Milí majitelé routerů Turris,
toto fórum bylo 9. 12. 2016 zmrazeno a nahrazeno naším novým Turris fórem. Ještě chvíli bude dostupné k prohlížení, ale již zde není možné přispívat. Více informací naleznete v oznámení o uzavření fóra.
Dear Turris routers users,
this forum has been frozen on Dec 9th, 2016 and replaced by our new Turris forum. It will be read-only accessible for some time after. For more information, read the announcement about closing the forum.
pyrrha.fi.muni.cz 123/UDP 1 76.00 B 48.00 B 1 76.00 B 48.00 B
46.243.52.111 123/UDP 1 76.00 B 48.00 B 1 76.00 B 48.00 B
prg02s11-in-x15.1e100.net 443/TCP 0 0.00 B 0.00 B 69 20.17 KB 15.95 KB
ea-in-x6c.1e100.net 993/TCP 0 0.00 B 0.00 B 718 72.63 KB 28.54 KB
other all/both 0 0.00 B 0.00 B 0 0.00 B 0.00 B
www.stream.cz 80/TCP 0 0.00 B 0.00 B 85 11.60 KB 6.59 KB
prg02s11-in-x08.1e100.net 443/TCP 0 0.00 B 0.00 B 9 1.53 KB 1017.00 B
fec0:0:0:ffff::3 53/UDP 0 0.00 B 0.00 B 27 2.25 KB 1006.00 B
2a00:1450:4001:80d::1008 80/TCP 0 0.00 B 0.00 B 1 72.00 B 0.00 B
login.szn.cz 443/TCP 0 0.00 B 0.00 B 16 2.45 KB 1.49 KB
2a00:1450:4001:80d::100a 443/TCP 0 0.00 B 0.00 B 22 3.03 KB 1.65 KB
prg02s11-in-x06.1e100.net 443/TCP 0 0.00 B 0.00 B 86 34.12 KB 29.04 KB
2a00:1450:4001:80d::1008 443/TCP 0 0.00 B 0.00 B 1 72.00 B 0.00 B
2a01:300:30::b00a:5109 80/TCP 0 0.00 B 0.00 B 7 530.00 B 98.00 B
fec0:0:0:ffff::2 53/UDP 0 0.00 B 0.00 B 28 2.33 KB 1.02 KB
bud02s21-in-x13.1e100.net 443/TCP 0 0.00 B 0.00 B 8 540.00 B 0.00 B
2606:2800:133:206e:1315:22a5:2006:24fd 80/TCP 0 0.00 B 0.00 B 7 981.00 B 549.00 B
prg02s11-in-x17.1e100.net 443/TCP 0 0.00 B 0.00 B 6 432.00 B 0.00 B
cl-668.prg-01.cz.sixxs.net 443/TCP 0 0.00 B 0.00 B 42 10.41 KB 7.91 KB
prg02s11-in-x05.1e100.net 443/TCP 0 0.00 B 0.00 B 21 4.31 KB 3.00 KB
oc2.cdn.szn.cz 80/TCP 0 0.00 B 0.00 B 8 480.00 B 0.00 B
2a02:26f0:78:28d::236 443/TCP 0 0.00 B 0.00 B 14 1.94 KB 1.05 KB
bud02s21-in-x1f.1e100.net 443/TCP 0 0.00 B 0.00 B 581 120.33 KB 86.24 KB
db3wns2010909.wns.windows.com 443/TCP 0 0.00 B 0.00 B 2 226.00 B 106.00 B
prg02s11-in-x04.1e100.net 80/TCP 0 0.00 B 0.00 B 7 1.81 KB 1.37 KB
2a00:1450:4010:c08::5e 80/TCP 0 0.00 B 0.00 B 8 485.00 B 5.00 B
ec2.cdn.szn.cz 80/TCP 0 0.00 B 0.00 B 1604 96.15 KB 2.08 KB
prg02s11-in-x0e.1e100.net 443/TCP 0 0.00 B 0.00 B 52 17.78 KB 14.65 KB
2a00:1450:4001:80d::1002 443/TCP 0 0.00 B 0.00 B 4 288.00 B 0.00 B
2a01:300:30::b00a:5108 80/TCP 0 0.00 B 0.00 B 12 723.00 B 3.00 B
prg02s11-in-x03.1e100.net 443/TCP 0 0.00 B 0.00 B 18 4.20 KB 3.09 KB
2a00:1450:4001:80d::100b 80/TCP 0 0.00 B 0.00 B 2 144.00 B 0.00 B
db3wns2011009.wns.windows.com 443/TCP 0 0.00 B 0.00 B 19 2.34 KB 1.17 KB
prg02s11-in-x0a.1e100.net 443/TCP 0 0.00 B 0.00 B 3 216.00 B 0.00 B
db3wns2010910.wns.windows.com 443/TCP 0 0.00 B 0.00 B 29 3.82 KB 2.04 KB
prg02s11-in-x04.1e100.net 443/TCP 0 0.00 B 0.00 B 15 4.47 KB 3.58 KB
2400:cb00:2048:1::c629:f9d2 443/TCP 0 0.00 B 0.00 B 14 1.70 KB 850.00 B
prg02s11-in-x01.1e100.net 443/TCP 0 0.00 B 0.00 B 17 6.28 KB 5.26 KB
prg02s11-in-x0e.1e100.net 80/TCP 0 0.00 B 0.00 B 8 2.07 KB 1.58 KB
db3wns2011109.wns.windows.com 443/TCP 0 0.00 B 0.00 B 4 489.00 B 249.00 B
db3wns4011610.wns.windows.com 443/TCP 0 0.00 B 0.00 B 4 453.00 B 189.00 B
prg02s11-in-x0f.1e100.net 443/TCP 0 0.00 B 0.00 B 8 576.00 B 0.00 B
nibiru.zarea.net 80/TCP 16 1.61 KB 964.00 B 24 1.60 KB 628.00 B
46.243.48.111 123/UDP 1 76.00 B 48.00 B 1 76.00 B 48.00 B
srv2.trusted.cz 123/UDP 1 76.00 B 48.00 B 1 76.00 B 48.00 B
46.243.51.55 123/UDP 1 76.00 B 48.00 B 1 76.00 B 48.00 B
tik.cesnet.cz 123/UDP 1 76.00 B 48.00 B 1 76.00 B 48.00 B
tak.cesnet.cz 123/UDP 1 76.00 B 48.00 B 1 76.00 B 48.00 B
46.243.52.222 123/UDP 1 76.00 B 48.00 B 1 76.00 B 48.00 B
mark33.flirtising.com 80/TCP 0 0.00 B 0.00 B 15 780.00 B 0.00 B
other all/both 0 0.00 B 0.00 B 0 0.00 B 0.00 B
sysctl net.ipv4.tcp_fin_timeout
) a následně každých n minut sledovat obsah netstatu.
"ether host 11:22:33:44:55:66"
, kde specifikujete MAC toho podezřelého routeru? Ze získaného PCAP souboru by snad mělo být možné zjistit, co se děje.
-n
, pokud tam ta adresa pořád je.
IP Address: 5.231.23.233
Netblock: 005/8
Status: ALLOCATED
Detail: RIPE NCC
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See http://www.ripe.net/db/support/db-terms-conditions.pdf
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '5.231.23.0 - 5.231.23.255'
% Abuse contact: for '5.231.23.0 - 5.231.23.255' is 'abuse@ghostnet.de'
inetnum: 5.231.23.0 - 5.231.23.255
netname: DE-GHOSTNET-FRA-GN-HOSTING-VPS
descr: GHOSTnet Network used for VPS Hosting Services
descr: Assigned 20120912
country: DE
admin-c: GN-RIPE
tech-c: GN-RIPE
status: ASSIGNED PA
mnt-by: GHOSTNET-MNT
mnt-lower: GHOSTNET-MNT
mnt-routes: GHOSTNET-MNT
remarks: INFRA-AW
source: RIPE # Filtered
% Information related to '5.231.23.0/24AS12586'
route: 5.231.23.0/24
descr: GHOSTnet GmbH IP Space
origin: AS12586
mnt-by: GHOSTNET-MNT
source: RIPE # Filtered
% This query was served by the RIPE Database Query Service version 1.76 (DB-3)
root@turris:# ls /tmp/majordomo_db/
majordomo_daily_2014-11-30 majordomo_hourly_2014-11-30-13
majordomo_hourly_2014-11-30-08 majordomo_hourly_2014-11-30-14
majordomo_hourly_2014-11-30-09 majordomo_monthly_2014-11
majordomo_hourly_2014-11-30-10 majordomo_origin_monthly_2014-11
majordomo_hourly_2014-11-30-11 majordomo_serialized_mac_vendor
majordomo_hourly_2014-11-30-12 majordomo_serialized_ptr
0 0 1 * * root rm -rf /mnt/nas/folder/majordomo_db
/etc/cron.d/majordomo
0.001704 2014-11-29 10:20:22.949847 192.168.1.2 5.231.23.233 TCP 0.001704 66 51268→80 [SYN] Seq=0 Win=5840 Len=0 MSS=1460 SACK_PERM=1 WS=2
2.999569 2014-11-29 10:20:25.949416 192.168.1.2 5.231.23.233 TCP 2.999569 66 [TCP Retransmission] 51268→80 [SYN] Seq=0 Win=5840 Len=0 MSS=1460 SACK_PERM=1 WS=2
6.000118 2014-11-29 10:20:31.949534 192.168.1.2 5.231.23.233 TCP 6.000118 66 [TCP Retransmission] 51268→80 [SYN] Seq=0 Win=5840 Len=0 MSS=1460 SACK_PERM=1 WS=2
config 'switch' 'eth0'
option 'enable' '1'
config 'switch_vlan' 'eth0_0'
option 'device' 'eth0'
option 'vlan' '0'
option 'ports' '0 1 2 3 4 5'
config 'interface' 'loopback'
option 'ifname' 'lo'
option 'proto' 'static'
option 'ipaddr' '127.0.0.1'
option 'netmask' '255.0.0.0'
config 'interface' 'lan'
option 'type' 'bridge'
option 'ifname' 'eth0.0'
option 'proto' 'static'
option 'netmask' '255.255.255.0'
option 'ipaddr' '192.168.1.2'
option 'gateway' '192.168.1.1'
option 'defaultroute' '1'
option 'peerdns' '0'
option 'ip6gw' 'xxxx:xxxx:xxxx:xxxx:0:0:0:1'
option 'ip6addr' '2xx:xxxx:xxxx:xxxx::20/64'
option 'dns' '192.168.1.1'
ifname eth0.0
, takže se tam očekávají tagované rámce s tagem 0. Zřejmě nějakou chybou jedna strana přijímá i tagované rámce jako netagované a tím se to rozbíjí.
#/bin/bash
while true; do
pstree -a > /tmp/procesy.txt
if grep -q "mark33" "/tmp/procesy.txt";
then
echo "Je to tam!"
cat /tmp/procesy.txt
break;
fi
#sleep 5
done
Powered by mwForum 2.29.3 © 1999-2013 Markus Wichitill