Difficulties with ulog / NFCT

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi,

I've set up logging as follows, to get a history of TCP connections:

# conntrack logging to MariaDB
stack=ct1:NFCT,ip2str1:IP2STR,mysql1:MYSQL

[ct1]
accept_proto_filter=tcp # layer 4 proto of connections
event_mask=0x00000004 # only listen to DESTROY events

[mysql1]
table="ct"
reconnect=4
connect_timeout=60
procedure="INSERT"
db="ulog"
host="localhost"
user="ulog"
pass="*****"
port=3306


It doesn't work well.  For example, I get this:

MariaDB [ulog]> SELECT FROM_UNIXTIME(flow_start_sec) AS start, flow_end_sec - flow_start_sec AS sec,
> orig_ip_saddr_str AS src, orig_l4_sport AS sport, orig_ip_daddr_str, orig_l4_dport AS svc
> FROM ct WHERE orig_ip_saddr_str = '66.110.216.209';
+-------+------+----------------+-------+-------------------+------+
| start | sec  | src            | sport | orig_ip_daddr_str | svc  |
+-------+------+----------------+-------+-------------------+------+
| NULL  | NULL | 66.110.216.209 | 32767 | 62.94.243.226     |  143 |
| NULL  | NULL | 66.110.216.209 | 32767 | 62.94.243.226     |  143 |
+-------+------+----------------+-------+-------------------+------+
2 rows in set (0.00 sec)



flow_start_sec and flow_end_sec are both NULL, after several hours.  They seem to be non-NULL for outgoing connections and for connections coming from the internal network.  Even then, they don't seem to be accurate timings.

The mail log for the IP above IP is as follows (the source port is always 32767):

Feb 15 12:08:07 22 north imapd: LOGIN FAILED, user=sungjtrio@xxxxxxxxxxxx, ip=[66.110.216.209], port=[41204]
Feb 15 12:08:16 23 north imapd: Disconnected, ip=[66.110.216.209], port=[41204], time=16
Feb 15 12:08:47 23 north imapd: Connection, ip=[66.110.216.209], port=[45344]
Feb 15 12:08:54 22 north imapd: LOGIN FAILED, user=sungjtrio@xxxxxxxxxxxx, ip=[66.110.216.209], port=[45344]
Feb 15 12:09:06 23 north imapd: Disconnected, ip=[66.110.216.209], port=[45344], time=19

Disconnections are likely caused by conntrack -D -s 66.110.216.209.  I'm reporting abusive login attempts at end-of-day, and I've been told to mention my server (target) address and port, 62.94.243.226:143 in this case.  Since the mail log doesn't mention that data, the idea is to find it in the NFCT log based on the time and source IP.

Should I be running conntrackd?
Should I play with socket buffer/ resync timeout/ backlog_oneshot_requests/ ring_buffer_size?
Any other hint?


TIA
Ale
-- 



























[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux