On Mon, 31 Jan 2005, Jose Maria Lopez wrote: > El lun, 31 de 01 de 2005 a las 14:29, Kevin Van Workum escribiÃ: > > I'm learning about iptables and am working through the example scripts > > in Oskar Andreasson's Iptables Tutorial 1.1.19. So I have the following > > rules: > > > > iptables -A bad_tcp_packets -p tcp ! --syn -m state --state NEW -j LOG > > --log-prefix "New not syn:" > > iptables -A bad_tcp_packets -p tcp ! --syn -m state --state NEW -j DROP > > > > My understanding of this rule is that all NEW tcp packets should by SYN > > also. So if they are not NEW and SYN, then we should log them and drop > > them. I guess Andreasson wants to log them because they may indicate a > > problem of some sort. So in my log file, I get this: > > > > Jan 30 20:09:27 server kernel: New not syn:IN= OUT=lo SRC=10.0.0.100 > > DST=10.0.0.100 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=7678 DF PROTO=TCP > > SPT=34928 DPT=143 WINDOW=32767 RES=0x00 ACK PSH FIN URGP=0 > > > > So what's the problem with these packets? It looks like some client is > > contacting the imapd (which is running on my firewall) with some bad tcp > > packets? > > NEW without SYN packets can occur but they are very uncommon, the > rule proposed it's correct in the 99% of the systems, but if you > have a program or daemon that doesn't make the SYN/ACK-SYN/ACK > correctly then you maybe have to allow this packets. Is there a way to determine which program or daemon is producing these packets? -- Kevin