On Fri, 17 Mar 2000, The Wolf wrote:
> Do you see anything like
>
> Mar 16 22:18:37 YourBox kernel: Packet log: input DENY eth0 PROTO=1
> 1.2.3.4:0 1.2.3.4:0 L=84 S=0x00 I=38756 F=0x4000 T=241 (#5)
I wasn't when the packets weren't being allowed. I might've been during
the first scan, though.
> These would be your logging done by the kernel
>
> You have to specifie the -l option of firewall rules you want to track.
Yup.
> Now I do not know if you are running some other scan detection besides
> the
> ones provided by the ipchains.
It's got to be something besides ipchains. ipchains isn't dynamic, so it
can't shut off someone doing a port scan. Not directly anyway. Well it's
probably actually possible, but I'm not getting near that intense with my
rules :). It's probably the kernel as I didn't see any other processes
that looked like they would be doing that. snort was running, but again
it's not directly proactive. Also I shut it down.
> If not you shoud consider logging any syn packets trying to hit your box
> on 0 - 1024 and 6000 - 6060
I think I'm doing that.
Once this works I want to see if ipchains interferes with apps like
tcpdump and ethereal...
ciao,
der.hans
--
# +++++++++++=================================+++++++++++ #
# der.hans@LuftHans.com www.excelco.com #
# http://home.pages.de/~lufthans/ #
# I'm not anti-social, I'm pro-individual. - der.hans #
# ===========+++++++++++++++++++++++++++++++++=========== #