LinuxQuestions.org
Help answer threads with 0 replies.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 04-21-2009, 12:31 PM   #16
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380

Quote:
Originally Posted by Winstar View Post
[root@22475_1_17681_97086 ~]# iptables -nvL INPUT
Chain INPUT (policy ACCEPT 26M packets, 15G bytes)
pkts bytes target prot opt in out source destination
852K 41M DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:3072
854K 41M DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:1024
This makes it sound like the rules are actually working.

I mean, each of those rules has sent well over 800,000 packets to DROP.
 
Old 04-22-2009, 08:06 AM   #17
Winstar
LQ Newbie
 
Registered: Apr 2009
Posts: 9

Original Poster
Rep: Reputation: 0
Yes, it seems so.
However is a couple of days that attacks toward my server seem to have stopped, so i have not been suspended. I dunno if iptables saved me or i have only been lucky.
 
Old 04-30-2009, 03:29 PM   #18
Winstar
LQ Newbie
 
Registered: Apr 2009
Posts: 9

Original Poster
Rep: Reputation: 0
I have received another abuse complaint.... Now i am sure those rules does not work. I continue to send packets to remote ports 1024 and 3072 to answer to syn flood. This situation is incredible: look at this

Code:
[root@22475_1_17681_97086 ~]# iptables -nvL INPUT
Chain INPUT (policy ACCEPT 73M packets, 47G bytes)
 pkts bytes target     prot opt in     out     source               destination
1910K   91M DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp spt:3072
1914K   91M DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp spt:1024
[root@22475_1_17681_97086 ~]# iptables -nvL OUTPUT
Chain OUTPUT (policy ACCEPT 611M packets, 162G bytes)
 pkts bytes target     prot opt in     out     source               destination
    0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp dpt:3072
    0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp dpt:1024
It seems the chain INPUT is doing the job, the chain output is doing anything. Statistically should have happened some packets to go towards ports 3072 or 1024 don't you think so?
What's the problem???
 
Old 04-30-2009, 03:58 PM   #19
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Quote:
Originally Posted by Winstar View Post
I have received another abuse complaint.... Now i am sure those rules does not work. I continue to send packets to remote ports 1024 and 3072 to answer to syn flood. This situation is incredible: look at this

Code:
[root@22475_1_17681_97086 ~]# iptables -nvL INPUT
Chain INPUT (policy ACCEPT 73M packets, 47G bytes)
 pkts bytes target     prot opt in     out     source               destination
1910K   91M DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp spt:3072
1914K   91M DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp spt:1024
[root@22475_1_17681_97086 ~]# iptables -nvL OUTPUT
Chain OUTPUT (policy ACCEPT 611M packets, 162G bytes)
 pkts bytes target     prot opt in     out     source               destination
    0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp dpt:3072
    0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp dpt:1024
It seems the chain INPUT is doing the job, the chain output is doing anything. Statistically should have happened some packets to go towards ports 3072 or 1024 don't you think so?
What's the problem???
Can you show us some moderately verbose tcpdump descriptions of the outbound packets? I'm not sure about the statistics involved, but it would seem like there should be at least a few non-attack packets getting filtered by those rules. Although, the fact there aren't any isn't in and of itself an indication that something is broken. In any case, checking this should be easy. Generate some outbound TCP packets with those destination ports and see if they are filtered. If they aren't, then something is definitely not right.
 
Old 04-30-2009, 05:32 PM   #20
Winstar
LQ Newbie
 
Registered: Apr 2009
Posts: 9

Original Poster
Rep: Reputation: 0
Can you suggest a simple way for doing that?
thanks
 
Old 04-30-2009, 07:01 PM   #21
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Quote:
Originally Posted by Winstar View Post
Can you suggest a simple way for doing that?
thanks
You mean to generate packets with those destination ports? You could do a:
Code:
ssh -p 3072 linuxquestions.org
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
synflood.c file error soni_silver17 Linux - Software 1 03-31-2009 08:09 AM
Abuse prashantbhushan Linux - Networking 1 11-23-2006 05:34 AM
email abuse ice99 General 3 11-20-2005 09:55 AM
Email abuse Jon Doe Linux - Security 25 07-01-2005 03:59 PM
ALERT!!! ALERT!!! I messed up the UNIX!!! Firew Linux - Software 1 11-05-2001 11:48 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 09:17 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration