David Ishmael wrote:
<snip>
> ports that were not opened on the PIX.  Assuming this functionality 
> isn't there, I was hoping that the PIX would at the very least send a 
> syslog message stating that a port scan had been done for logging purposes.
> 
> - Dave
> 
<snip>

I've done a bit of playing with nmap & a PIX. The PIX if v6.1(1) & is 
set up to allow only TCP 80 to a test host.

I'm scanning port 80 & 81 to see which nmap switches will produce 
results & see what the PIX will log.

Scanning with:
     root@bog# nmap -sS -T 5 -p80-81 134.x.x.1

     Starting nmap V. 2.54BETA28 ( www.insecure.org/nmap/ )
     Interesting ports on target.host (134.x.x.1):
     Port       State       Service
     80/tcp     open        http
     81/tcp     filtered    hosts2-ns


Shows correct status & Generates syslog logs like:

...%PIX-4-106023: Deny tcp src outside:<attacker>/23177 dst 
inside:134.x.x.1/81 by access-group "INBOUND"

Scanning with:
     root@bog# nmap -sF -T 5 -p80-81 134.x.x.1

     Starting nmap V. 2.54BETA28 ( www.insecure.org/nmap/ )
     Interesting ports on target.host (134.x.x.1):
     Port       State       Service
     80/tcp     open        http
     81/tcp     open        hosts2-ns


Shows both open & Generates syslogs of:

...%PIX-4-400028: IDS:3042 TCP FIN only flags from <attacker> to 
134.x.x.1 on interface outside
...%PIX-6-106015: Deny TCP (no connection) from <attacker>/43814 to 
134.x.x.1/81 flags FIN  on interface outside

Tcpdump on the NMAP host shows that no packets have been returned to NMAP,
yet NMAP concludes that the ports are open. Nmap generates a false positive?

Scanning with:
     root@bog# nmap -sN -T 5 -p80-81 134.x.x.1

     Starting nmap V. 2.54BETA28 ( www.insecure.org/nmap/ )
     Interesting ports on target.host (134.x.x.1):
     Port       State       Service
     80/tcp     open        http
     81/tcp     open        hosts2-ns

Generates syslogs of:

...%PIX-4-400026: IDS:3040 TCP NULL flags from <attacker> to 134.x.x.1 
on interface outside
...%PIX-6-106015: Deny TCP (no connection) from <attacker>/55006 to 
134.x.x.1/81 flags  on interface outside

And incorrectly show both ports open in NMAP. Again, no packets were
returned to the NMAP host.


Scanning with:
     root@bog# nmap -sX -T 5 -p80-81 134.x.x.1

     Starting nmap V. 2.54BETA28 ( www.insecure.org/nmap/ )
     Interesting ports on target.host (134.x.x.1):
     Port       State       Service
     80/tcp     open        http
     81/tcp     open        hosts2-ns

Generates:
...%PIX-6-106015: Deny TCP (no connection) from <attacker>/51748 to 
134.x.x.1/80 flags FIN PSH URG  on interface outside

This is again a false positive from NMAP.

It looks to me like the PIX is logging as it should.

-- 
-----------------------------------------
Michael Janke
Director, Network Services
Minnesota State Colleges and Universities
-----------------------------------------

_______________________________________________
Firewalls mailing list
[EMAIL PROTECTED]
http://lists.gnac.net/mailman/listinfo/firewalls

Reply via email to