install ngrep and run

ngrep -q -t -P "" -W byline -d ng0 SIP

Should show the sip packets in a more friendly format.



On Sat, Sep 18, 2010 at 10:29 PM, packetfilte...@gmail.com <
packetfilte...@gmail.com> wrote:

> Hi
>
> Can someone shed some light on the following (pfSense) PF log entries;
>
>
> 36. 281054 rule 80/0(match): block in on ng0: (tos 0x0, ttl 45, id 51305,
> offset 0, flags [DF], proto UDP (17), length 437) 124.92.251.2.5060
>  > 91.84.205.47.5060: SIP, length: 409
>
>
> OPTI\200\242\224LL\223\006\000`\000\000\000p\000\000\000\024\000\000\000=\002\001\000ng0\000\000\000\000\000\000\000\000\000\000\000\
>
> 000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000P\377\377\377\377\377\377\377\377\240\206\001\000\000\000\
> 000\000\306\320\000\000\001\000\000\000E\000\0000\330i@
> \000q\006\201\271\274\201\312\242[T\315,\012\360\001\275e\267\010\177\000\000\000\000{
>
> \242\224Lfv\002\000`\000\000\000t\000\000\000\024\000\000\000=\002\000\000fxp0\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\00
>
> 0\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000h\377\377\377\377\377\377\377\377\240\206\001\000\000\000\000\000\306\320\000\00
> 0\001\000\000\000E\000\0004\342;@
> \000?\006=\314\012\261\301RBf\015S9,\001\273\327\020\370\272\000\000\000\000{\242\224L>\202\002\000`\000\000
>
> \000t\000\000\000\024\000\000\000=\002\000\000fxp0\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\00
>
> 0\000\000\000\000\000\000\000\000h\377\377\377\377\377\377\377\377\240\206\001\000\000\000\000\000\306\320\000\000\001\000\000\000E\000\0004\
> 031q@
> \000?\006\006\227\012\261\301RBf\015S9-\001\273\327\024;\305\000\000\000\000{\242\224L\343\323\003\000`\000\000\000t\000\000\000\024\000
>
> \000\000=\002\000\000fxp0\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000
>        0x0000:  4f50 5449
>
>
>
> Sep 18 16:36:42         pf: From: 
> "sipsscuser"<sip:1...@192.168.1.9<sip%3a...@192.168.1.9>>;
> t\000\000\000\000\200\002\301\350\006\226\000\000\002\004\005\254\001\00
>
> 3\003\000\001\001\004\002t\000\000\000\024\000\000\000=\002\000\000fxp0\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\0
>
> 00\000\000\000\000\000\000\000\000\000\000\000\000\000h\377\377\377\377\377\377\377\377\240\206\001\000\000\000\000\000}\025\000\000\001\000\
> 000\000E\000\0004\031\023@
> \000?\006\204\207\012\261\301R\255\302$d5\214\000P\013SL\352\000\000\000\000\200\002\301\350\200\364\000\000\002\00
>
> 4\005\254\001\003\003\000\001\001\004\002\024\000\005\000=\002\000\000fxp0\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\00
>
> 0\000\000\000\000\000\000\000\000\000\000\000\000\000\000m\377\377\377\377\377\377\377\377\240\206\001\000\000\000\000\000}\025\000\000\001\0
> 00\000\000e\000\0004\304\...@\000?\006
> \276\012\261\301R\331\222\260\3515\207\003\343\012\005h\275\000
> Sep 18 16:36:42         pf: Content-Length: 0
> Sep 18 16:36:42         pf: Via: SIP/2.0/UDP 192.168.1.9:5060
> ;branch=z9hG4bK-02932966;rport
> Sep 18 16:36:42         pf: OPTIONS 
> sip:1...@91.84.205.44<sip%3a...@91.84.205.44>SIP/2.0
>
>
>
> I've been experiencing a lot of problems when trying to log into online
> banking and Googlemail and sometime see private IP addresses between my ADSL
> router and my ISP's gateway. Does anybody know if these log entries may be
> associated with some malicious activities as they were created whilst I was
> unable to log into Googlemail earlier today.
>
> I don't use VoIP and use a default deny firewall (ie; both in and out)
> policy. However I'm using RST and DEST-UNR which may invite a botnet or
> feeling lucky today script kid.
>
> Resetting the PF state seems to alleviate the problem at least partially
> but even though PF logs that the packet was locked it seems to be causing
> problems. Is it some sort of arp poisoning or UDP injection which is
> stuffing the routing tables.
>
> Can anyone offer any advice.
>
> Thanks
>
> Rhys

Reply via email to