[864] in Intrusion Detection Systems

home help back first fref pref prev next nref lref last post

Re: syslogd core

daemon@ATHENA.MIT.EDU (owner-ids@uow.edu.au)
Sun Jan 19 12:08:22 1997

From: owner-ids@uow.edu.au
To: ids@uow.edu.au
Date: Fri, 17 Jan 1997 12:29:44 -0400 (AST)
In-Reply-To: <199701132021.OAA01229@magnify.opr.com> from "Ivan Pulleyn" at Jan 

13, 97 02:21:20 pm
From: dinn@moose.nstn.ca (Michael 'Moose' Dinn)
X-Mailer: ELM [version 2.4 PL25]
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Sender: owner-ids
Precedence: bulk
Reply-To: ids

>   I found a core from syslogd the other day on my Solaris 2.5.1 based firewall.
> We are running the FW-1 firewall that comes with Sun's Netra.  The question
> is, what can I do with this core to determine if it was the result of any 
> foul play? gdb tells me little, same thing with strings -a.


Stock Solaris syslogd will core dump if it receives a packet from an ip#
that doesn't resolve back into a hostname.

--
 Michael 'Moose' Dinn \  Sun Life Skate Canada - LIVE on the Web
 Michael.Dinn@iSTAR.Ca \  
 iSTAR Internet Inc.    \       http://www.ctvistar.com
 (902) 481-4524 Voice    \  

    If you own a 1972 Mustang Convertible... I want to hear from you!

home help back first fref pref prev next nref lref last post