RE: UFW logging

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello Dermot,

as far as I can see, HTTP is blocked (DPT=80). 

Why are you using UFW. You've got a DMZ?


Regards Marcel

> -----Original Message-----
> From: linux-admin-owner@xxxxxxxxxxxxxxx [mailto:linux-admin-
> owner@xxxxxxxxxxxxxxx] On Behalf Of Dermot Paikkos
> Sent: Tuesday, December 20, 2011 3:03 PM
> To: linux-admin@xxxxxxxxxxxxxxx
> Subject: UFW logging
> 
> Hi,
> 
> I noticed on our company http server that I had a lot of 'probes'. My
> logwatch file (text-mode) is 3+MB and rising. I have thousands of
> entries in my logwatch reports:
> 
> A total of 5711 sites probed the server
>     1.152.198.116
>     1.22.185.5
>     1.23.105.130
>     1.38.24.232
>     1.38.25.24
>     1.39.95.219
>     1.53.101.185
>     101.108.239.43
> ...
> ...
> ...
> 
> I'm not sure what the above probes are. Any help in understanding the
> above would be appreciated.
> 
> I also have several entries like this:
> 
> A total of 4 possible successful probes were detected (the following
> URLs
>  contain strings that match one or more of a listing of strings that
>  indicate a possible exploit):
> 
> 
> /images/?option=com_sectionex&controller=../../../../../../../../../../.
> ./../..//proc/self/environ%0000 HTTP Response 200
>     /?
> 
> I believe these are php exploits.
> 
> To help secure the server, I installed UFW, enabled and allowed HTTP,
> HTTPS and SSH. I then monitored the logs to see what was happening. What
> I am not clear on is what service the log entries below refer to.
> 
> 
> Dec 20 13:10:35 myserver kernel: [4808284.769172] [UFW BLOCK]
> IN=eth0 OUT= MAC=00:16:3e:1e:65:85:00:0a:b7:96:5c:80:08:00
> SRC=194.27.44.2 DST=217.222.0.x LEN=52 TOS=0x00 PREC=0x00 TTL=109
> ID=10243 DF PROTO=TCP SPT=6565 DPT=80 WINDOW=4320 RES=0x00 ACK
> FIN
> URGP=0
> Dec 20 13:11:01 myserver kernel: [4808311.356089] [UFW BLOCK]
> IN=eth0 OUT= MAC=00:16:3e:1e:65:85:00:0a:b7:96:5c:80:08:00
> SRC=151.96.254.4 DST=217.222.0.x LEN=40 TOS=0x00 PREC=0x00 TTL=55
> ID=44116 PROTO=TCP SPT=58842 DPT=80 WINDOW=1032 RES=0x00 ACK RST
> URGP=0
> 
> I am getting an entry like this every 20-30 seconds. Can anyone tell me
> what service/port is being blocked in the above log entries?
> 
> Below are the rules at the moment.
> Thanks in advance,
> Dermot
> 
> Chain ufw-user-input (1 references)
>     pkts      bytes target     prot opt in     out     source
>      destination
>    29164  1620981 ACCEPT     tcp  --  *      *       0.0.0.0/0
>    0.0.0.0/0           tcp dpt:80 /* 'dapp_Apache' */
>     5151   299728 ACCEPT     tcp  --  *      *       0.0.0.0/0
>    0.0.0.0/0           multiport dports 80,443 /* 'dapp_Apache%20Full'
> */
>        3      180 ACCEPT     tcp  --  *      *       0.0.0.0/0
>    0.0.0.0/0           tcp dpt:22 /* 'dapp_OpenSSH' */
>        0        0 REJECT     all  --  *      *       220.162.244.251
>    0.0.0.0/0           reject-with icmp-port-unreachable
>        0        0 REJECT     all  --  *      *       217.115.199.40
>    0.0.0.0/0           reject-with icmp-port-unreachable
>        0        0 REJECT     all  --  *      *       93.84.116.216
>    0.0.0.0/0           reject-with icmp-port-unreachable
>        0        0 REJECT     all  --  *      *       85.10.204.194
>    0.0.0.0/0           reject-with icmp-port-unreachable
>        0        0 REJECT     all  --  *      *       221.232.155.6
>    0.0.0.0/0           reject-with icmp-port-unreachable
>        0        0 REJECT     all  --  *      *       122.255.96.164
>    0.0.0.0/0           reject-with icmp-port-unreachable
>        0        0 REJECT     all  --  *      *       77.240.21.131
>    0.0.0.0/0           reject-with icmp-port-unreachable
>        0        0 REJECT     all  --  *      *       83.170.79.6
>    0.0.0.0/0           reject-with icmp-port-unreachable
> 
> Chain ufw-user-forward (1 references)
>     pkts      bytes target     prot opt in     out     source
>      destination
> 
> Chain ufw-user-output (1 references)
>     pkts      bytes target     prot opt in     out     source
>      destination
> 
> Chain ufw-user-limit-accept (0 references)
>     pkts      bytes target     prot opt in     out     source
>      destination
>        0        0 ACCEPT     all  --  *      *       0.0.0.0/0
>    0.0.0.0/0
> 
> Chain ufw-user-limit (0 references)
>     pkts      bytes target     prot opt in     out     source
>      destination
>        0        0 LOG        all  --  *      *       0.0.0.0/0
>    0.0.0.0/0           limit: avg 3/min burst 5 LOG flags 0 level 4
> prefix `[UFW LIMIT BLOCK] '
>        0        0 REJECT     all  --  *      *       0.0.0.0/0
>    0.0.0.0/0           reject-with icmp-port-unreachable
> --
> To unsubscribe from this list: send the line "unsubscribe linux-admin" in
> the body of a message to majordomo@xxxxxxxxxxxxxxx
> More majordomo info at  http://vger.kernel.org/majordomo-info.html
--
To unsubscribe from this list: send the line "unsubscribe linux-admin" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [Linux Newbie]     [Audio]     [Hams]     [Kernel Newbies]     [Util Linux NG]     [Security]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux Device Drivers]     [Samba]     [Video 4 Linux]     [Git]     [Fedora Users]

  Powered by Linux