LINUX [TCP|UDP|ICMP]/IP LOGGING PACKAGES

Capabilities and Weaknesses


The fields on the left are nmap-style flags, with '-f' denoting fragmentation and T/S/F/X/N/U denoting regular TCP connect, SYN scan (ala strobe), FIN scan, XMAS scan, Null scan and UDP scan respectively.


. iplog v1.8 ippl v1.4.5 protolog v1.0.8 jail v1.5 tcplogd-e v0.1.5
-sT Y Y Y Y Y
-sF Y* Y Y N Y
-sF -f Y* Y Y N Y
-sX Y* N Y N Y
-sX -f Y* Y Y N Y
-sS Y Y Y Y Y
-sS -f Y Y Y Y Y
-sN Y* N Y N Y
-sN -f Y* N Y N Y
-sU Y Y Y N N
Log TCP End N Y N N N
DNS Cache Y Y N N? N
Resolve Hosts N Y Y Y Y
IDENT Support Y Y N N N
Dfl. Ignore /etc/resolv.conf [UDP/53] [UDP/*] [ICMP/EchoReply] N [TCP/80,113] [ICMP/echoreply] localhost [TCP/25,113] www.yahoo.com 202.202.202.2
Can Ignore PT/PR/TH* PT/IT/SA/PR SA/PR/TH PT/IT/SA/PR PT/SA/TH


(Y) Success/True

(N) Failure/False

(Y*) Iplog Scan Detection
Iplog seems to require two bogus packets from the same source before logging '<TCP flag> scan detected' and moving in to 'scan mode'. Hence I suspect that there is a timeout here (haven't confirmed), and therefore undetected scanning should be possible against hosts utilising iplog. Simply utilise a differing IP per port scanned (probable) or wait a long time between ports (possible) to defeat this logger.

(PT/IT/SA/PR/TH) Ignore Capabilities
These stand for Port (TCP + UDP), ICMP Type, Source Address, Protocol and TCP Header flags respectively.

(TH*) Iplog TCP Header Ignore
This consists of predefined alternatives and is not nearly as flexible as that of protolog, for example.

(N?) Not Sure - Suspect N


Ippl Interesting Feature
If you remove a log file (say, /var/log/ippl/tcp.log), logging is halted to that file until ippl is restarted.

Note that tcplogd-e v0.1.5 is a hacked tcplogd.c v2.1 which is itself a hack from Mike Edulla's tcplogger.



Back to Sik Kuntz