From owner-freebsd-stable@FreeBSD.ORG Sat Sep 20 14:05:35 2003 Return-Path: Delivered-To: freebsd-stable@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 4EDDE16A4B3 for ; Sat, 20 Sep 2003 14:05:35 -0700 (PDT) Received: from obsecurity.dyndns.org (adsl-64-169-107-253.dsl.lsan03.pacbell.net [64.169.107.253]) by mx1.FreeBSD.org (Postfix) with ESMTP id 516B743FE3 for ; Sat, 20 Sep 2003 14:05:33 -0700 (PDT) (envelope-from kris@obsecurity.org) Received: from rot13.obsecurity.org (rot13.obsecurity.org [10.0.0.5]) by obsecurity.dyndns.org (Postfix) with ESMTP id 34DE566D6A; Sat, 20 Sep 2003 14:05:28 -0700 (PDT) Received: by rot13.obsecurity.org (Postfix, from userid 1000) id 088C9A88; Sat, 20 Sep 2003 14:05:28 -0700 (PDT) Date: Sat, 20 Sep 2003 14:05:27 -0700 From: Kris Kennaway To: Pertti Kosunen Message-ID: <20030920210527.GB38264@rot13.obsecurity.org> References: <030501c37f99$4beb9500$0b00000a@arenanet.fi> Mime-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="St7VIuEGZ6dlpu13" Content-Disposition: inline In-Reply-To: <030501c37f99$4beb9500$0b00000a@arenanet.fi> User-Agent: Mutt/1.4.1i cc: freebsd-stable@freebsd.org Subject: Re: [snort] BAD-TRAFFIC loopback traffic 4.9-PRE X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 20 Sep 2003 21:05:35 -0000 --St7VIuEGZ6dlpu13 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Sat, Sep 20, 2003 at 08:04:46PM +0300, Pertti Kosunen wrote: > Source: 127.0.0.1:80 -> Destination: my.inet.ip: ports ~1025-1999 >=20 > >From snorts alert log file, these come ~1000 in a day: > [**] [1:528:4] BAD-TRAFFIC loopback traffic [**] > [Classification: Potentially Bad Traffic] [Priority: 2] > 09/19-22:52:46.419992 127.0.0.1:80 -> my.inet.ip:1821 > TCP TTL:127 TOS:0x0 ID:13627 IpLen:20 DgmLen:40 > ***A*R** Seq: 0x0 Ack: 0x59780001 Win: 0x0 TcpLen: 20 > [Xref =3D> http://rr.sans.org/firewall/egress.php] >=20 > What could cause this loopback traffic? Forged source address on a network with no egress filtering. Kris --St7VIuEGZ6dlpu13 Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.3 (FreeBSD) iD8DBQE/bMEXWry0BWjoQKURAruoAKCp45gglMFf89wgc2DogRC6m+b+uwCgq1LR RxmXDvyKuoVSi5VGZG+SwdU= =PI5C -----END PGP SIGNATURE----- --St7VIuEGZ6dlpu13--