Re: Snort Output v. Iptables Log

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Le mar 04/11/2003 à 23:25, David C. Hart a écrit :
> If I run snort, I get tons of these from a neighboring IP (I'm assuming
> "dirty" windows in contrast to anything malicious BTW).
> ----------------------------
> [**] MISC UPnP malformed advertisement [**]
> 11/04-16:25:15.492306 151.202.17.22:1901 -> 239.255.255.250:1900
> UDP TTL:150 TOS:0x0 ID:1 IpLen:20 DgmLen:355
> Len: 327
> ---------------------------

Destination is 239.255.255.250 which is a multicast address.

> None of these packets get logged by IPTables. To be sure, I added a
> "kitchen sink" rule at the very top specific to the offending IP with no
> parameters:
> -A INPUT -s 151.202.17.22 -j LOG  --log-prefix "Firewall: " --log-level
> debug --log-tcp-sequence --log-tcp-options --log-ip-options

You won't see theses packets in INPUT chain unless your box is listening
to this very multicast address. Maybe you can try to catch it on
PREROUTING chain in mangle table...

-- 
http://www.netexit.com/~sid/
PGP KeyID: 157E98EE FingerPrint: FA62226DA9E72FA8AECAA240008B480E157E98EE
>> Hi! I'm your friendly neighbourhood signature virus.
>> Copy me to your signature file and help me spread! 



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux