LinuxQuestions.org
Visit Jeremy's Blog.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 02-02-2005, 10:46 AM   #1
qwijibow
LQ Guru
 
Registered: Apr 2003
Location: nottingham england
Distribution: Gentoo
Posts: 2,672

Rep: Reputation: 47
router log: **Smurt** from 192.168.1.2


192.168.1.2 is the LAN address of my Gentoo Linux machine.

the router logs are full of **SMURT**
what does this mean ???

[code]
2005/01/31 18:20:08 : **Smurt** from 192.168.1.2
2005/01/31 17:00:03 : **Smurt** from 192.168.1.2
2005/01/31 15:39:58 : **Smurt** from 192.168.1.2
2005/01/31 14:59:54 : **Smurt** from 192.168.1.2
2005/01/31 14:39:49 : **Smurt** from 192.168.1.2
2005/01/31 14:29:45 : **Smurt** from 192.168.1.2
2005/01/31 14:24:42 : **Smurt** from 192.168.1.2
2005/01/31 13:11:01 : **Smurt** from 192.168.1.2
2005/01/31 12:30:57 : **Smurt** from 192.168.1.2
2005/01/31 12:10:52 : **Smurt** from 192.168.1.2
2005/01/31 12:00:48 : **Smurt** from 192.168.1.2
2005/01/31 11:55:45 : **Smurt** from 192.168.1.2
[code]

i am using a Q-tech home broadband router. (cheap, but supports NAT/ port forwarding, DMZ and DynDNS.org)

all google results are in languages i do not understand, thanks.
 
Old 02-02-2005, 11:02 AM   #2
peter_robb
Senior Member
 
Registered: Feb 2002
Location: Szczecin, Poland
Distribution: Gentoo, Debian
Posts: 2,458

Rep: Reputation: 48
I think it's a typo from the manufacturer.. could be SMURF
which is a spoofed icmp packet attack..
http://www.google.com/search?hl=en&l...e:SMURF+Attack
 
Old 02-02-2005, 11:16 AM   #3
qwijibow
LQ Guru
 
Registered: Apr 2003
Location: nottingham england
Distribution: Gentoo
Posts: 2,672

Original Poster
Rep: Reputation: 47
ill set my firewall to log all outgoing ICMP traffic, and see whatt turns up.
 
Old 02-02-2005, 11:39 AM   #4
qwijibow
LQ Guru
 
Registered: Apr 2003
Location: nottingham england
Distribution: Gentoo
Posts: 2,672

Original Poster
Rep: Reputation: 47
ahg !!!! HELP!

this is my firewall's OUTPUT chain

Code:
Chain OUTPUT (policy ACCEPT 13301 packets, 1445K bytes)
 pkts bytes target     prot opt in     out     source               destination
 1035 44212 LOG        icmp --  any    any     anywhere             anywhere            LOG level warning prefix `ICMP_'
shortly after adding th LOG rule, i logged 1035 hits !

all like this..

Quote:
ICMP_IN= OUT=lo SRC=192.168.1.2 DST=192.168.1.2 LEN=56 TOS=0x00 PREC=0xC0 TTL=64 ID=52925 PROTO=ICMP TYPE=3 CODE=1 [SRC=192.168.1.2 DST=192.168.1.198 LEN=28 TOS=0x00 PREC=0x00 TTL=64 ID=1734 DF PROTO=ICMP TYPE=8 CODE=0 ID=35185 SEQ=0 ]
ICMP_IN= OUT=lo SRC=192.168.1.2 DST=192.168.1.2 LEN=56 TOS=0x00 PREC=0xC0 TTL=64 ID=52926 PROTO=ICMP TYPE=3 CODE=1 [SRC=192.168.1.2 DST=192.168.1.199 LEN=28 TOS=0x00 PREC=0x00 TTL=64 ID=1735 DF PROTO=ICMP TYPE=8 CODE=0 ID=35185 SEQ=0 ]
ICMP_IN= OUT=lo SRC=192.168.1.2 DST=192.168.1.2 LEN=56 TOS=0x00 PREC=0xC0 TTL=64 ID=52927 PROTO=ICMP TYPE=3 CODE=1 [SRC=192.168.1.2 DST=192.168.1.200 LEN=28 TOS=0x00 PREC=0x00 TTL=64 ID=1736 DF PROTO=ICMP TYPE=8 CODE=0 ID=35185 SEQ=0 ]
ICMP_IN= OUT=lo SRC=192.168.1.2 DST=192.168.1.2 LEN=56 TOS=0x00 PREC=0xC0 TTL=64 ID=52928 PROTO=ICMP TYPE=3 CODE=1 [SRC=192.168.1.2 DST=192.168.1.201 LEN=28 TOS=0x00 PREC=0x00 TTL=64 ID=1737 DF PROTO=ICMP TYPE=8 CODE=0 ID=35185 SEQ=0 ]
ICMP_IN= OUT=lo SRC=192.168.1.2 DST=192.168.1.2 LEN=56 TOS=0x00 PREC=0xC0 TTL=64 ID=52929 PROTO=ICMP TYPE=3 CODE=1 [SRC=192.168.1.2 DST=192.168.1.202 LEN=28 TOS=0x00 PREC=0x00 TTL=64 ID=1738 DF PROTO=ICMP TYPE=8 CODE=0 ID=35185 SEQ=0 ]
ICMP_IN= OUT=lo SRC=192.168.1.2 DST=192.168.1.2 LEN=56 TOS=0x00 PREC=0xC0 TTL=64 ID=52930 PROTO=ICMP TYPE=3 CODE=1 [SRC=192.168.1.2 DST=192.168.1.203 LEN=28 TOS=0x00 PREC=0x00 TTL=64 ID=1739 DF PROTO=ICMP TYPE=8 CODE=0 ID=35185 SEQ=0 ]
ICMP_IN= OUT=lo SRC=192.168.1.2 DST=192.168.1.2 LEN=56 TOS=0x00 PREC=0xC0 TTL=64 ID=52931 PROTO=ICMP TYPE=3 CODE=1 [SRC=192.168.1.2 DST=192.168.1.204 LEN=28 TOS=0x00 PREC=0x00 TTL=64 ID=1740 DF PROTO=ICMP TYPE=8 CODE=0 ID=35185 SEQ=0 ]
ICMP_IN= OUT=lo SRC=192.168.1.2 DST=192.168.1.2 LEN=56 TOS=0x00 PREC=0xC0 TTL=64 ID=52932 PROTO=ICMP TYPE=3 CODE=1 [SRC=192.168.1.2 DST=192.168.1.205 LEN=28 TOS=0x00 PREC=0x00 TTL=64 ID=1741 DF PROTO=ICMP TYPE=8 CODE=0 ID=35185 SEQ=0 ]
ICMP_IN= OUT=lo SRC=192.168.1.2 DST=192.168.1.2 LEN=56 TOS=0x00 PREC=0xC0 TTL=64 ID=52933 PROTO=ICMP TYPE=3 CODE=1 [SRC=192.168.1.2 DST=192.168.1.206 LEN=28 TOS=0x00 PREC=0x00 TTL=64 ID=1742 DF PROTO=ICMP TYPE=8 CODE=0 ID=35185 SEQ=0 ]
ICMP_IN= OUT=lo SRC=192.168.1.2 DST=192.168.1.2 LEN=56 TOS=0x00 PREC=0xC0 TTL=64 ID=52934 PROTO=ICMP TYPE=3 CODE=1 [SRC=192.168.1.2 DST=192.168.1.207 LEN=28 TOS=0x00 PREC=0x00 TTL=64 ID=1743 DF PROTO=ICMP TYPE=8 CODE=0 ID=35185 SEQ=0 ]
ICMP_IN= OUT=lo SRC=192.168.1.2 DST=192.168.1.2 LEN=56 TOS=0x00 PREC=0xC0 TTL=64 ID=52935 PROTO=ICMP TYPE=3 CODE=1 [SRC=192.168.1.2 DST=192.168.1.208 LEN=28 TOS=0x00 PREC=0x00 TTL=64 ID=1744 DF PROTO=ICMP TYPE=8 CODE=0 ID=35185 SEQ=0 ]
ICMP_IN= OUT=lo SRC=192.168.1.2 DST=192.168.1.2 LEN=56 TOS=0x00 PREC=0xC0 TTL=64 ID=52936 PROTO=ICMP TYPE=3 CODE=1 [SRC=192.168.1.2 DST=192.168.1.209 LEN=28 TOS=0x00 PREC=0x00 TTL=64 ID=1745 DF PROTO=ICMP TYPE=8 CODE=0 ID=35185 SEQ=0 ]
ICMP_IN= OUT=lo SRC=192.168.1.2 DST=192.168.1.2 LEN=56 TOS=0x00 PREC=0xC0 TTL=64 ID=52937 PROTO=ICMP TYPE=3 CODE=1 [SRC=192.168.1.2 DST=192.168.1.210 LEN=28 TOS=0x00 PREC=0x00 TTL=64 ID=1746 DF PROTO=ICMP TYPE=8 CODE=0 ID=35185 SEQ=0 ]
ICMP_IN= OUT=lo SRC=192.168.1.2 DST=192.168.1.2 LEN=56 TOS=0x00 PREC=0xC0 TTL=64 ID=52938 PROTO=ICMP TYPE=3 CODE=1 [SRC=192.168.1.2 DST=192.168.1.211 LEN=28 TOS=0x00 PREC=0x00 TTL=64 ID=1747 DF PROTO=ICMP TYPE=8 CODE=0 ID=35185 SEQ=0 ]
ICMP_IN= OUT=lo SRC=192.168.1.2 DST=192.168.1.2 LEN=56 TOS=0x00 PREC=0xC0 TTL=64 ID=52939 PROTO=ICMP TYPE=3 CODE=1 [SRC=192.168.1.2 DST=192.168.1.212 LEN=28 TOS=0x00 PREC=0x00 TTL=64 ID=1748 DF PROTO=ICMP TYPE=8 CODE=0 ID=35185 SEQ=0 ]
ICMP_IN= OUT=lo SRC=192.168.1.2 DST=192.168.1.2 LEN=56 TOS=0x00 PREC=0xC0 TTL=64 ID=52940 PROTO=ICMP TYPE=3 CODE=1 [SRC=192.168.1.2 DST=192.168.1.213 LEN=28 TOS=0x00 PREC=0x00 TTL=64 ID=1749 DF PROTO=ICMP TYPE=8 CODE=0 ID=35185 SEQ=0 ]
ICMP_IN= OUT=lo SRC=192.168.1.2 DST=192.168.1.2 LEN=56 TOS=0x00 PREC=0xC0 TTL=64 ID=52941 PROTO=ICMP TYPE=3 CODE=1 [SRC=192.168.1.2 DST=192.168.1.214 LEN=28 TOS=0x00 PREC=0x00 TTL=64 ID=1750 DF PROTO=ICMP TYPE=8 CODE=0 ID=35185 SEQ=0 ]
ICMP_IN= OUT=lo SRC=192.168.1.2 DST=192.168.1.2 LEN=56 TOS=0x00 PREC=0xC0 TTL=64 ID=52942 PROTO=ICMP TYPE=3 CODE=1 [SRC=192.168.1.2 DST=192.168.1.215 LEN=28 TOS=0x00 PREC=0x00 TTL=64 ID=1751 DF PROTO=ICMP TYPE=8 CODE=0 ID=35185 SEQ=0 ]
ICMP_IN= OUT=lo SRC=192.168.1.2 DST=192.168.1.2 LEN=56 TOS=0x00 PREC=0xC0 TTL=64 ID=52943 PROTO=ICMP TYPE=3 CODE=1 [SRC=192.168.1.2 DST=192.168.1.216 LEN=28 TOS=0x00 PREC=0x00 TTL=64 ID=1752 DF PROTO=ICMP TYPE=8 CODE=0 ID=35185 SEQ=0 ]
somthing just pinged my whole 192.168.1.* !
and not from the outside, from my own linux box

rkhunter and f-prot found nothing.

ideas ???
 
Old 02-02-2005, 11:40 AM   #5
qwijibow
LQ Guru
 
Registered: Apr 2003
Location: nottingham england
Distribution: Gentoo
Posts: 2,672

Original Poster
Rep: Reputation: 47
panick averted... i think.....
could this be samba looking for hosts ???

it probably is...
 
Old 02-02-2005, 06:54 PM   #6
Capt_Caveman
Senior Member
 
Registered: Mar 2003
Distribution: Fedora
Posts: 3,658

Rep: Reputation: 69
Quote:
Originally posted by qwijibow
panick averted... i think.....
could this be samba looking for hosts ???

it probably is...
I doubt it. Those are ICMP host unreachable messages leaving the loopback adapter and have your box as the source AND destination addresses. Maybe you have some kind of firewall issue where you're mistakenly blocking internal traffic? If this was Samba looking for hosts, you'd expect it to be on the standard SMB ports. Try using tcpdump to capture some packets on various interfaces (especially lo) and make sure to use the -e option to dump the link level info (what you'd like to get is traffic to/from 192.168.1.2):

tcpdump -e -i <interface> src and dst host 192.168.1.2

Then look at the MAC addresses in the link level info to track down where the initial packets that generate the icmp errors are coming from.
 
Old 02-03-2005, 04:04 AM   #7
qwijibow
LQ Guru
 
Registered: Apr 2003
Location: nottingham england
Distribution: Gentoo
Posts: 2,672

Original Poster
Rep: Reputation: 47
my LISa daemon settings regarding finding new hosts...

Code:
Tell LISa how to search for hosts:
[ checked ] NetBIOS broadcasts
[ checked ] Send icmp pings to 192.168.1.2/255.255.255.0
If these packets are truely being output through lo (and not eth0) then how is my router logging them ???

i will start the tcp dump and post back here if i find an new info.
 
Old 02-03-2005, 04:10 AM   #8
qwijibow
LQ Guru
 
Registered: Apr 2003
Location: nottingham england
Distribution: Gentoo
Posts: 2,672

Original Poster
Rep: Reputation: 47
hmm....

ive been using

iptables -A INPUT -i lo -s 127.0.0.1 -d 127.0.0.1 -j ACCEPT
to allow internal traffic...

i assumed that internal traffic addressed by it eth0 address would have been allowed by my

iptables -A INPUT -m state --state ESTABLSIHED,RELATED -j ACCEPT
rule ???

the tcp dump rule you game me picks up rejected pings to my own eth0 address.

i am quite satisfied that my machine is not compromised, would you agree ?
 
Old 02-03-2005, 10:01 AM   #9
Capt_Caveman
Senior Member
 
Registered: Mar 2003
Distribution: Fedora
Posts: 3,658

Rep: Reputation: 69
Quote:
Originally posted by qwijibow
hmm....
ive been using
iptables -A INPUT -i lo -s 127.0.0.1 -d 127.0.0.1 -j ACCEPT
to allow internal traffic...
i assumed that internal traffic addressed by it eth0 address would have been allowed by my
iptables -A INPUT -m state --state ESTABLSIHED,RELATED -j ACCEPT
rule ???
the tcp dump rule you game me picks up rejected pings to my own eth0 address.
i am quite satisfied that my machine is not compromised, would you agree ?
I misread the log messages. If you look at each one, what is generating the msgs is an initial ICMP ping to a host on the 192.168.2.X network probably going out the external interface, which is immediately followed by a subsystem ICMP host unreachable through lo. The subsystem ICMP host unreachable (1st part of log msg) is what is getting logged and the iniitial ping is included in the log message for reference (2nd part of log msg). You can prove this to yourself by having tcpdump listen on lo and then ping a non-existant IP address, you should then see traffic to 192.168.1.2 from 192.168.1.2 over the loopback interface.

So it is LISa incrementally pinging each host on the network and not a compromise or someone trying to spoof IP addresses (as in a smurf attack). For some reason, the router is flagging the internal traffic generated by LISa as smurf, probably the ping to the network broadcast IPi what is getting flagged.

As for your iptables rules, as you can see from this example there are alot more types of traffic on lo addressed to IPs other than 127.0.0.1. I usually use:

iptables -i lo -j ACCEPT

and then just filter invalid IPs like 127.0.01 on the external interfaces.

Last edited by Capt_Caveman; 02-03-2005 at 10:02 AM.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Is someone on my network?! ::ffff:192.168.0.10:ssh ::ffff:192.168.0.:38201 ESTABLISHE ming0 Linux - Security 4 04-12-2005 01:04 AM
192.168.2.1 network with 192.168.0.1? Micro420 Linux - Networking 2 02-27-2005 06:59 AM
Iptables is converting -s 192.168.1.0/8 into 192.0.0.0/8 why !? qwijibow Linux - Security 2 01-26-2005 09:57 AM
Debian bound to IP address 192.168.0.101 when connected to D-link wireless router henrylcr Linux - Wireless Networking 4 01-28-2004 05:35 PM
All PCs behind router with one eth0 each. Shorewall ACCEPTetho:192.168.1.0/24 - bad ? cmisip Linux - Security 4 09-20-2003 02:13 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 04:49 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration