SCIENTIFIC-LINUX-USERS Archives

July 2012

SCIENTIFIC-LINUX-USERS@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Gilberto Ficara <[log in to unmask]>
Reply To:
Gilberto Ficara <[log in to unmask]>
Date:
Fri, 6 Jul 2012 16:44:06 +0200
Content-Type:
text/plain
Parts/Attachments:
text/plain (59 lines)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 07/06/2012 04:29 PM, Anne Wilson wrote:
> On 06/07/12 14:08, Mark Stodola wrote:
>> On 07/06/2012 04:06 AM, Anne Wilson wrote: Logwatch on my laptop 
>> tells me
> 
>> Listed by source hosts: Dropped 30 packets on interface eth0 From 
>> 192.168.0.40 - 30 packets to tcp(38575)
[snip]
>> If the connection is still active, you can use a combination of 
>> 'netstat -na' and/or 'lsof -nP -i4' to find the process owning the 
>> connection. If it isn't, it will be difficult to track down
>> without fancier logging/capturing tools.  You mentioned remote
>> mounts, but not what method (CIFS, NFS, etc).  If it is NFS,
>> pseudo-random ports are chosen for the client connections and may
>> be your culprit.
> 
> It is indeed NFS.  The logs show ~6 of these high-number allocated
> ports listening, so you could well be right.  Is there any way to
> confirm that?  I have several nfs mounts in fstab.  One for each mount
> probably explains it.
> 
> netstat -na | grep 38575 tells me that it is listening:
> 
> on the laptop:
> tcp        0      0 0.0.0.0:38575               0.0.0.0:*
>       LISTEN
> 
> but doesn't give me any clue as to what it hears :-)

try adding -p to netstat command line, it will show what pid/process is
using the port (root privileges may be required)

Gilberto


- -- 

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=KSTl
-----END PGP SIGNATURE-----

ATOM RSS1 RSS2