File: README.conntrack

package info (click to toggle)
natlog 3.01.00-2
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 1,912 kB
  • sloc: cpp: 3,691; fortran: 201; sh: 133; ansic: 123; makefile: 110
file content (89 lines) | stat: -rw-r--r-- 3,368 bytes parent folder | download | duplicates (3)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
On Debian Linux systems conntrack uses the /proc/net/nf_conntrack device. This
device may not be available in other Linux variants (e.g., Ubuntu). Sebastian
Monte provided information about how conntrack can be used in those cases. See
README.no_nf_conntrack for a description of his findings.

Conntrack byte counts add the sizes of the IP headers (usually 20 bytes) to
the byte counts. So, icmp packets are usually reported as having size 84, 
even though ping etc reports the payload (64 bytes). Since the actual size of
the IP headers cannot be determined from conntrack's output, the sizes
reported via natlog's conntrack mode are as reported, and are therefore not
corrected for IP header lengths.

Example conntrack lines: 
The 'maybe' entries appear if the command
 
     $ echo 1 > /proc/sys/net/netfilter/nf_conntrack_acct

 has been issued before starting natlog.

[1338987414.52626 ]      [NEW] tcp      6 120 SYN_SENT 
     src=192.168.1.4     dst=129.125.14.80   sport=59783 dport=22  [UNREPLIED] 
     src=129.125.14.80   dst=129.125.100.246 sport=22    dport=59783

[1387190223.487711]      [DESTROY] tcp  6                
     src=192.168.17.21   dst=192.87.23.111   sport=50029 dport=443
     packets=7 bytes=450     <-- maybe
     src=192.87.23.111   dst=129.125.100.246 sport=443   dport=50029 
     packets=5 bytes=1679    <-- maybe
     [ASSURED] 


[1515751941.057688]     [NEW] tcp      6 120 SYN_SENT 
    src=192.168.17.6    dst=129.125.3.162   sport=49590 dport=22    [UNREPLIED] 
    src=129.125.3.162   dst=192.168.8.17    sport=22    dport=49590

[1515752071.886964] [DESTROY] tcp      6 
    src=192.168.17.6    dst=129.125.3.162   sport=49590 dport=22 
    packets=29  bytes=4840 
    src=129.125.3.162   dst=192.168.8.17    sport=22    dport=49590 
    packets=30  bytes=5132  [ASSURED]

With conntrack records the source port and unique port combinations (1st line)
are unique and are used as the key.

-------------------------------------------------------------------------------

[1387190207.172139]      [NEW] udp      17 30
     src=10.4.0.6        dst=129.125.4.6       sport=42998 dport=53 [UNREPLIED]
     src=129.125.4.6     dst=129.125.100.246   sport=53    dport=42998

[1387190187.423829]      [DESTROY] udp      17
     src=10.4.0.6        dst=216.239.34.10     sport=60840 dport=53
     packets=1 bytes=138     <-- maybe
     src=216.239.34.10   dst=129.125.100.246   sport=53    dport=60840
     packets=1 bytes=524     <-- maybe


 Note that the tcp and udp lines are identically organized 

With conntrack records the source port and unique port combinations (1st line)
are unique and are used as the key.

-------------------------------------------------------------------------------



[1387190207.153486]      [NEW] icmp 1 30             
     src=192.168.17.7    dst=129.125.3.162     type=8 code=0 id=7016 [UNREPLIED]  
     src=129.125.3.162   dst=129.125.100.246   type=0 code=0 id=7016 

[1387190237.151720]      [DESTROY] icmp 1
     src=192.168.17.7    dst=129.125.3.162     type=8 code=0 id=7016
     packets=1 bytes=84      <-- maybe
     src=129.125.3.162   dst=129.125.100.246   type=0 code=0 id=7016
     packets=1 bytes=84      <-- maybe


With conntrack records the IDs are unique and are used as the key.

-------------------------------------------------------------------------------