All of lore.kernel.org
 help / color / mirror / Atom feed
* lots of tcp port 445 traffic
@ 2004-12-06 16:54 ro0ot
  2004-12-06 22:56 ` Paul Annesley
  2004-12-09 21:17 ` Jose Maria Lopez
  0 siblings, 2 replies; 5+ messages in thread
From: ro0ot @ 2004-12-06 16:54 UTC (permalink / raw)
  To: netfilter

Hi,

I get lots of tcp port 445 traffic when I do a tcpdump -n port 445, 
could it be an attack?

I check on the syslog files at /var/log/syslog, it shows this as below: -

Dec  7 00:36:40 fw01 kernel: Neighbour table overflow.
Dec  7 00:36:46 fw01 kernel: NET: 32 messages suppressed.
Dec  7 00:36:46 fw01 kernel: Neighbour table overflow.
Dec  7 00:36:51 fw01 kernel: NET: 27 messages suppressed.
Dec  7 00:36:51 fw01 kernel: Neighbour table overflow.
Dec  7 00:38:14 fw01 kernel: NET: 6 messages suppressed.
Dec  7 00:38:14 fw01 kernel: Neighbour table overflow.

When I try to ping my router IP address, I get this message below: -

connect: No buffer space available

I did tried running the below command and it seems not helping much: -

iptables -I cus2jarwan -p tcp --dport 445 -j REJECT --reject-with tcp-reset

or

iptables -I cus2jarwan -p tcp --dport 445 -j DROP

How can I stop this tcp port 445 traffic?  Or how can I prevent it?

Regards,
ro0ot





^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: lots of tcp port 445 traffic
  2004-12-06 16:54 lots of tcp port 445 traffic ro0ot
@ 2004-12-06 22:56 ` Paul Annesley
  2004-12-09 21:17 ` Jose Maria Lopez
  1 sibling, 0 replies; 5+ messages in thread
From: Paul Annesley @ 2004-12-06 22:56 UTC (permalink / raw)
  To: netfilter

On Tue, 07 Dec 2004 00:54:08 +0800, ro0ot <ro0ot@phreaker.net> wrote:
> Hi,
> 
> I get lots of tcp port 445 traffic when I do a tcpdump -n port 445,
> could it be an attack?

Many viruses hammer TCP port 445 attempting to exploit MS Windows
vulnerabilities.  They attempt to establish TCP sessions on dport 445
to a massive amount of P addresses.. this can fill up
/proc/net/ip_conntrack in no time, amongst other things.

> 
> I check on the syslog files at /var/log/syslog, it shows this as below: -
> 
> Dec  7 00:36:40 fw01 kernel: Neighbour table overflow.
> Dec  7 00:36:46 fw01 kernel: NET: 32 messages suppressed.
> Dec  7 00:36:46 fw01 kernel: Neighbour table overflow.
> Dec  7 00:36:51 fw01 kernel: NET: 27 messages suppressed.
> Dec  7 00:36:51 fw01 kernel: Neighbour table overflow.
> Dec  7 00:38:14 fw01 kernel: NET: 6 messages suppressed.
> Dec  7 00:38:14 fw01 kernel: Neighbour table overflow.
> 
> When I try to ping my router IP address, I get this message below: -
> 
> connect: No buffer space available
> 
> I did tried running the below command and it seems not helping much: -
> 
> iptables -I cus2jarwan -p tcp --dport 445 -j REJECT --reject-with tcp-reset
> 
> or
> 
> iptables -I cus2jarwan -p tcp --dport 445 -j DROP
> 

You definately don't want to use -J REJECT - this will do more harm
than good, as it will be generating an ICMP unreachable message for
each port 445 packet.

> How can I stop this tcp port 445 traffic?  Or how can I prevent it?

Use the drop rule you mentioned.  Apply it to INPUT and also FORWARD.

If possible;
- remove the viruses
- disable the infected computer(s) switch port(s) until cleaned
- unplug the infected computer(s) from the network until cleaned

Regards,
Paul

> 
> Regards,
> ro0ot
> 
>


^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: lots of tcp port 445 traffic
  2004-12-06 16:54 lots of tcp port 445 traffic ro0ot
  2004-12-06 22:56 ` Paul Annesley
@ 2004-12-09 21:17 ` Jose Maria Lopez
  2004-12-09 21:37   ` Paul Annesley
  1 sibling, 1 reply; 5+ messages in thread
From: Jose Maria Lopez @ 2004-12-09 21:17 UTC (permalink / raw)
  To: netfilter@lists.netfilter.org

El lun, 06 de 12 de 2004 a las 17:54, ro0ot escribió:
> Hi,
> 
> I get lots of tcp port 445 traffic when I do a tcpdump -n port 445, 
> could it be an attack?
> 
> I check on the syslog files at /var/log/syslog, it shows this as below: -
> 
> Dec  7 00:36:40 fw01 kernel: Neighbour table overflow.
> Dec  7 00:36:46 fw01 kernel: NET: 32 messages suppressed.
> Dec  7 00:36:46 fw01 kernel: Neighbour table overflow.
> Dec  7 00:36:51 fw01 kernel: NET: 27 messages suppressed.
> Dec  7 00:36:51 fw01 kernel: Neighbour table overflow.
> Dec  7 00:38:14 fw01 kernel: NET: 6 messages suppressed.
> Dec  7 00:38:14 fw01 kernel: Neighbour table overflow.
> 
> When I try to ping my router IP address, I get this message below: -
> 
> connect: No buffer space available
> 
> I did tried running the below command and it seems not helping much: -
> 
> iptables -I cus2jarwan -p tcp --dport 445 -j REJECT --reject-with tcp-reset
> 
> or
> 
> iptables -I cus2jarwan -p tcp --dport 445 -j DROP
> 
> How can I stop this tcp port 445 traffic?  Or how can I prevent it?
> 
> Regards,
> ro0ot
> 

I also receive tons of this kind of traffic, like anyone else,
I suppose. The way you stop them it's correct, maybe you don't
have the rule in the correct chain, because it works ok for me.

-- 
Jose Maria Lopez Hernandez
Director Tecnico de bgSEC
jkerouac@bgsec.com
bgSEC Seguridad y Consultoria de Sistemas Informaticos
http://www.bgsec.com
ESPAÑA

The only people for me are the mad ones -- the ones who are mad to live,
mad to talk, mad to be saved, desirous of everything at the same time,
the ones who never yawn or say a commonplace thing, but burn, burn, burn
like fabulous yellow Roman candles.
                -- Jack Kerouac, "On the Road"



^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: lots of tcp port 445 traffic
  2004-12-09 21:17 ` Jose Maria Lopez
@ 2004-12-09 21:37   ` Paul Annesley
  2004-12-10 13:52     ` ro0ot
  0 siblings, 1 reply; 5+ messages in thread
From: Paul Annesley @ 2004-12-09 21:37 UTC (permalink / raw)
  To: netfilter

> > iptables -I cus2jarwan -p tcp --dport 445 -j REJECT --reject-with tcp-reset
> >
> > or
> >
> > iptables -I cus2jarwan -p tcp --dport 445 -j DROP
> >
>
> You definately don't want to use -J REJECT - this will do more harm
> than good, as it will be generating an ICMP unreachable message for
> each port 445 packet.

My mistake - I didn't notice you were using "--reject-with tcp-reset".
Pretty sure you'd be better off with DROP anyway.

Regards,
Paul


^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: lots of tcp port 445 traffic
  2004-12-09 21:37   ` Paul Annesley
@ 2004-12-10 13:52     ` ro0ot
  0 siblings, 0 replies; 5+ messages in thread
From: ro0ot @ 2004-12-10 13:52 UTC (permalink / raw)
  To: Paul Annesley; +Cc: netfilter

I include these rules below and it helps: -

iptables -t nat -A PREROUTING -p tcp --dport 135 -j DROP
iptables -t nat -A PREROUTING -p tcp --dport 445 -j DROP


Paul Annesley wrote:

>>>iptables -I cus2jarwan -p tcp --dport 445 -j REJECT --reject-with tcp-reset
>>>
>>>or
>>>
>>>iptables -I cus2jarwan -p tcp --dport 445 -j DROP
>>>
>>>      
>>>
>>You definately don't want to use -J REJECT - this will do more harm
>>than good, as it will be generating an ICMP unreachable message for
>>each port 445 packet.
>>    
>>
>
>My mistake - I didn't notice you were using "--reject-with tcp-reset".
>Pretty sure you'd be better off with DROP anyway.
>
>Regards,
>Paul
>
>
>  
>


^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2004-12-10 13:52 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2004-12-06 16:54 lots of tcp port 445 traffic ro0ot
2004-12-06 22:56 ` Paul Annesley
2004-12-09 21:17 ` Jose Maria Lopez
2004-12-09 21:37   ` Paul Annesley
2004-12-10 13:52     ` ro0ot

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.