LinuxQuestions.org
Visit Jeremy's Blog.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 03-21-2006, 01:54 AM   #1
math_physics
LQ Newbie
 
Registered: Jul 2005
Posts: 22

Rep: Reputation: 15
I got a suspicious link, what is it?


I got a link from port 718 of a remote host, whose ip address is 84.56.245.11.

The link state is always "ESTABLISHED".

I tried to use iptables to disable it, but it did not work.

I used this command :
iptable -I INPUT -s 84.56.245.11 -d my-ip-address -p tcp --dport 111 -j REJECT

and command "iptable -t filter -L " gives this message:

REJECT tcp -- dslb-084-056-245-011.pools.arcor-ip.net my-ip-address tcp dpt:sunrpc reject-with icmp-port-unreachable

What is this link? How can I disable it, if it is dangerous?

Thank you very much!
 
Old 03-21-2006, 01:55 AM   #2
math_physics
LQ Newbie
 
Registered: Jul 2005
Posts: 22

Original Poster
Rep: Reputation: 15
I got a suspicious link, what is it?

I got a link from port 718 of a remote host, whose ip address is 84.56.245.11, to my port 111 (sunrpc).

The link state is always "ESTABLISHED".

I tried to use iptables to disable it, but it did not work.

I used this command :
iptable -I INPUT -s 84.56.245.11 -d my-ip-address -p tcp --dport 111 -j REJECT

and command "iptable -t filter -L " gives this message:

REJECT tcp -- dslb-084-056-245-011.pools.arcor-ip.net my-ip-address tcp dpt:sunrpc reject-with icmp-port-unreachable

What is this link? How can I disable it, if it is dangerous?

Thank you very much!

Last edited by math_physics; 03-21-2006 at 01:58 AM.
 
Old 03-21-2006, 02:17 AM   #3
nixcraft
Member
 
Registered: Nov 2004
Location: BIOS
Distribution: RHEL3.0, FreeBSD 5.x, Debian 3.x, Soaris x86 v10
Posts: 379

Rep: Reputation: 30
Try
iptable -I INPUT -s 84.56.245.11 -j DROP

Above rule should drop any connection attempt from IP 84.56.245.11

To kill established connection use tcpkill (http://www.cyberciti.biz/howto/quest...ux-netstat.php); it is a good idea to block all incoming request
 
Old 03-21-2006, 02:42 AM   #4
nx5000
Senior Member
 
Registered: Sep 2005
Location: Out
Posts: 3,307

Rep: Reputation: 57
or if you don't manage to compile quickly enough tcpkill, you can reroute this IP to your localhost:


Code:
route add 84.56.245.11 gw 127.0.0.1
Doesn't replace iptable nor tcpkill but its a quick way to drop a connection at IP level
 
Old 03-21-2006, 03:03 AM   #5
jschiwal
LQ Guru
 
Registered: Aug 2001
Location: Fargo, ND
Distribution: SuSE AMD64
Posts: 15,733

Rep: Reputation: 683Reputation: 683Reputation: 683Reputation: 683Reputation: 683Reputation: 683
sunrpc is the port for the portmapper. This service runs if you use NFS for example.
This link may be useful.
http://probing.csx.cam.ac.uk/about/sunrpc.html

This page also links to a portmapper replacement, written by the same person to wrote postfix.
The replacement provides logging and ACLs.

If that IP address is suspect, you might consider blocking it out totally.

Last edited by jschiwal; 03-21-2006 at 03:05 AM.
 
Old 03-21-2006, 03:45 AM   #6
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,417
Blog Entries: 55

Rep: Reputation: 3622Reputation: 3622Reputation: 3622Reputation: 3622Reputation: 3622Reputation: 3622Reputation: 3622Reputation: 3622Reputation: 3622Reputation: 3622Reputation: 3622
@math_physics: //Moderator.note: unfortunately you have posted two similar messages in one forum, which is against the LQ Rules. Cross-posting and posting duplicates is considered bad netiquette on your part, a waste of resources on LQ's part and a waste of time for LQ members who take the time to read and answer your question(s). Please do not do that again. Your threads have been merged for everyones convenience.
 
Old 03-21-2006, 03:57 AM   #7
nx5000
Senior Member
 
Registered: Sep 2005
Location: Out
Posts: 3,307

Rep: Reputation: 57
To see why rpc is installed, you can get the registered rpc services by doing:
Code:
rpcinfo -p localhost
Could be famd,nfs for example

If you don't need these services, remove portmap

If you don't want to export anything to the outside but still want to keep portmap running you can restrict it with tcp_wrapper. To restrict it only to localhost, you can launch portmap to listen only to localhost.

In debian (maybe others) edit /etc/init.d/portmap
Code:
OPTIONS="-i 127.0.0.1"
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Logwatch: suspicious output mdw10 Linux - Security 2 02-18-2006 02:11 PM
suspicious sgi_fam behavior jbeiter Linux - Security 2 09-07-2004 05:24 AM
Suspicious modem-driver MadCactus Linux - Security 1 03-02-2004 05:26 PM
suspicious outbound connections di11rod Linux - Networking 13 01-23-2004 02:55 AM
Suspicious network traffic Config Linux - Security 9 03-09-2003 07:23 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 10:25 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration