1 |
>>>> I'm still getting the blocked outbound requests to port 3680 on my |
2 |
>>>> firewall and I'm running the above script (changed 993 to 3680) on the |
3 |
>>>> local system indicated by SRC in the firewall log, but mystery.log |
4 |
>>>> remains empty. I tested the script with other ports and it seems to |
5 |
>>>> be working fine. |
6 |
>>>> |
7 |
>>>> Also the MAC indicated in the firewall log is 14 blocks long and the |
8 |
>>>> local system in question has a MAC address 6 blocks long according to |
9 |
>>>> ifconfig, but the 6 blocks from ifconfig do match 6 of the blocks |
10 |
>>>> reported by the firewall. |
11 |
>>>> |
12 |
>>>> Does this make sense to anyone? |
13 |
>>> |
14 |
>>> Does not make sense to me, sorry. :-( |
15 |
>> |
16 |
>> Since my local firewall is rejecting the outbound requests, the time |
17 |
>> elapsed between the request and the block should be very short. Is it |
18 |
>> possible the 'sleep 1' portion of the script is causing the failure to |
19 |
>> log the connection request? The outbound connection is only attempted |
20 |
>> a few times per day. If so, how would you recommend fixing that? |
21 |
> |
22 |
> Try configuring your local firewall to log the request. There may be |
23 |
> something useful, such as logging an associated PID or user, that you |
24 |
> can add there. I don't know. |
25 |
> |
26 |
> Alternately, you could DROP the outbound packet rather than REJECT it; |
27 |
> that should cause the connecting process to wait several seconds until |
28 |
> it times out. |
29 |
|
30 |
I've just done this at your's and Michael Orlitzky's suggestion. |
31 |
Waiting for another connection attempt now. |
32 |
|
33 |
>> I'm also wondering if there is a command I could run on the |
34 |
>> router/firewall machine that would log something from the outbound |
35 |
>> request. Even if the information logged isn't useful, it would be |
36 |
>> nice to see a confirmation of the outbound requests logged from |
37 |
>> somewhere besides the firewall. |
38 |
> |
39 |
> Ow. We need to get a bit more specific. Is the 'local firewall' on the |
40 |
> connecting host, or is it on your router? |
41 |
|
42 |
The firewall runs on the router (which is a Gentoo system) in the local network. |
43 |
|
44 |
> As far as logging goes, you can set up a rule (prior to your DROP or |
45 |
> REJECT) with a target of LOG. The packet will show up in syslog. |
46 |
|
47 |
I just started running this on the router: |
48 |
|
49 |
tcpdump -i eth1 -n | grep the.offending.ip.address |
50 |
|
51 |
where eth1 is my LAN interface. I figure this will tell me if any |
52 |
requests are being made to the offending IP, including any that aren't |
53 |
being logged by the firewall. Nothing yet. |
54 |
|
55 |
- Grant |