On Wed, Aug 6, 2014, at 10:54, Tom Eastep wrote:
> Did you specify logging on your ACCEPT rule -- I'm guessing not. For
> 'info' level logging:
> 
> ACCEPT:info     net     fw      ...

You guess right.  Now it's set.  I now see why this is necessary even
though I have info set in policy;  it hits rules first.
ACCEPT:info(uid)  $FW      net     tcp     843,8080


> > Now I'm getting firewall
> > blocks on 843 and 8080, with my own user ID.
> > [ 6114.140836] Shorewall:fw-net:REJECT:IN= OUT=wlan0 SRC=192.168.1.1
> > DST=119.81.13.84 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=17453 DF PROTO=TCP
> > SPT=50892 DPT=843 WINDOW=29200 RES=0x00 SYN URGP=0 UID=1000 GID=1000 
> > [ 6114.143375] Shorewall:fw-net:REJECT:IN= OUT=wlan0 SRC=192.168.1.1
> > DST=119.81.13.84 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=9972 DF PROTO=TCP
> > SPT=42038 DPT=8080 WINDOW=29200 RES=0x00 SYN URGP=0 UID=1000 GID=1000
> 
> It is interesting that the SOURCE IP address is an RFC-1918 address; is
> that the IP address of a local interface? If so, what is that interface
> used for? How is it defined to Shorewall?

Yes the source IP is on my workstation's only operating interface.  It
communicates with other machines in the LAN through the router, as well
as the internet through the router's WAN port.

Interfaces:
-       lo              ignore
net     all             physical=+,routeback,optional

Policy:
$FW      all    REJECT          info(uid)
net      all    DROP            info(uid)
local    all    REJECT          info(uid)
all      all    REJECT          info(uid)

Stoppedrules:
#ACCEPT          wlan0          -
#ACCEPT                 -               wlan0
#ACCEPT                 eth0            -
#ACCEPT                 -               eth0

Zones:
fw      firewall
net     ipv4
local    ipv4

As I've just reconfigured Shorewall to the new methods, these are my
only config files, besides shorewall.conf and rules.


> > And eth0 is frantically going in and out of promiscuous, even though I'm
> > not using it.
> 
> I think I would be considering re-imaging this box at the earliest
> opportunity.

Two reasons I can't right now:
-  I don't know how this happened so I can't prevent it happening again;
-  My backups server is full, so I can't take backups - the zfs array is
full, and the drive cage is full.  I have larger drives on order.


> > I guess there's no way to troubleshoot this other than to open 8080 new,
> > close it established and
> > # netstat -tnap | fgrep :8080
> > 
> > Surprising that this sort of thing has never been a problem before.  I
> > guess most ppl's firewalls are open so they never notice.
> 
> Most people's firewalls are nailed down to the point that a acquiring a
> Trojan is extremely improbable. They run the minimum set of services
> necessary with SSH being the only service open to the net.

That's how I'm set, although my SSH is limited to the LAN:
ACCEPT  net:192.168.1.0/28    $FW     tcp     ssh -
ACCEPT  $FW     net:192.168.1.0/28    tcp     ssh -

As I say, I've always had absolutely everything nailed shut in and out
except what I specifically need.  This is why I'm concerned.  I always
ID phishing emails and junk them.  Running TorBirdy on TBird.  Run
NoScript in my main browser (TorBrowser), as well as TorButton.

Whups, there's another one:
[ 8715.287331] Shorewall:fw-net:REJECT:IN= OUT=wlan0 SRC=192.168.1.1
DST=141.0.173.173 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=3145 DF PROTO=TCP
SPT=41774 DPT=25 WINDOW=29200 RES=0x00 SYN URGP=0 UID=1004 GID=999

This time it's user ossec, group ossec.  This is enlightening.  I
haven't actually set up ossec yet, although the daemon is running:
# ps aux |grep ossec
ossecm    1749  0.0  0.0  19620  1244 ?        S    07:35   0:00
/var/ossec/bin/ossec-maild
root      1753  0.0  0.0  12688   504 ?        S    07:35   0:00
/var/ossec/bin/ossec-execd
ossec     1757  0.0  0.0  17604  2508 ?        S    07:35   0:05
/var/ossec/bin/ossec-analysisd
root      1761  0.0  0.0   4424   548 ?        S    07:35   0:00
/var/ossec/bin/ossec-logcollector
root      1772  0.1  0.0   5816  2272 ?        S    07:36   0:18
/var/ossec/bin/ossec-syscheckd
ossec     1776  0.0  0.0  12940   528 ?        S    07:36   0:00
/var/ossec/bin/ossec-monitord
root      2124  0.0  0.0  12684   964 pts/9    S+   11:46   0:00 grep
--color=auto ossec

I was planning to use it for an IDS, but now plan on using the
SecurityOnion suite when/if I figure out how to adapt it like I want it.
 I'd installed ossec-hids from the Debian package management system. 
Maybe this port 25 knocking is innocuous, although what are they doing
frickin' phoning home?




-- 
http://www.fastmail.fm - Or how I learned to stop worrying and
                          love email again


------------------------------------------------------------------------------
Infragistics Professional
Build stunning WinForms apps today!
Reboot your WinForms applications with our WinForms controls. 
Build a bridge from your legacy apps to the future.
http://pubads.g.doubleclick.net/gampad/clk?id=153845071&iu=/4140/ostg.clktrk
_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to