Bug 8929 - SYSLOGD PROBLEM
Summary: SYSLOGD PROBLEM
Keywords:
Status: CLOSED NOTABUG
Alias: None
Product: Red Hat Linux
Classification: Retired
Component: sysklogd
Version: 6.1
Hardware: i386
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Bill Nottingham
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2000-01-27 20:24 UTC by info
Modified: 2014-03-17 02:12 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2000-02-03 20:27:07 UTC
Embargoed:


Attachments (Terms of Use)

Description info 2000-01-27 20:24:36 UTC
Hi,

I downloaded and installed the SYSLOGD update from your site. Your warning
is that there was a Denial of Attack in the old SYSLOGD.
Now what happens:
Since then my /var/log/messages says:

Jan 27 21:14:06 sparrow kernel: Packet log: input DENY eth0 PROTO=17
213.136.0.22:5151 239.192.74$
Jan 27 21:14:06 sparrow kernel: Packet log: input DENY eth0 PROTO=17
195.81.40.61:137 195.81.40.2$
Jan 27 21:14:06 sparrow kernel: Packet log: input DENY eth0 PROTO=17
213.136.0.22:5151 239.192.74$
Jan 27 21:14:07 sparrow kernel: Packet log: input DENY eth0 PROTO=17
195.81.40.61:137 195.81.40.2$
Jan 27 21:14:07 sparrow kernel: Packet log: input DENY eth0 PROTO=17
213.136.0.22:5151 239.192.74$
Jan 27 21:14:09 sparrow kernel: Packet log: input DENY eth0 PROTO=17
195.81.40.61:138 195.81.40.2$
Jan 27 21:14:10 sparrow kernel: Packet log: input DENY eth0 PROTO=17
195.81.40.61:137 195.81.40.2$
Jan 27 21:14:10 sparrow kernel: Packet log: input DENY eth0 PROTO=17
195.81.40.61:137 195.81.40.2$
Jan 27 21:14:10 sparrow kernel: Packet log: input DENY eth0 PROTO=17
195.81.40.65:138 195.81.40.2$
Jan 27 21:14:11 sparrow kernel: Packet log: input DENY eth0 PROTO=17
195.81.40.61:137 195.81.40.2$
Jan 27 21:14:11 sparrow kernel: Packet log: input DENY eth0 PROTO=17
195.81.40.61:137 195.81.40.2$
Jan 27 21:14:12 sparrow kernel: Packet log: input DENY eth0 PROTO=17
195.81.40.61:137 195.81.40.2$
Jan 27 21:14:12 sparrow kernel: Packet log: input DENY eth0 PROTO=17
195.81.40.61:137 195.81.40.2$
Jan 27 21:14:14 sparrow kernel: Packet log: input DENY eth0 PROTO=17
195.81.40.61:138 195.81.40.2$
Jan 27 21:14:14 sparrow kernel: Packet log: input DENY eth0 PROTO=17
195.81.40.228:138 195.81.40.$

etc. etc.
It looks like it is trying to get in all computers in the domain on port
137 and 138.
How to get back the old SYSLOGD ???

Jan Koenegras,
The Netherlands.

Comment 1 Bill Nottingham 2000-01-27 23:27:59 UTC
Ports 137 & 138 are netbios stuff; perhaps you have a samba
server that's trying to talk to itself? (NMBD will do this
periodically...)

Comment 2 Elliot Lee 2000-02-03 20:27:59 UTC
The kernel firewalling code generates these messages when you have turned on
logging for a specific firewall rule. This is unrelated to your sysklogd update.


Note You need to log in before you can comment on or make changes to this bug.