-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 07/06/2012 04:29 PM, Anne Wilson wrote: > On 06/07/12 14:08, Mark Stodola wrote: >> On 07/06/2012 04:06 AM, Anne Wilson wrote: Logwatch on my laptop >> tells me > >> Listed by source hosts: Dropped 30 packets on interface eth0 From >> 192.168.0.40 - 30 packets to tcp(38575) [snip] >> If the connection is still active, you can use a combination of >> 'netstat -na' and/or 'lsof -nP -i4' to find the process owning the >> connection. If it isn't, it will be difficult to track down >> without fancier logging/capturing tools. You mentioned remote >> mounts, but not what method (CIFS, NFS, etc). If it is NFS, >> pseudo-random ports are chosen for the client connections and may >> be your culprit. > > It is indeed NFS. The logs show ~6 of these high-number allocated > ports listening, so you could well be right. Is there any way to > confirm that? I have several nfs mounts in fstab. One for each mount > probably explains it. > > netstat -na | grep 38575 tells me that it is listening: > > on the laptop: > tcp 0 0 0.0.0.0:38575 0.0.0.0:* > LISTEN > > but doesn't give me any clue as to what it hears :-) try adding -p to netstat command line, it will show what pid/process is using the port (root privileges may be required) Gilberto - -- -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQIcBAEBAgAGBQJP9vm2AAoJEFs07fyVhi0AWikP/RNIVxFOYk4V9K2YmlbgX21u NAYA8OjXrTzcyrI1lcI+y+ZE2Mt3HnwUgYRR1tW9zAYZcKmPYneWZH/bvuXsKz5K pCLPDjTNQiXYSPW65qMEeRxsSvzDcGPmFL7Q7bgUOpu5AhhzVeTXI0zXTAJjWMlH zmII+Ifk+dcjUaY9q14JW6EmPrPKoFihOZ1VcKLAQAtEYmR70o5+nLpbFksCFi7v pim3xgTU3OIcJ1wAnRXWtsBPV2TAmpXxWIn7jftmQl5xQ082zVPKQN0wyQWCXwNr xtGr5ALnGS4KdeFede4aunJkTF2fw/0qy16JULO5sUTlzYZDTgNr5jt9Muy9nvc5 XIBNldbPRyUQ2BHyVK/OPg8ktf/BDiBvTh/c+e4LCjp7hUTLuMl6gMh/ZMI/rEHy 17oc99y4YpssnEiH1O1qAcaIO4dWrVL61mQl1p0ebVRD7OW5vYJ5PyLAAzxzyeQ+ hgzOzTWiOkFZOX+g4NSiv1lvtfxlyOuWzf2Axl0R/jXoFwUjV+ZECHiCcTj1xQe8 U/nFI/HIOvnRILhstV0LxifZq8vLUPw7EiQxdoEPjaCmzzN7eNmie4ZpaVuoAgju 5J67rrQ5JPOdbd0u6cZJFUlBuVCqDooZid0AXOkzUj/wD43HcNjKMc6NpRbAxZp9 Bsfvx55CjqqtX82UtosH =KSTl -----END PGP SIGNATURE-----