On Sun, 18 Nov 2001, guy keren wrote:
> 
> On Sun, 18 Nov 2001, Cedar Cox wrote:
> 
> > Unusual System Events
> > =-=-=-=-=-=-=-=-=-=-=
> > Nov 17 22:36:53 bibi kernel: Packet log: output DENY ppp0 PROTO=6 
>192.117.108.105:61707 172.26.140.6:9044 L=40 S=0x00 I=3796 F=0x0000 T=255 (#2)
> > Nov 17 22:36:58 bibi kernel: Packet log: output DENY ppp0 PROTO=6 
>192.117.108.105:61707 172.26.140.6:9044 L=40 S=0x00 I=3844 F=0x0000 T=255 (#2)
> > Nov 17 22:37:10 bibi kernel: Packet log: output DENY ppp0 PROTO=6 
>192.117.108.105:61707 172.26.140.6:9044 L=40 S=0x00 I=3983 F=0x0000 T=255 (#2)
> > Nov 17 22:37:32 bibi kernel: Packet log: output DENY ppp0 PROTO=6 
>192.117.108.105:61707 172.26.140.6:9044 L=40 S=0x00 I=4063 F=0x0000 T=255 (#2)
> > Nov 17 22:38:18 bibi kernel: Packet log: output DENY ppp0 PROTO=6 
>192.117.108.105:61707 172.26.140.6:9044 L=40 S=0x00 I=4071 F=0x0000 T=255 (#2)
> > Nov 17 22:40:38 bibi kernel: Packet log: output DENY ppp0 PROTO=6 
>192.117.108.105:61733 172.26.140.7:9044 L=40 S=0x00 I=4317 F=0x0000 T=255 (#2)
> > Nov 17 22:40:49 bibi kernel: Packet log:output DENY ppp0 PROTO=6 
>192.117.108.105:61733 172.26.140.7:9044 L=40 S=0x00 I=4449 F=0x0000 T=255 (#2)
> > Nov 17 22:41:12 bibi kernel: Packet log: output DENY ppp0 PROTO=6 
>192.117.108.105:61733 172.26.140.7:9044 L=40 S=0x00 I=4477 F=0x0000 T=255 (#2)
> > Nov17 22:41:58 bibi kernel: Packet log: output DENY ppp0 PROTO=6
> >    192.117.108.105:61733 172.26.140.7:9044 L=40 S=0x00 I=4495 F=0x0000
> >    T=255 (#2)
> >
> > Correct me if I'm wrong but it just looks like a internal (masq'ed) host
> > tried to contact the 172.26 network. We do not use this network so it was
> > sent to the default route but blocked on the way out (..just a safety so
> > no private traffic gets sent out the ppp0 interface).
> 
> how do you know its a masqued ohst, and not your linux gateway that's
> emitting the traffic?

Because, (I think) outgoing ports 61000-65096 are only used for
masquarding and nothing else (someone please correct me if I am wrong).

> in any case, you could put a logging rule on the 'input' chain (or
> 'forward' chain) that logs any packet sent to 172.26.140.7:9044 using
> 'tcp', and see there where it comes from. assuming this still occures.
> 
> --
> guy

Right.  I think this is the only way to get what I want.  I just didn't
know if there was some special logging for masquarding that I don't know
about.  Thanks to everyone that answered :)

-Cedar


=================================================================
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word "unsubscribe" in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]

Reply via email to