[snip]


>   A single packet to the discard service could
> be something "normal" for some custom apps if your system was already
> communicating with the other system.  A tcp connection between ports
> 3205 and 27015 looks like some sort of allocatable data connection
> with allocatable ports on either end.

Well.. we are running two apps actually.  One is a custom java app and 
the other was running for only a couple of hours (Team Fortress server 
for Linux ::grinz::).  Ran TF for only a couple of hours and was 
surprised to see UDP 9 hit at all.

> 
> 
>       Where you running IPChains or ipfwadm?  

Portsentry.conf has a setting for ipfwadm to add any "perceived" attacks 
to the deny policy though if I do IPCHAINS -L it shows all policies.

> The logs look like
> IPChains but you are using the ipfwadm command.  There is a chain name
> in the message and it just happens to be the name of the inp chain used
> by some of the backward compatibility scripts to make IPChains look sort
> of like ipfwadm (it creats an inp chain and links it to the input chain).
> If you are using IPChains, you are long past time to get off the crutch
> of the compatibility scripts and start running IPChains natively.  Just
> in time to start worrying about the change to Netfilter.  :-)

Yah.. 2.4 looks good.  I heard they switched the firewall software (again).

> 
> 
>       You said this is a custom app that has to run outside of the
> firewall.  Then you put a firewall on it (portsentry + ipfwadm/IPChains).
> The fact that this app requires that it be outside of a firewall should
> have been a clue that "strange things might happen" when it interacts
> with a firewall like ipfwadm or something like portsentry.  Why did this
> app require that it be outside of your firewall?

The java app talks directly to an oracle database (port 1521 I 
believe).  It requires something called osagent (part of the visibroker 
tools I believe).  Osagent had trouble going through our NAT firewall so 
we moved it outside to run our tests.

> 
> 
>       1) Do not trigger firewall reconfiguration on UDP scans.  These can
> be spoofed to create denial of service attacks against you or to do more
> amusing things.  If someone thought you were running portsentry and shuting
> down your firewall based on UDP they could do real amusing things by spoofing
> packets at you as if they came from all the root name servers.  :-)  Just
> deny UDP ports you are not using.

I've heard of this.  I'll make this change.  Thx :-)

> 
> 
>       2) Do not trigger firewall reconfiguration based on Stealth
> scans (see #1 above).
> 
>       3) One packet, a port scan does not make.  The fact that you had
> so LITTLE traffic (that you showed us) really indicates that this was
> not a port scan.  If it had been a UDP services port scan you should
> have seen a flood of them.  I would have also expected to see some
> serious attempts to contact well known tcp services and that's not
> in the log segment you posted either.

Hmmm... ok.... I overreacted then.  /me blushes

> 
> 
>       One UDP packet to port 9 and a couple of retries on what looks to
> be an estabished socket simply does NOT look like a port scan unless there
> was a LOT more that you didn't post.


That's about it actually.  I appreciate it

/me goes to the corner now

Thx

Frank

> 
> 
>> Greatly Appreciated.
> 
>> Frank.
> 
>> Feb 12 00:54:17 testapp_001 portsentry[1883]: attackalert: UDP scan from host: 
>djinn-open.gene.com/192.12.78.2 to UDP port: 9
>> Feb 12 00:54:17 testapp_001 portsentry[1883]: attackalert: Host 192.12.78.2 has 
>been blocked via wrappers with string: "ALL: 192.12.78.2"
>> Feb 12 00:54:18 testapp_001 portsentry[1883]: attackalert: Host 192.12.78.2 has 
>been blocked via dropped route using command: "/sbin/ipfwadm -I -i deny -S 
>192.12.78.2 -o"
>> Feb 12 00:54:18 testapp_001 kernel: Packet log: inp DENY eth0 PROTO=17 
>192.12.78.2:3205 166.70.202.30:27015 L=40 S=0x00 I=43300 F=0x0000 T=17 (#1) 
>> Feb 12 00:54:20 testapp_001 kernel: Packet log: inp DENY eth0 PROTO=17 
>192.12.78.2:3205 166.70.202.30:27015 L=40 S=0x00 I=44870 F=0x0000 T=17 (#1) 
>> Feb 12 00:54:22 testapp_001 kernel: Packet log: inp DENY eth0 PROTO=17 
>192.12.78.2:3205 166.70.202.30:27015 L=40 S=0x00 I=45274 F=0x0000 T=17 (#1) 
>> Feb 12 00:54:24 testapp_001 kernel: Packet log: inp DENY eth0 PROTO=17 
>192.12.78.2:3205 166.70.202.30:27015 L=40 S=0x00 I=45647 F=0x0000 T=17 (#1) 
> 
> 
>       Mike




_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to