Re: Mystics of packet forwarding

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Ivan Petrushev wrote:
tcpdump could be a bit overwhelming with its mass of output information.
Maybe Wireshark?

If the case is virus/worm it could be doing port scans on the target
sites or something that not involve port 80.
I'm lost. And desperate.

I added rule to log ALL packets that are forwarded through.

wrote a tiny script to filter them out.

#!/usr/bin/env ruby

targets = ARGV[0..-1]
puts "targets: #{targets.inspect}"

data = {}
File.open('syslogemu.log') do |f|
    f.read.split("\n").each do |line|
        parts = line.split
        dst = parts[10].split('=')[1]
        if targets.size == 0 or targets.include?(dst)
            src = parts[9].split('=')[1]
            data[src] ||= 0
            data[src] += 1
        end
    end
end

data.to_a.sort_by { |e| e[0] }.each do |ip, conns|
    puts "#{ip} => #{conns}"
end

gw:/var/log/ulog# ./newconns.rb 87.248.113.14 206.190.60.37 68.180.206.184 64.191.203.30
targets: ["87.248.113.14", "206.190.60.37", "68.180.206.184", "64.191.203.30"]
192.168.0.3 => 3

the 0.3 host is me trying to open digg.com

what the hell? No packets there and still it doesn't work? :((( I'm running out of ideas.
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux