From: steeles on
Hi all,

periodally /var/adm/messages always collects this type of messages,

Dec 18 13:09:57 denver rlogind[12345]: [ID 776819 daemon.error] failed to
receive protocol zero byte
Dec 18 13:09:57 denver rlogind[23456]: [ID 776819 daemon.error] failed to
receive protocol zero byte
Dec 18 13:09:57 denver rlogind[34567]: [ID 776819 daemon.error] failed to
receive protocol zero byte
Dec 18 13:09:57 denver rlogind[45678]: [ID 776819 daemon.error] failed to
receive protocol zero byte
Dec 18 13:09:57 denver rlogind[56675]: [ID 776819 daemon.error] failed to
receive protocol zero byte

I don't know what could cause that, can anyone please advice?


From: Andreas F. Borchert on
On 2006-12-18, steeles <steeles(a)gmail.com> wrote:
> periodally /var/adm/messages always collects this type of messages,
>
> Dec 18 13:09:57 denver rlogind[12345]: [ID 776819 daemon.error] failed to
> receive protocol zero byte
> Dec 18 13:09:57 denver rlogind[23456]: [ID 776819 daemon.error] failed to
> receive protocol zero byte
> Dec 18 13:09:57 denver rlogind[34567]: [ID 776819 daemon.error] failed to
> receive protocol zero byte
> Dec 18 13:09:57 denver rlogind[45678]: [ID 776819 daemon.error] failed to
> receive protocol zero byte
> Dec 18 13:09:57 denver rlogind[56675]: [ID 776819 daemon.error] failed to
> receive protocol zero byte
>
> I don't know what could cause that, can anyone please advice?

Most likely some attacker probed your rlogind port (TCP port 513) without
attempting to login.

Andreas.
From: steeles on
Attacher? How can I trace it?

Thanks.


"Andreas F. Borchert"
<comp.unix.solaris(a)expires-on-2006-12-27.usenet.andreas-borchert.de> wrote
in message
news:slrneof2j6.qgk.comp.unix.solaris(a)usenet.andreas-borchert.de...
> On 2006-12-18, steeles <steeles(a)gmail.com> wrote:
>> periodally /var/adm/messages always collects this type of messages,
>>
>> Dec 18 13:09:57 denver rlogind[12345]: [ID 776819 daemon.error] failed to
>> receive protocol zero byte
>> Dec 18 13:09:57 denver rlogind[23456]: [ID 776819 daemon.error] failed to
>> receive protocol zero byte
>> Dec 18 13:09:57 denver rlogind[34567]: [ID 776819 daemon.error] failed to
>> receive protocol zero byte
>> Dec 18 13:09:57 denver rlogind[45678]: [ID 776819 daemon.error] failed to
>> receive protocol zero byte
>> Dec 18 13:09:57 denver rlogind[56675]: [ID 776819 daemon.error] failed to
>> receive protocol zero byte
>>
>> I don't know what could cause that, can anyone please advice?
>
> Most likely some attacker probed your rlogind port (TCP port 513) without
> attempting to login.
>
> Andreas.


From: James Carlson on
"steeles" <steeles(a)gmail.com> writes:
> Attacher? How can I trace it?

There's not much to 'trace' here ... but using snoop and/or ethereal
would be a fair start.

--
James Carlson, KISS Network <james.d.carlson(a)sun.com>
Sun Microsystems / 1 Network Drive 71.232W Vox +1 781 442 2084
MS UBUR02-212 / Burlington MA 01803-2757 42.496N Fax +1 781 442 1677
From: Andreas F. Borchert on
On 2006-12-19, steeles <steeles(a)gmail.com> wrote:
> Attacher? How can I trace it?

Firstly, I would recommend to run the ipfilter firewall software.
(ipfilter is included in Solaris 10. You can download ipfilter from
http://coombs.anu.edu.au/~avalon/ if you have an older release of
Solaris.) Then, if you configure ipfilter to block and log TCP port 513
from outside, you see at least the IP address of the attacker.

You can also run snoop as already suggested. However, there is possibly
not much to be seen beyond an initial TCP SYN/ACK/ACK handshake. Another
option would be to run snort which can be asked to record all interesting
packets. snort ist available at http://www.sunfreeware.com/.

As documented at http://www.incidents.org/port_details.php?port=513,
probes at TCP port 513 are rarely seen. Likewise, few servers actually
continue to run rlogind as this has been widely replaced by sshd.

Perhaps the attacker used a tool like nmap to scan through a large
number of your TCP ports to find out which are open. You can download
nmap from http://www.sunfreeware.com/ and see yourself which ports are
left open and which traces are left by nmap in your logs.

Andreas.