jan 23 03:43:00 marvin kernel: Packet log: input DENY eth1 PROTO=6 
148.235.3.71:53 24.14.189.245:53 L=40 S=0x00 I=39426 F=0x0000 T=27 SYN (#10)

You get the idea. No special software needed, just good 'ole ipchains.

BTW: Could you try to keep lines to <80 characters? (Nevermind the fact that 
I just broke that rule with the firewall logs).

-- 
Jordan Bettis <http://www.hafd.org/~jordanb/>
Showing up is 80% of life.
                -- Woody Allen

Reply via email to