- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - Linux
- >
- blocked IP addresses coming through on netwatch
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-10-2003 04:13 PM
11-10-2003 04:13 PM
blocked IP addresses coming through on netwatch
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-10-2003 05:05 PM
11-10-2003 05:05 PM
Re: blocked IP addresses coming through on netwatch
Give us some details on the topography if you could (lan cards, basic router layout) and a look at your firewall rules (iptables -nvL & iptables -nvL -t nat).
The /etc/hosts.{allow,deny} files are only for services connecting to the host, not beyond it.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-10-2003 08:18 PM
11-10-2003 08:18 PM
Re: blocked IP addresses coming through on netwatch
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-10-2003 08:55 PM
11-10-2003 08:55 PM
Re: blocked IP addresses coming through on netwatch
wow..
Ok.
'netwatch' I take it uses libpcap to grab traffic (like 'tcpdump'), yes?
If so, you'll see all requests *PRIOR* to being MASQUERADE'd, as well as the after MASQ, so you should be seeing two.
If it's UDP 123, I'd assume it's being accepted by global ACCEPT on the INETOUT chain, and by :
112 8512 UDPACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:123
on the INETIN chain (for the record, the LOG rule will never get hit in UDPACCEPT, as the 'ACCEPT' above it will just bypass it).
This make sense thus far? (sorry, have answered a dozen phone calls, converted half a dozen databases, and have beaten my head against the desk countless times in the time it's taken to write this little bit :P ).
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-11-2003 08:04 AM
11-11-2003 08:04 AM
Re: blocked IP addresses coming through on netwatch
I can see from the configuration that you seem to be running a dmz and and external firewall on the same server.
Thats a design issue. The external firewall should be on on machine, the internal boundry another piece of hardware.
I would suggest at this point to activate iptables logging feature(It will go to /var/log/messages). That will gather you data on whats going on.
I may be wrong on the dmz issue, having misinterpreted your data. I would consider simplifying the setup if possible. I'm wondering what you are using squid for and what benefits it provides. Also, if all ports except secure shell are blocked, why is NTP working?
I'm missing something. I find your issue intellectually stimulating and wish to work on it further.
SEP
Owner of ISN Corporation
http://isnamerica.com
http://hpuxconsulting.com
Sponsor: http://hpux.ws
Twitter: http://twitter.com/hpuxlinux
Founder http://newdatacloud.com
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-11-2003 08:35 AM
11-11-2003 08:35 AM
Re: blocked IP addresses coming through on netwatch
As far as I understand it, you set up an histeresis restraining packets quantity to 2/s, but you still accept packets in this limit.
If 192.168.0.100 is trying to connect to sth outside, depending on its configuration, it'll address you (input from eth1), or may address directly outside, forcing forward rule.
INPUT is read as ACCEPT from eth1. Packets go out, isn't it ?
On their way back, packets are accepted for several standard ports, and if they are related, which is the case if 0.100 initiate connection. Am I wrong ?
Forward is read as targeted to inetout, which can be read as accept, isn't it ?
Same comment as Input on their way back.
In this case, I see 0.100 initiating and maintaining connection without any problem, and same scenario for many other machines in internal part.
So will NTP work from the inside. Am I too tired and missing the main issue ?
As said, deny is for localhost, not for firewall rule. Steven suggests a good idea on setting up precise logs to see what connects from 0.100. A rootkit can be easily hidden from any chkrootkit tool. What did you use to check ?
hth
J
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-11-2003 03:08 PM
11-11-2003 03:08 PM
Re: blocked IP addresses coming through on netwatch
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-11-2003 03:32 PM
11-11-2003 03:32 PM
Re: blocked IP addresses coming through on netwatch
Since there is a s suspcion of a rootkit, ie some kind of hack, I think it would be prudent to turn on iptables logging.
I totally agree with Jerome. Your rules list is too complex, and has obviously been breached.
Stuart is the best around here, and his suggestion will probably work out.
As an experienced administrator, I'll say you are doing what should be a simple job in a complex way. You are using too many rules, too many products based on the information provided in the original post.
Your presentation and subsequent information is incomplete. I use iptables to provide NAT access to my private office network. I'm not using squid and am uploading my iptables file(slightly edited) as a reference. I've purposely altered the external IP addresses for my network.
My firewall is working just fine.
I don't want any points for this. Good Luck.
SEP
Owner of ISN Corporation
http://isnamerica.com
http://hpuxconsulting.com
Sponsor: http://hpux.ws
Twitter: http://twitter.com/hpuxlinux
Founder http://newdatacloud.com
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-11-2003 04:09 PM
11-11-2003 04:09 PM
Re: blocked IP addresses coming through on netwatch
The one here at work though wouldn't make sense unless I also threw in all the routing rules :P Go mangle table and 'ip rule's :)
(The joys of having 3-5 external network connections!)
But yes, am a big fan of '--state ESTABLISHED,RELATED'. You can cover so may things with that one rule.
Forward chain for instance is as simple as:
Chain FORWARD (policy DROP 543K packets, 48M bytes)
pkts bytes target prot opt in out source destination
4940K 2623M ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
220K 20M ACCEPT all -- eth0 eth1 192.168.200.0/24 0.0.0.0/0 state NEW
543K 48M LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 4 prefix `FORWARD:'
Anyway.. Fun..
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-11-2003 04:40 PM
11-11-2003 04:40 PM