Re: TCP and SYN packets

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



One idea, and I may be completely off here is that these might be packets
sent _after_ a connection is closed.  Your rule logs any non-SYN packets
that don't have an associated existing conneciton.  What _might_ be
happening is that these other servers establish a connection, do some stuff
with it and then try to close it.  They send one FIN packet which your
server receives.  This causes your server to tear down the connection and
it disappears from the iptables statefull connection list.  But maybe your
ACK to FIN (and here I'm really just hazarding a guess ... I don't even
know the full teardown procedure in TCP) doesn't get to the other systems
so they try to send you another FIN.   I'm curious if this is even
possible.  Someone who knows TCP a little better please comment.

I actually checked out a short TCP tutorial and it seems to me that this is
possible -- it seems that one side can close down the TCP connection before
the other.

Sheer

Matt Kowske wrote:

> On Tue, 2001-12-11 at 01:06, David Correa wrote:
>     I would not remove that rule. How are you logging? I don't see
>     the word "LOG" in your rule.
>
>     Could you send part of the log information here? Do a tcpdump
>     and send a packet? Or tell us the sites that you say are doing
>     that so i/we can check what they send?
> Well I have a rule directly before the other rule that first logs the
> packet, and then drops it.  the two rules are identical except that in
> one rule the target is LOG and the other is DROP.  Here is an example of
> a log entry:
>
> Dec 11 02:59:59 bob kernel: New not syn:IN=eth1 OUT=
> MAC=00:e0:29:22:10:80:00:06:2a:cf:ec:54:08:00 SRC=205.156.51.200 DST=<my
> ip> LEN=52 TOS=0x00 PREC=0x00 TTL=45 ID=23535 PROTO=TCP SPT=80 DPT=54248
> WINDOW=65500 RES=0x00 ACK FIN URGP=0
>
> That source IP equates to tgftp.nws.noaa.gov, which is a internet
> weather site.  I could find other examples too but they're all very
> similar.  Here's another from greetingcards.msn.com
>
> Dec 11 00:35:50 bob kernel: New not syn:IN=eth1 OUT=
> MAC=00:e0:29:22:10:80:00:06:2a:cf:ec:54:08:00 SRC=207.68.181.238 DST=<mi
> ip> LEN=471 TOS=0x00 PREC=0x00 TTL=62 ID=53655 PROTO=TCP SPT=80 DPT=3299
> WINDOW=8760 RES=0x00 ACK PSH FIN URGP=0
>
> I don't think these sites would be sending invalid TCP connection
> attempts on purpose but I can't figure out what the reason would be.
>
> -Matt Kowske
>
> ------------------------------------------------------------------------
>      To unsubscribe email security-discuss-request@linuxsecurity.com
>          with "unsubscribe" in the subject of the message.

------------------------------------------------------------------------
     To unsubscribe email security-discuss-request@linuxsecurity.com
         with "unsubscribe" in the subject of the message.


[Index of Archives]     [Fedora Announce]     [Linux Crypto]     [Kernel]     [Netfilter]     [Bugtraq]     [USB]     [Fedora Security]

  Powered by Linux