here's a logcheck message i got recently, where ipchains is
logging certain unwelcome hits (based on what's primarily the
default ipmasq filtering rules)--

----- Forwarded message from root <[EMAIL PROTECTED]> -----

Security Violations
=-=-=-=-=-=-=-=-=-=
Apr  8 17:45:10 server kernel: Packet log: input DENY eth0 PROTO=1 
172.149.223.27:10 224.0.0.2:0 L=28 S=0x00 I=11290 F=0x0000 T=128 (#7)
Apr  8 17:59:48 server kernel: Packet log: input DENY eth1 PROTO=1 
192.168.241.180:4 208.33.90.85:0 L=56 S=0x00 I=12140 F=0x4000 T=240 (#4)
Apr  8 18:00:23 server kernel: Packet log: input DENY eth1 PROTO=1 
192.168.241.180:4 208.33.90.85:0 L=56 S=0x00 I=12145 F=0x4000 T=240 (#4)
Apr  8 17:45:10 server kernel: Packet log: input DENY eth0 PROTO=1 
172.149.223.27:10 224.0.0.2:0 L=28 S=0x00 I=11290 F=0x0000 T=128 (#7)
Apr  8 17:59:48 server kernel: Packet log: input DENY eth1 PROTO=1 
192.168.241.180:4 208.33.90.85:0 L=56 S=0x00 I=12140 F=0x4000 T=240 (#4)
Apr  8 18:00:23 server kernel: Packet log: input DENY eth1 PROTO=1 
192.168.241.180:4 208.33.90.85:0 L=56 S=0x00 I=12145 F=0x4000 T=240 (#4)

Unusual System Events
=-=-=-=-=-=-=-=-=-=-=
Apr  8 17:45:10 server kernel: Packet log: input DENY eth0 PROTO=1 
172.149.223.27:10 224.0.0.2:0 L=28 S=0x00 I=11290 F=0x0000 T=128 (#7)
Apr  8 17:46:17 server kernel: hdd: irq timeout: status=0xd0 { Busy }
Apr  8 17:46:17 server kernel: ide1: reset: success
Apr  8 17:59:48 server kernel: Packet log: input DENY eth1 PROTO=1 
192.168.241.180:4 208.33.90.85:0 L=56 S=0x00 I=12140 F=0x4000 T=240 (#4)
Apr  8 18:00:23 server kernel: Packet log: input DENY eth1 PROTO=1 
192.168.241.180:4 208.33.90.85:0 L=56 S=0x00 I=12145 F=0x4000 T=240 (#4)
Apr  8 17:24:55 server xinetd[26200]: warning: can't get client address: 
Invalid argument
Apr  8 17:45:10 server kernel: Packet log: input DENY eth0 PROTO=1 
172.149.223.27:10 224.0.0.2:0 L=28 S=0x00 I=11290 F=0x0000 T=128 (#7)
Apr  8 17:46:17 server kernel: hdd: irq timeout: status=0xd0 { Busy }
Apr  8 17:46:17 server kernel: ide1: reset: success
Apr  8 17:57:17 server xinetd[26200]: warning: can't get client address: 
Invalid argument
Apr  8 17:59:48 server kernel: Packet log: input DENY eth1 PROTO=1 
192.168.241.180:4 208.33.90.85:0 L=56 S=0x00 I=12140 F=0x4000 T=240 (#4)
Apr  8 18:00:23 server kernel: Packet log: input DENY eth1 PROTO=1 
192.168.241.180:4 208.33.90.85:0 L=56 S=0x00 I=12145 F=0x4000 T=240 (#4)
Apr  8 17:24:55 server xinetd[26200]: warning: can't get client address: 
Invalid argument
Apr  8 17:57:17 server xinetd[26200]: warning: can't get client address: 
Invalid argument

----- End forwarded message -----

if i understand correctly, the following line (broken for
readability) says someone at 172.149.223.27 was broadcasting
(224.*.*.*):

        Apr  8 17:45:10 server kernel: Packet log:
                input DENY eth0 PROTO=1 172.149.223.27:10
                224.0.0.2:0 L=28 S=0x00 I=11290 F=0x0000 T=128 (#7)

i get messages like that, quite frequently.

--

but then this following packet says someone at 192.168.241.180
was scanning our server (208.33.90.85) --

        Apr  8 17:59:48 server kernel: Packet log:
                input DENY eth1 PROTO=1 192.168.241.180:4
                208.33.90.85:0 L=56 S=0x00 I=12140 F=0x4000 T=240 (#4)

but 192.168.*.* is internal-only, a reserved
'not-for-external-ip' number cluster, right?

my ifconfig shows three devices -- eth1 (208.33.90.85) and eth0
(192.168.1.1) and lo (127.0.0.1).

on my intRAnet i've got 192.168.1.[1,2,100,101,102,200] and
nothing else. where would this have come from? are we hacked?

-- 
americans should never read anything so subversive as what's at
http://www.salon.com/people/col/pagl/2001/03/21/spring/index1.html

[EMAIL PROTECTED]
http://sourceforge.net/projects/newbiedoc -- we need your brain!
http://www.dontUthink.com/ -- your brain needs us!

Reply via email to