Date: Wed, 26 Jan 2000 20:25:12 -0800 (PST) From: Matthew Dillon <dillon@apollo.backplane.com> To: Brett Glass <brett@lariat.org> Cc: security@FreeBSD.ORG Subject: Re: Riddle me this Message-ID: <200001270425.UAA18744@apollo.backplane.com> References: <200001270355.UAA01355@lariat.lariat.org>
next in thread | previous in thread | raw e-mail | index | archive | help
:A fellow here in town asked me to look at a machine which he thought had been :attacked. Sure enough, when I checked the logs, I saw : :Jan 24 19:18:59 victim /kernel: icmp-response bandwidth limit 108/100 pps :Jan 24 19:19:37 victim /kernel: icmp-response bandwidth limit 115/100 pps :Jan 24 19:19:38 victim /kernel: icmp-response bandwidth limit 131/100 pps :Jan 24 19:19:39 victim /kernel: icmp-response bandwidth limit 135/100 pps :Jan 24 19:19:40 victim /kernel: icmp-response bandwidth limit 104/100 pps :Jan 24 19:20:12 victim /kernel: icmp-response bandwidth limit 146/100 pps :Jan 24 19:20:13 victim /kernel: icmp-response bandwidth limit 127/100 pps :Jan 24 19:20:14 victim /kernel: icmp-response bandwidth limit 127/100 pps :Jan 24 19:20:15 victim /kernel: icmp-response bandwidth limit 118/100 pps : :which means that ICMP bandwidth limiting had kicked in. Probably stream.c, I :thought. While this seemed to be keeping the system alive, I noted that the :machine was also acting as a router for a private subnet with some Windows :machines on it. So, since multicast IP wasn't in use, I added IPFW rules that :blocked multicast addresses on all interfaces: : :00049 deny ip from 224.0.0.0/4 to any via any :00050 deny ip from any to 224.0.0.0/4 via any : :So far, so good. But a couple of days later, when I checked the logs, I saw: : :Jan 26 15:23:49 victim natd[125]: failed to write packet back (No route to host) : :Maybe I'm just dense this evening and the cause of the message is obvious, but :I can't figure out what would have generated this message. The system has a :static default route to the upstream ISP's router. : :Is this a side effect of the rules I added? Or of something else? : :--Brett Glass Well, certainly the 'failed to write packet back' has nothing to do with the icmp bandwidth limiting -- the bandwidth limiting drops packets, the sender would not see an error. Also, the bandwidth limiting only drops kernel-generated icmp response packets for certain specific cases unrelated to NAT. It's hard to say without doing a continuous tcpdump but the most likely possibility is that someone was playing a game or doing something else related to sending and receiving UDP packets, and then disconnected. Either that or it was a really dumb hacker attacking the machine (at only 120 pps). What likely occured in the Jan 24 logs was some sort of continuous problem for the time range indicated (19:18:59 -> 19:20:15), but only exceeding the 100 pps threshold at a couple of points during that period. It would be interesting to see if there is some sort of continuing problem by reducing the limit from 100 to 50, 20, 10, and so forth, and seeing if it catches anything. If you find a potential problem then raise the limit back up again and capture a bunch of packets with tcpdump and see if you can locate the problem (use the -l option to tcpdump and then grep for icmp packets). -Matt Matthew Dillon <dillon@backplane.com> To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200001270425.UAA18744>