Re: Source and Destination port 0

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



If the FORWARD chain is not blocking these faulty packets it might mean
that the packets are being generated on the firewall itself. Try to block
them on the OUTPUT chain as well and see what happens. The next step would
be to figure out why you get them. What is the src and dst of the packets?
Anything meaningful?

Ramin

On Tue, Jul 15, 2003 at 12:16:44PM -0500, Geffrey Velasquez wrote:

> Hello Friends,
> 
> I have in my IDS logs packets comming from outside to DMZ servers with
> source port 0 and destination port 0.
> 
> The IDS is located in the DMZ network, and I have an iptables
> firewall, kernel-2.4.18-26.1.99_kb2c.1foo over RH 8 (that is the
> kernel with superfreeswan patches).
> 
> I tried with this couple of rules on top of FORWARD chain:
> 
> $IPT -A FORWARD -p tcp --sport 0 -j LOG --log-prefix "Zero: "
> $IPT -A FORWARD -p tcp --sport 0 -j DROP
> 
> also:
> 
> $IPT -A FORWARD -p tcp --sport 0 --dport 0 -j LOG --log-prefix "Cero: "
> $IPT -A FORWARD -p tcp --sport 0 --dport 0 -j DROP
> 
> After that I continue viewing the bad packets on IDS, how could I
> filter this kind of packets?
> 
> 
> -- 
> Best regards,
>  Geffrey                          mailto:g_netfilter@xxxxxxxxxxx
> 


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux