Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 16 Feb 2001 15:03:44 GMT
From:      Cliff Sarginson <cliff@raggedclown.net>
To:        Peter Pentchev <roam@orbitel.bg>, Artem Koutchine <matrix@ipform.ru>, questions@FreeBSD.ORG, security@FreeBSD.ORG
Subject:   Efficiency [Was: Re: rpc.statd attack]
Message-ID:  <E14TmQC-0006Ip-00@post.mail.nl.demon.net>

next in thread | raw e-mail | index | archive | help
> On Fri, Feb 16, 2001 at 04:24:07PM +0200, Peter Pentchev wrote:
> > On Fri, Feb 16, 2001 at 05:16:47PM +0300, Artem Koutchine wrote:
> > > Hi!
> > > 
> > > I am regulary getting this:
> > > 
> > [snip (unsuccessful, useless against fbsd) attack log]
> > > 
> > > What port should i close or log to detect the connection? I am sure
> > > this is a script
> > > kiddie, so no IP spoffing or anything tricky is envolved. I'd like log
> > > it with ipfw and
> > > kick that junkie butt. So, what port is it or as always with RPC it is
> > > a tricky business?
> > 
> > If you consider rpcinfo -p | egrep -e 'udp.*status$' | awk '{print $4}'
> > to be a tricky business, then yes, it is a tricky business ;)
> 
> Well, as people pointed out, I'm not awake yet :)
> 
> rpcinfo -p | awk '($3 == "udp") && ($5 == "status") {print $4 }'
> 
> ...works just as well, or even better, with less false alarms and more
> efficiency :)
>
As you can see makes all the difference :)
But this is under Solaris ...
 
$ time rpcinfo -p | egrep -e 'udp.*status$' | awk '{print $4}'                         
32790

real    0m0.12s
user    0m0.04s
sys     0m0.07s
  
$ time rpcinfo -p | awk '($3 == "udp") && ($5 == "status") {print $4 }'
32790

real    0m0.11s
user    0m0.05s
sys     0m0.04s

Cliff



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-questions" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?E14TmQC-0006Ip-00>