On Tue, Jan 23, 2001 at 11:45:28AM -0500, Gord Mc . Pherson wrote: > Hi, > > Perhaps 'iptraf' or 'netwatch' (both available on freshmeat) and 'netstat' > could be used to identify what/who is generating the traffic on your system. > I'd also concur with a previous comment about 'portsentry', since it's > possible to spoof an address and have portsentry block it.. it there for > becomes an effective tool for a hacker to use as a DoS. For example, I could > find out what your ISP's DNS servers are, spoof those addresses and have your > portsentry block them. This would cut you off from the net until you manually > corrected it.
Ipchains (and I would assume iptables) has a log feature that will log any packets that hit any rule with a -l in it, for instance, here was a guy trying ftp: Jan 18 15:21:00 marvin kernel: Packet log: input DENY eth1 PROTO=6 213.51.164.222:3336 24.14.189.245:21 L=48 S=0x00 I=15284 F=0x4000 T=117 SYN (#9) Jan 18 15:21:03 marvin kernel: Packet log: input DENY eth1 PROTO=6 213.51.164.222:3336 24.14.189.245:21 L=48 S=0x00 I=15347 F=0x4000 T=118 SYN (#9) another trying sunrpc: Jan 18 22:16:10 marvin kernel: Packet log: input REJECT eth1 PROTO=6 211.116.51.17:2100 24.14.189.245:111 L=60 S=0x00 I=33380 F=0x4000 T=51 SYN (#13) yet another trying DNS (comming from another dns server, hrmm) Jan 23 03:43:00 marvin kernel: Packet log: input DENY eth1 PROTO=6 148.235.3.71:53 24.14.189.245:53 L=40 S=0x00 I=39426 F=0x0000 T=27 SYN (#10) You get the idea. No special software needed, just good 'ole ipchains. BTW: Could you try to keep lines to <80 characters? (Nevermind the fact that I just broke that rule with the firewall logs). -- Jordan Bettis <http://www.hafd.org/~jordanb/> Showing up is 80% of life. -- Woody Allen