Re: ICMP logging question

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, 2004-05-04 at 23:09, Philip Craig wrote:
>
> Given that there's only 56 bytes in the ICMP packet, and 40 bytes in the
> original TCP packet, all of which are headers, that packet by itself
> would be a very low bandwidth covert channel.  What makes you think it is?

Going off topic just a little here...
The pattern is nearly identical to what we documented here:
http://archives.neohapsis.com/archives/incidents/2000-01/0005.html

The major difference is these packets target an actual IP address rather
than x.x.x.0. This tells me it may be a variation off the original tool
adapted for a different OS (original zombie ran on SunOS). Just trying
to ID the tool.

> No, the feature is still there, but it only prints out the ports when
> it has a full TCP header.  While it would be possible to print the
> ports from just the first 8 bytes of the TCP header, iptables never
> has AFAIK. 

Think I figured it out. Check out the following:

Oct 30 22:36:53 gw2 kernel:  DROP  IN=eth0 OUT=eth0 SRC=207.88.240.101
DST=12.33.247.252 LEN=56 TOS=0x00 PREC=0x00 TTL=243 ID=0 PROTO=ICMP
TYPE=3 CODE=1 [SRC=12.33.247.252 DST=194.102.91.1 LEN=40 TOS=0x00
PREC=0x00 TTL=24 ID=41546 PROTO=TCP SPT=31632 DPT=4160 WINDOW=63498
RES=0x09 ACK RST SYN FIN URGP=0]

Port numbers decoded off a 56 byte packet but it has the "let's pretend
the sequence number field is the flag field" bug. I'm guessing when the
bug was fixed, the change was made so port numbers were no longer
translated when only 8 bytes of the TCP header are present.

Kind of a bummer to lose the additional info. May be able to fix this
with ulog.

Thanks for the re!
Chris




[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux