LinuxQuestions.org
Visit the LQ Articles and Editorials section
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware
User Name
Password
Slackware This Forum is for the discussion of Slackware Linux.

Notices

Reply
 
Search this Thread
Old 11-11-2007, 03:07 PM   #1
H_TeXMeX_H
Guru
 
Registered: Oct 2005
Location: $RANDOM
Distribution: slackware64
Posts: 12,928
Blog Entries: 2

Rep: Reputation: 1269Reputation: 1269Reputation: 1269Reputation: 1269Reputation: 1269Reputation: 1269Reputation: 1269Reputation: 1269Reputation: 1269
Exclamation dmesg Invalid packet / INPUT packet died flood


Instead of the normal dmesg output I get this:
Code:
0.136.149 LEN=131 TOS=0x00 PREC=0x20 TTL=111 ID=1852 PROTO=UDP SPT=54242 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=217.234.95.242 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x20 TTL=115 ID=21278 PROTO=UDP SPT=33824 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=88.73.153.173 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x00 TTL=114 ID=21709 PROTO=UDP SPT=62275 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=85.146.114.221 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x80 TTL=109 ID=20603 PROTO=UDP SPT=46615 DPT=33614 LEN=111 
Invalid packet: IN=ppp0 OUT= MAC= SRC=84.53.134.25 DST=89.40.136.149 LEN=40 TOS=0x00 PREC=0x20 TTL=51 ID=61550 DF PROTO=TCP SPT=80 DPT=3129 WINDOW=32760 RES=0x00 ACK FIN URGP=0 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=213.91.224.88 DST=89.40.136.149 LEN=126 TOS=0x00 PREC=0x80 TTL=115 ID=34886 PROTO=UDP SPT=27060 DPT=33614 LEN=106 
Invalid packet: IN=ppp0 OUT= MAC= SRC=84.53.134.25 DST=89.40.136.149 LEN=40 TOS=0x00 PREC=0x20 TTL=51 ID=61551 DF PROTO=TCP SPT=80 DPT=3129 WINDOW=32760 RES=0x00 ACK FIN URGP=0 
Invalid packet: IN=ppp0 OUT= MAC= SRC=84.53.134.25 DST=89.40.136.149 LEN=40 TOS=0x00 PREC=0x20 TTL=51 ID=61552 DF PROTO=TCP SPT=80 DPT=3129 WINDOW=32760 RES=0x00 ACK FIN URGP=0 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=82.241.158.23 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x80 TTL=111 ID=51436 PROTO=UDP SPT=41984 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=92.114.130.47 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x20 TTL=110 ID=8310 PROTO=UDP SPT=11489 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=211.179.30.186 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x00 TTL=107 ID=16258 PROTO=UDP SPT=51633 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=219.94.60.161 DST=89.40.136.149 LEN=126 TOS=0x00 PREC=0x00 TTL=110 ID=44121 PROTO=UDP SPT=18890 DPT=33614 LEN=106 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=41.251.17.184 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x00 TTL=112 ID=40638 PROTO=UDP SPT=15829 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=89.40.25.118 DST=89.40.136.149 LEN=48 TOS=0x00 PREC=0x00 TTL=118 ID=8503 DF PROTO=TCP SPT=3845 DPT=1433 WINDOW=64240 RES=0x00 SYN URGP=0 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=89.40.25.118 DST=89.40.136.149 LEN=48 TOS=0x00 PREC=0x00 TTL=118 ID=8724 DF PROTO=TCP SPT=3845 DPT=1433 WINDOW=64240 RES=0x00 SYN URGP=0 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=86.10.54.155 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x80 TTL=112 ID=54654 PROTO=UDP SPT=14321 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=68.61.169.105 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x20 TTL=109 ID=49081 PROTO=UDP SPT=16683 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=68.49.83.74 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x20 TTL=110 ID=17617 PROTO=UDP SPT=13603 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=78.55.62.215 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x80 TTL=115 ID=19538 PROTO=UDP SPT=46354 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=213.84.52.15 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x80 TTL=111 ID=4369 PROTO=UDP SPT=56233 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=221.220.168.92 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x20 TTL=105 ID=38260 PROTO=UDP SPT=1056 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=83.23.210.79 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x00 TTL=116 ID=71 PROTO=UDP SPT=49152 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=80.98.181.152 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x00 TTL=111 ID=7947 PROTO=UDP SPT=6881 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=87.121.69.251 DST=89.40.136.149 LEN=126 TOS=0x1C PREC=0x80 TTL=117 ID=11280 PROTO=UDP SPT=20567 DPT=33614 LEN=106 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=90.200.71.26 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x00 TTL=114 ID=14963 PROTO=UDP SPT=16478 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=217.120.65.46 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x80 TTL=115 ID=58564 PROTO=UDP SPT=49621 DPT=33614 LEN=111 
Invalid packet: IN=ppp0 OUT= MAC= SRC=86.131.110.147 DST=89.40.136.149 LEN=159 TOS=0x00 PREC=0x80 TTL=232 ID=20863 PROTO=ICMP TYPE=3 CODE=3 [SRC=89.40.136.149 DST=192.168.0.1 LEN=131 TOS=0x00 PREC=0x00 TTL=103 ID=44326 PROTO=UDP SPT=33614 DPT=12953 LEN=111 ] 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=68.214.7.114 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x20 TTL=107 ID=3806 PROTO=UDP SPT=50799 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=76.119.97.98 DST=89.40.136.149 LEN=296 TOS=0x00 PREC=0x20 TTL=105 ID=12729 PROTO=UDP SPT=42735 DPT=33614 LEN=276 
Invalid packet: IN=ppp0 OUT= MAC= SRC=190.37.160.154 DST=89.40.136.149 LEN=159 TOS=0x00 PREC=0x20 TTL=109 ID=7645 PROTO=ICMP TYPE=3 CODE=3 [SRC=89.40.136.149 DST=192.168.0.116 LEN=131 TOS=0x00 PREC=0x00 TTL=109 ID=53443 PROTO=UDP SPT=33614 DPT=17479 LEN=111 ] 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=201.152.95.28 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x20 TTL=110 ID=46122 PROTO=UDP SPT=54877 DPT=33614 LEN=111 
Invalid packet: IN=ppp0 OUT= MAC= SRC=190.37.160.154 DST=89.40.136.149 LEN=159 TOS=0x00 PREC=0x20 TTL=109 ID=8098 PROTO=ICMP TYPE=3 CODE=3 [SRC=89.40.136.149 DST=192.168.0.116 LEN=131 TOS=0x00 PREC=0x00 TTL=109 ID=55088 PROTO=UDP SPT=33614 DPT=17479 LEN=111 ] 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=69.123.92.104 DST=89.40.136.149 LEN=305 TOS=0x00 PREC=0x20 TTL=14 ID=19684 PROTO=UDP SPT=1324 DPT=33614 LEN=285 
Invalid packet: IN=ppp0 OUT= MAC= SRC=190.37.160.154 DST=89.40.136.149 LEN=159 TOS=0x00 PREC=0x20 TTL=109 ID=8244 PROTO=ICMP TYPE=3 CODE=3 [SRC=89.40.136.149 DST=192.168.0.116 LEN=131 TOS=0x00 PREC=0x00 TTL=109 ID=55539 PROTO=UDP SPT=33614 DPT=17479 LEN=111 ] 
Invalid packet: IN=ppp0 OUT= MAC= SRC=190.74.8.173 DST=89.40.136.149 LEN=305 TOS=0x00 PREC=0x20 TTL=109 ID=62335 PROTO=UDP SPT=59707 DPT=33614 LEN=285 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=219.74.50.67 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x20 TTL=109 ID=49849 PROTO=UDP SPT=60370 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=83.208.190.49 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x80 TTL=112 ID=9478 PROTO=UDP SPT=33694 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=89.40.1.36 DST=89.40.136.149 LEN=64 TOS=0x00 PREC=0x00 TTL=36 ID=32098 DF PROTO=TCP SPT=4998 DPT=1433 WINDOW=53760 RES=0x00 SYN URGP=0 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=89.40.1.36 DST=89.40.136.149 LEN=64 TOS=0x00 PREC=0x00 TTL=36 ID=32988 DF PROTO=TCP SPT=4998 DPT=1433 WINDOW=53760 RES=0x00 SYN URGP=0 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=89.40.134.75 DST=89.40.136.149 LEN=64 TOS=0x00 PREC=0x00 TTL=40 ID=3399 DF PROTO=TCP SPT=3620 DPT=1433 WINDOW=53760 RES=0x00 SYN URGP=0 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=201.42.69.98 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x00 TTL=108 ID=31831 PROTO=UDP SPT=10467 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=195.187.136.2 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x00 TTL=112 ID=32273 PROTO=UDP SPT=22544 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=129.15.131.253 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x20 TTL=100 ID=27341 PROTO=UDP SPT=52643 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=65.96.246.19 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x20 TTL=104 ID=37805 PROTO=UDP SPT=53469 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=213.60.90.240 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x00 TTL=113 ID=1988 PROTO=UDP SPT=32915 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=75.152.67.160 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x20 TTL=113 ID=17593 PROTO=UDP SPT=64149 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=74.95.160.86 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x20 TTL=104 ID=55396 PROTO=UDP SPT=33776 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=61.184.22.185 DST=89.40.136.149 LEN=126 TOS=0x00 PREC=0x20 TTL=108 ID=12348 PROTO=UDP SPT=18031 DPT=33614 LEN=106 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=190.32.231.185 DST=89.40.136.149 LEN=126 TOS=0x00 PREC=0x00 TTL=112 ID=30090 PROTO=UDP SPT=1501 DPT=33614 LEN=106 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=58.105.207.243 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x00 TTL=110 ID=4691 PROTO=UDP SPT=26041 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=213.205.47.147 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x00 TTL=113 ID=24184 PROTO=UDP SPT=42661 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=122.123.50.67 DST=89.40.136.149 LEN=126 TOS=0x00 PREC=0x80 TTL=107 ID=3880 PROTO=UDP SPT=16881 DPT=33614 LEN=106 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=213.134.160.229 DST=89.40.136.149 LEN=90 TOS=0x00 PREC=0x20 TTL=112 ID=33336 PROTO=UDP SPT=18819 DPT=12405 LEN=70 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=77.181.202.11 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x20 TTL=110 ID=61834 PROTO=UDP SPT=64049 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=88.73.153.173 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x00 TTL=114 ID=50084 PROTO=UDP SPT=62275 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=87.246.1.88 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x80 TTL=112 ID=18409 PROTO=UDP SPT=43443 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=195.228.122.204 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x20 TTL=109 ID=14451 PROTO=UDP SPT=29928 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=194.187.204.46 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x20 TTL=112 ID=25893 PROTO=UDP SPT=61523 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=24.76.170.87 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x20 TTL=111 ID=44222 PROTO=UDP SPT=19844 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=88.89.147.217 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x20 TTL=109 ID=15837 PROTO=UDP SPT=58895 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=70.70.157.18 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x20 TTL=107 ID=25526 PROTO=UDP SPT=40431 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=66.171.224.134 DST=89.40.136.149 LEN=134 TOS=0x00 PREC=0x20 TTL=110 ID=25679 PROTO=UDP SPT=1280 DPT=33614 LEN=114 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=219.84.20.159 DST=89.40.136.149 LEN=296 TOS=0x00 PREC=0x20 TTL=105 ID=52511 PROTO=UDP SPT=26610 DPT=33614 LEN=276 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=92.114.130.47 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x20 TTL=110 ID=57360 PROTO=UDP SPT=14341 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=77.49.218.243 DST=89.40.136.149 LEN=134 TOS=0x00 PREC=0x20 TTL=115 ID=10122 PROTO=UDP SPT=39078 DPT=33614 LEN=114 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=87.88.35.197 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x80 TTL=113 ID=26632 PROTO=UDP SPT=24129 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=74.192.200.133 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x20 TTL=106 ID=23548 PROTO=UDP SPT=33321 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=89.40.228.154 DST=89.40.136.149 LEN=48 TOS=0x00 PREC=0x00 TTL=118 ID=58450 DF PROTO=TCP SPT=1790 DPT=80 WINDOW=64240 RES=0x00 SYN URGP=0 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=81.202.165.156 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x80 TTL=109 ID=24322 PROTO=UDP SPT=37461 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=81.234.221.200 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x80 TTL=108 ID=11861 PROTO=UDP SPT=34598 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=86.101.218.174 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x00 TTL=113 ID=43531 PROTO=UDP SPT=49710 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=74.95.157.206 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x20 TTL=107 ID=5961 PROTO=UDP SPT=1549 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=60.211.27.119 DST=89.40.136.149 LEN=126 TOS=0x00 PREC=0x20 TTL=106 ID=34359 PROTO=UDP SPT=27908 DPT=33614 LEN=106 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=218.84.190.18 DST=89.40.136.149 LEN=126 TOS=0x00 PREC=0x20 TTL=106 ID=49550 PROTO=UDP SPT=1501 DPT=33614 LEN=106 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=216.227.91.125 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x00 TTL=106 ID=8762 PROTO=UDP SPT=39221 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=89.27.236.38 DST=89.40.136.149 LEN=134 TOS=0x00 PREC=0x20 TTL=112 ID=38450 PROTO=UDP SPT=16316 DPT=33614 LEN=114 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=89.139.53.238 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x20 TTL=110 ID=29662 PROTO=UDP SPT=48618 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=97.86.245.119 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x20 TTL=109 ID=7949 PROTO=UDP SPT=42253 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=82.47.216.167 DST=89.40.136.149 LEN=126 TOS=0x00 PREC=0x80 TTL=110 ID=36935 PROTO=UDP SPT=28662 DPT=33614 LEN=106 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=63.231.168.53 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x00 TTL=107 ID=59894 PROTO=UDP SPT=53564 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=89.41.69.38 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x20 TTL=111 ID=33401 PROTO=UDP SPT=36560 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=84.175.245.219 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x20 TTL=116 ID=32558 PROTO=UDP SPT=55122 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=60.53.36.12 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x00 TTL=108 ID=16305 PROTO=UDP SPT=17520 DPT=33614 LEN=111 
Invalid packet: IN=ppp0 OUT= MAC= SRC=190.37.160.154 DST=89.40.136.149 LEN=159 TOS=0x00 PREC=0x20 TTL=109 ID=26249 PROTO=ICMP TYPE=3 CODE=3 [SRC=89.40.136.149 DST=192.168.0.116 LEN=131 TOS=0x00 PREC=0x00 TTL=109 ID=22597 PROTO=UDP SPT=33614 DPT=17479 LEN=111 ] 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=81.165.175.198 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x20 TTL=109 ID=11055 PROTO=UDP SPT=61278 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=90.224.67.25 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x80 TTL=108 ID=8697 PROTO=UDP SPT=15977 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=83.31.181.22 DST=89.40.136.149 LEN=296 TOS=0x00 PREC=0x00 TTL=116 ID=13461 PROTO=UDP SPT=18922 DPT=33614 LEN=276 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=58.9.228.184 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x20 TTL=107 ID=7058 PROTO=UDP SPT=38316 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=218.166.229.66 DST=89.40.136.149 LEN=296 TOS=0x00 PREC=0x80 TTL=108 ID=37653 PROTO=UDP SPT=19611 DPT=33614 LEN=276 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=151.43.8.120 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x80 TTL=113 ID=26777 PROTO=UDP SPT=35942 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=60.48.132.182 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x00 TTL=106 ID=12192 PROTO=UDP SPT=63063 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=90.231.185.183 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x80 TTL=110 ID=28257 PROTO=UDP SPT=32932 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=84.50.69.81 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x80 TTL=111 ID=13771 PROTO=UDP SPT=25059 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=172.159.53.81 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x20 TTL=108 ID=2743 PROTO=UDP SPT=61695 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=87.9.130.182 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x80 TTL=110 ID=17034 PROTO=UDP SPT=27135 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=69.132.126.117 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x00 TTL=41 ID=30426 PROTO=UDP SPT=13183 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=85.74.10.180 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x80 TTL=113 ID=36392 PROTO=UDP SPT=60718 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=219.90.182.200 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x00 TTL=111 ID=19202 PROTO=UDP SPT=6881 DPT=33614 LEN=111 
INPUT packet died: IN=ppp0 OUT= MAC= SRC=216.186.208.25 DST=89.40.136.149 LEN=131 TOS=0x00 PREC=0x20 TTL=109 ID=14586 PROTO=UDP SPT=13662 DPT=33614 LEN=111 
eth0: Media Link Off
Is that normal ? Not only is it abnormally short (100 lines), but it contains only 'INPUT packet died' and 'Invalid packet'. What is up with that ?

Also, I have an 'rc.firewall' script generated by Alien Bob's EFG up and running.

Thanks beforehand for suggestions and theories, etc.
 
Old 11-11-2007, 03:49 PM   #2
tobyl
Member
 
Registered: Apr 2003
Location: uk
Distribution: slackware current
Posts: 743

Rep: Reputation: 50
DPT=33614

thats the clue....what app have you got with that port open?
given the diverse source IP's, it looks like a p2p app shut down, but peers still trying to connect

tobyl

Last edited by tobyl; 11-11-2007 at 03:54 PM. Reason: correction
 
Old 11-11-2007, 06:17 PM   #3
rworkman
Slackware Contributor
 
Registered: Oct 2004
Location: Tuscaloosa, Alabama (USA)
Distribution: Slackware
Posts: 1,913

Rep: Reputation: Disabled
Looks normal to me - you'll find a rule somewhere in your firewall script that logs dropped packets and prefixes them with "INPUT packet died:"
 
Old 11-12-2007, 02:58 AM   #4
H_TeXMeX_H
Guru
 
Registered: Oct 2005
Location: $RANDOM
Distribution: slackware64
Posts: 12,928
Blog Entries: 2

Original Poster
Rep: Reputation: 1269Reputation: 1269Reputation: 1269Reputation: 1269Reputation: 1269Reputation: 1269Reputation: 1269Reputation: 1269Reputation: 1269
In rc.firewall there is:
Quote:
# Log packets that still don't match
$IPT -A INPUT -m limit --limit 3/minute --limit-burst 3 -j LOG \
--log-prefix "INPUT packet died: "
Quote:
# Drop INVALID packets immediately
$IPT -A bad_packets -p ALL -m state --state INVALID -j LOG \
--log-prefix "Invalid packet: "
I'm not using port 33614. The only port being used is:
Quote:
bash-3.1$ socklist
type port inode uid pid fd name
tcp 631 13932 0 0 0
udp 67 14989 0 0 0
udp 631 13935 0 0 0
raw 1 14985 0 0 0
Quote:
bash-3.1$ nmap localhost

Starting Nmap 4.20 ( http://insecure.org ) at 2007-11-12 10:56 EET
Interesting ports on kafox.kafox.local (127.0.0.1):
Not shown: 1696 closed ports
PORT STATE SERVICE
631/tcp open ipp

Nmap finished: 1 IP address (1 host up) scanned in 0.161 seconds
port 631 is obviously used by cups.

I guess if it's normal, then it's fine. Thanks for the responses.

Last edited by H_TeXMeX_H; 11-12-2007 at 02:59 AM.
 
Old 11-12-2007, 01:52 PM   #5
tobyl
Member
 
Registered: Apr 2003
Location: uk
Distribution: slackware current
Posts: 743

Rep: Reputation: 50
Well it is a bit curious.
You were flooded with packets directed at one port from a lot of different sources.
So why do lots of people try to connect via udp to a particular host?
The two obvious ones that strike me are p2p and online gaming.

Had you been doing something of this sort, and then closed the application, I think you would see this behaviour.
Once you closed that app, the port would not show up in socklist.
Since you only scanned 1697 ports with nmap, you would not have seen port 33614 even if it were open.

The other possibilty that occurs to me, is that if you got a dynamically allocated IP address shortly after a previous user had released it, you may have been getting hits (probably legit) that were intended for the previous user.

hope I didn't bore you :-)

tobyl

Last edited by tobyl; 11-12-2007 at 01:55 PM. Reason: .
 
Old 11-12-2007, 02:52 PM   #6
H_TeXMeX_H
Guru
 
Registered: Oct 2005
Location: $RANDOM
Distribution: slackware64
Posts: 12,928
Blog Entries: 2

Original Poster
Rep: Reputation: 1269Reputation: 1269Reputation: 1269Reputation: 1269Reputation: 1269Reputation: 1269Reputation: 1269Reputation: 1269Reputation: 1269
No, it's not boring, it's interesting. I was most puzzled about why it's only 100 lines long, the entire output is usually much longer, but then I bet it only keeps a certain number of bytes available for output with the dmesg command at any one time.

I guess it was nothing. I panic sometimes for no good reason. Mostly when I can't understand something.
 
  


Reply

Tags
dmesg, invalid, packet


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off


Similar Threads
Thread Thread Starter Forum Replies Last Post
A packet filter using libipq which uses ether type field to capture the packet can26_manish Programming 2 10-16-2007 05:35 AM
dmesg Invalid packet H_TeXMeX_H Slackware 4 03-13-2007 12:07 PM
How To Stop a UDP Packet Flood ! murder Linux - Newbie 2 09-19-2005 10:14 AM
"INPUT Packet died" Messages Keep Appearing? Nickj Linux - Security 7 08-05-2005 08:48 AM
Bogus packet displayed in dmesg zulfilee Linux - Networking 0 06-23-2004 08:52 AM


All times are GMT -5. The time now is 01:18 AM.

Main Menu
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
identi.ca: @linuxquestions
Facebook: linuxquestions Google+: linuxquestions
Open Source Consulting | Domain Registration