UFW logging

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi,

I noticed on our company http server that I had a lot of 'probes'. My 
logwatch file (text-mode) is 3+MB and rising. I have thousands of 
entries in my logwatch reports:

A total of 5711 sites probed the server 
    1.152.198.116
    1.22.185.5
    1.23.105.130
    1.38.24.232
    1.38.25.24
    1.39.95.219
    1.53.101.185
    101.108.239.43
...
...
...

I'm not sure what the above probes are. Any help in understanding the 
above would be appreciated. 

I also have several entries like this:

A total of 4 possible successful probes were detected (the following 
URLs
 contain strings that match one or more of a listing of strings that
 indicate a possible exploit):
 
    
/images/?option=com_sectionex&controller=../../../../../../../../../../.
./../..//proc/self/environ%0000 HTTP Response 200 
    /?

I believe these are php exploits. 

To help secure the server, I installed UFW, enabled and allowed HTTP, 
HTTPS and SSH. I then monitored the logs to see what was happening. What 
I am not clear on is what service the log entries below refer to.


Dec 20 13:10:35 myserver kernel: [4808284.769172] [UFW BLOCK]
IN=eth0 OUT= MAC=00:16:3e:1e:65:85:00:0a:b7:96:5c:80:08:00
SRC=194.27.44.2 DST=217.222.0.x LEN=52 TOS=0x00 PREC=0x00 TTL=109
ID=10243 DF PROTO=TCP SPT=6565 DPT=80 WINDOW=4320 RES=0x00 ACK FIN
URGP=0
Dec 20 13:11:01 myserver kernel: [4808311.356089] [UFW BLOCK]
IN=eth0 OUT= MAC=00:16:3e:1e:65:85:00:0a:b7:96:5c:80:08:00
SRC=151.96.254.4 DST=217.222.0.x LEN=40 TOS=0x00 PREC=0x00 TTL=55
ID=44116 PROTO=TCP SPT=58842 DPT=80 WINDOW=1032 RES=0x00 ACK RST
URGP=0

I am getting an entry like this every 20-30 seconds. Can anyone tell me 
what service/port is being blocked in the above log entries?

Below are the rules at the moment. 
Thanks in advance,
Dermot

Chain ufw-user-input (1 references)
    pkts      bytes target     prot opt in     out     source
     destination
   29164  1620981 ACCEPT     tcp  --  *      *       0.0.0.0/0
   0.0.0.0/0           tcp dpt:80 /* 'dapp_Apache' */
    5151   299728 ACCEPT     tcp  --  *      *       0.0.0.0/0
   0.0.0.0/0           multiport dports 80,443 /* 'dapp_Apache%20Full'
*/
       3      180 ACCEPT     tcp  --  *      *       0.0.0.0/0
   0.0.0.0/0           tcp dpt:22 /* 'dapp_OpenSSH' */
       0        0 REJECT     all  --  *      *       220.162.244.251
   0.0.0.0/0           reject-with icmp-port-unreachable
       0        0 REJECT     all  --  *      *       217.115.199.40
   0.0.0.0/0           reject-with icmp-port-unreachable
       0        0 REJECT     all  --  *      *       93.84.116.216
   0.0.0.0/0           reject-with icmp-port-unreachable
       0        0 REJECT     all  --  *      *       85.10.204.194
   0.0.0.0/0           reject-with icmp-port-unreachable
       0        0 REJECT     all  --  *      *       221.232.155.6
   0.0.0.0/0           reject-with icmp-port-unreachable
       0        0 REJECT     all  --  *      *       122.255.96.164
   0.0.0.0/0           reject-with icmp-port-unreachable
       0        0 REJECT     all  --  *      *       77.240.21.131
   0.0.0.0/0           reject-with icmp-port-unreachable
       0        0 REJECT     all  --  *      *       83.170.79.6
   0.0.0.0/0           reject-with icmp-port-unreachable

Chain ufw-user-forward (1 references)
    pkts      bytes target     prot opt in     out     source
     destination

Chain ufw-user-output (1 references)
    pkts      bytes target     prot opt in     out     source
     destination

Chain ufw-user-limit-accept (0 references)
    pkts      bytes target     prot opt in     out     source
     destination
       0        0 ACCEPT     all  --  *      *       0.0.0.0/0
   0.0.0.0/0

Chain ufw-user-limit (0 references)
    pkts      bytes target     prot opt in     out     source
     destination
       0        0 LOG        all  --  *      *       0.0.0.0/0
   0.0.0.0/0           limit: avg 3/min burst 5 LOG flags 0 level 4
prefix `[UFW LIMIT BLOCK] '
       0        0 REJECT     all  --  *      *       0.0.0.0/0
   0.0.0.0/0           reject-with icmp-port-unreachable
--
To unsubscribe from this list: send the line "unsubscribe linux-admin" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [Linux Newbie]     [Audio]     [Hams]     [Kernel Newbies]     [Util Linux NG]     [Security]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux Device Drivers]     [Samba]     [Video 4 Linux]     [Git]     [Fedora Users]

  Powered by Linux