[BlueOnyx:13708] Re: Message Log
Richard Sidlin
richard at sidlin.co.uk
Thu Sep 19 06:43:35 -05 2013
Thanks Chuck
All seems OK at the moment. This is the current status. Does this look right?:
[root at ns5 ~]# iptables -L -n | more
Chain INPUT (policy ACCEPT)
target prot opt source destination
dFix2 all -- 0.0.0.0/0 0.0.0.0/0
acctin all -- 0.0.0.0/0 0.0.0.0/0
Chain FORWARD (policy ACCEPT)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
acctout all -- 0.0.0.0/0 0.0.0.0/0
Chain acctin (1 references)
target prot opt source destination
all -- 0.0.0.0/0 192.168.250.240
all -- 0.0.0.0/0 127.0.0.1
Chain acctout (1 references)
target prot opt source destination
all -- 192.168.250.240 0.0.0.0/0
all -- 127.0.0.1 0.0.0.0/0
Chain compass_fw (0 references)
target prot opt source destination
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp spt:53
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:20
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:21
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:25
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:53
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:53
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:80
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:81
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:110
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:143
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:443
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:444
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:587
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:993
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:995
LOG all -- 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 4 prefix `Compass Security: '
DROP all -- 0.0.0.0/0 0.0.0.0/0
Chain dFix2 (1 references)
target prot opt source destination
Chain dFixblock2 (0 references)
target prot opt source destination
LOG all -- 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 4
DROP all -- 0.0.0.0/0 0.0.0.0/0
From: blueonyx-bounces at mail.blueonyx.it [mailto:blueonyx-bounces at mail.blueonyx.it] On Behalf Of Chuck Tetlow
Sent: 18 September 2013 18:30
To: BlueOnyx General Mailing List
Subject: [BlueOnyx:13705] Re: Message Log
Hi Richard,
If you don't want those blocks - use the command-line command: "iptables -L -n | more"
to find the rule that is blocking. The output will looks something like this under the "acctin" chain:
DROP all -- 0.0.0.0/0 192.168.250.240/32
or
DROP tcp -- 195.195.131.183 192.168.250.240 tcp dpt:80
or maybe even
DROP all -- 192.195.131.183 0.0.0.0/32
You're looking in the "acctin" chain for something showing that destination IP 192.168.250.240, and destination port TCP80. Once you find the rule, count down from the top to see what rule number it is (like 5th from the top). Then use the command: "iptables -D acctin 5" to delete that rule.
Alternately, you can delete it by duplicating it (its just harder with the syntax). So that second rule above would be deleted with:
iptables -D acctin -p tcp -s 195.195.131.183 -d 192.168.250.240 --dport 80 -j DROP
See why I say counting down the number of rules and deleting it by line number is easier??
Chuck
P.S. - If you can't figure out which line is doing the blocking, use the "iptables -L -n -v" command and send the output back to the list. I'll look it over and see if I can figure out which firewall rule is doing the blocking.
---------- Original Message -----------
From: "Richard Sidlin" <richard at sidlin.co.uk>
To: "'BlueOnyx General Mailing List'" <blueonyx at mail.blueonyx.it>
Sent: Wed, 18 Sep 2013 18:11:02 +0100
Subject: [BlueOnyx:13702] Re: Message Log
> Thanks Chuck. I certainly [UTF-8?]don’t want access to port 80 blocked and we received complaints today that it was unavailable. I have Dfix2 installed but I [UTF-8?]don’t want it blocking access!
>
>
> From: blueonyx-bounces at mail.blueonyx.it [mailto:blueonyx-bounces at mail.blueonyx.it] On Behalf Of Chuck Tetlow
> Sent: 18 September 2013 17:55
> To: BlueOnyx General Mailing List
> Subject: [BlueOnyx:13700] Re: Message Log
>
> Those log entries show that someone at 195.195.131.183 was trying to connect to 192.168.250.240 on TCP port 80. So they're trying to hit the webpage at the address 192.168.250.240, but were being blocked by the IPTables firewall software on your BX server.
>
> Does that source address mean anything to you? What is on that destination IP address, and does that site have a webpage? And probably the most important question - why would the IPTables software be configured to block someone hitting a webpage??
>
> I can't imagine DFix or one of the other automated security tools blocking webpage requests to TCP Port 80, but I don't know all those packages well - so it could be something automatic. But on first guess - I'd suggest someone would have had to manually configure that block. That then goes back to the last question - why would someone want to block access to a webpage/website??
>
> Chuck
>
> ---------- Original Message -----------
> From: "Richard Sidlin" <richard at sidlin.co.uk>
> To: <blueonyx at mail.blueonyx.it>
> Sent: Wed, 18 Sep 2013 17:38:09 +0100
> Subject: [BlueOnyx:13699] Message Log
>
> > Hi
> >
> > I have loads of these in my message log. Anything to be concerned about?
> >
> > Sep 18 12:30:44 ns5 kernel: IN=eth0 OUT= MAC=00:0a:e4:82:4e:e6:00:90:fb:33:79:96:08:00 SRC=195.195.131.183 DST=192.168.250.240 LEN=60 TOS=0x00 PREC=0x00 TTL=49 ID=32494 DF PROTO=TCP SPT=42963 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
> > Sep 18 12:30:56 ns5 kernel: IN=eth0 OUT= MAC=00:0a:e4:82:4e:e6:00:90:fb:33:79:96:08:00 SRC=195.195.131.182 DST=192.168.250.240 LEN=60 TOS=0x00 PREC=0x00 TTL=49 ID=43175 DF PROTO=TCP SPT=53690 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
> > Sep 18 12:30:56 ns5 kernel: IN=eth0 OUT= MAC=00:0a:e4:82:4e:e6:00:90:fb:33:79:96:08:00 SRC=195.195.131.183 DST=192.168.250.240 LEN=60 TOS=0x00 PREC=0x00 TTL=49 ID=32495 DF PROTO=TCP SPT=42963 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
> > Sep 18 12:31:05 ns5 kernel: IN=eth0 OUT= MAC=00:0a:e4:82:4e:e6:00:90:fb:33:79:96:08:00 SRC=195.195.131.183 DST=192.168.250.240 LEN=60 TOS=0x00 PREC=0x00 TTL=50 ID=64909 DF PROTO=TCP SPT=48409 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
> > Sep 18 12:31:07 ns5 kernel: IN=eth0 OUT= MAC=00:0a:e4:82:4e:e6:00:90:fb:33:79:96:08:00 SRC=195.195.131.183 DST=192.168.250.240 LEN=60 TOS=0x00 PREC=0x00 TTL=49 ID=48816 DF PROTO=TCP SPT=42656 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
> > Sep 18 12:31:08 ns5 kernel: IN=eth0 OUT= MAC=00:0a:e4:82:4e:e6:00:90:fb:33:79:96:08:00 SRC=195.195.131.183 DST=192.168.250.240 LEN=60 TOS=0x00 PREC=0x00 TTL=49 ID=64910 DF PROTO=TCP SPT=48409 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
> > Sep 18 12:31:12 ns5 kernel: IN=eth0 OUT= MAC=00:0a:e4:82:4e:e6:00:90:fb:33:79:96:08:00 SRC=195.195.131.182 DST=192.168.250.240 LEN=60 TOS=0x00 PREC=0x00 TTL=50 ID=8668 DF PROTO=TCP SPT=55189 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
> > Sep 18 12:31:14 ns5 kernel: IN=eth0 OUT= MAC=00:0a:e4:82:4e:e6:00:90:fb:33:79:96:08:00 SRC=195.195.131.183 DST=192.168.250.240 LEN=60 TOS=0x00 PREC=0x00 TTL=49 ID=64911 DF PROTO=TCP SPT=48409 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
> > Sep 18 12:31:15 ns5 kernel: IN=eth0 OUT= MAC=00:0a:e4:82:4e:e6:00:90:fb:33:79:96:08:00 SRC=195.195.131.182 DST=192.168.250.240 LEN=60 TOS=0x00 PREC=0x00 TTL=49 ID=8669 DF PROTO=TCP SPT=55189 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
> >
> > Thanks
> >
> > Richard
> >
> >
> ------- End of Original Message -------
------- End of Original Message -------
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.blueonyx.it/pipermail/blueonyx/attachments/20130919/97b833b2/attachment.html>
More information about the Blueonyx
mailing list