[H-GEN] IP Traffic Monitoring

Russell Stuart russell at stuart.id.au
Wed Sep 10 17:38:50 EDT 2003


[ Humbug *General* list - semi-serious discussions about Humbug and     ]
[ Unix-related topics. Posts from non-subscribed addresses will vanish. ]

On Wed, 2003-09-10 at 18:49, Tony Nugent wrote:
> But if tcpdump can't "see" these (filtered?) packets, why does
> iptraf see it?  tcpdump is usually regarded as the semi-official
> reference tool for analysing network traffic...  :)

Yes, that is odd.  But others have told me tcpdump also can drop packets
under some conditions.

> > > Also, you should be able to gather "real" (crude raw) statistics
> > > from the relevant /proc/ files (eg "watch cat /proc/net/dev" and
> > > other similar spells).  You might also need to look at doing some
> > > tweaking to the kernel settings in /proc/sys/net/ipv4/*[2].
> > 
> > There was nothing obvious under /proc.
> 
> Perhaps nothing *obvious* :)
> 
> That would be ports 135 and 593 (along with 137-139).  And you
> should be seeing this sort of traffic in your packet dumps (if it is
> there).

Yes, I should of, and I didn't.  The only thing I did see was lots of
icmp echo requests, which apparently is one thing the worm(s) do. 
Another reason to suspect that tcpdump was not printing the packets for
some reason.

>   BTW, the latest rumours/information about the msblaster worm (and
>   who *didn't* see it? :) is that it was the cause of (or at the
>   very least a major contributing factor to) the recent massive
>   power failures in north america.  Idiots for using windows in
>   mission-critical situations... the US navy is still using winnt,
>   isn't it?  a bit of worry :)
> 
> > But according to
> > iptraf, roughly 50% of all incoming packets _still_ have bad checksums.
> 
> Still?  And as high as 50%?  I'm suspicious... was it flagging bad
> checksums before?  (You probably don't know).

Was it flagging bad checksums before: no.

> > I am still curious about where they are coming from.  My current theory
> > is that they are bad packets generated by the worms using a raw socket.
> 
> Perhaps... if you have those ports blocked, then perhaps this is why
> tcpdump isn't seeing them?  If you are, then you might want to log
> them with iptables just before the drop/reject rule.

Yes, that is a possibility.

>   I'm not sure at what "level" of the kernel packet handling tcpdump
>   and other such tools get their information, can anyone answer
>   that?  Eg, does it see all the traffic (raw), or only after
>   kernel-level and/or netfilter-level and/or routing-level
>   filtering.  Would promiscious mode make a difference? etc).
> 
> FWIW... I've just tried tcpdump and iptraf[1] on an ippp0 interface
> and saw nothing like you describe, all looks well.  There's a lot of
> one-hit port 135 traffic coming in[2], but nothing at all being
> flagged as having bad checksums.
> 
>   [1] rh7.3, kernel 2.4.20-20, hisax isdn driver, tcpdump 3.6.3-17,
>   iptraf 2.5.0-3
> 
>   [2] I wish telstra would block it everywhere (all netbios ports
>   mentioned above - if anyone needs it, well that's what VPNs are
>   all about).  I also wish telstra would filter viruses and spam out
>   of their customers' email... but I digress :)  
> 
> Good luck with figuring this out.



--
* This is list (humbug) general handled by majordomo at lists.humbug.org.au .
* Postings to this list are only accepted from subscribed addresses of
* lists 'general' or 'general-post'.  See http://www.humbug.org.au/



More information about the General mailing list