From owner-freebsd-security@FreeBSD.ORG Tue Jul 18 16:11:54 2006 Return-Path: X-Original-To: freebsd-security@freebsd.org Delivered-To: freebsd-security@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 1ED0416A4E0 for ; Tue, 18 Jul 2006 16:11:54 +0000 (UTC) (envelope-from claim@rinux.net) Received: from rinux.net (rinux.net [81.169.157.144]) by mx1.FreeBSD.org (Postfix) with ESMTP id A21D443D45 for ; Tue, 18 Jul 2006 16:11:53 +0000 (GMT) (envelope-from claim@rinux.net) Received: from localhost (localhost [127.0.0.1]) by rinux.net (Postfix) with ESMTP id B058D353073 for ; Tue, 18 Jul 2006 18:11:51 +0200 (CEST) X-Virus-Scanned: by amavisd-new using F-Prot/ClamAV at rinux.net Received: from rinux.net ([127.0.0.1]) by localhost (rinux.net [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QFIbrUflTSfC for ; Tue, 18 Jul 2006 18:11:49 +0200 (CEST) Received: from [10.0.0.3] (i5387891F.versanet.de [83.135.137.31]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by rinux.net (Postfix) with ESMTP id A7C8B3530BE for ; Tue, 18 Jul 2006 18:11:49 +0200 (CEST) Message-ID: <44BD0846.6060405@rinux.net> Date: Tue, 18 Jul 2006 18:11:50 +0200 From: Clemens Renner User-Agent: Thunderbird 1.5.0.4 (Windows/20060516) MIME-Version: 1.0 To: freebsd-security@freebsd.org Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Subject: Port scan from Apache? X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 18 Jul 2006 16:11:54 -0000 Hi everyone, today I got an e-mail from a company claiming that my server is doing port scans on their firewall machine. I found that hard to believe so I started checking the box. The company rep told me that the scan was originating at port 80 with destination port 8254 on their machine. I couldn't find any hints as to why that computer was subject to the alleged port scans. Searching in logs and crontab entries did not reveal the domain name or IP address of the machine except for my web mailer. It seems that someone from the company's network is accessing the web mailer in 10-15 minute intervals which is absolutely believable since one of my users works for the company and checks his mail via the web mailer. The strange part is that the company rep said these scans started some time on Sunday, while my user definitely was not using the company's hardware. Apparently, the company uses NetScreen hardware and/or software for such intrusion detection / prevention mechanisms and the log he provided read: [Root]system-alert-00016: Port scan! From $my-server-ip:80 to $their-server-ip:8254, proto TCP (zone Untrust, int ethernet1). Occurred 1 times. My questions are: 1. Can this be malicious code on my side? Both port 80 and 443 are bound to Apache's httpd so they shouldn't be available to other processes, right? 2. I'm using ipfw as a firewall where everything is denied except for a rather tight permitting ruleset that (of course) allows communication to/from port 80/443 on my machine but not to the destination port 8254. If the firewall prohibits access to a remote port 8254, processes on my side shouldn't be able to initiate a connection to that port. If there is a connection to that port, it had to be established earlier by the remote machine. Am I correct? 3. Does anyone know when the NetScreen hardware / software labels something "port scan"? As far as I can tell, the server is free of malicious code, I especially looked for PHP (and similar) files belonging to freely available port scanners etc.; everything seems to be alright. While I was investigating, no one but me was logged in. Any help is greatly appreciated! Clemens