[lug] outgoing port 220 exploit?
David Anselmi
anselmi at anselmi.us
Mon Jan 19 09:24:07 MST 2004
As you've noticed, you can't sniff the packets if they are blocked by
ipchains. They wouldn't tell you anything more than the ipchains logs
tell you anyway - src/dst ip/port - since they aren't actually going
out. If you want to find out what the session is trying to do, open the
firewall and let it out. Then you can capture the whole session and
probably figure out quite a bit.
It is also problematic to figure out which process is trying to open the
connection. strace would tell you, if you knew which program to trace.
lsof will tell you, if you manage to run it while the socket it open.
Looking below the IP stack (where ipchains and tcpdump operate) won't
tell you. I don't see anything in /proc that connects processes to
sockets (not that I know what everything there means).
D. Stimits wrote:
[...]
>
> Ok I found out a pattern people might find interesting. More than one
> KRUD machine (so far KRUD 7.3 and 8.0) are both doing this. One after
> the other, as one tries an outbound port 220 from local port 6129, the
> other will also try the SAME outbound IP. So someone is doing something
> like a port scan that is triggering the port 220 relay attempt on
> separate machines. I am beginning to think the inbound trigger is some
> sort of broadcast or non-tcp trigger. Not sure yet.
You said these are SYN packets being blocked, right? Is the interval
regular? What destination IPs are there? Posting the relevant logs
might get you better answers.
As for both machines doing this, what is the timing? And what is the
difference between their clocks. You mentioned mozilla, could this be
the "check for new mail every 10 minutes" feature? Mozilla is an imap
client so maybe some built-in or misconfiguration is trying to use imap
(do you have any accounts set up in it that use imap?)
You can use tcpdump/ethereal to catch inbound traffic that triggers the
imap response but I doubt you'll see any. And if there is any it would
be to a port that you listen on (if the machine has been rooted you
can't trust it to show you the truth, obviously).
Dave
More information about the LUG
mailing list