> When i woke up this morning and started to read my logs as usually, i found
> 5 strange packets, all from different times and source addresses.
> Im running on a kernel 2.2.7 with firewall ( Ipchains )
> abacus_sentry[591]: attackalert: Unknown packet type from host:
> some_ip/some_ip to TCP port: 111
> abacus_sentry[591]: attackalert: Packet Flags: SYN: 0 FIN: 0 ACK: 0 PSH: 0
> URG: 0 RST: 1
> abacus_sentry[591]: attackalert: some_ip has been blocked via wrappers.
> abacus_sentry[591]: attackalert: Host some_ip has been blocked via dropped
> route.
> I have ( atleast i think ) properly configured firewall, denying all
> incoming data, how come this packet got through my firewall?
> Is there any way to prevent this with ipchains ?
> I dont have any servers running, and i checked with tripwire that nothing
> was changed / ran chkrootkit ( paranoid? ;) ).
Looks like you have received a packet looking for a sunrpc port.
Portsentry seens to have stopped further attempts from that ip by using
tcpwrappers, and presumably adding a new rule to your ipchains rule set.
What is not clear, is how the packet got past your firewall script in
the first place.
I'd be willing to bet thta you are running a default policy of accept,
and that even though you have no services running, the packet still got
through and was caught by portsentry.
I'd be checking your ipchains rules to ensure that you are trapping
everything that you dont explicitly want to allow in.
Go to http://www.linux-firewall-tools.com for a design tool that will
make your life easy.
--
Regards
Luke
------
ego.sh comes with a self installer. It is a single threaded multi
process daemon application thats facilitates access to the infamous
game "rat race". Warning uninstalling may enhance system performance.
------
PLEASE NOTE: Spamgard (tm) installed.
------