openSUSE Security
Threads by month
- ----- 2024 -----
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2004 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2003 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2002 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2001 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2000 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1999 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1998 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1997 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1996 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
February 2003
- 104 participants
- 78 discussions
Hi all,
here's a bit of a step-by-step description on how to keep nimda
and codered from filling your apache logs.
Parts used:
- SuSE 7.2 Professional
- SuSEfirewall2
- iptables 1.2.3
- linux kernel 2.4.13-pre5
steps:
1. install kernel sources for a kernel >> 2.4.9, running 2.4.13-
pre5 here, works fine so far
2. get the sources for iptables 1.2.3 from
http://netfilter.samba.org
3. unpack sources somewhere
4. export KERNEL_DIR=$(where you put the kernel tree)
5. cd into unpacked iptables sources, there's a subdirectory
named patch-o-matic there
6. apply wanted patches by running ./runme $(name.of.patch)patch
for this here You'll want the string patch
You can also apply other patches, like the irc-conntrack patch
7. now there's a little bug in this patch...
here's a diff:
--- linux/net/ipv4/netfilter/ipt_string.c~ Sun Oct 21
00:16:29 2001
+++ linux/net/ipv4/netfilter/ipt_string.c Sun Oct 21
16:54:45 2001
@@ -62,7 +62,7 @@
sk = skip[haystack[right_end - i]];
sh = shift[i];
- right_end = max(int, right_end - i + sk,
right_end + sh);
+ right_end = max(right_end - i + sk, right_end +
sh);
}
return NULL;
8. now, make config/menuconfig/xconfig... as usual. You can
import your running kernel's config first.
9. enable the experimental stuff
10. go to networking options->netfilter, there's an option there
to enable string matching; set that to M
11. compile and install kernel as usual; remember to uncomment
the export INSTALL_PATH=/boot in the main makefile.
12. now build a rpm file for the new iptables stuff by installing
the source rpm which comes with suse, then edit the spec file,
put the iptables source in /usr/src/packages/SOURCE and rebuild.
13. now there are some small changes to the firewall config
files.
a) uncomment the last line in
/etc/rc.config.d/firewall2.rc.config:
FW_CUSTOMRULES="/etc/rc.config.d/firewall2-custom.rc.config"
b) edit that file, I got the following stuff in mine:
for forbidden_string in root.exe cmd.exe .ida; do
iptables -I input_ext -p tcp --dport http -m string \
--string $forbidden_string -m state \
--state ESTABLISHED -j REJECT --reject-with tcp-reset
done
put that in the last supfunction defined in the custom rc file.
c) change the FW_LOG setting in firewall2.rc.config from reading
-log-level warning to -log-level kernel.warning
14. last: some small changes to /sbin/SuSEfirewall2
search in the script for the parts where the modules are loaded
and unloaded; be sure to add ipt_string (and the other new
modules you created by patching the kernel and enabling them in
make config) to the modules loading/unloading code there.
15. reboot
16. if you try now to access (from outside, of course) one of the
nimda or codered URLS, all you get is a 'connection reset by
peer', and the request doesn't show in apache log files.
btw, no guarantees, and the usual YMMV :)
bye
[L]
7
7
Hi,
I use suse 7.3
Internal network connect to internet by setting port
3128 in IE but when i set in squid.conf for
authenticate_program that get windows login for users,
IE don't get any windows and Internal network
(clients) connect to internet normally without login
I set these options in squid.conf:
authenticate_program /usr/sbin/pam_auth
acl password proxy_auth payam
acl users src 192.168.1.0/255.255.252.0
http_access allow users
http_access allow password
Is here any problem with this configuration that IE
can't get windows login when want to browsing?
Thanks for your help,
Payam
__________________________________________________
Do you Yahoo!?
Yahoo! Mail Plus - Powerful. Affordable. Sign up now.
http://mailplus.yahoo.com
7
6
Fwd: RE: [suse-security] My SuSEFirewall blocks something than my LAM can not surfing in internet anymore.
by Ian David Laws 28 Feb '03
by Ian David Laws 28 Feb '03
28 Feb '03
Hi
You need to put in /etc/resolv.conf a DNS server!
This is normally your ISP servers.
Ian
---------- Forwarded Message ----------
Subject: RE: [suse-security] My SuSEFirewall blocks something than my LAM can
not surfing in internet anymore.
Date: Fri, 28 Feb 2003 08:15:46 -0800 (PST)
From: Prabu Subroto <prabu_subroto(a)yahoo.com>
To: SuSE Security Milis <suse-security(a)suse.com>
Dear Stefan... (Now, I know your first name is
Stefan...:D Chickle...)
I found a mistype in your instruction. It should not
be "DTP" but "DPT".
Now, I got the output from my "/var/log/messages":
"
proxy:/var/log # cat /var/log/messages|grep
DPT=80|grep -v DST=192.168.23.10
Feb 27 16:14:53 proxy kernel: SuSE-FW-ACCEPT IN=ippp0
OUT= MAC= SRC=145.254.192.34 DST=145.254.88.223 LEN=48
TOS=0x08 PREC=0x00 TTL=119 ID=14754 DF PROTO=TCP
SPT=4215 DPT=80 WINDOW=16384 RES=0x00 SYN URGP=0 OPT
(020405B401010402)
Feb 27 16:14:54 proxy kernel: SuSE-FW-ACCEPT IN=ippp0
OUT= MAC= SRC=145.254.192.34 DST=145.254.88.223 LEN=48
TOS=0x08 PREC=0x00 TTL=119 ID=14825 DF PROTO=TCP
SPT=4215 DPT=80 WINDOW=16384 RES=0x00 SYN URGP=0 OPT
(020405B401010402)
Feb 27 16:14:55 proxy kernel: SuSE-FW-ACCEPT IN=ippp0
OUT= MAC= SRC=145.254.192.34 DST=145.254.88.223 LEN=48
TOS=0x08 PREC=0x00 TTL=119 ID=14890 DF PROTO=TCP
SPT=4215 DPT=80 WINDOW=16384 RES=0x00 SYN URGP=0 OPT
(020405B401010402)
proxy:/var/log #
"
Here is the error message in the internet browser of
my LAN user while this problem is happening.
"
The requested URL could not be retrieved
While trying to retrieve the URL:
http://www.yahoo.com/
The following error was encountered:
Unable to determine IP address from host name for
www.yahoo.com
The dnsserver returned:
No DNS records
This means that:
The cache was not able to resolve the hostname
presented in the URL.
Check if the address is correct.
Your cache administrator is webmaster.
"
Lookslike because of DNS server... But How and why?
Please tell me.....
--- Peer Stefan <stefan.peer(a)tiwag.at> wrote:
> Hi Prabu,
>
> Sorry to say so, but this trace shows nothing more
> than a connection-trace of your ssh-session (DPT=22
> ...).
> Don't tail /var/log/messages, it's quite big and
> gets filled really fast.
> Do a "cat /var/log/messages|grep DTP=80|grep -v
> DST=192.168.23.10" in order to get all the outgoing
> http-stuff.
>
> so long,
> Stefan
>
> btw. I'm called Stefan - it's a bit queer here in
> Austria, we always put the last name in front ;-)
>
> > From: Prabu Subroto
>
> [mailto:prabu_subroto@yahoo.com]
>
> > Dear my friend, Peer...
> >
> > Today morning, it happened again. I follow your
>
> advice
>
> > and this is the 60 lines of my "/var/log/messages"
> > file:
> > "
> > proxy:/var/log # tail -n 60 messages
> > Feb 27 14:04:49 proxy kernel:
> > SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> > MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> > SRC=192.168.23.237 DST=192.168.23.10 LEN=52
>
> TOS=0x10
>
> > PREC=0x00 TTL=64 ID=4343 DF PROTO=TCP SPT=1132
>
> DPT=22
>
> > WINDOW=16192 RES=0x00 ACK URGP=0 OPT
> > (0101080A00097D1B04A2BFF7)
> > Feb 27 14:04:49 proxy kernel:
> > SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> > MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> > SRC=192.168.23.237 DST=192.168.23.10 LEN=52
>
> TOS=0x10
>
> > PREC=0x00 TTL=64 ID=4344 DF PROTO=TCP SPT=1132
>
> DPT=22
>
> > WINDOW=16192 RES=0x00 ACK URGP=0 OPT
> > (0101080A00097D1B04A2BFF7)
> > Feb 27 14:04:49 proxy kernel:
> > SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> > MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> > SRC=192.168.23.237 DST=192.168.23.10 LEN=52
>
> TOS=0x10
>
> > PREC=0x00 TTL=64 ID=4345 DF PROTO=TCP SPT=1132
>
> DPT=22
>
> > WINDOW=16192 RES=0x00 ACK URGP=0 OPT
> > (0101080A00097D1B04A2BFF7)
> > Feb 27 14:04:49 proxy kernel:
> > SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> > MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> > SRC=192.168.23.237 DST=192.168.23.10 LEN=52
>
> TOS=0x10
>
> > PREC=0x00 TTL=64 ID=4346 DF PROTO=TCP SPT=1132
>
> DPT=22
>
> > WINDOW=16192 RES=0x00 ACK URGP=0 OPT
> > (0101080A00097D1B04A2BFF7)
> > Feb 27 14:04:49 proxy kernel:
> > SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> > MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> > SRC=192.168.23.237 DST=192.168.23.10 LEN=52
>
> TOS=0x10
>
> > PREC=0x00 TTL=64 ID=4347 DF PROTO=TCP SPT=1132
>
> DPT=22
>
> > WINDOW=16192 RES=0x00 ACK URGP=0 OPT
> > (0101080A00097D1B04A2BFF7)
> > Feb 27 14:04:49 proxy kernel:
> > SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> > MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> > SRC=192.168.23.237 DST=192.168.23.10 LEN=52
>
> TOS=0x10
>
> > PREC=0x00 TTL=64 ID=4348 DF PROTO=TCP SPT=1132
>
> DPT=22
>
> > WINDOW=16192 RES=0x00 ACK URGP=0 OPT
> > (0101080A00097D1B04A2BFF7)
> > Feb 27 14:04:49 proxy kernel:
> > SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> > MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> > SRC=192.168.23.237 DST=192.168.23.10 LEN=52
>
> TOS=0x10
>
> > PREC=0x00 TTL=64 ID=4349 DF PROTO=TCP SPT=1132
>
> DPT=22
>
> > WINDOW=16192 RES=0x00 ACK URGP=0 OPT
> > (0101080A00097D1B04A2BFF7)
> > Feb 27 14:04:49 proxy kernel:
> > SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> > MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> > SRC=192.168.23.237 DST=192.168.23.10 LEN=52
>
> TOS=0x10
>
> > PREC=0x00 TTL=64 ID=4350 DF PROTO=TCP SPT=1132
>
> DPT=22
>
> > WINDOW=16192 RES=0x00 ACK URGP=0 OPT
> > (0101080A00097D1B04A2BFF7)
> > Feb 27 14:04:49 proxy kernel:
> > SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> > MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> > SRC=192.168.23.237 DST=192.168.23.10 LEN=52
>
> TOS=0x10
>
> > PREC=0x00 TTL=64 ID=4351 DF PROTO=TCP SPT=1132
>
> DPT=22
>
> > WINDOW=16192 RES=0x00 ACK URGP=0 OPT
> > (0101080A00097D1B04A2BFF7)
> > Feb 27 14:04:49 proxy kernel:
> > SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> > MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> > SRC=192.168.23.237 DST=192.168.23.10 LEN=52
>
> TOS=0x10
>
> > PREC=0x00 TTL=64 ID=4352 DF PROTO=TCP SPT=1132
>
> DPT=22
>
> > WINDOW=16192 RES=0x00 ACK URGP=0 OPT
> > (0101080A00097D1B04A2BFF7)
> > Feb 27 14:04:49 proxy kernel:
> > SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> > MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> > SRC=192.168.23.237 DST=192.168.23.10 LEN=52
>
> TOS=0x10
>
> > PREC=0x00 TTL=64 ID=4353 DF PROTO=TCP SPT=1132
>
> DPT=22
>
> > WINDOW=16192 RES=0x00 ACK URGP=0 OPT
> > (0101080A00097D1B04A2BFF8)
> > Feb 27 14:04:49 proxy kernel:
> > SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> > MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> > SRC=192.168.23.237 DST=192.168.23.10 LEN=52
>
> TOS=0x10
>
> > PREC=0x00 TTL=64 ID=4354 DF PROTO=TCP SPT=1132
>
> DPT=22
>
> > WINDOW=16192 RES=0x00 ACK URGP=0 OPT
> > (0101080A00097D1B04A2BFF8)
> > Feb 27 14:04:49 proxy kernel:
> > SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> > MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> > SRC=192.168.23.237 DST=192.168.23.10 LEN=52
>
> TOS=0x10
>
> > PREC=0x00 TTL=64 ID=4355 DF PROTO=TCP SPT=1132
>
> DPT=22
>
> > WINDOW=16192 RES=0x00 ACK URGP=0 OPT
> > (0101080A00097D1C04A2BFF8)
> > Feb 27 14:04:49 proxy kernel:
> > SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> > MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> > SRC=192.168.23.237 DST=192.168.23.10 LEN=52
>
> TOS=0x10
>
> > PREC=0x00 TTL=64 ID=4356 DF PROTO=TCP SPT=1132
>
> DPT=22
>
> > WINDOW=18824 RES=0x00 ACK URGP=0 OPT
> > (0101080A00097D1C04A2BFF8)
> > Feb 27 14:04:49 proxy kernel:
> > SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> > MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> > SRC=192.168.23.237 DST=192.168.23.10 LEN=52
>
> TOS=0x10
>
> > PREC=0x00 TTL=64 ID=4357 DF PROTO=TCP SPT=1132
>
> DPT=22
>
> > WINDOW=18824 RES=0x00 ACK URGP=0 OPT
> > (0101080A00097D1C04A2BFF8)
> > Feb 27 14:04:49 proxy kernel:
> > SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> > MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> > SRC=192.168.23.237 DST=192.168.23.10 LEN=52
>
> TOS=0x10
>
> > PREC=0x00 TTL=64 ID=4358 DF PROTO=TCP SPT=1132
>
> DPT=22
>
> > WINDOW=18824 RES=0x00 ACK URGP=0 OPT
> > (0101080A00097D1C04A2BFF8)
> > Feb 27 14:04:49 proxy kernel:
> > SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> > MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> > SRC=192.168.23.237 DST=192.168.23.10 LEN=52
>
> TOS=0x10
>
> > PREC=0x00 TTL=64 ID=4359 DF PROTO=TCP SPT=1132
>
> DPT=22
>
> > WINDOW=21720 RES=0x00 ACK URGP=0 OPT
> > (0101080A00097D1C04A2BFF8)
> > Feb 27 14:04:49 proxy kernel:
> > SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> > MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> > SRC=192.168.23.237 DST=192.168.23.10 LEN=52
>
> TOS=0x10
>
> > PREC=0x00 TTL=64 ID=4360 DF PROTO=TCP SPT=1132
>
> DPT=22
>
> > WINDOW=24616 RES=0x00 ACK URGP=0 OPT
> > (0101080A00097D1D04A2BFF8)
> > Feb 27 14:04:49 proxy kernel:
> > SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> > MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> > SRC=192.168.23.237 DST=192.168.23.10 LEN=52
>
> TOS=0x10
>
> > PREC=0x00 TTL=64 ID=4361 DF PROTO=TCP SPT=1132
>
> DPT=22
>
> > WINDOW=27512 RES=0x00 ACK URGP=0 OPT
> > (0101080A00097D1D04A2BFF9)
> > Feb 27 14:04:51 proxy kernel:
> > SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> > MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
=== message truncated ===
__________________________________________________
Do you Yahoo!?
Yahoo! Tax Center - forms, calculators, tips, more
http://taxes.yahoo.com/
--
Check the headers for your unsubscription address
For additional commands, e-mail: suse-security-help(a)suse.com
Security-related bug reports go to security(a)suse.de, not here
-------------------------------------------------------
2
1
RE: [suse-security] My SuSEFirewall blocks something than my LAM can not surfing in internet anymore.
by Peer Stefan 28 Feb '03
by Peer Stefan 28 Feb '03
28 Feb '03
Hi Prabu,
Sorry to say so, but this trace shows nothing more than a connection-trace of your ssh-session (DPT=22 ...).
Don't tail /var/log/messages, it's quite big and gets filled really fast.
Do a "cat /var/log/messages|grep DTP=80|grep -v DST=192.168.23.10" in order to get all the outgoing http-stuff.
so long,
Stefan
btw. I'm called Stefan - it's a bit queer here in Austria, we always put the last name in front ;-)
> From: Prabu Subroto [mailto:prabu_subroto@yahoo.com]
> Dear my friend, Peer...
>
> Today morning, it happened again. I follow your advice
> and this is the 60 lines of my "/var/log/messages"
> file:
> "
> proxy:/var/log # tail -n 60 messages
> Feb 27 14:04:49 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=52 TOS=0x10
> PREC=0x00 TTL=64 ID=4343 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=16192 RES=0x00 ACK URGP=0 OPT
> (0101080A00097D1B04A2BFF7)
> Feb 27 14:04:49 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=52 TOS=0x10
> PREC=0x00 TTL=64 ID=4344 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=16192 RES=0x00 ACK URGP=0 OPT
> (0101080A00097D1B04A2BFF7)
> Feb 27 14:04:49 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=52 TOS=0x10
> PREC=0x00 TTL=64 ID=4345 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=16192 RES=0x00 ACK URGP=0 OPT
> (0101080A00097D1B04A2BFF7)
> Feb 27 14:04:49 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=52 TOS=0x10
> PREC=0x00 TTL=64 ID=4346 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=16192 RES=0x00 ACK URGP=0 OPT
> (0101080A00097D1B04A2BFF7)
> Feb 27 14:04:49 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=52 TOS=0x10
> PREC=0x00 TTL=64 ID=4347 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=16192 RES=0x00 ACK URGP=0 OPT
> (0101080A00097D1B04A2BFF7)
> Feb 27 14:04:49 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=52 TOS=0x10
> PREC=0x00 TTL=64 ID=4348 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=16192 RES=0x00 ACK URGP=0 OPT
> (0101080A00097D1B04A2BFF7)
> Feb 27 14:04:49 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=52 TOS=0x10
> PREC=0x00 TTL=64 ID=4349 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=16192 RES=0x00 ACK URGP=0 OPT
> (0101080A00097D1B04A2BFF7)
> Feb 27 14:04:49 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=52 TOS=0x10
> PREC=0x00 TTL=64 ID=4350 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=16192 RES=0x00 ACK URGP=0 OPT
> (0101080A00097D1B04A2BFF7)
> Feb 27 14:04:49 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=52 TOS=0x10
> PREC=0x00 TTL=64 ID=4351 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=16192 RES=0x00 ACK URGP=0 OPT
> (0101080A00097D1B04A2BFF7)
> Feb 27 14:04:49 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=52 TOS=0x10
> PREC=0x00 TTL=64 ID=4352 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=16192 RES=0x00 ACK URGP=0 OPT
> (0101080A00097D1B04A2BFF7)
> Feb 27 14:04:49 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=52 TOS=0x10
> PREC=0x00 TTL=64 ID=4353 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=16192 RES=0x00 ACK URGP=0 OPT
> (0101080A00097D1B04A2BFF8)
> Feb 27 14:04:49 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=52 TOS=0x10
> PREC=0x00 TTL=64 ID=4354 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=16192 RES=0x00 ACK URGP=0 OPT
> (0101080A00097D1B04A2BFF8)
> Feb 27 14:04:49 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=52 TOS=0x10
> PREC=0x00 TTL=64 ID=4355 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=16192 RES=0x00 ACK URGP=0 OPT
> (0101080A00097D1C04A2BFF8)
> Feb 27 14:04:49 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=52 TOS=0x10
> PREC=0x00 TTL=64 ID=4356 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=18824 RES=0x00 ACK URGP=0 OPT
> (0101080A00097D1C04A2BFF8)
> Feb 27 14:04:49 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=52 TOS=0x10
> PREC=0x00 TTL=64 ID=4357 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=18824 RES=0x00 ACK URGP=0 OPT
> (0101080A00097D1C04A2BFF8)
> Feb 27 14:04:49 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=52 TOS=0x10
> PREC=0x00 TTL=64 ID=4358 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=18824 RES=0x00 ACK URGP=0 OPT
> (0101080A00097D1C04A2BFF8)
> Feb 27 14:04:49 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=52 TOS=0x10
> PREC=0x00 TTL=64 ID=4359 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=21720 RES=0x00 ACK URGP=0 OPT
> (0101080A00097D1C04A2BFF8)
> Feb 27 14:04:49 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=52 TOS=0x10
> PREC=0x00 TTL=64 ID=4360 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=24616 RES=0x00 ACK URGP=0 OPT
> (0101080A00097D1D04A2BFF8)
> Feb 27 14:04:49 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=52 TOS=0x10
> PREC=0x00 TTL=64 ID=4361 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=27512 RES=0x00 ACK URGP=0 OPT
> (0101080A00097D1D04A2BFF9)
> Feb 27 14:04:51 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=100 TOS=0x10
> PREC=0x00 TTL=64 ID=4362 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=27512 RES=0x00 ACK PSH URGP=0 OPT
> (0101080A00097DBA04A2BFF9)
> Feb 27 14:04:51 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=52 TOS=0x10
> PREC=0x00 TTL=64 ID=4363 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=27512 RES=0x00 ACK URGP=0 OPT
> (0101080A00097DBD04A2C09A)
> Feb 27 14:04:51 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=100 TOS=0x10
> PREC=0x00 TTL=64 ID=4364 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=27512 RES=0x00 ACK PSH URGP=0 OPT
> (0101080A00097DCA04A2C09A)
> Feb 27 14:04:51 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=52 TOS=0x10
> PREC=0x00 TTL=64 ID=4365 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=27512 RES=0x00 ACK URGP=0 OPT
> (0101080A00097DCA04A2C0A6)
> Feb 27 14:04:51 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=100 TOS=0x10
> PREC=0x00 TTL=64 ID=4366 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=27512 RES=0x00 ACK PSH URGP=0 OPT
> (0101080A00097DD804A2C0A6)
> Feb 27 14:04:51 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=52 TOS=0x10
> PREC=0x00 TTL=64 ID=4367 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=27512 RES=0x00 ACK URGP=0 OPT
> (0101080A00097DDB04A2C0B8)
> Feb 27 14:04:51 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=100 TOS=0x10
> PREC=0x00 TTL=64 ID=4368 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=27512 RES=0x00 ACK PSH URGP=0 OPT
> (0101080A00097DF004A2C0B8)
> Feb 27 14:04:51 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=52 TOS=0x10
> PREC=0x00 TTL=64 ID=4369 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=27512 RES=0x00 ACK URGP=0 OPT
> (0101080A00097DF304A2C0CF)
> Feb 27 14:04:51 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=100 TOS=0x10
> PREC=0x00 TTL=64 ID=4370 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=27512 RES=0x00 ACK PSH URGP=0 OPT
> (0101080A00097E1104A2C0CF)
> Feb 27 14:04:51 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=52 TOS=0x10
> PREC=0x00 TTL=64 ID=4371 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=27512 RES=0x00 ACK URGP=0 OPT
> (0101080A00097E1504A2C0F1)
> Feb 27 14:04:54 proxy kernel: SuSE-FW-ILLEGAL-TARGET
> IN=eth0 OUT=
> MAC=ff:ff:ff:ff:ff:ff:00:50:bf:77:77:f8:08:00
> SRC=192.168.23.238 DST=192.168.23.0 LEN=174 TOS=0x00
> PREC=0x00 TTL=64 ID=25437 DF PROTO=UDP SPT=631 DPT=631
> LEN=154
> Feb 27 14:04:56 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=100 TOS=0x10
> PREC=0x00 TTL=64 ID=4372 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=27512 RES=0x00 ACK PSH URGP=0 OPT
> (0101080A00097FD004A2C0F1)
> Feb 27 14:04:56 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=52 TOS=0x10
> PREC=0x00 TTL=64 ID=4373 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=27512 RES=0x00 ACK URGP=0 OPT
> (0101080A00097FD404A2C2B0)
> Feb 27 14:04:56 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=100 TOS=0x10
> PREC=0x00 TTL=64 ID=4374 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=27512 RES=0x00 ACK PSH URGP=0 OPT
> (0101080A00097FF804A2C2B0)
> Feb 27 14:04:56 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=52 TOS=0x10
> PREC=0x00 TTL=64 ID=4375 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=27512 RES=0x00 ACK URGP=0 OPT
> (0101080A00097FFB04A2C2D8)
> Feb 27 14:04:56 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=100 TOS=0x10
> PREC=0x00 TTL=64 ID=4376 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=27512 RES=0x00 ACK PSH URGP=0 OPT
> (0101080A0009800C04A2C2D8)
> Feb 27 14:04:57 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=52 TOS=0x10
> PREC=0x00 TTL=64 ID=4377 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=27512 RES=0x00 ACK URGP=0 OPT
> (0101080A0009800F04A2C2EB)
> Feb 27 14:04:57 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=100 TOS=0x10
> PREC=0x00 TTL=64 ID=4378 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=27512 RES=0x00 ACK PSH URGP=0 OPT
> (0101080A0009805304A2C2EB)
> Feb 27 14:04:57 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=52 TOS=0x10
> PREC=0x00 TTL=64 ID=4379 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=27512 RES=0x00 ACK URGP=0 OPT
> (0101080A0009805704A2C333)
> Feb 27 14:04:57 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=100 TOS=0x10
> PREC=0x00 TTL=64 ID=4380 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=27512 RES=0x00 ACK PSH URGP=0 OPT
> (0101080A0009806F04A2C333)
> Feb 27 14:04:57 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=52 TOS=0x10
> PREC=0x00 TTL=64 ID=4381 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=27512 RES=0x00 ACK URGP=0 OPT
> (0101080A0009806F04A2C34C)
> Feb 27 14:04:58 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=100 TOS=0x10
> PREC=0x00 TTL=64 ID=4382 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=27512 RES=0x00 ACK PSH URGP=0 OPT
> (0101080A000980A304A2C34C)
> Feb 27 14:04:58 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=52 TOS=0x10
> PREC=0x00 TTL=64 ID=4383 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=27512 RES=0x00 ACK URGP=0 OPT
> (0101080A000980A604A2C382)
> Feb 27 14:04:59 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=100 TOS=0x10
> PREC=0x00 TTL=64 ID=4384 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=27512 RES=0x00 ACK PSH URGP=0 OPT
> (0101080A000980EB04A2C382)
> Feb 27 14:04:59 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=52 TOS=0x10
> PREC=0x00 TTL=64 ID=4385 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=27512 RES=0x00 ACK URGP=0 OPT
> (0101080A000980ED04A2C3CA)
> Feb 27 14:04:59 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=100 TOS=0x10
> PREC=0x00 TTL=64 ID=4386 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=27512 RES=0x00 ACK PSH URGP=0 OPT
> (0101080A0009810304A2C3CA)
> Feb 27 14:04:59 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=52 TOS=0x10
> PREC=0x00 TTL=64 ID=4387 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=27512 RES=0x00 ACK URGP=0 OPT
> (0101080A0009810604A2C3E2)
> Feb 27 14:04:59 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=100 TOS=0x10
> PREC=0x00 TTL=64 ID=4388 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=27512 RES=0x00 ACK PSH URGP=0 OPT
> (0101080A0009811F04A2C3E2)
> Feb 27 14:04:59 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=52 TOS=0x10
> PREC=0x00 TTL=64 ID=4389 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=27512 RES=0x00 ACK URGP=0 OPT
> (0101080A0009812204A2C3FE)
> Feb 27 14:04:59 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=100 TOS=0x10
> PREC=0x00 TTL=64 ID=4390 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=27512 RES=0x00 ACK PSH URGP=0 OPT
> (0101080A0009813304A2C3FE)
> Feb 27 14:04:59 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=52 TOS=0x10
> PREC=0x00 TTL=64 ID=4391 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=27512 RES=0x00 ACK URGP=0 OPT
> (0101080A0009813604A2C412)
> Feb 27 14:05:00 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=100 TOS=0x10
> PREC=0x00 TTL=64 ID=4392 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=27512 RES=0x00 ACK PSH URGP=0 OPT
> (0101080A0009814304A2C412)
> Feb 27 14:05:00 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=52 TOS=0x10
> PREC=0x00 TTL=64 ID=4393 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=27512 RES=0x00 ACK URGP=0 OPT
> (0101080A0009814604A2C422)
> Feb 27 14:05:01 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=100 TOS=0x10
> PREC=0x00 TTL=64 ID=4394 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=27512 RES=0x00 ACK PSH URGP=0 OPT
> (0101080A000981A204A2C422)
> Feb 27 14:05:01 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=52 TOS=0x10
> PREC=0x00 TTL=64 ID=4395 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=27512 RES=0x00 ACK URGP=0 OPT
> (0101080A000981A504A2C481)
> Feb 27 14:05:01 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=100 TOS=0x10
> PREC=0x00 TTL=64 ID=4396 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=27512 RES=0x00 ACK PSH URGP=0 OPT
> (0101080A000981B204A2C481)
> Feb 27 14:05:01 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=52 TOS=0x10
> PREC=0x00 TTL=64 ID=4397 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=27512 RES=0x00 ACK URGP=0 OPT
> (0101080A000981B504A2C491)
> Feb 27 14:05:01 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=100 TOS=0x10
> PREC=0x00 TTL=64 ID=4398 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=27512 RES=0x00 ACK PSH URGP=0 OPT
> (0101080A000981CD04A2C491)
> Feb 27 14:05:01 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=52 TOS=0x10
> PREC=0x00 TTL=64 ID=4399 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=27512 RES=0x00 ACK URGP=0 OPT
> (0101080A000981CF04A2C4AC)
> Feb 27 14:05:05 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=100 TOS=0x10
> PREC=0x00 TTL=64 ID=4400 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=27512 RES=0x00 ACK PSH URGP=0 OPT
> (0101080A0009835104A2C4AC)
> Feb 27 14:05:05 proxy kernel:
> SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> SRC=192.168.23.237 DST=192.168.23.10 LEN=52 TOS=0x10
> PREC=0x00 TTL=64 ID=4401 DF PROTO=TCP SPT=1132 DPT=22
> WINDOW=27512 RES=0x00 ACK URGP=0 OPT
> (0101080A0009835104A2C62E)
> proxy:/var/log #
> "
>
> Please tell me your solution... Should I allow
> "145.254.88.223"? But how?
>
> Thank you, Peer.
> --- Peer Stefan <stefan.peer(a)tiwag.at> wrote:
> > Hi
> > > From: Prabu Subroto
> > [mailto:prabu_subroto@yahoo.com]
> > > Dear my collegues...
> > >
> > > I have SuSE Linux 8.1 with SuSEfirewall2, BIND 8,
> > > ip-masquerading and squid server. This server use
> > ISDN
> > > dial up to arcor (www.arcor.de)
> > >
> > > Everything runs properly, I have opened "53 3128
> > 67 25
> > > 110". But after sometimes than my LAN User can not
> > > surfing to internet anymore but they still can use
> > > e-mail (pop and smtp) properly.I don't know when
> > the
> > > problem comes, lookslike after our ISP
> > reset/change
> > > the IP number of our ISDN card (I guess so).
> > >
> > > The LAN user can go to the internet only after I
> > > restart my SuSEfirewall, such as:
> > > "
> > > SuSEfirewall2 stop
> > > SuSEfirewall2 start
> > > "
> > >
> > > Thank you very much.
> >
> > Have a look at /var/log/messages -> are there any
> > entries which show dropped or rejected packages?
> >
> > >
> > > ps. If I start my SuSEfirewall2 than comes this
> > error
> > > message:
> > > "
> > > proxy:~ # SuSEfirewall2 start
> > > Warning: FW_SERVICE_DNS defined, but no DNS server
> > > found running!
> > > proxy:~ #
> > > "
> >
> > Does your DNS crash sometimes? Again look at
> > /var/log/messages, it's all in there ;-)
>
>
> __________________________________________________
> Do you Yahoo!?
> Yahoo! Tax Center - forms, calculators, tips, more
> http://taxes.yahoo.com/
>
> --
> Check the headers for your unsubscription address
> For additional commands, e-mail: suse-security-help(a)suse.com
> Security-related bug reports go to security(a)suse.de, not here
>
>
2
2
Hi,
I have the following in my /var/log/warn file :
Feb 28 13:51:37 plato kernel: SuSE-FW-ILLEGAL-TARGET IN=ppp0 OUT= MAC= SRC=xx.xx.xx.xx DST=224.0.0.1 LEN=28 TOS=0x00 PREC=0x00 TTL=1 ID=55846 PROTO=2
I've read that this message is basically a misconfigured router from my DSL supplier.
However what I'd like to know is, what can I add to my SuSEFirewall config so that I
can skip logging these messages (i.e. ignore any 224.0.0.1 messages )?
Thanks
CPH
3
3
Fwd: RE: [suse-security] My SuSEFirewall blocks something than my LAM can not surfing in internet anymore.
by Ian David Laws 28 Feb '03
by Ian David Laws 28 Feb '03
28 Feb '03
Hi Prabu
you see that it is ssh if you look at the destination port DST it is 22 or SSH
.
Ian
---------- Forwarded Message ----------
Subject: RE: [suse-security] My SuSEFirewall blocks something than my LAM can
not surfing in internet anymore.
Date: Fri, 28 Feb 2003 06:01:33 -0800 (PST)
From: Prabu Subroto <prabu_subroto(a)yahoo.com>
To: SuSE Security Milis <suse-security(a)suse.com>
Dear Peer....
I tried the command line from you. But the output is
empty...
I grep nothing...
I will repeat this threat from you if the problem
comes again.
Btw, how can you know that what I send to you was only
ssh?
Please help me, I am stucked...
--- Peer Stefan <stefan.peer(a)tiwag.at> wrote:
> Hi Prabu,
>
> Sorry to say so, but this trace shows nothing more
> than a connection-trace of your ssh-session (DPT=22
> ...).
> Don't tail /var/log/messages, it's quite big and
> gets filled really fast.
> Do a "cat /var/log/messages|grep DTP=80|grep -v
> DST=192.168.23.10" in order to get all the outgoing
> http-stuff.
>
> so long,
> Stefan
>
> btw. I'm called Stefan - it's a bit queer here in
> Austria, we always put the last name in front ;-)
>
> > From: Prabu Subroto
>
> [mailto:prabu_subroto@yahoo.com]
>
> > Dear my friend, Peer...
> >
> > Today morning, it happened again. I follow your
>
> advice
>
> > and this is the 60 lines of my "/var/log/messages"
> > file:
> > "
> > proxy:/var/log # tail -n 60 messages
> > Feb 27 14:04:49 proxy kernel:
> > SuSE-FW-ACCEPT-ALL-INTERNAL IN=eth0 OUT=
> > MAC=00:50:bf:77:77:d5:00:50:bf:77:80:49:08:00
> > SRC=192.168.23.237 DST=192.168.23.10 LEN=52
>
> TOS=0x10
>
> > PREC=0x00 TTL=64 ID=4343 DF PROTO=TCP SPT=1132
>
> DPT=22
>
2
1
RE: [suse-security] My SuSEFirewall blocks something than my LAM can not surfing in internet anymore.
by Peer Stefan 28 Feb '03
by Peer Stefan 28 Feb '03
28 Feb '03
Hi
> From: Prabu Subroto [mailto:prabu_subroto@yahoo.com]
> Dear my collegues...
>
> I have SuSE Linux 8.1 with SuSEfirewall2, BIND 8,
> ip-masquerading and squid server. This server use ISDN
> dial up to arcor (www.arcor.de)
>
> Everything runs properly, I have opened "53 3128 67 25
> 110". But after sometimes than my LAN User can not
> surfing to internet anymore but they still can use
> e-mail (pop and smtp) properly.I don't know when the
> problem comes, lookslike after our ISP reset/change
> the IP number of our ISDN card (I guess so).
>
> The LAN user can go to the internet only after I
> restart my SuSEfirewall, such as:
> "
> SuSEfirewall2 stop
> SuSEfirewall2 start
> "
>
> Thank you very much.
Have a look at /var/log/messages -> are there any entries which show dropped or rejected packages?
>
> ps. If I start my SuSEfirewall2 than comes this error
> message:
> "
> proxy:~ # SuSEfirewall2 start
> Warning: FW_SERVICE_DNS defined, but no DNS server
> found running!
> proxy:~ #
> "
Does your DNS crash sometimes? Again look at /var/log/messages, it's all in there ;-)
2
1
28 Feb '03
Dear my friends....
I am using SuSE Linux 8.1 for our internet gateway. I
installed Squid, SuSEfirewall2 and ip-masquerading on
the Linux-Box.
It runs properly after a couple of hours in one day
but than my LAN user can not surfing in internet
anymore. If the problem comes, my LAN user still can
use e-mail through IP-Masquerading but not http.
If the problem comes than I have to restart the
SuSEfirewall2 with:
"
SuSEfirewall2 stop
SuSEfirewall2 start
"
After restarting the SuSEfirewall2 than my LAN user
can surfing in internet back (again).
If I restart my SuSEfirewall I got this error message:
"
proxy:~ # SuSEfirewall2 stop
Removing filter rules ...
SuSEfirewall2: clearing rules now ... done
proxy:~ # SuSEfirewall2 start
Warning: FW_SERVICE_DNS defined, but no DNS server
found running!
proxy:~ #
"
Here is my "/var/log/messages":
"
patrixlinux@patrix:~/arsip> tail -n 60 ./fromproxy
Feb 27 13:14:17 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=ippp0 OUT= MAC= SRC=145.
253.2.196 DST=145.254.88.223 LEN=117 TOS=0x00
PREC=0x00 TTL=247 ID=38389 DF PROT
O=UDP SPT=53 DPT=1096 LEN=97
Feb 27 13:14:17 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=ippp0 OUT= MAC= SRC=145.
253.2.139 DST=145.254.88.223 LEN=301 TOS=0x00
PREC=0x00 TTL=246 ID=35450 DF PROT
O=UDP SPT=53 DPT=1096 LEN=281
Feb 27 13:14:23 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=ippp0 OUT= MAC= SRC=145.
253.2.196 DST=145.254.88.223 LEN=117 TOS=0x00
PREC=0x00 TTL=247 ID=38390 DF PROT
O=UDP SPT=53 DPT=1096 LEN=97
Feb 27 13:14:23 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=ippp0 OUT= MAC= SRC=145.
253.2.139 DST=145.254.88.223 LEN=301 TOS=0x00
PREC=0x00 TTL=246 ID=35451 DF PROT
O=UDP SPT=53 DPT=1096 LEN=281
Feb 27 13:14:24 proxy squid[8941]: idnsCheckQueue: ID
5c4: giving up after 35 tr
ies and 310.0 seconds
Feb 27 13:14:24 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=ippp0 OUT= MAC= SRC=145.
253.2.196 DST=145.254.88.223 LEN=96 TOS=0x00 PREC=0x00
TTL=247 ID=38391 DF PROTO
=UDP SPT=53 DPT=1096 LEN=76
Feb 27 13:14:24 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=ippp0 OUT= MAC= SRC=145.
253.2.139 DST=145.254.88.223 LEN=117 TOS=0x00
PREC=0x00 TTL=246 ID=35452 DF PROT
O=UDP SPT=53 DPT=1096 LEN=97
Feb 27 13:14:28 proxy squid[8941]: idnsCheckQueue: ID
5c5: giving up after 34 tr
ies and 302.7 seconds
Feb 27 13:14:28 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=ippp0 OUT= MAC= SRC=145.
253.2.196 DST=145.254.88.223 LEN=301 TOS=0x00
PREC=0x00 TTL=247 ID=38392 DF PROT
O=UDP SPT=53 DPT=1096 LEN=281
Feb 27 13:14:33 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=eth0 OUT= MAC=ff:ff:ff:f
f:ff:ff:00:50:bf:77:77:f8:08:00 SRC=192.168.23.238
DST=192.168.23.0 LEN=173 TOS=
0x00 PREC=0x00 TTL=64 ID=61439 DF PROTO=UDP SPT=631
DPT=631 LEN=153
Feb 27 13:14:33 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=eth0 OUT= MAC=ff:ff:ff:f
f:ff:ff:00:50:bf:77:77:f8:08:00 SRC=192.168.23.238
DST=192.168.23.0 LEN=173 TOS=
0x00 PREC=0x00 TTL=64 ID=61440 DF PROTO=UDP SPT=631
DPT=631 LEN=153
Feb 27 13:14:33 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=eth0 OUT= MAC=ff:ff:ff:f
f:ff:ff:00:50:bf:77:77:f8:08:00 SRC=192.168.23.238
DST=192.168.23.0 LEN=171 TOS=
0x00 PREC=0x00 TTL=64 ID=61441 DF PROTO=UDP SPT=631
DPT=631 LEN=151
Feb 27 13:14:33 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=eth0 OUT= MAC=ff:ff:ff:f
f:ff:ff:00:50:bf:77:77:f8:08:00 SRC=192.168.23.238
DST=192.168.23.0 LEN=174 TOS=
0x00 PREC=0x00 TTL=64 ID=61442 DF PROTO=UDP SPT=631
DPT=631 LEN=154
Feb 27 13:14:33 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=ippp0 OUT= MAC= SRC=145.
253.2.196 DST=145.254.88.223 LEN=301 TOS=0x00
PREC=0x00 TTL=247 ID=38393 DF PROT
O=UDP SPT=53 DPT=1096 LEN=281
Feb 27 13:14:33 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=ippp0 OUT= MAC= SRC=145.
253.2.139 DST=145.254.88.223 LEN=96 TOS=0x00 PREC=0x00
TTL=246 ID=35453 DF PROTO
=UDP SPT=53 DPT=1096 LEN=76
Feb 27 13:14:35 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=ippp0 OUT= MAC= SRC=145.
253.2.196 DST=145.254.88.223 LEN=117 TOS=0x00
PREC=0x00 TTL=247 ID=38394 DF PROT
O=UDP SPT=53 DPT=1096 LEN=97
Feb 27 13:14:35 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=ippp0 OUT= MAC= SRC=145.
253.2.139 DST=145.254.88.223 LEN=301 TOS=0x00
PREC=0x00 TTL=246 ID=35454 DF PROT
O=UDP SPT=53 DPT=1096 LEN=281
Feb 27 13:14:40 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=ippp0 OUT= MAC= SRC=145.
253.2.139 DST=145.254.88.223 LEN=301 TOS=0x00
PREC=0x00 TTL=246 ID=35455 DF PROT
O=UDP SPT=53 DPT=1096 LEN=281
Feb 27 13:14:44 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=ippp0 OUT= MAC= SRC=145.
253.2.196 DST=145.254.88.223 LEN=96 TOS=0x00 PREC=0x00
TTL=247 ID=38395 DF PROTO
=UDP SPT=53 DPT=1096 LEN=76
Feb 27 13:14:44 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=ippp0 OUT= MAC= SRC=145.
253.2.139 DST=145.254.88.223 LEN=117 TOS=0x00
PREC=0x00 TTL=246 ID=35456 DF PROT
O=UDP SPT=53 DPT=1096 LEN=97
Feb 27 13:14:46 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=ippp0 OUT= MAC= SRC=145.
253.2.196 DST=145.254.88.223 LEN=301 TOS=0x00
PREC=0x00 TTL=247 ID=38396 DF PROT
O=UDP SPT=53 DPT=1096 LEN=281
Feb 27 13:14:47 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=eth0 OUT= MAC=ff:ff:ff:f
f:ff:ff:00:50:bf:77:77:f8:08:00 SRC=192.168.23.238
DST=192.168.23.0 LEN=174 TOS=
0x00 PREC=0x00 TTL=64 ID=61555 DF PROTO=UDP SPT=631
DPT=631 LEN=154
Feb 27 13:14:51 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=ippp0 OUT= MAC= SRC=145.
253.2.196 DST=145.254.88.223 LEN=301 TOS=0x00
PREC=0x00 TTL=247 ID=38397 DF PROT
O=UDP SPT=53 DPT=1096 LEN=281
Feb 27 13:14:51 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=ippp0 OUT= MAC= SRC=145.
253.2.139 DST=145.254.88.223 LEN=96 TOS=0x00 PREC=0x00
TTL=246 ID=35457 DF PROTO
=UDP SPT=53 DPT=1096 LEN=76
Feb 27 13:14:54 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=ippp0 OUT= MAC= SRC=145.
253.2.196 DST=145.254.88.223 LEN=117 TOS=0x00
PREC=0x00 TTL=247 ID=38398 DF PROT
O=UDP SPT=53 DPT=1096 LEN=97
Feb 27 13:14:54 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=ippp0 OUT= MAC= SRC=145.
253.2.139 DST=145.254.88.223 LEN=301 TOS=0x00
PREC=0x00 TTL=246 ID=35458 DF PROT
O=UDP SPT=53 DPT=1096 LEN=281
Feb 27 13:14:56 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=ippp0 OUT= MAC= SRC=145.
253.2.139 DST=145.254.88.223 LEN=301 TOS=0x00
PREC=0x00 TTL=246 ID=35459 DF PROT
O=UDP SPT=53 DPT=1096 LEN=281
Feb 27 13:15:01 proxy squid[8941]: idnsCheckQueue: ID
5c6: giving up after 33 tr
ies and 301.9 seconds
Feb 27 13:15:01 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=ippp0 OUT= MAC= SRC=145.
253.2.139 DST=145.254.88.223 LEN=117 TOS=0x00
PREC=0x00 TTL=246 ID=35460 DF PROT
O=UDP SPT=53 DPT=1096 LEN=97
Feb 27 13:15:04 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=eth0 OUT= MAC=ff:ff:ff:f
f:ff:ff:00:50:bf:77:77:f8:08:00 SRC=192.168.23.238
DST=192.168.23.0 LEN=173 TOS=
0x00 PREC=0x00 TTL=64 ID=61623 DF PROTO=UDP SPT=631
DPT=631 LEN=153
Feb 27 13:15:04 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=eth0 OUT= MAC=ff:ff:ff:f
f:ff:ff:00:50:bf:77:77:f8:08:00 SRC=192.168.23.238
DST=192.168.23.0 LEN=173 TOS=
0x00 PREC=0x00 TTL=64 ID=61624 DF PROTO=UDP SPT=631
DPT=631 LEN=153
Feb 27 13:15:04 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=eth0 OUT= MAC=ff:ff:ff:f
f:ff:ff:00:50:bf:77:77:f8:08:00 SRC=192.168.23.238
DST=192.168.23.0 LEN=171 TOS=
0x00 PREC=0x00 TTL=64 ID=61625 DF PROTO=UDP SPT=631
DPT=631 LEN=151
Feb 27 13:15:04 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=eth0 OUT= MAC=ff:ff:ff:f
f:ff:ff:00:50:bf:77:77:f8:08:00 SRC=192.168.23.238
DST=192.168.23.0 LEN=174 TOS=
0x00 PREC=0x00 TTL=64 ID=61626 DF PROTO=UDP SPT=631
DPT=631 LEN=154
Feb 27 13:15:05 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=ippp0 OUT= MAC= SRC=217.
225.240.146 DST=145.254.88.223 LEN=60 TOS=0x00
PREC=0x00 TTL=54 ID=13525 DF PROT
O=TCP SPT=2539 DPT=4662 WINDOW=15972 RES=0x00 SYN
URGP=0 OPT (020405840402080A00
5A2CC70000000001030300)
Feb 27 13:15:05 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=ippp0 OUT= MAC= SRC=145.
253.2.196 DST=145.254.88.223 LEN=301 TOS=0x00
PREC=0x00 TTL=247 ID=38399 DF PROT
O=UDP SPT=53 DPT=1096 LEN=281
Feb 27 13:15:07 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=ippp0 OUT= MAC= SRC=145.
253.2.196 DST=145.254.88.223 LEN=301 TOS=0x00
PREC=0x00 TTL=247 ID=38400 DF PROT
O=UDP SPT=53 DPT=1096 LEN=281
Feb 27 13:15:08 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=ippp0 OUT= MAC= SRC=217.
225.240.146 DST=145.254.88.223 LEN=60 TOS=0x00
PREC=0x00 TTL=54 ID=13724 DF PROT
O=TCP SPT=2539 DPT=4662 WINDOW=15972 RES=0x00 SYN
URGP=0 OPT (020405840402080A00
5A2DF30000000001030300)
Feb 27 13:15:11 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=ippp0 OUT= MAC= SRC=145.
253.2.196 DST=145.254.88.223 LEN=117 TOS=0x00
PREC=0x00 TTL=247 ID=38401 DF PROT
O=UDP SPT=53 DPT=1096 LEN=97
Feb 27 13:15:11 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=ippp0 OUT= MAC= SRC=145.
253.2.139 DST=145.254.88.223 LEN=301 TOS=0x00
PREC=0x00 TTL=246 ID=35461 DF PROT
O=UDP SPT=53 DPT=1096 LEN=281
Feb 27 13:15:11 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=ippp0 OUT= MAC= SRC=145.
253.2.139 DST=145.254.88.223 LEN=301 TOS=0x00
PREC=0x00 TTL=246 ID=35462 DF PROT
O=UDP SPT=53 DPT=1096 LEN=281
Feb 27 13:15:14 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=ippp0 OUT= MAC= SRC=217.
225.240.146 DST=145.254.88.223 LEN=60 TOS=0x00
PREC=0x00 TTL=54 ID=14050 DF PROT
O=TCP SPT=2539 DPT=4662 WINDOW=15972 RES=0x00 SYN
URGP=0 OPT (020405840402080A00
5A304B0000000001030300)
Feb 27 13:15:17 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=ippp0 OUT= MAC= SRC=145.
253.2.139 DST=145.254.88.223 LEN=117 TOS=0x00
PREC=0x00 TTL=246 ID=35463 DF PROT
O=UDP SPT=53 DPT=1096 LEN=97
Feb 27 13:15:18 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=eth0 OUT= MAC=ff:ff:ff:f
f:ff:ff:00:50:bf:77:77:f8:08:00 SRC=192.168.23.238
DST=192.168.23.0 LEN=174 TOS=
0x00 PREC=0x00 TTL=64 ID=61697 DF PROTO=UDP SPT=631
DPT=631 LEN=154
Feb 27 13:15:21 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=ippp0 OUT= MAC= SRC=145.
253.2.196 DST=145.254.88.223 LEN=301 TOS=0x00
PREC=0x00 TTL=247 ID=38402 DF PROT
O=UDP SPT=53 DPT=1096 LEN=281
Feb 27 13:15:21 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=ippp0 OUT= MAC= SRC=145.
253.2.196 DST=145.254.88.223 LEN=301 TOS=0x00
PREC=0x00 TTL=247 ID=38403 DF PROT
O=UDP SPT=53 DPT=1096 LEN=281
Feb 27 13:15:26 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=ippp0 OUT= MAC= SRC=217.
225.240.146 DST=145.254.88.223 LEN=60 TOS=0x00
PREC=0x00 TTL=54 ID=14661 DF PROT
O=TCP SPT=2539 DPT=4662 WINDOW=15972 RES=0x00 SYN
URGP=0 OPT (020405840402080A00
5A34FB0000000001030300)
Feb 27 13:15:28 proxy squid[8941]: idnsCheckQueue: ID
5c7: giving up after 34 tr
ies and 303.1 seconds
Feb 27 13:15:28 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=ippp0 OUT= MAC= SRC=145.
253.2.196 DST=145.254.88.223 LEN=117 TOS=0x00
PREC=0x00 TTL=247 ID=38404 DF PROT
O=UDP SPT=53 DPT=1096 LEN=97
Feb 27 13:15:28 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=ippp0 OUT= MAC= SRC=145.
253.2.139 DST=145.254.88.223 LEN=301 TOS=0x00
PREC=0x00 TTL=246 ID=35464 DF PROT
O=UDP SPT=53 DPT=1096 LEN=281
Feb 27 13:15:31 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=ippp0 OUT= MAC= SRC=195.
202.35.106 DST=145.254.88.223 LEN=48 TOS=0x00
PREC=0x00 TTL=113 ID=4772 DF PROTO
=TCP SPT=2896 DPT=4662 WINDOW=16384 RES=0x00 SYN
URGP=0 OPT (0204058601010402)
Feb 27 13:15:34 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=ippp0 OUT= MAC= SRC=145.
253.2.139 DST=145.254.88.223 LEN=117 TOS=0x00
PREC=0x00 TTL=246 ID=35465 DF PROT
O=UDP SPT=53 DPT=1096 LEN=97
Feb 27 13:15:34 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=ippp0 OUT= MAC= SRC=195.
202.35.106 DST=145.254.88.223 LEN=48 TOS=0x00
PREC=0x00 TTL=113 ID=4891 DF PROTO
=TCP SPT=2896 DPT=4662 WINDOW=16384 RES=0x00 SYN
URGP=0 OPT (0204058601010402)
Feb 27 13:15:35 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=eth0 OUT= MAC=ff:ff:ff:f
f:ff:ff:00:50:bf:77:77:f8:08:00 SRC=192.168.23.238
DST=192.168.23.0 LEN=173 TOS=
0x00 PREC=0x00
TTL=64 ID=61792 DF PROTO=UDP SPT=631 DPT=631 LEN=153
Feb 27 13:15:35 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=eth0 OUT= MAC=ff:ff:ff:f
f:ff:ff:00:50:bf:77:77:f8:08:00 SRC=192.168.23.238
DST=192.168.23.0 LEN=173 TOS=
0x00 PREC=0x00
TTL=64 ID=61793 DF PROTO=UDP SPT=631 DPT=631 LEN=153
Feb 27 13:15:35 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=eth0 OUT= MAC=ff:ff:ff:f
f:ff:ff:00:50:bf:77:77:f8:08:00 SRC=192.168.23.238
DST=192.168.23.0 LEN=171 TOS=
0x00 PREC=0x00
TTL=64 ID=61794 DF PROTO=UDP SPT=631 DPT=631 LEN=151
Feb 27 13:15:35 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=eth0 OUT= MAC=ff:ff:ff:f
f:ff:ff:00:50:bf:77:77:f8:08:00 SRC=192.168.23.238
DST=192.168.23.0 LEN=174 TOS=
0x00 PREC=0x00
TTL=64 ID=61795 DF PROTO=UDP SPT=631 DPT=631 LEN=154
Feb 27 13:15:39 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=ippp0 OUT= MAC= SRC=145.
253.2.196
DST=145.254.88.223 LEN=301 TOS=0x00 PREC=0x00 TTL=247
ID=38405 DF PROT
O=UDP SPT=53 DPT=1096 LEN=281
Feb 27 13:15:40 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=ippp0 OUT= MAC= SRC=195.
202.35.106
DST=145.254.88.223 LEN=48 TOS=0x00 PREC=0x00 TTL=113
ID=5137 DF PROTO
=TCP SPT=2896 DPT=4662
WINDOW=16384 RES=0x00 SYN URGP=0 OPT
(0204058601010402)
Feb 27 13:15:45 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=ippp0 OUT= MAC= SRC=145.
253.2.196
DST=145.254.88.223 LEN=117 TOS=0x00 PREC=0x00 TTL=247
ID=38406 DF PROT
O=UDP SPT=53 DPT=1096 LEN=97
Feb 27 13:15:45 proxy kernel: SuSE-FW-ILLEGAL-TARGET
IN=ippp0 OUT= MAC= SRC=145.
253.2.139
DST=145.254.88.223 LEN=301 TOS=0x00 PREC=0x00 TTL=246
ID=35466 DF PROT
O=UDP SPT=53 DPT=1096 LEN=281
patrixlinux@patrix:~/arsip>
"
Please help me to solve this problem.
I still can not understand. Should I allow
"145.254.88.223"? How?
Thank you very much.
Thank you very much in advance.
__________________________________________________
Do you Yahoo!?
Yahoo! Tax Center - forms, calculators, tips, more
http://taxes.yahoo.com/
1
0
-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
SuSE Security Announcement
Package: hypermail
Announcement-ID: SuSE-SA:2003:0012
Date: Thursday, Feb 27th 2003 18:30 MET
Affected products: 7.1, 7.2, 7.3, 8.0, 8.1
Vulnerability Type: remote system compromise
Severity (1-10): 4
SuSE default package: no
Cross References: CAN-2003-0025
Content of this advisory:
1) security vulnerability resolved: several bugs after source code
review
problem description, discussion, solution and upgrade information
2) pending vulnerabilities, solutions, workarounds:
- vnc
- w3m
3) standard appendix (further information)
______________________________________________________________________________
1) problem description, brief discussion, solution, upgrade information
Hypermail is a tool to convert a Unix mail-box file to a set of cross-
referenced HTML documents.
During an internal source code review done by Thomas Biege several bugs
where found in hypermail and its tools. These bugs allow remote code
execution, local tmp race conditions, denial-of-service conditions and
read access to files belonging to the host hypermail is running on.
Additionally the mail CGI program can be abused by spammers as email-
relay and should thus be disabled.
There is no temporary fix known other then disabling hypermail. Please
download and install the new packages from our FTP servers.
Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command "rpm -Fhv file.rpm" to apply
the update.
Our maintenance customers are being notified individually. The packages
are being offered to install from the maintenance web.
Intel i386 Platform:
SuSE-8.1:
ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/hypermail-2.1.4-58.i58…
a4b683703b65cb65d0d1b246c2bf652d
patch rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/hypermail-2.1.4-58.i58…
9e087a97c250c8987dda03da43e0dd1e
source rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/src/hypermail-2.1.4-58.src.…
9d95d9872a3ed98a4dbff25e952335d7
SuSE-8.0:
ftp://ftp.suse.com/pub/suse/i386/update/8.0/ap4/hypermail-2.1.3-234.i386.rpm
53bdfc3ca1ab0c504f460ac7a18ba42e
source rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/8.0/zq1/hypermail-2.1.3-234.src.rpm
be0df42b666fc59e38babd671479d2f1
SuSE-7.3:
ftp://ftp.suse.com/pub/suse/i386/update/7.3/ap2/hypermail-2.1.2-141.i386.rpm
81194dcbb3cf149f67eac9948dd79db9
source rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/7.3/zq1/hypermail-2.1.2-141.src.rpm
9a02ce79e81bab281c418070fa91dbde
SuSE-7.2:
ftp://ftp.suse.com/pub/suse/i386/update/7.2/ap2/hypermail-2.1.0-91.i386.rpm
d61f52df6c995b65e16a4141b1b7efa1
source rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/7.2/zq1/hypermail-2.1.0-91.src.rpm
66b65eed8f2daefde8115abf77511bba
SuSE-7.1:
ftp://ftp.suse.com/pub/suse/i386/update/7.1/ap2/hypermail-2.0b29-59.i386.rpm
698338c7d9b8961ec3d4f4ab99ee2436
source rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/7.1/zq1/hypermail-2.0b29-59.src.rpm
8db31cd4981ee84a0333ec8200443bef
Sparc Platform:
SuSE-7.3:
ftp://ftp.suse.com/pub/suse/sparc/update/7.3/ap2/hypermail-2.1.2-40.sparc.r…
341757885457f2e4b018dbb132f1a8f8
source rpm(s):
ftp://ftp.suse.com/pub/suse/sparc/update/7.3/zq1/hypermail-2.1.2-40.src.rpm
cdc92a18900996524768914c79bf20d9
AXP Alpha Platform:
SuSE-7.1:
ftp://ftp.suse.com/pub/suse/axp/update/7.1/ap2/hypermail-2.0b29-37.alpha.rpm
980f217c12affcb3c0a6d0fd916a5115
source rpm(s):
ftp://ftp.suse.com/pub/suse/axp/update/7.1/zq1/hypermail-2.0b29-37.src.rpm
a2242ecc8ba2a13c3d18ca94e6ba23f0
PPC Power PC Platform:
SuSE-7.3:
ftp://ftp.suse.com/pub/suse/ppc/update/7.3/ap2/hypermail-2.1.2-98.ppc.rpm
6c7a197fe18a95b7594b2cd7b572837a
source rpm(s):
ftp://ftp.suse.com/pub/suse/ppc/update/7.3/zq1/hypermail-2.1.2-98.src.rpm
e370de5432545f06731c9f841bc84054
SuSE-7.1:
ftp://ftp.suse.com/pub/suse/ppc/update/7.1/ap2/hypermail-2.0b29-38.ppc.rpm
64b3be05678f4789985824e31f8335d2
source rpm(s):
ftp://ftp.suse.com/pub/suse/ppc/update/7.1/zq1/hypermail-2.0b29-38.src.rpm
4cd2b65522738594d0b60333f807b8b2
______________________________________________________________________________
2) Pending vulnerabilities in SuSE Distributions and Workarounds:
- vnc
VNC (Virtual Network Computing) uses a weak cookie generation process
which can be exploited by an attacker to bypass authentication.
New packages are currently being tested and will be available on our
FTP servers soon.
- w3m
The textbased web-browser w3m does not properly escape HTML tags.
A malicious HTML page or img alt attribute may lead to information
leakage. New packages will be available soon.
______________________________________________________________________________
3) standard appendix: authenticity verification, additional information
- Package authenticity verification:
SuSE update packages are available on many mirror ftp servers all over
the world. While this service is being considered valuable and important
to the free and open source software community, many users wish to be
sure about the origin of the package and its content before installing
the package. There are two verification methods that can be used
independently from each other to prove the authenticity of a downloaded
file or rpm package:
1) md5sums as provided in the (cryptographically signed) announcement.
2) using the internal gpg signatures of the rpm package.
1) execute the command
md5sum <name-of-the-file.rpm>
after you downloaded the file from a SuSE ftp server or its mirrors.
Then, compare the resulting md5sum with the one that is listed in the
announcement. Since the announcement containing the checksums is
cryptographically signed (usually using the key security(a)suse.de)
the checksums show proof of the authenticity of the package.
We disrecommend to subscribe to security lists which cause the
email message containing the announcement to be modified so that
the signature does not match after transport through the mailing
list software.
Downsides: You must be able to verify the authenticity of the
announcement in the first place. If RPM packages are being rebuilt
and a new version of a package is published on the ftp server, all
md5 sums for the files are useless.
2) rpm package signatures provide an easy way to verify the authenticity
of an rpm package. Use the command
rpm -v --checksig <file.rpm>
to verify the signature of the package, where <file.rpm> is the
filename of the rpm package that you have downloaded. Of course,
package authenticity verification can only target an un-installed rpm
package file.
Prerequisites:
a) gpg is installed
b) The package is signed using a certain key. The public part of this
key must be installed by the gpg program in the directory
~/.gnupg/ under the user's home directory who performs the
signature verification (usually root). You can import the key
that is used by SuSE in rpm packages for SuSE Linux by saving
this announcement to a file ("announcement.txt") and
running the command (do "su -" to be root):
gpg --batch; gpg < announcement.txt | gpg --import
SuSE Linux distributions version 7.1 and thereafter install the
key "build(a)suse.de" upon installation or upgrade, provided that
the package gpg is installed. The file containing the public key
is placed at the top-level directory of the first CD (pubring.gpg)
and at ftp://ftp.suse.com/pub/suse/pubring.gpg-build.suse.de .
- SuSE runs two security mailing lists to which any interested party may
subscribe:
suse-security(a)suse.com
- general/linux/SuSE security discussion.
All SuSE security announcements are sent to this list.
To subscribe, send an email to
<suse-security-subscribe(a)suse.com>.
suse-security-announce(a)suse.com
- SuSE's announce-only mailing list.
Only SuSE's security announcements are sent to this list.
To subscribe, send an email to
<suse-security-announce-subscribe(a)suse.com>.
For general information or the frequently asked questions (faq)
send mail to:
<suse-security-info(a)suse.com> or
<suse-security-faq(a)suse.com> respectively.
=====================================================================
SuSE's security contact is <security(a)suse.com> or <security(a)suse.de>.
The <security(a)suse.de> public key is listed below.
=====================================================================
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way. In particular,
it is desired that the clear-text signature shows proof of the
authenticity of the text.
SuSE Linux AG makes no warranties of any kind whatsoever with respect
to the information contained in this security advisory.
Type Bits/KeyID Date User ID
pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team <security(a)suse.de>
pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build(a)suse.de>
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org
mQGiBDnu9IERBACT8Y35+2vv4MGVKiLEMOl9GdST6MCkYS3yEKeueNWc+z/0Kvff
4JctBsgs47tjmiI9sl0eHjm3gTR8rItXMN6sJEUHWzDP+Y0PFPboMvKx0FXl/A0d
M+HFrruCgBlWt6FA+okRySQiliuI5phwqkXefl9AhkwR8xocQSVCFxcwvwCglVcO
QliHu8jwRQHxlRE0tkwQQI0D+wfQwKdvhDplxHJ5nf7U8c/yE/vdvpN6lF0tmFrK
XBUX+K7u4ifrZlQvj/81M4INjtXreqDiJtr99Rs6xa0ScZqITuZC4CWxJa9GynBE
D3+D2t1V/f8l0smsuYoFOF7Ib49IkTdbtwAThlZp8bEhELBeGaPdNCcmfZ66rKUd
G5sRA/9ovnc1krSQF2+sqB9/o7w5/q2qiyzwOSTnkjtBUVKn4zLUOf6aeBAoV6NM
CC3Kj9aZHfA+ND0ehPaVGJgjaVNFhPi4x0e7BULdvgOoAqajLfvkURHAeSsxXIoE
myW/xC1sBbDkDUIBSx5oej73XCZgnj/inphRqGpsb+1nKFvF+rQoU3VTRSBQYWNr
YWdlIFNpZ25pbmcgS2V5IDxidWlsZEBzdXNlLmRlPohcBBMRAgAcBQI57vSBBQkD
wmcABAsKAwQDFQMCAxYCAQIXgAAKCRCoTtronIAKyl8sAJ98BgD40zw0GHJHIf6d
NfnwI2PAsgCgjH1+PnYEl7TFjtZsqhezX7vZvYCIRgQQEQIABgUCOnBeUgAKCRCe
QOMQAAqrpNzOAKCL512FZvv4VZx94TpbA9lxyoAejACeOO1HIbActAevk5MUBhNe
LZa/qM2JARUDBRA6cGBvd7LmAD0l09kBATWnB/9An5vfiUUE1VQnt+T/EYklES3t
XXaJJp9pHMa4fzFa8jPVtv5UBHGee3XoUNDVwM2OgSEISZxbzdXGnqIlcT08TzBU
D9i579uifklLsnr35SJDZ6ram51/CWOnnaVhUzneOA9gTPSr+/fT3WeVnwJiQCQ3
0kNLWVXWATMnsnT486eAOlT6UNBPYQLpUprF5Yryk23pQUPAgJENDEqeU6iIO9Ot
1ZPtB0lniw+/xCi13D360o1tZDYOp0hHHJN3D3EN8C1yPqZd5CvvznYvB6bWBIpW
cRgdn2DUVMmpU661jwqGlRz1F84JG/xe4jGuzgpJt9IXSzyohEJB6XG5+D0BiF0E
ExECAB0FAjxqqTQFCQoAgrMFCwcKAwQDFQMCAxYCAQIXgAAKCRCoTtronIAKyp1f
AJ9dR7saz2KPNwD3U+fy/0BDKXrYGACfbJ8fQcJqCBQxeHvt9yMPDVq0B0W5Ag0E
Oe70khAIAISR0E3ozF/la+oNaRwxHLrCet30NgnxRROYhPaJB/Tu1FQokn2/Qld/
HZnh3TwhBIw1FqrhWBJ7491iAjLR9uPbdWJrn+A7t8kSkPaF3Z/6kyc5a8fas44h
t5h+6HMBzoFCMAq2aBHQRFRNp9Mz1ZvoXXcI1lk1l8OqcUM/ovXbDfPcXsUVeTPT
tGzcAi2jVl9hl3iwJKkyv/RLmcusdsi8YunbvWGFAF5GaagYQo7YlF6UaBQnYJTM
523AMgpPQtsKm9o/w9WdgXkgWhgkhZEeqUS3m5xNey1nLu9iMvq9M/iXnGz4sg6Q
2Y+GqZ+yAvNWjRRou3zSE7Bzg28MI4sAAwYH/2D71Xc5HPDgu87WnBFgmp8MpSr8
QnSs0wwPg3xEullGEocolSb2c0ctuSyeVnCttJMzkukL9TqyF4s/6XRstWirSWaw
JxRLKH6Zjo/FaKsshYKf8gBkAaddvpl3pO0gmUYbqmpQ3xDEYlhCeieXS5MkockQ
1sj2xYdB1xO0ExzfiCiscUKjUFy+mdzUsUutafuZ+gbHog1CN/ccZCkxcBa5IFCH
ORrNjq9pYWlrxsEn6ApsG7JJbM2besW1PkdEoxak74z1senh36m5jQvVjA3U4xq1
wwylxadmmJaJHzeiLfb7G1ZRjZTsB7fyYxqDzMVul6o9BSwO/1XsIAnV1uuITAQY
EQIADAUCOe70kgUJA8JnAAAKCRCoTtronIAKyksiAJsFB3/77SkH3JlYOGrEe1Ol
0JdGwACeKTttgeVPFB+iGJdiwQlxasOfuXyITAQYEQIADAUCPGqpWQUJCgCCxwAK
CRCoTtronIAKyofBAKCSZM2UFyta/fe9WgITK9I5hbxxtQCfX+0ar2CZmSknn3co
SPihn1+OBNyZAQ0DNuEtBAAAAQgAoCRcd7SVZEFcumffyEwfLTcXQjhKzOahzxpo
omuF+HIyU4AGq+SU8sTZ/1SsjhdzzrSAfv1lETACA+3SmLr5KV40Us1w0UC64cwt
A46xowVq1vMlH2Lib+V/qr3b1hE67nMHjysECVx9Ob4gFuKNoR2eqnAaJvjnAT8J
/LoUC20EdCHUqn6v+M9t/WZgC+WNR8cq69uDy3YQhDP/nIan6fm2uf2kSV9A7ZxE
GrwsWl/WX5Q/sQqMWaU6r4az98X3z90/cN+eJJ3vwtA+rm+nxEvyev+jaLuOQBDf
ebh/XA4FZ35xmi+spdiVeJH4F/ubaGlmj7+wDOF3suYAPSXT2QAFEbQlU3VTRSBT
ZWN1cml0eSBUZWFtIDxzZWN1cml0eUBzdXNlLmRlPokBFQMFEDbhLUfkWLKHsco8
RQEBVw4H/1vIdiOLX/7hdzYaG9crQVIk3QwaB5eBbjvLEMvuCZHiY2COUg5QdmPQ
8SlWNZ6k4nu1BLcv2g/pymPUWP9fG4tuSnlUJDrWGm3nhyhAC9iudP2u1YQY37Gb
B6NPVaZiYMnEb4QYFcqv5c/r2ghSXUTYk7etd6SW6WCOpEqizhx1cqDKNZnsI/1X
11pFcO2N7rc6byDBJ1T+cK+F1Ehan9XBt/shryJmv04nli5CXQMEbiqYYMOu8iaA
8AWRgXPCWqhyGhcVD3LRhUJXjUOdH4ZiHCXaoF3zVPxpeGKEQY8iBrDeDyB3wHmj
qY9WCX6cmogGQRgYG6yJqDalLqrDOdmJARUDBRA24S0Ed7LmAD0l09kBAW04B/4p
WH3f1vQn3i6/+SmDjGzUu2GWGq6Fsdwo2hVM2ym6CILeow/K9JfhdwGvY8LRxWRL
hn09j2IJ9P7H1Yz3qDf10AX6V7YILHtchKT1dcngCkTLmDgC4rs1iAAl3f089sRG
BafGPGKv2DQjHfR1LfRtbf0P7c09Tkej1MP8HtQMW9hPkBYeXcwbCjdrVGFOzqx+
AvvJDdT6a+oyRMTFlvmZ83UV5pgoyimgjhWnM1V4bFBYjPrtWMkdXJSUXbR6Q7Pi
RZWCzGRzwbaxqpl3rK/YTCphOLwEMB27B4/fcqtBzgoMOiaZA0M5fFoo54KgRIh0
zinsSx2OrWgvSiLEXXYKiEYEEBECAAYFAjseYcMACgkQnkDjEAAKq6ROVACgjhDM
/3KM+iFjs5QXsnd4oFPOnbkAnjYGa1J3em+bmV2aiCdYXdOuGn4ZiQCVAwUQN7c7
whaQN/7O/JIVAQEB+QP/cYblSAmPXxSFiaHWB+MiUNw8B6ozBLK0QcMQ2YcL6+Vl
D+nSZP20+Ja2nfiKjnibCv5ss83yXoHkYk2Rsa8foz6Y7tHwuPiccvqnIC/c9Cvz
dbIsdxpfsi0qWPfvX/jLMpXqqnPjdIZErgxpwujas1n9016PuXA8K3MJwVjCqSKI
RgQQEQIABgUCOhpCpAAKCRDHUqoysN/3gCt7AJ9adNQMbmA1iSYcbhtgvx9ByLPI
DgCfZ5Wj+f7cnYpFZI6GkAyyczG09sE=
=LRKC
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
iQEVAwUBPl5TD3ey5gA9JdPZAQEzPAgAgITAIC3FizXxoVcOHGcfAgQD/p409cFg
Jllmi+VTQ+ytdPXGdILCPv7rVgbEaeTOcSohf2Fss8PwGQHhBTZ0ATdrPjO5yAeS
67YZh68UVPnZ+sQ3Dqvq+/ZFQp+fR8RP2p6mEL0jlYz7XCfRu0b0qb+pV8juWikW
US7hdegN7rInMEykyXaJ2uQWwhrQdhm7N+ZHW2aTILa76FLH3x2hHuHupZ/jDsQy
SfNQzn4ROMT/F26dzZ4/45UekHB5Q2+9FXSPUbECJwsEoGL7cB7xk6VB5Td9U6Iv
H7+xBh2Ut5gbaAh5QLDGvvekuDAUxnGNmWQzOcJumDlcViRdWRfK1w==
=ac7H
-----END PGP SIGNATURE-----
Bye,
Thomas
--
Thomas Biege <thomas(a)suse.de>
SuSE Linux AG,Deutschherrnstr. 15-19,90429 Nuernberg
Function: Security Support & Auditing
"lynx -source http://www.suse.de/~thomas/contact/thomas.asc | gpg --import"
Key fingerprint = 7254 B15D B3C4 943F 485E 0BBD 8ECC D7CB C200 A213
--
Swimming through the Void
We hear the Words
We lose Ourselves
But we find it All
-- Serj Tankian (Arials Lyrics)
1
0
-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
SuSE Security Announcement
Package: openssl
Announcement-ID: SuSE-SA:2003:011
Date: Wednesday, Feb. 26th 2003 15:20 MET
Affected products: 7.1, 7.2, 7.3, 8.0, 8.1
SuSE Linux Database Server,
SuSE eMail Server III, 3.1
SuSE Linux Enterprise Server 7
SuSE Linux Enterprise Server 8
SuSE Linux Firewall on CD/Admin host
SuSE Linux Connectivity Server
SuSE Linux Office Server
Vulnerability Type: remote attack on encryption
Severity (1-10): 5
SuSE default package: yes
Cross References: CAN-2003-0078
Content of this advisory:
1) security vulnerability resolved: openssl
problem description, discussion, solution and upgrade information
2) pending vulnerabilities, solutions, workarounds:
- vnc
- w3m
3) standard appendix (further information)
______________________________________________________________________________
1) problem description, brief discussion, solution, upgrade information
OpenSSL is an implementation of the Secure Sockets Layer and Transport
Layer Security protocols and provides strong cryptography for many
applications in a Linux system. It is a default package in all SuSE
products.
A security weakness has been found, known as "Vaudenay timing attack
on CBC", named after one of the discoverers (Brice Canvel (EPFL), Alain
Hiltgen (UBS), Serge Vaudenay (EPFL), and Martin Vuagnoux (EPFL, Ilion)).
The weakness may allow an attacker to obtain a plaintext data block by
observing timing differences in response to two different error cases
(cipher padding errors vs. MAC verification errors).
In order to exploit this vulnerability, the attacker has to meet certain
requirements: The network connection between client and server must be
of high quality to be able to observe timing differences, the attacker
must be able to perform a man-in-the-middle attack, the transactions
must repeatedly contain the same (encrypted) plain text block (such as
a pop password or alike), and decoding failures in the SSL layer must
not be propagated to the application that is using the SSL connection.
These exploitation conditions considerably reduce the security risk
imposed by the vulnerability. However, we recommend to completely
remedy this weakness by installing the update packages for your system
according to the following guidelines. There does not exist any temporary
workaround for this problem other than applying the update packages.
Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Our maintenance customers are being notified individually. The packages
are being offered to install from the maintenance web.
SPECIAL INSTALLATION INSTRUCTIONS:
====================================
Please update your openssl package using the command
rpm -Fhv <package.rpm>
The operation of this command must not be interrupted! An interrupted
update of the openssl package may cause large protions of your system to
fail.
After performing the update, it is adviseable to run the command
"ldconfig" to update the shared library loading cache.
After the update, running processes in your system will continue to
use the shared libraries from the old package before the update.
Generally, it is necessary to restart all of these processes to
completely fix the vulnerability in your system. The command
lsof -n 2>/dev/null | grep RPMDELETE
can be used to find the binaries and processes that still use the old
shared libraries. In all cases, the next reboot of the system will cause
the old shared libraries to be completely removed from the system.
Alternatively, a transition to runlevel 1 (single user mode) and back
to the default runlevel will have the same effect.
Intel i386 Platform:
SuSE-8.1:
ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/openssl-0.9.6g-55.i586…
7fbf4d975180a20ff8dedc8adbdecc59
patch rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/openssl-0.9.6g-55.i586…
6ed4321ec536aa718189702470c33091
source rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/src/openssl-0.9.6g-55.src.r…
90fc753346dd2aff00eee4c530cea84a
SuSE-8.0:
ftp://ftp.suse.com/pub/suse/i386/update/8.0/sec1/openssl-0.9.6c-83.i386.rpm
d6246b820780993cc0e2b48597743a8f
patch rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/8.0/sec1/openssl-0.9.6c-83.i386.pat…
2d933e913a9062de6a1fa35de969d211
source rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/8.0/zq1/openssl-0.9.6c-83.src.rpm
b4b887a7311e9734a14d11e1a380f76e
SuSE-7.3:
ftp://ftp.suse.com/pub/suse/i386/update/7.3/sec1/openssl-0.9.6b-154.i386.rpm
d3c0f892441c09c8c5a689e2af04ba55
source rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/7.3/zq1/openssl-0.9.6b-154.src.rpm
31ec962fe3549a713b9e6937190a88fb
SuSE-7.2:
ftp://ftp.suse.com/pub/suse/i386/update/7.2/sec1/openssl-0.9.6a-78.i386.rpm
d14f67c34c589f168b750b18c9162508
source rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/7.2/zq1/openssl-0.9.6a-78.src.rpm
2ba5a416d6ca3cb75c9aabb5a25bb532
SuSE-7.1:
ftp://ftp.suse.com/pub/suse/i386/update/7.1/sec1/openssl-0.9.6a-78.i386.rpm
c6b711573555982fadd31cfa179dd9dc
source rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/7.1/zq1/openssl-0.9.6a-78.src.rpm
d00df30aa6ec6a3872c58da709181879
Sparc Platform:
SuSE-7.3:
ftp://ftp.suse.com/pub/suse/sparc/update/7.3/sec1/openssl-0.9.6b-87.sparc.r…
6a8f19a49a698b93e740121321f59e5d
source rpm(s):
ftp://ftp.suse.com/pub/suse/sparc/update/7.3/zq1/openssl-0.9.6b-87.src.rpm
50712c3fd35042278063622ad5cc77c7
AXP Alpha Platform:
The packages for the 7.1-axp distribution will be published soon.
PPC Power PC Platform:
SuSE-7.3:
ftp://ftp.suse.com/pub/suse/ppc/update/7.3/sec1/openssl-0.9.6b-147.ppc.rpm
051ef85d8e711819b2de38f55dc0023a
source rpm(s):
ftp://ftp.suse.com/pub/suse/ppc/update/7.3/zq1/openssl-0.9.6b-147.src.rpm
58631776b8fa88932eb57069a7f2878e
SuSE-7.1:
ftp://ftp.suse.com/pub/suse/ppc/update/7.1/sec1/openssl-0.9.6a-28.ppc.rpm
da5e7caa177316f3016dd98497e580de
source rpm(s):
ftp://ftp.suse.com/pub/suse/ppc/update/7.1/zq1/openssl-0.9.6a-28.src.rpm
b317144556c8f1890d15f304d95c5764
______________________________________________________________________________
2) Pending vulnerabilities in SuSE Distributions and Workarounds:
- vnc
VNC (Virtual Network Computing) uses a weak cookie generation process
which can be exploited by an attacker to bypass authentication.
New packages are currently being tested and will be available on our
FTP servers soon.
- w3m
The textbased web-browser w3m does not properly escape HTML tags.
A malicious HTML page or img alt attribute may lead to information
leakage. New packages will be available soon.
______________________________________________________________________________
3) standard appendix: authenticity verification, additional information
- Package authenticity verification:
SuSE update packages are available on many mirror ftp servers all over
the world. While this service is being considered valuable and important
to the free and open source software community, many users wish to be
sure about the origin of the package and its content before installing
the package. There are two verification methods that can be used
independently from each other to prove the authenticity of a downloaded
file or rpm package:
1) md5sums as provided in the (cryptographically signed) announcement.
2) using the internal gpg signatures of the rpm package.
1) execute the command
md5sum <name-of-the-file.rpm>
after you downloaded the file from a SuSE ftp server or its mirrors.
Then, compare the resulting md5sum with the one that is listed in the
announcement. Since the announcement containing the checksums is
cryptographically signed (usually using the key security(a)suse.de)
the checksums show proof of the authenticity of the package.
We disrecommend to subscribe to security lists which cause the
email message containing the announcement to be modified so that
the signature does not match after transport through the mailing
list software.
Downsides: You must be able to verify the authenticity of the
announcement in the first place. If RPM packages are being rebuilt
and a new version of a package is published on the ftp server, all
md5 sums for the files are useless.
2) rpm package signatures provide an easy way to verify the authenticity
of an rpm package. Use the command
rpm -v --checksig <file.rpm>
to verify the signature of the package, where <file.rpm> is the
filename of the rpm package that you have downloaded. Of course,
package authenticity verification can only target an un-installed rpm
package file.
Prerequisites:
a) gpg is installed
b) The package is signed using a certain key. The public part of this
key must be installed by the gpg program in the directory
~/.gnupg/ under the user's home directory who performs the
signature verification (usually root). You can import the key
that is used by SuSE in rpm packages for SuSE Linux by saving
this announcement to a file ("announcement.txt") and
running the command (do "su -" to be root):
gpg --batch; gpg < announcement.txt | gpg --import
SuSE Linux distributions version 7.1 and thereafter install the
key "build(a)suse.de" upon installation or upgrade, provided that
the package gpg is installed. The file containing the public key
is placed at the top-level directory of the first CD (pubring.gpg)
and at ftp://ftp.suse.com/pub/suse/pubring.gpg-build.suse.de .
- SuSE runs two security mailing lists to which any interested party may
subscribe:
suse-security(a)suse.com
- general/linux/SuSE security discussion.
All SuSE security announcements are sent to this list.
To subscribe, send an email to
<suse-security-subscribe(a)suse.com>.
suse-security-announce(a)suse.com
- SuSE's announce-only mailing list.
Only SuSE's security announcements are sent to this list.
To subscribe, send an email to
<suse-security-announce-subscribe(a)suse.com>.
For general information or the frequently asked questions (faq)
send mail to:
<suse-security-info(a)suse.com> or
<suse-security-faq(a)suse.com> respectively.
=====================================================================
SuSE's security contact is <security(a)suse.com> or <security(a)suse.de>.
The <security(a)suse.de> public key is listed below.
=====================================================================
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way. In particular,
it is desired that the clear-text signature shows proof of the
authenticity of the text.
SuSE Linux AG makes no warranties of any kind whatsoever with respect
to the information contained in this security advisory.
Type Bits/KeyID Date User ID
pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team <security(a)suse.de>
pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build(a)suse.de>
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org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=LRKC
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3in
Charset: noconv
iQEVAwUBPlzffney5gA9JdPZAQG3RQf6Aj55DN4eyOCKlKywqQITYHfvaFi1gzIX
q05/9X8r4jfSQlbKYp61h6yO5DcfA2rr9tDIA30IAt9cnzMS+hybMOgyd53bdcJ3
as8QdCspVhDC+RJ7Nk5UZwu8t30kTAY8g2hvxsteFg/LRFX6id5cTS2frnFofHvq
Mg1q2K0BoziYe0Yjx+k9MhuFKSPqR386OTmUknZqm2f7B0naK8yKW7z6p8GVc60z
cjHDaWuutK/dEKqw5yQI/0E1CpcgyGAQ/4zlNP2xJ9GvndJpCdFvQv/AhvnRR87W
2MMPIuK1BziDsTifVZ4yz7GG9Ff7NJtKkhpHSrdevTXUVMD6yzwGFA==
=u+n+
-----END PGP SIGNATURE-----
--
- -
| Roman Drahtmüller <draht(a)suse.de> // "You don't need eyes to see, |
SuSE Linux AG - Security Phone: // you need vision!"
| Nürnberg, Germany +49-911-740530 // Maxi Jazz, Faithless |
- -
2
2