Re: bad tcp packets?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, 31 Jan 2005, Jose Maria Lopez wrote:

> El lun, 31 de 01 de 2005 a las 14:29, Kevin Van Workum escribiÃ:
> > I'm learning about iptables and am working through the example scripts
> > in Oskar Andreasson's Iptables Tutorial 1.1.19. So I have the following
> > rules:
> >
> > iptables -A bad_tcp_packets -p tcp ! --syn -m state --state NEW -j LOG
> > --log-prefix "New not syn:"
> > iptables -A bad_tcp_packets -p tcp ! --syn -m state --state NEW -j DROP
> >
> > My understanding of this rule is that all NEW tcp packets should by SYN
> > also. So if they are not NEW and SYN, then we should log them and drop
> > them. I guess Andreasson wants to log them because they may indicate a
> > problem of some sort. So in my log file, I get this:
> >
> > Jan 30 20:09:27 server kernel: New not syn:IN= OUT=lo SRC=10.0.0.100
> > DST=10.0.0.100 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=7678 DF PROTO=TCP
> > SPT=34928 DPT=143 WINDOW=32767 RES=0x00 ACK PSH FIN URGP=0
> >
> > So what's the problem with these packets? It looks like some client is
> > contacting the imapd (which is running on my firewall) with some bad tcp
> > packets?
>
> NEW without SYN packets can occur but they are very uncommon, the
> rule proposed it's correct in the 99% of the systems, but if you
> have a program or daemon that doesn't make the SYN/ACK-SYN/ACK
> correctly then you maybe have to allow this packets.

Is there a way to determine which program or daemon is producing these
packets?

-- 
Kevin



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux