Subject: | |
From: | |
Reply To: | |
Date: | Fri, 6 Jul 2012 16:44:06 +0200 |
Content-Type: | text/plain |
Parts/Attachments: |
|
|
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On 07/06/2012 04:29 PM, Anne Wilson wrote:
> On 06/07/12 14:08, Mark Stodola wrote:
>> On 07/06/2012 04:06 AM, Anne Wilson wrote: Logwatch on my laptop
>> tells me
>
>> Listed by source hosts: Dropped 30 packets on interface eth0 From
>> 192.168.0.40 - 30 packets to tcp(38575)
[snip]
>> If the connection is still active, you can use a combination of
>> 'netstat -na' and/or 'lsof -nP -i4' to find the process owning the
>> connection. If it isn't, it will be difficult to track down
>> without fancier logging/capturing tools. You mentioned remote
>> mounts, but not what method (CIFS, NFS, etc). If it is NFS,
>> pseudo-random ports are chosen for the client connections and may
>> be your culprit.
>
> It is indeed NFS. The logs show ~6 of these high-number allocated
> ports listening, so you could well be right. Is there any way to
> confirm that? I have several nfs mounts in fstab. One for each mount
> probably explains it.
>
> netstat -na | grep 38575 tells me that it is listening:
>
> on the laptop:
> tcp 0 0 0.0.0.0:38575 0.0.0.0:*
> LISTEN
>
> but doesn't give me any clue as to what it hears :-)
try adding -p to netstat command line, it will show what pid/process is
using the port (root privileges may be required)
Gilberto
- --
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
iQIcBAEBAgAGBQJP9vm2AAoJEFs07fyVhi0AWikP/RNIVxFOYk4V9K2YmlbgX21u
NAYA8OjXrTzcyrI1lcI+y+ZE2Mt3HnwUgYRR1tW9zAYZcKmPYneWZH/bvuXsKz5K
pCLPDjTNQiXYSPW65qMEeRxsSvzDcGPmFL7Q7bgUOpu5AhhzVeTXI0zXTAJjWMlH
zmII+Ifk+dcjUaY9q14JW6EmPrPKoFihOZ1VcKLAQAtEYmR70o5+nLpbFksCFi7v
pim3xgTU3OIcJ1wAnRXWtsBPV2TAmpXxWIn7jftmQl5xQ082zVPKQN0wyQWCXwNr
xtGr5ALnGS4KdeFede4aunJkTF2fw/0qy16JULO5sUTlzYZDTgNr5jt9Muy9nvc5
XIBNldbPRyUQ2BHyVK/OPg8ktf/BDiBvTh/c+e4LCjp7hUTLuMl6gMh/ZMI/rEHy
17oc99y4YpssnEiH1O1qAcaIO4dWrVL61mQl1p0ebVRD7OW5vYJ5PyLAAzxzyeQ+
hgzOzTWiOkFZOX+g4NSiv1lvtfxlyOuWzf2Axl0R/jXoFwUjV+ZECHiCcTj1xQe8
U/nFI/HIOvnRILhstV0LxifZq8vLUPw7EiQxdoEPjaCmzzN7eNmie4ZpaVuoAgju
5J67rrQ5JPOdbd0u6cZJFUlBuVCqDooZid0AXOkzUj/wD43HcNjKMc6NpRbAxZp9
Bsfvx55CjqqtX82UtosH
=KSTl
-----END PGP SIGNATURE-----
|
|
|