Jozsef Kadlecsik wrote:
On Wed, 22 Apr 2009, Patrick McHardy wrote:
The well-maintained sites manage to locate on-site infected machines by
using IDS, traffic-analysis, etc. However the typical user case for small
sites is that the ISP or other offsite host report an abuse: "your machine
x.y.z.w attacked machine a.b.c.d/added to the RBL because of spamming/etc" -
and the machine x.y.z.w is of course their firewall. And they have got
nothing which could help them to pick the real machine from the NATed
network behind the firewall. And the small sites is the main reason why I'd
favor an "out of the box" solution, which does not rely on anything besides
netfilter/iptables.
Yes, but at that point, you can look at your logfiles and see who
connected to a.b.c.d and you'll see the internal address. Logging
the NATed address is not really helping since you need the internal
address anyways, so it seems natural to look at the unNATed information.
What am I missing here?
Hmm, if there are multiple clients connecting to the same external node
(or even just a few ones but the exact time is not definite due to the
unsynced clocks) then the hunted client does not stand out. But it might
indicate multiple infected machines as well...
Yes, you'd need at least destination port numbers to reduce false
positives. But the same is also true if you do log the NATed address.
For the small-site case you describe, the external address is usually
know anyways since there is only a single one :)
Just to be clear about this, I don't generally object to this,
but before making this (quite undesirable IMO) change, I'd like
to be sure that it actually provides a tantamount benefit.
Please feel free to tell me that I'm missing the point :)
--
To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html