Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 20 Sep 1998 12:23:41 -0700 (PDT)
From:      "Jan B. Koum " <jkb@best.com>
To:        freebsd-security@FreeBSD.ORG
Cc:        john <john@unt.edu>
Subject:   Re: Are we vulnerable to "stealth" port scans? 
Message-ID:  <Pine.BSF.4.02A.9809201216330.1204-100000@shell6.ba.best.com>
In-Reply-To: <8631.906017885@critter.freebsd.dk>

next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, 17 Sep 1998, Poul-Henning Kamp wrote:

>
>patches ?
>
>In message <Pine.BSF.4.02A.9809162329390.28001-100000@shell6.ba.best.com>, "Jan
> B. Koum " writes:
>>
>>	I wouldn't use the word "vulnerable", but yes, most TCP stacks
>>will in one way or another respond to Steal scans. On my system I modifed
>>kernel to log via net.inet.tcp.log_in_vain sysctl variable not only SYN
>>packets but all other packets. If someone would be to do this stealth scan
>>on you, you could still notice:
>>
>>Sep 11 22:58:50 twentythree /kernel: Connection attempt to TCP
>>199.51.61.23:1 from 199.51.61.22:1<6>FIN<6>RST<6>PUSH<6>URG<6>
>>
>>Sep 11 22:58:50 twentythree /kernel: Connection attempt to TCP
>>199.51.61.23:1 from 199.51.61.22:1<6>RST<6>
>>
>>Sep 11 22:58:50 twentythree /kernel: Connection attempt to TCP
>>199.51.61.23:1 from 199.51.61.22:1<6>ACK<6>FIN<6>RST<6>URG<6>
>>
>>	Also, one can setup something like NFR to watch for port scans on
>>the network.
>>
>>-- Yan
>>

	Had to modify the hack.. Here is what the log looks like now:

Connection attempt to TCP 199.51.61.23:138 from 0.255.0.255:31337
flags=0xc<RST,PUSH>
onnection attempt to TCP 199.51.61.23:138 from 255.255.255.255:0
flags=0x32<SYN,ACK,URG>
Connection attempt to TCP 199.51.61.23:138 from 255.255.255.255:0
flags=0xa<SYN,PUSH>
Connection attempt to TCP 199.51.61.23:138 from 255.255.255.255:0
flags=0x3f<FIN,SYN,RST,PUSH,ACK,URG>

	And here is diff -p against -CURRENT of a few days ago:

twentythree# diff -p tcp_input.c.orig tcp_input.c

*** tcp_input.c.orig    Sat Sep 19 23:13:02 1998
--- tcp_input.c Sat Sep 19 23:16:17 1998
*************** findpcb:
*** 388,401 ****
         * but should either do a listen or a connect soon.
         */
        if (inp == NULL) {
!               if (log_in_vain && tiflags & TH_SYN) {
                        char buf[4*sizeof "123"];
  
                        strcpy(buf, inet_ntoa(ti->ti_dst));
                        log(LOG_INFO,
!                           "Connection attempt to TCP %s:%d from %s:%d\n",
                            buf, ntohs(ti->ti_dport), inet_ntoa(ti->ti_src),
                            ntohs(ti->ti_sport));
                }
                goto dropwithreset;
        }
--- 388,417 ----
         * but should either do a listen or a connect soon.
         */
        if (inp == NULL) {
!               if (log_in_vain && tiflags & (TH_FLAGS)) {
                        char buf[4*sizeof "123"];
  
                        strcpy(buf, inet_ntoa(ti->ti_dst));
                        log(LOG_INFO,
!                           "Connection attempt to TCP %s:%d from %s:%d ",
                            buf, ntohs(ti->ti_dport), inet_ntoa(ti->ti_src),
                            ntohs(ti->ti_sport));
+ 
+       /* 
+        * Code below added by Jan Koum <jkb@freebsd.org> to log flags
+        * of tcp packets via net.inet.tcp.log_in_vain - "man sysctl"
+        */
+ 
+               printf("flags=0x%b\n", ti->ti_flags,
+               "\020"
+               "\001FIN"
+               "\002SYN"
+               "\003RST"
+               "\004PUSH"
+               "\005ACK"
+               "\006URG"
+               );
+ 
                }
                goto dropwithreset;
        }


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.02A.9809201216330.1204-100000>