RE: [Leaf-user] Hits on port 53.

2001-12-02 Thread Paul Rimmer

  Has anybody out their seen the following, hits on port 53?

Yep, this is a well known problem (see archives, when they work...).  Change
ipfilter_firewall_cfg in ipfilter.conf with these extra lines (#New Port 53
filter start/end):

ipfilter_firewall_cfg () {
local ADDR
local DEST
local NET
local SERVICE

#
# set default policies
#
# ONLY DENY FORWARDING ETC IF YOU KNOW WHAT YOU ARE DOING!  If
# you turn off the filters, the box will become opaque to any traffic!
#
ipfilter_policy DENY

# Clear any garbage rules out of the filters
ipfilter_flush

# New Port 53 filter start
  IP_LIST=`cat /etc/dns_floods`
  for IP in $IP_LIST; do
 $IPCH -I input -j DENY -p tcp -s $IP/32 -d $EXTERN_IP/32 53 -i
$EXTERN_IF

  done; unset IP
#New Port 53 filter end

# Set up Fair Queueing classifier lists
ipfilter_fairq

#
# Set up port forwards for internal services
#
snip etc.

Now create a dns_floods file in your /etc directory with all of the hosts
you receive port 53 spewage from.  Here's my current list:

128.121.10.90
128.242.105.34
129.250.244.10
194.205.125.26
194.213.64.150
202.139.133.129
203.194.166.182
203.208.128.70
207.55.138.206
207.68.131.17
212.78.160.237
216.220.39.42
216.33.35.214
216.34.68.2
216.35.167.58
62.23.80.2
62.26.119.34
64.14.200.154
64.37.200.46
64.56.174.186
64.78.235.14

Now do:
svi network ipfilter flush
svi network ipfilter reload

Make sure you backup your changes (/etc).

Paul Rimmer,
Calgary, Alberta, Canada


___
Leaf-user mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user



Is this typical of what fills everybody's logs? -was- Re: [Leaf-user] Hits on port 53.

2001-12-02 Thread Leaf Leaf

--- Kevin Kropf [EMAIL PROTECTED] wrote:
 
  Has anybody out their seen the following, hits on
 port 53?  
 
 Sample:
 Dec  1 14:48:57 kc_firewall kernel: Packet log:
 input DENY eth0 PROTO=6
 216.34.68.2:15209 24.80.151.202:53 L=44 S=0x00 I=0
 F=0x T=248 (#44)

No, but In a very cursory look through my recent logs
I have noticed one instance of about 100 packets from
one address denied in a 30 sec period. I'm guessing
it's a scan through my /27 block for some service on
port 27374, sample:

Nov 28 18:19:43 firewall kernel: Packet log: forward
DENY eth2 PROTO=6 216.1.84.76:2017 216.136.89.98:27374
L=48 S=0x00 I=41493
   F=0x4000 T=111 SYN (#25)
   Nov 28 18:19:43 firewall kernel: Packet log:
forward DENY eth2 PROTO=6 216.1.84.76:2018
216.136.89.99:27374 L=48 S=0x00 I=42517
   F=0x4000 T=111 SYN (#25)
   Nov 28 18:19:44 firewall kernel: Packet log:
forward DENY eth2 PROTO=6 216.1.84.76:2019
216.136.89.100:27374 L=48 S=0x00 I=43285
   F=0x4000 T=111 SYN (#25)
   Nov 28 18:19:45 firewall kernel: Packet log:
forward DENY eth2 PROTO=6 216.1.84.76:2022
216.136.89.103:27374 L=48 S=0x00 I=45077
   F=0x4000 T=111 SYN (#25)
   Nov 28 18:19:46 firewall kernel: Packet log:
forward DENY eth2 PROTO=6 216.1.84.76:2023
216.136.89.104:27374 L=48 S=0x00 I=45589
   F=0x4000 T=109 SYN (#25)
   Nov 28 18:19:46 firewall kernel: Packet log:
forward DENY eth2 PROTO=6 216.1.84.76:2024
216.136.89.105:27374 L=48 S=0x00 I=46869
   F=0x4000 T=111 SYN (#25)

Most of the time however, my logs show a stream of
denials occurring at a round-the-clock average rate of
roughly 3 per minute (occasionally a period of a few
minutes with nothing) of packets from various ip
addresses denied mostly by the 'forward' rule to
primarily ports 80 and 21, and occasionally ports 111
113 137 and others I'm sure, directed to various ip's
of my /27 block defined in my DMZ, but on which most
have no services running.  

Would someone care to tell me what some of these are? 
And is this fairly typical of what goes on out there?

I know I should be concerned enough to learn how to
identify whether any of this is any form of attack, or
whether it is port scanning that may be hampering our
network useage.  In the mean time, does anyone care to
look through the following and let me know if you see
anything of concern?

My network is 216.136.89.96/27, isp router, my
networks gateway: .97, Dachstein eth0: .101, eth2 DMZ:
.102

Thanks.


Samples from today:

Dec 2 10:09:00 firewall kernel: Packet log: forward
DENY eth2 PROTO=6 216.136.86.206:1412
216.136.89.107:80 L=48 S=0x00 I=24134
   F=0x4000 T=116 SYN (#25)
   Dec 2 10:09:03 firewall kernel: Packet log: forward
DENY eth2 PROTO=6 216.136.86.206:1412
216.136.89.107:80 L=48 S=0x00 I=25139
   F=0x4000 T=116 SYN (#25)
   Dec 2 10:10:42 firewall kernel: Packet log: forward
DENY eth2 PROTO=6 216.136.86.206:1550
216.136.89.125:80 L=48 S=0x00 I=64214
   F=0x4000 T=115 SYN (#25)
   Dec 2 10:10:44 firewall kernel: Packet log: forward
DENY eth2 PROTO=6 216.136.86.206:1550
216.136.89.125:80 L=48 S=0x00 I=65482
   F=0x4000 T=116 SYN (#25)
   Dec 2 10:11:11 firewall kernel: Packet log: forward
DENY eth2 PROTO=6 216.136.86.206:1512
216.136.89.114:80 L=48 S=0x00 I=12453
   F=0x4000 T=116 SYN (#25)
   Dec 2 10:11:14 firewall kernel: Packet log: forward
DENY eth2 PROTO=6 216.136.86.206:1512
216.136.89.114:80 L=48 S=0x00 I=13254
   F=0x4000 T=116 SYN (#25)
   Dec 2 10:11:36 firewall kernel: Packet log: forward
DENY eth2 PROTO=6 216.136.81.30:4181 216.136.89.118:80
L=44 S=0x00 I=10711
   F=0x4000 T=120 SYN (#25)
   Dec 2 10:11:39 firewall kernel: Packet log: forward
DENY eth2 PROTO=6 216.136.81.30:4181 216.136.89.118:80
L=44 S=0x00 I=35036
   F=0x4000 T=121 SYN (#25)
   Dec 2 10:11:45 firewall kernel: Packet log: forward
DENY eth2 PROTO=6 216.136.81.30:4595 216.136.89.124:80
L=44 S=0x00 I=9191
   F=0x4000 T=121 SYN (#25)
   Dec 2 10:11:48 firewall kernel: Packet log: forward
DENY eth2 PROTO=6 216.136.81.30:4595 216.136.89.124:80
L=44 S=0x00 I=31725
   F=0x4000 T=121 SYN (#25)
   Dec 2 10:13:27 firewall kernel: Packet log: forward
DENY eth2 PROTO=6 216.136.86.206:1832
216.136.89.122:80 L=48 S=0x00 I=1362
   F=0x4000 T=115 SYN (#25)
   Dec 2 10:13:30 firewall kernel: Packet log: forward
DENY eth2 PROTO=6 216.136.86.206:1832
216.136.89.122:80 L=48 S=0x00 I=2563
   F=0x4000 T=116 SYN (#25)
   Dec 2 10:16:15 firewall kernel: Packet log: forward
DENY eth2 PROTO=6 216.55.133.33:4520 216.136.89.112:80
L=48 S=0x00 I=21015
   F=0x4000 T=108 SYN (#25)
   Dec 2 10:16:32 firewall kernel: Packet log: forward
DENY eth2 PROTO=6 216.136.81.30:4645 216.136.89.100:80
L=44 S=0x00 I=3569
   F=0x4000 T=120 SYN (#25)
   Dec 2 10:16:35 firewall kernel: Packet log: forward
DENY eth2 PROTO=6 216.136.81.30:4645 216.136.89.100:80
L=44 S=0x00 I=59894
   F=0x4000 T=121 SYN (#25)

Dec 2 12:56:42 firewall kernel: Packet log: forward
DENY eth2 PROTO=6 216.136.86.206:1188
216.136.89.118:80 L=48 S=0x00 I=17741
   F=0x4000 T=115 SYN (#25)
   Dec 2 12:56:45 

Re: Is this typical of what fills everybody's logs? -was- Re: [Leaf-user] Hits on port 53.

2001-12-02 Thread Patrick Benson

Leaf Leaf wrote:

 No, but In a very cursory look through my recent logs
 I have noticed one instance of about 100 packets from
 one address denied in a 30 sec period. I'm guessing
 it's a scan through my /27 block for some service on
 port 27374, sample:
 
 Nov 28 18:19:43 firewall kernel: Packet log: forward
 DENY eth2 PROTO=6 216.1.84.76:2017 216.136.89.98:27374
 L=48 S=0x00 I=41493
F=0x4000 T=111 SYN (#25)
Nov 28 18:19:43 firewall kernel: Packet log:
 forward DENY eth2 PROTO=6 216.1.84.76:2018
 216.136.89.99:27374 L=48 S=0x00 I=42517
F=0x4000 T=111 SYN (#25)
Nov 28 18:19:44 firewall kernel: Packet log:
 forward DENY eth2 PROTO=6 216.1.84.76:2019
 216.136.89.100:27374 L=48 S=0x00 I=43285
F=0x4000 T=111 SYN (#25)
Nov 28 18:19:45 firewall kernel: Packet log:
 forward DENY eth2 PROTO=6 216.1.84.76:2022
 216.136.89.103:27374 L=48 S=0x00 I=45077
F=0x4000 T=111 SYN (#25)
Nov 28 18:19:46 firewall kernel: Packet log:
 forward DENY eth2 PROTO=6 216.1.84.76:2023
 216.136.89.104:27374 L=48 S=0x00 I=45589
F=0x4000 T=109 SYN (#25)
Nov 28 18:19:46 firewall kernel: Packet log:
 forward DENY eth2 PROTO=6 216.1.84.76:2024
 216.136.89.105:27374 L=48 S=0x00 I=46869
F=0x4000 T=111 SYN (#25)
 
 Most of the time however, my logs show a stream of
 denials occurring at a round-the-clock average rate of
 roughly 3 per minute (occasionally a period of a few
 minutes with nothing) of packets from various ip
 addresses denied mostly by the 'forward' rule to
 primarily ports 80 and 21, and occasionally ports 111
 113 137 and others I'm sure, directed to various ip's
 of my /27 block defined in my DMZ, but on which most
 have no services running.
 
 Would someone care to tell me what some of these are?
 And is this fairly typical of what goes on out there?

Take a look at:  http://www.dshield.org/topports.html

and it all makes some sense. Look at the sequence of the ports
originating from the one who is probing, 2017, 2018, 2019, etc. No use
in trying to locate who, what is doing this, they're usually cracked
boxes, anyway

 I know I should be concerned enough to learn how to
 identify whether any of this is any form of attack, or
 whether it is port scanning that may be hampering our
 network useage.  In the mean time, does anyone care to
 look through the following and let me know if you see
 anything of concern?
 
 My network is 216.136.89.96/27, isp router, my
 networks gateway: .97, Dachstein eth0: .101, eth2 DMZ:
 .102
 
 Thanks.
 
 Samples from today:
 
 Dec 2 10:09:00 firewall kernel: Packet log: forward
 DENY eth2 PROTO=6 216.136.86.206:1412
 216.136.89.107:80 L=48 S=0x00 I=24134
F=0x4000 T=116 SYN (#25)

Nimda is a real pain...


-- 
Patrick Benson
Stockholm, Sweden

___
Leaf-user mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user



[Leaf-user] Delays in updating wanpipe.lrp

2001-12-02 Thread Michael D. Schleif


We are very sorry for any delays we may incur; but, we are among the
unlucky @Home victims.

Notwithstanding ATT's six weeks of assurances that we would experience
no interruptions, apparently the dear judge judged the case at least one
week quicker than ATT anticipated and transition us to the new network.

Thank goodness for modems and netZero ;

I can receive Email; but, not in realtime, for the near future.

And, large uploads to anywhere are intolerable ;

-- 

Best Regards,

mds
mds resource
888.250.3987

Dare to fix things before they break . . .

Our capacity for understanding is inversely proportional to how much we
think we know.  The more I know, the more I know I don't know . . .

Sign Up for NetZero Platinum Today
Only $9.95 per month!
http://my.netzero.net/s/signup?r=platinumrefcd=PT97

___
Leaf-user mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user



[Leaf-user] More info on E2B DMZ_SWITCH=PRIVATE problems

2001-12-02 Thread Matt Brennan

Further to an email of yesterday, having set the DMZ network to be 
192.168.2.0/24 as part of the greater internal 192.168.0.0/16 network, I 
can now talk out of the DMZ to the external world.

However, none of the DMZ features appear to work: no connection from 
internal or external networks to services adevertised in the DMZ seems 
possible. Adding and removing DMZ_SERVERn entries seems to have no 
effect on the output of the ipchains listing. :-(

I have looked through the mail archives and seen some recent discussions 
about dachstein rc2 with DMZ_SWITCH=PRIVATE but little else. Maybe 
discussions of private DMZ on E2B are in the older LRP archives?

Anyway, here are selections from network.conf and 'svi network ipfilter 
list'. Any help very much appreciated.

some snipping follows:

eth0_IPADDR=150.101.234.2
eth0_MASKLEN=30
eth0_BROADCAST=150.101.234.3
eth0_DEFAULT_GW=150.101.234.1

eth1_IPADDR=192.168.42.254
eth1_MASKLEN=24
eth1_BROADCAST=192.168.42.255

eth2_IPADDR=192.168.1.254
eth2_MASKLEN=24
eth2_BROADCAST=192.168.1.255

# the DMZ network
#
eth3_IPADDR=192.168.2.254
eth3_MASKLEN=24
eth3_BROADCAST=192.168.2.255
eth3_IP_SPOOF=YES
eth3_IP_KRNL_LOGMARTIANS=YES
eth3_IP_SHARED_MEDIA=NO
eth3_BRIDGE=NO
eth3_PROXY_ARP=NO
eth3_FAIRQ=NO

# Internal interface (Intern_IF and Intern_Ip are bogus)
#
INTERN_IF=eth1 
# Internal Interface
INTERN_NET=192.168.0.0/16 
# Internal network (to be masqueraded)
INTERN_IP=192.168.42.254 
# IP number of Internal Interface
# (to allow forwarding to external IP)
MASQ_SWITCH=YES 
# Masquerade internal network to outside
# world - YES/NO

# ports (domain and ssh are just on the firewall)
#
EXTERN_UDP_PORTS=0/0_domain 0/0_www
EXTERN_TCP_PORTS=0/0_ssh 0/0_www

# The DMZ
#
DMZ_SWITCH=PRIVATE
DMZ_IF=eth3
DMZ_NET=192.168.2.0/24
DMZ_OUTBOUND_ALL=YES
# I've tried these with and without double quotes and with and without
# the extern_ip as a variable vs. hardcoded.
#
DMZ_SERVER0=tcp_150.101.234.2_www_192.168.2.10_www
DMZ_SERVER1=udp_150.101.234.2_www_192.168.2.10_www



Chain input (policy DENY: 0 packets, 0 bytes):
  pkts bytes target prot opttosa tosx  ifname mark 
outsize  sourcedestination   ports
 0 0 DENY   icmp l- 0xFF 0x00  * 
   0.0.0.0/00.0.0.0/0 13 - *
 0 0 DENY   icmp l- 0xFF 0x00  * 
   0.0.0.0/00.0.0.0/0 14 - *
 0 0 DENY   all  l- 0xFF 0x00  eth0 
   0.0.0.0  0.0.0.0/0 n/a
 0 0 DENY   all  l- 0xFF 0x00  eth0 
   255.255.255.255  0.0.0.0/0 n/a
 0 0 DENY   all  l- 0xFF 0x00  eth0 
   127.0.0.0/8  0.0.0.0/0 n/a
 0 0 DENY   all  l- 0xFF 0x00  eth0 
   224.0.0.0/4  0.0.0.0/0 n/a
 0 0 DENY   all  l- 0xFF 0x00  eth0 
   10.0.0.0/8   0.0.0.0/0 n/a
 0 0 DENY   all  l- 0xFF 0x00  eth0 
   172.16.0.0/120.0.0.0/0 n/a
 0 0 DENY   all  l- 0xFF 0x00  eth0 
   192.168.0.0/16   0.0.0.0/0 n/a
 0 0 DENY   all  l- 0xFF 0x00  eth0 
   0.0.0.0/80.0.0.0/0 n/a
 0 0 DENY   all  l- 0xFF 0x00  eth0 
   128.0.0.0/16 0.0.0.0/0 n/a
 0 0 DENY   all  l- 0xFF 0x00  eth0 
   191.255.0.0/16   0.0.0.0/0 n/a
 0 0 DENY   all  l- 0xFF 0x00  eth0 
   192.0.0.0/24 0.0.0.0/0 n/a
 0 0 DENY   all  l- 0xFF 0x00  eth0 
   223.255.255.0/24 0.0.0.0/0 n/a
 0 0 DENY   all  l- 0xFF 0x00  eth0 
   240.0.0.0/4  0.0.0.0/0 n/a
 0 0 DENY   all  l- 0xFF 0x00  eth0 
   192.168.0.0/16   0.0.0.0/0 n/a
 0 0 DENY   all  l- 0xFF 0x00  eth0 
   150.101.234.20.0.0.0/0 n/a
 0 0 REJECT all  l- 0xFF 0x00  eth0 
   0.0.0.0/0127.0.0.0/8   n/a
 0 0 REJECT all  l- 0xFF 0x00  eth0 
   0.0.0.0/0192.168.0.0/16n/a
 0 0 REJECT tcp  -- 0xFF 0x00  eth0 
   0.0.0.0/00.0.0.0/0 * - 137
 0 0 REJECT tcp  -- 0xFF 0x00  eth0 
   0.0.0.0/00.0.0.0/0 * - 135
 0 0 REJECT udp  -- 0xFF 0x00  eth0 
   0.0.0.0/00.0.0.0/0 * - 137
 0 0 REJECT udp  -- 0xFF 0x00  eth0 
   0.0.0.0/00.0.0.0/0 * - 135
 0 0 REJECT tcp  -- 0xFF 0x00  eth0 
   0.0.0.0/00.0.0.0/0 * - 138:139
 0 0 REJECT udp  -- 0xFF 0x00  eth0 
   0.0.0.0/00.0.0.0/0 * - 138
  

[Leaf-user] Updated LEAF 2.4.14+ Shorewall 1.1.18

2001-12-02 Thread Jacques Nilo

I have updated the LEAF 2.4.14 + Shorewall  distro described in my
previous post:
http://www.geocrawler.com/archives/3/7232/2001/11/50/7129319/

everything is in
http://leaf.sourceforge.net/devel/jnilo/kernel-2.4.14

The updated 1680k diskimage is called leaf-2.4.14-1680-b1.bin

Changelog:

1/ TMPFS is used instead of /dev/ram
/dev/ram0 is only used to boot initrd.lrp then the main filesystem is
pivot_rooted to tmpfs and /dev/ram0 released.
Three parameters can be introduced in the command line (but defaults
should be OK in most cases):
syst_size= max size of LRP filesystem (default SYSTSIZE=6M)
log_size= max size of /var/log  (default LOGSIZE=2M)
tmp_size= max size of /tmp (default remaining available memory)

Therefore ramlog.lrp is not needed anymore

Everything is in /var/lib/lrpkg/root.linuxrc
initrd fs umount and freeramdisk /dev/ram0 are done in /etc/init.d/rcS

2/ Initrd.lrp can be backuped as any other file
The scheme goes as follow: whatever package ($INITRD) is found after
initrd= is treated as a compressed minix fs. Then in lrcfg.back.script
if $PACKAGE=$INITRD a new script is called that will take care of
backuping this special file. See lrcfg.back.initrd.
The max size of the uncompressed initrd.lrp package can be setup through
initrd package configuration menu.
The procedure is fully transparent to the user. Standard rules for
including/excluding files apply. Files in /boot/modules will saved in
there.

3/ Busybox updated to 0.60.2
pivot_root  mkfs.minix added

3/ Shorewall is now really 1.1.18 (was 1.1.17 by mistake in the previous
release). Shorewall is setup with the two-interfaces configuration file
provided by Tom and adapted to a standard LEAF distro by me. Move to the
three-interface one for setting up a DMZ.

4/ There seems to be a bug in busybox umount -a which does not umount
tmpfs filesystems. Until it's fixed the util-linux-2.11m version takes
care of umount -a.

5/ keyboard.lrp provided in the distro. fr.map is default... (No, I am
kidding...)

Todo's:

1/ clean-up /etc/init.d/network, /etc/network.conf  and
/etc/ipfilter.conf to get rid of all the unecessary stuff.
2/ In the above mentioned files check the QoS and bridge stuff
3/ Adjust weblet script to take care of firewall messages

Jacques



___
Leaf-user mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user



[Leaf-user] Updated kernel available

2001-12-02 Thread Charles Steinkuehler

There is a new 2.2.19-3 release of the kernel used for Dachstein available:
http://lrp2.steinkuehler.net/files/kernels/
http://lrp1.steinkuehler.net/files/kernels/
http://lrp.steinkuehler.net/files/kernels/

The major change from the earlier kernels is the removal of the reiserfs
patch which was preventing ext2, nfs, and other filesystems from loading
properly as modules.  I don't think this problem is entirely the fault of
reiserfs, but rather an interaction between the reiserfs patch and the
openwall patch.

While I was re-compiling everything, I updated the openwall patch from ow3
to ow4.

The only other thing is the addition of an extra-version ID to the kernel
(uname -a), to try and prevent confusion about exactly which version you're
running...everything else remains the same.

NOTE:  Unless you are currently trying to use one of the affected
file-system modules (you'll know, because it's broken), you don't need to
migrate to the new kernel.

NOTE:  The older kernel directories have been removed...the contents are
still available as tar.gz files, if needed.

Charles Steinkuehler
http://lrp.steinkuehler.net
http://c0wz.steinkuehler.net (lrp.c0wz.com mirror)



___
Leaf-user mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user



[Leaf-user] Re: [Leaf-devel] Updated LEAF 2.4.14+ Shorewall 1.1.18

2001-12-02 Thread Jacques Nilo

 4/ There seems to be a bug in busybox umount -a which does not umount
 tmpfs filesystems. Until it's fixed the util-linux-2.11m version takes
 care of umount -a.

My bad. The problem was the -n switch. umount -a works perfectly well
whereas umount -n -a does not.
This makes sense to me since my bbox is compiled with #define
BB_FEATURE_MTAB_SUPPORT commented out.
So got rid of util-linux umount, restored the bbox one and changed
/etc/init.d/umountfs to put umount -a instead of umount -n -a.
Jacques


___
Leaf-user mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user



Re: [Leaf-devel] [Leaf-user] Testing help needed

2001-12-02 Thread David Douthitt

On 12/1/01 at 3:12 PM, Jack Coates [EMAIL PROTECTED] wrote:

 On Sat, 1 Dec 2001, Tony wrote:

  If so, wouldn't it be easier/safer/more secure to
  forward them to an internal syslog server?

 syslog-ng is supposed to fix a lot of these problems, but I've never
 gotten around to taking a look at it.

syslog-ng is very nice; it's set up to act as our central UNIX log
server for the corporation.

It has a unique ability in that it can use TCP instead of UDP -
allowing it to be tunneled via ssh to an external server where it can
then receive log messages from a syslog-ng located on that side.

This allows you to receive messages through a firewall that blocks UDP
syslog traffic (as it ought to).
--
David Douthitt
UNIX Systems Administrator
HP-UX, Unixware, Linux
[EMAIL PROTECTED]

___
Leaf-user mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user