>>> `watch` isn't going to help too much unless you're looking at it. Append
>>> the
>>> output to some log file instead. I chose netstat because its output
>>> looked
>>> easier to parse with a stupid regexp.
>>>
>>>  while true; do
>>>    netstat -antp | grep ':993 '>>  mystery.log;
>>>    sleep 1;
>>>  done;
>>>
>>> You'll want to change the port -- I tested to make sure that was really
>>> logging my Thunderbird connections.
>>
>>
>> I'm still getting the blocked outbound requests to port 3680 on my
>> firewall and I'm running the above script (changed 993 to 3680) on the
>> local system indicated by SRC in the firewall log, but mystery.log
>> remains empty.  I tested the script with other ports and it seems to
>> be working fine.
>>
>> Also the MAC indicated in the firewall log is 14 blocks long and the
>> local system in question has a MAC address 6 blocks long according to
>> ifconfig, but the 6 blocks from ifconfig do match 6 of the blocks
>> reported by the firewall.
>>
>> Does this make sense to anyone?
>>
>
> Are you running it as root? If not, you could be missing some connections.

I'm running it as root.

> I also typed the 't' in netstat out of habit -- that limits the output to
> tcp connections. You can remove it to catch the UDP ones.

According to the firewall log, the 3680 requests are TCP connections,
but I just switched to 'lsof -i' anyway.

- Grant

Reply via email to