netfilter-devel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Patrick McHardy <kaber@trash.net>
To: Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>
Cc: Pablo Neira Ayuso <pablo@netfilter.org>, netfilter-devel@vger.kernel.org
Subject: Re: [PATCH] Add support to log original and NAT-ed IP addresses
Date: Wed, 22 Apr 2009 17:59:32 +0200	[thread overview]
Message-ID: <49EF3EE4.1090204@trash.net> (raw)
In-Reply-To: <alpine.DEB.2.00.0904211939040.7297@blackhole.kfki.hu>

Jozsef Kadlecsik wrote:
> On Tue, 21 Apr 2009, Patrick McHardy wrote:
> 
>> I can see that it has some informational value, but for things like
>> locating infected hosts, why not simply look at the traffic before
>> it is NATed? I currently can't come up with a real use case for
>> this ...
> 
> The well-maintained sites manage to locate on-site infected machines by 
> using IDS, traffic-analysis, etc. However the typical user case for small 
> sites is that the ISP or other offsite host report an abuse: "your machine 
> x.y.z.w attacked machine a.b.c.d/added to the RBL because of spamming/etc" 
> - and the machine x.y.z.w is of course their firewall. And they have got 
> nothing which could help them to pick the real machine from the NATed 
> network behind the firewall. And the small sites is the main reason why 
> I'd favor an "out of the box" solution, which does not rely on anything 
> besides netfilter/iptables.

Yes, but at that point, you can look at your logfiles and see who
connected to a.b.c.d and you'll see the internal address. Logging
the NATed address is not really helping since you need the internal
address anyways, so it seems natural to look at the unNATed information.
What am I missing here?


  reply	other threads:[~2009-04-22 15:59 UTC|newest]

Thread overview: 15+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2009-04-20  9:21 [PATCH] Add support to log original and NAT-ed IP addresses Jozsef Kadlecsik
2009-04-20  9:58 ` Pablo Neira Ayuso
2009-04-20 10:12   ` Jozsef Kadlecsik
2009-04-20 10:33     ` Jan Engelhardt
2009-04-20 10:49       ` Jozsef Kadlecsik
2009-04-20 11:08     ` Pablo Neira Ayuso
2009-04-20 11:23       ` Jozsef Kadlecsik
2009-04-20 14:40         ` Patrick McHardy
2009-04-20 16:47           ` Jozsef Kadlecsik
2009-04-21 12:22             ` Patrick McHardy
2009-04-21 18:18               ` Jozsef Kadlecsik
2009-04-22 15:59                 ` Patrick McHardy [this message]
2009-04-22 20:39                   ` Jozsef Kadlecsik
2009-04-23 12:12                     ` Patrick McHardy
2009-04-24  8:06                       ` Jozsef Kadlecsik

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=49EF3EE4.1090204@trash.net \
    --to=kaber@trash.net \
    --cc=kadlec@blackhole.kfki.hu \
    --cc=netfilter-devel@vger.kernel.org \
    --cc=pablo@netfilter.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).