Linux Netfilter discussions
 help / color / mirror / Atom feed
* using iptables to deny ipsec connections
       [not found] <S1752377AbYKKAIu/20081111000850Z+3277@vger.kernel.org>
@ 2008-11-11  0:22 ` Eric Lease Morgan
  2008-11-11  1:10   ` Grant Taylor
  0 siblings, 1 reply; 5+ messages in thread
From: Eric Lease Morgan @ 2008-11-11  0:22 UTC (permalink / raw)
  To: netfilter


How do I use iptables to deny IPSEC connections?

I am running iptables v1.3.8 on Fedora 5. On a regular basis a remote  
host connects to my machine and gobbles up more than 3 MB/sec of  
bandwidth, makes my swap space almost full, and always seems to be  
associated with a second, remote machine. Not only is this irritating  
but it is also embarrassing. I'm not sure, but I think remote machine  
one is talking to remote machine two.

I have a rule in /etc/sysconfig/iptables that looks like this (with IP  
changed to protect the guilty):

   -A RH-Firewall-1-INPUT -s 123.456.789.109 -j REJECT

I believe this rule says, "Reject any connections coming from  
123.456.789.109", but after I restart iptables the connections  
persist. Using ntop as my diagnostic tool, I see that 0% of the  
connections from 123.456.789.109 are IP-based but rather IPSEC-based.  
(Does such a thing make sense?)

How do I either: 1) deny any access to my machine from  
123.456.789.109, or 2) deny any connections that are IPSEC-based  
because I have no such need for IPSEC, I think. What is host  
123.456.789.109 exploiting?

-- 
Eric Lease Morgan
University of Notre Dame



^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: using iptables to deny ipsec connections
  2008-11-11  0:22 ` using iptables to deny ipsec connections Eric Lease Morgan
@ 2008-11-11  1:10   ` Grant Taylor
  2008-11-13  3:36     ` Eric Lease Morgan
  0 siblings, 1 reply; 5+ messages in thread
From: Grant Taylor @ 2008-11-11  1:10 UTC (permalink / raw)
  To: Mail List - Netfilter

On 11/10/2008 6:22 PM, Eric Lease Morgan wrote:
> How do I use iptables to deny IPSEC connections?

I'm not 100% sure, but I think you can block ESP, IP protocol 50.

> I am running iptables v1.3.8 on Fedora 5. On a regular basis a remote 
> host connects to my machine and gobbles up more than 3 MB/sec of 
> bandwidth, makes my swap space almost full, and always seems to be 
> associated with a second, remote machine. Not only is this irritating 
> but it is also embarrassing. I'm not sure, but I think remote machine 
> one is talking to remote machine two.

Do you have any thing IPSec related installed or in kernel?  (I don't 
use Fedora so I don't know what the default is.)

I find it very unlikely that one (or more) unknown system(s) are 
successfully negotiating an IPSec connection to your system with out 
your knowledge and help.  About the only way that I can see this 
happening is if your security has been breached and someone else with 
knowledge of IPSec set it up.

> I have a rule in /etc/sysconfig/iptables that looks like this (with IP 
> changed to protect the guilty):
> 
>   -A RH-Firewall-1-INPUT -s 123.456.789.109 -j REJECT
> 
> I believe this rule says, "Reject any connections coming from 
> 123.456.789.109", but after I restart iptables the connections persist.

Well, the simple act of matching based on the source and rejecting is 
correct.  However, like I said above, I don't know any thing about 
Fedora so I can't say any thing to the RH-Firewall-1-INPUT chain being 
referenced.

Also, does the rule persist after you restart your firewall, or is it 
getting flushed out when you restart the firewall?

> Using ntop as my diagnostic tool, I see that 0% of the connections from 
> 123.456.789.109 are IP-based but rather IPSEC-based. (Does such a thing 
> make sense?)

Well, IPSec's ESP rides on top of IP, so, I'm not quite sure why this is 
worded the way that it is.

> How do I either: 1) deny any access to my machine from 123.456.789.109, 
> or 2) deny any connections that are IPSEC-based because I have no such 
> need for IPSEC, I think. What is host 123.456.789.109 exploiting?

A simple IPTables rule like above /should/ do what you are wanting.  I 
have a feeling that something else here is in play here with out your 
knowledge.

Do you have a capture of any of the traffic?



Grant. . . .

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: using iptables to deny ipsec connections
  2008-11-11  1:10   ` Grant Taylor
@ 2008-11-13  3:36     ` Eric Lease Morgan
  2008-11-13 17:44       ` Bill Chappell
  2008-11-13 17:49       ` Bill Chappell
  0 siblings, 2 replies; 5+ messages in thread
From: Eric Lease Morgan @ 2008-11-13  3:36 UTC (permalink / raw)
  To: netfilter


On Nov 10, 2008, at 8:10 PM, Grant Taylor wrote:

>> How do I use iptables to deny IPSEC connections?
>
> I'm not 100% sure, but I think you can block ESP, IP protocol 50.


Thank you for the prompt reply, but I have not been able to resolve my  
problem. I still have a remote host that seems to be connecting to my  
machine, doing something, and communicating with another machine. I am  
unable to determine what port they are using, nor what application  
they are running. Frustrating and embarrassing.

I believe I have turned off IP protocol 50:

   -A RH-Firewall-1-INPUT -p 50 -j REJECT


>> I am running iptables v1.3.8 on Fedora 5. On a regular basis a  
>> remote host connects to my machine and gobbles up more than 3 MB/ 
>> sec of bandwidth, makes my swap space almost full, and always seems  
>> to be associated with a second, remote machine. Not only is this  
>> irritating but it is also embarrassing. I'm not sure, but I think  
>> remote machine one is talking to remote machine two.
>
> Do you have any thing IPSec related installed or in kernel?  (I  
> don't use Fedora so I don't know what the default is.)

I'm sorry, but I do not know how to check whether or not anything  
related to IPSec is installed or in kernel.



>> I have a rule in /etc/sysconfig/iptables that looks like this (with  
>> IP changed to protect the guilty):
>>  -A RH-Firewall-1-INPUT -s 123.456.789.109 -j REJECT
>> I believe this rule says, "Reject any connections coming from  
>> 123.456.789.109", but after I restart iptables the connections  
>> persist.
>
> Well, the simple act of matching based on the source and rejecting  
> is correct.  However, like I said above, I don't know any thing  
> about Fedora so I can't say any thing to the RH-Firewall-1-INPUT  
> chain being referenced.
>
> Also, does the rule persist after you restart your firewall, or is  
> it getting flushed out when you restart the firewall?

The offending host seems to go by three identities, a name and two IP  
addresses:

   * host-50-65-23-65.ussignalcom.net
   * 65.23.65.50
   * 208.69.36.132

At the beginning of my /etc/sysconfig/iptables file I have put the  
following, and restarted iptables, but the diagnostic tool I am using  
(ntop) still reports connections from the host:

   -A RH-Firewall-1-INPUT -s 65.23.65.50 -j REJECT
   -A RH-Firewall-1-INPUT -s 208.69.36.132 -j REJECT

Ironically, when I use netstat (netstat -a) I do not see any of the  
three hosts, above, listed. Yes, when I do something like iptables -- 
list the hosts are listed as being rejected, but the IP addresses are  
being translated into domain names:

   REJECT all -- host-50-65-23-65.ussignalcom.net anywhere reject-with  
icmp-port-unreachable


> Do you have a capture of any of the traffic?

I'm sorry, but I do not know how to capture the traffic. Can you tell  
me how to do this?

In short, I seem to have some host (host-50-65-23-65.ussignalcom.net)  
connecting to my computer, running an unknown process, and sending  
output to a second host (artemis49.hitherward.info). How can I see  
more directly what is going on here and stop it?

-- 
Eric Lease Morgan
University of Notre Dame


^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: using iptables to deny ipsec connections
  2008-11-13  3:36     ` Eric Lease Morgan
@ 2008-11-13 17:44       ` Bill Chappell
  2008-11-13 17:49       ` Bill Chappell
  1 sibling, 0 replies; 5+ messages in thread
From: Bill Chappell @ 2008-11-13 17:44 UTC (permalink / raw)
  To: netfilter

Since you know the destination host, put LOG and DROP
rules in your OUTPUT chain with that destination.
That way if someone internally legitimately tries
to connect to the destination, you will know.  Or
even illegitimately, if your someone has a rogue
bot running on it.
To get the IP address of the "other end", I would
use nslookup, repeatedly, in case it has multiple
IP addresses.
I know this is not a clean solution, but it should
help both with cutting down the traffic and maybe
with identifying it.

Bill Chappell

Eric Lease Morgan wrote:
> 
> On Nov 10, 2008, at 8:10 PM, Grant Taylor wrote:
> 
>>> How do I use iptables to deny IPSEC connections?
>>
>> I'm not 100% sure, but I think you can block ESP, IP protocol 50.
> 
> 
> Thank you for the prompt reply, but I have not been able to resolve my 
> problem. I still have a remote host that seems to be connecting to my 
> machine, doing something, and communicating with another machine. I am 
> unable to determine what port they are using, nor what application they 
> are running. Frustrating and embarrassing.
> 
> I believe I have turned off IP protocol 50:
> 
>   -A RH-Firewall-1-INPUT -p 50 -j REJECT
> 
> 
>>> I am running iptables v1.3.8 on Fedora 5. On a regular basis a remote 
>>> host connects to my machine and gobbles up more than 3 MB/sec of 
>>> bandwidth, makes my swap space almost full, and always seems to be 
>>> associated with a second, remote machine. Not only is this irritating 
>>> but it is also embarrassing. I'm not sure, but I think remote machine 
>>> one is talking to remote machine two.
>>
>> Do you have any thing IPSec related installed or in kernel?  (I don't 
>> use Fedora so I don't know what the default is.)
> 
> I'm sorry, but I do not know how to check whether or not anything 
> related to IPSec is installed or in kernel.
> 
> 
> 
>>> I have a rule in /etc/sysconfig/iptables that looks like this (with 
>>> IP changed to protect the guilty):
>>>  -A RH-Firewall-1-INPUT -s 123.456.789.109 -j REJECT
>>> I believe this rule says, "Reject any connections coming from 
>>> 123.456.789.109", but after I restart iptables the connections persist.
>>
>> Well, the simple act of matching based on the source and rejecting is 
>> correct.  However, like I said above, I don't know any thing about 
>> Fedora so I can't say any thing to the RH-Firewall-1-INPUT chain being 
>> referenced.
>>
>> Also, does the rule persist after you restart your firewall, or is it 
>> getting flushed out when you restart the firewall?
> 
> The offending host seems to go by three identities, a name and two IP 
> addresses:
> 
>   * host-50-65-23-65.ussignalcom.net
>   * 65.23.65.50
>   * 208.69.36.132
> 
> At the beginning of my /etc/sysconfig/iptables file I have put the 
> following, and restarted iptables, but the diagnostic tool I am using 
> (ntop) still reports connections from the host:
> 
>   -A RH-Firewall-1-INPUT -s 65.23.65.50 -j REJECT
>   -A RH-Firewall-1-INPUT -s 208.69.36.132 -j REJECT
> 
> Ironically, when I use netstat (netstat -a) I do not see any of the 
> three hosts, above, listed. Yes, when I do something like iptables 
> --list the hosts are listed as being rejected, but the IP addresses are 
> being translated into domain names:
> 
>   REJECT all -- host-50-65-23-65.ussignalcom.net anywhere reject-with 
> icmp-port-unreachable
> 
> 
>> Do you have a capture of any of the traffic?
> 
> I'm sorry, but I do not know how to capture the traffic. Can you tell me 
> how to do this?
> 
> In short, I seem to have some host (host-50-65-23-65.ussignalcom.net) 
> connecting to my computer, running an unknown process, and sending 
> output to a second host (artemis49.hitherward.info). How can I see more 
> directly what is going on here and stop it?
> 

-- 
William Chappell, Software Engineer, Critical Technologies Inc.
* Creativity * Diversity * Expertise * Flexibility * Integrity *
Suite 400 Technology Center, 4th Floor 1001 Broad St, Utica NY 13501
315-793-0248 x148 FAX -9710 <bill.chappell@critical.com> www.critical.com

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: using iptables to deny ipsec connections
  2008-11-13  3:36     ` Eric Lease Morgan
  2008-11-13 17:44       ` Bill Chappell
@ 2008-11-13 17:49       ` Bill Chappell
  1 sibling, 0 replies; 5+ messages in thread
From: Bill Chappell @ 2008-11-13 17:49 UTC (permalink / raw)
  To: netfilter

Addition to previous response:

Besides INPUT (and OUTPUT), put your rules
in FORWARD.
If an internal box is involved, too, traffic
to and from it will be in the FORWARD chain.

Bill Chappell


Eric Lease Morgan wrote:
> 
> On Nov 10, 2008, at 8:10 PM, Grant Taylor wrote:
> 
>>> How do I use iptables to deny IPSEC connections?
>>
>> I'm not 100% sure, but I think you can block ESP, IP protocol 50.
> 
> 
> Thank you for the prompt reply, but I have not been able to resolve my 
> problem. I still have a remote host that seems to be connecting to my 
> machine, doing something, and communicating with another machine. I am 
> unable to determine what port they are using, nor what application they 
> are running. Frustrating and embarrassing.
> 
> I believe I have turned off IP protocol 50:
> 
>   -A RH-Firewall-1-INPUT -p 50 -j REJECT
> 
> 
>>> I am running iptables v1.3.8 on Fedora 5. On a regular basis a remote 
>>> host connects to my machine and gobbles up more than 3 MB/sec of 
>>> bandwidth, makes my swap space almost full, and always seems to be 
>>> associated with a second, remote machine. Not only is this irritating 
>>> but it is also embarrassing. I'm not sure, but I think remote machine 
>>> one is talking to remote machine two.
>>
>> Do you have any thing IPSec related installed or in kernel?  (I don't 
>> use Fedora so I don't know what the default is.)
> 
> I'm sorry, but I do not know how to check whether or not anything 
> related to IPSec is installed or in kernel.
> 
> 
> 
>>> I have a rule in /etc/sysconfig/iptables that looks like this (with 
>>> IP changed to protect the guilty):
>>>  -A RH-Firewall-1-INPUT -s 123.456.789.109 -j REJECT
>>> I believe this rule says, "Reject any connections coming from 
>>> 123.456.789.109", but after I restart iptables the connections persist.
>>
>> Well, the simple act of matching based on the source and rejecting is 
>> correct.  However, like I said above, I don't know any thing about 
>> Fedora so I can't say any thing to the RH-Firewall-1-INPUT chain being 
>> referenced.
>>
>> Also, does the rule persist after you restart your firewall, or is it 
>> getting flushed out when you restart the firewall?
> 
> The offending host seems to go by three identities, a name and two IP 
> addresses:
> 
>   * host-50-65-23-65.ussignalcom.net
>   * 65.23.65.50
>   * 208.69.36.132
> 
> At the beginning of my /etc/sysconfig/iptables file I have put the 
> following, and restarted iptables, but the diagnostic tool I am using 
> (ntop) still reports connections from the host:
> 
>   -A RH-Firewall-1-INPUT -s 65.23.65.50 -j REJECT
>   -A RH-Firewall-1-INPUT -s 208.69.36.132 -j REJECT
> 
> Ironically, when I use netstat (netstat -a) I do not see any of the 
> three hosts, above, listed. Yes, when I do something like iptables 
> --list the hosts are listed as being rejected, but the IP addresses are 
> being translated into domain names:
> 
>   REJECT all -- host-50-65-23-65.ussignalcom.net anywhere reject-with 
> icmp-port-unreachable
> 
> 
>> Do you have a capture of any of the traffic?
> 
> I'm sorry, but I do not know how to capture the traffic. Can you tell me 
> how to do this?
> 
> In short, I seem to have some host (host-50-65-23-65.ussignalcom.net) 
> connecting to my computer, running an unknown process, and sending 
> output to a second host (artemis49.hitherward.info). How can I see more 
> directly what is going on here and stop it?
> 

-- 
William Chappell, Software Engineer, Critical Technologies Inc.
* Creativity * Diversity * Expertise * Flexibility * Integrity *
Suite 400 Technology Center, 4th Floor 1001 Broad St, Utica NY 13501
315-793-0248 x148 FAX -9710 <bill.chappell@critical.com> www.critical.com

^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2008-11-13 17:49 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
     [not found] <S1752377AbYKKAIu/20081111000850Z+3277@vger.kernel.org>
2008-11-11  0:22 ` using iptables to deny ipsec connections Eric Lease Morgan
2008-11-11  1:10   ` Grant Taylor
2008-11-13  3:36     ` Eric Lease Morgan
2008-11-13 17:44       ` Bill Chappell
2008-11-13 17:49       ` Bill Chappell

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox