| ---[ Phrack Magazine Volume 8, Issue 53 July 8, 1998, article 13 of 15 | |
| -------------------------[ Designing and Attacking Port Scan Detection Tools | |
| --------[ solar designer <solar@false.com> | |
| ----[ Introduction | |
| The purpose of this article is to show potential problems with intrusion | |
| detection systems (IDS), concentrating on one simple attack: port scans. | |
| This lets me cover all components of such a simplified IDS. Also, unlike | |
| the great SNI paper (http://www.secnet.com/papers/IDS.PS), this article | |
| is not limited to network-based tools. In fact, the simple and hopefully | |
| reliable example port scan detection tool ("scanlogd") that you'll find | |
| at the end is host-based. | |
| ----[ What Can We Detect? | |
| A port scan involves an attacker trying many destination ports, usually | |
| including some that turn out not to be listening. One "signature" that | |
| could be used for detecting port scans is "several packets to different | |
| destination ports from the same source address within a short period of | |
| time". Another such signature could be "SYN to a non-listening port". | |
| Obviously, there are many other ways to detect port scans, up to dumping | |
| all the packet headers to a file and analyzing them manually (ouch). | |
| All of these different methods have their own advantages and disadvantages, | |
| resulting in different numbers of "false positives" and "false negatives". | |
| Now, let me show that, for this particular attack type, it is always possible | |
| for an attacker to make her attack either very unlikely to be noticed, or very | |
| unlikely to be traced to its real origin, while still being able to obtain | |
| the port number information. | |
| To obscure the attack, an attacker could do the scan very slowly. Unless the | |
| target system is normally idle (in which case one packet to a non-listening | |
| port is enough for the admin to notice, not a likely real world situation), | |
| it is possible to make the delay between ports large enough for this to be | |
| likely not recognized as a scan. | |
| A way to hide the origin of a scan, while still receiving the information, | |
| is to send a large amount (say, 999) of spoofed "port scans", and only on | |
| scan from the real source address. Even if all the scans (1000 of them) are | |
| detected and logged, there's no way to tell which of the source addresses is | |
| real. All we can tell is that we've been port scanned. | |
| Note that, while these attacks are possible, they obviously require more | |
| resources from the attacker to perform. Some attackers will likely choose | |
| not to use such complicated and/or slow attacks, and others will have to | |
| pay with their time. This alone is enough reason to still detect at least | |
| some port scans (the ones that are detectable). | |
| The possibility of such attacks means that our goal is not to detect all | |
| port scans (which is impossible), but instead, in my opinion, to detect | |
| as many port scan kinds as possible while still being reliable enough. | |
| ----[ What Information Can We Trust? | |
| Obviously, the source address can be spoofed, so we can't trust it unless | |
| other evidence is available. However, port scanners sometimes leak extra | |
| information that can be used to tell something about the real origin of a | |
| spoofed port scan. | |
| For example, if the packets we receive have an IP TTL of 255 at our end, we | |
| know for sure that they're being sent from our local network regardless of | |
| what the source address field says. However, if TTL is 250, we can only tell | |
| that the attacker was no more than 5 hops away, we can't tell how far exactly | |
| she was for sure. | |
| Starting TTL and source port number(s) can also give us a hint of what | |
| port scanner type (for "stealth" scans) or operating system (for full TCP | |
| connection scans) is used by the attacker. We can never be sure though. | |
| For example, nmap sets TTL to 255 and source port to 49724, while Linux | |
| kernel sets TTL to 64. | |
| ----[ Information Source (E-box) Choice | |
| For detecting TCP port scans, including "stealth" ones, we need access | |
| to raw IP and TCP packet headers. | |
| In a network-based IDS, we would use promiscuous mode for obtaining the | |
| raw packets. This has all the problems described in the SNI paper: both | |
| false positives and false negatives are possible. However, sometimes | |
| this might be acceptable for this attack type since it is impossible to | |
| detect all port scans anyway. | |
| For a host-based IDS, there are two major ways of obtaining the packets: | |
| reading from a raw TCP or IP socket, or getting the data directly inside | |
| the kernel (via a loadable module or a kernel patch). | |
| When using a raw TCP socket, most of the problems pointed out by SNI do | |
| not apply: we are only getting the packets recognized by our own kernel. | |
| However, this is still passive analysis (we might miss packets) and a | |
| fail-open system. While probably acceptable for port scans only, this | |
| is not a good design if we later choose to detect other attacks. If we | |
| used a raw IP socket instead (some systems don't have raw TCP sockets), | |
| we would have more of the "SNI problems" again. Anyway, in my example | |
| code, I'm using a raw TCP socket. | |
| The most reliable IDS is one with some support from the target systems | |
| kernel. This has access to all the required information, and can even be | |
| fail-close. The obvious disadvantage is that kernel modules and patches | |
| aren't very portable. | |
| ----[ Attack Signature (A-box) Choice | |
| It has already been mentioned above that different signatures can be | |
| used to detect port scans; they differ by numbers of false positives | |
| and false negatives. The attack signature that we choose should keep | |
| false positives as low as possible while still keeping false negatives | |
| reasonably low. It is however not obvious what to consider reasonable. | |
| In my opinion, this should depend on the severity of the attack we're | |
| detecting (the cost of a false negative), and on the actions taken for | |
| a detected attack (the cost of a false positive). Both of these costs | |
| can differ from site to site, so an IDS should be user-tunable. | |
| For scanlogd, I'm using the following attack signature: "at least COUNT | |
| ports need to be scanned from the same source address, with no longer | |
| than DELAY ticks between ports". Both COUNT and DELAY are configurable. | |
| A TCP port is considered to be scanned when receiving a packet without | |
| the ACK bit set. | |
| ----[ Logging the Results (D-box) | |
| Regardless of where we write our logs (a disk file, a remote system, or | |
| maybe even a printer), our space is limited. When storage is full, results | |
| will get lost. Most likely, either the logging stops, or old entries get | |
| replaced with newer ones. | |
| An obvious attack is to fill up the logs with unimportant information, | |
| and then do the real attack with the IDS effectively disabled. For the | |
| port scans example, spoofed "port scans" could be used to fill up the | |
| logs, and the real attack could be a real port scan, possibly followed | |
| by a breakin. This example shows how a badly coded port scan detection | |
| tool could be used to avoid logging of the breakin attempt, which would | |
| get logged if the tool wasn't running. | |
| One solution for this problem would be to put rate limits (say, no more | |
| than 5 messages per 20 seconds) on every attack type separately, and, | |
| when the limit is reached, log this fact, and temporarily stop logging | |
| of attacks of this type. For attack types that can't be spoofed, such | |
| limits could be put per source address instead. Since port scans can be | |
| spoofed, this still lets an attacker not reveal her real address, but | |
| this doesn't let her hide another attack type this way, like she could | |
| do if we didn't implement the rate limits... that's life. This is what | |
| I implemented in scanlogd. | |
| Another solution, which has similar advantages and disadvantages, is to | |
| allocate space for messages from every attack type separately. Both of | |
| these solutions can be implemented simultaneously. | |
| ----[ What To Do About Port Scans? (R-box) | |
| Some IDS are capable of responding to attacks they detect. The actions | |
| are usually directed to prevent further attacks and/or to obtain extra | |
| information about the attacker. Unfortunately, these features can often | |
| be abused by a smart attacker. | |
| A typical action is to block the attacking host (re-configuring access | |
| lists of the firewall, or similar). This leads to an obvious Denial of | |
| Service (DoS) vulnerability if the attack we're detecting is spoofable | |
| (like a port scan is). It is probably less obvious that this leads to DoS | |
| vulnerabilities for non-spoofable attack types, too. That's because IP | |
| addresses are sometimes shared between many people; this is the case for | |
| ISP shell servers and dynamic dialup pools. | |
| There are also a few implementation problems with this approach: firewall | |
| access lists, routing tables, etc... are all of a limited size. Also, even | |
| before the limit is reached, there are CPU usage issues. If an IDS is not | |
| aware of these issues, this can lead to DoS of the entire network (say, | |
| if the firewall goes down). | |
| In my opinion, there're only very few cases in which such an action might | |
| be justified. Port scans are definitely not among those. | |
| Another common action is to connect back to the attacking host to obtain | |
| extra information. For spoofable attacks, we might end up being used in | |
| attacking a third-party. We'd better not do anything for such attacks, | |
| including port scans. | |
| However, for non-spoofable attacks, this might be worth implementing in | |
| some cases, with a lot of precautions. Mainly, we should be careful not | |
| to consume too many resources, including bandwidth (should limit request | |
| rate regardless of the attack rate, and limit the data size), CPU time, | |
| and memory (should have a timeout, and limit the number of requests that | |
| we do at a time). Obviously, this means that an attacker can still make | |
| some of the requests fail, but there's nothing we can do here. | |
| See ftp://ftp.win.tue.nl/pub/security/murphy.ps.gz for an example of the | |
| issues involved. This paper by Wietse Venema details similar vulnerabilities | |
| in older versions of his famous TCP wrapper package. | |
| For these reasons, scanlogd doesn't do anything but log port scans. You | |
| should probably take action yourself. What exactly you do is a matter | |
| of taste; I personally only check my larger logs (that I'm not checking | |
| normally) for activity near the port scan time. | |
| ----[ Data Structures and Algorithm Choice | |
| When choosing a sorting or data lookup algorithm to be used for a normal | |
| application, people are usually optimizing the typical case. However, for | |
| IDS the worst case scenario should always be considered: an attacker can | |
| supply our IDS with whatever data she likes. If the IDS is fail-open, she | |
| would then be able to bypass it, and if it's fail-close, she could cause | |
| a DoS for the entire protected system. | |
| Let me illustrate this by an example. In scanlogd, I'm using a hash table | |
| to lookup source addresses. This works very well for the typical case as | |
| long as the hash table is large enough (since the number of addresses we | |
| keep is limited anyway). The average lookup time is better than that of a | |
| binary search. However, an attacker can choose her addresses (most likely | |
| spoofed) to cause hash collisions, effectively replacing the hash table | |
| lookup with a linear search. Depending on how many entries we keep, this | |
| might make scanlogd not be able to pick new packets up in time. This will | |
| also always take more CPU time from other processes in a host-based IDS | |
| like scanlogd. | |
| I've solved this problem by limiting the number of hash collisions, and | |
| discarding the oldest entry with the same hash value when the limit is | |
| reached. This is acceptable for port scans (remember, we can't detect all | |
| scans anyway), but might not be acceptable for detecting other attacks. | |
| If we were going to support some other attack type also, we would have to | |
| switch to a different algorithm instead, like a binary search. | |
| If we're using a memory manager (such as malloc(3) and free(3) from our | |
| libc), an attacker might be able to exploit its weaknesses in a similar | |
| way. This might include CPU usage issues and memory leaks because of not | |
| being able to do garbage collection efficiently enough. A reliable IDS | |
| should have its very own memory manager (the one in libc can differ from | |
| system to system), and be extremely careful with its memory allocations. | |
| For a tool as simple as scanlogd is, I simply decided not to allocate any | |
| memory dynamically at all. | |
| It is probably worth mentioning that similar issues also apply to things | |
| like operating system kernels. For example, hash tables are widely used | |
| there for looking up active connections, listening ports, etc. There're | |
| usually other limits which make these not really dangerous though, but | |
| more research might be needed. | |
| ----[ IDS and Other Processes | |
| For network-based IDS that are installed on a general-purpose operating | |
| system, and for all host-based IDS, there's some interaction of the IDS | |
| with the rest of the system, including other processes and the kernel. | |
| Some DoS vulnerabilities in the operating system might allow an attacker | |
| to disable the IDS (of course, only if it is fail-open) without it ever | |
| noticing. This can be done via vulnerabilities in both the kernel (like | |
| "teardrop") and in other processes (like having a UDP service enabled in | |
| inetd without a connection count limit and any resource limits). | |
| Similarly, a poorly coded host-based IDS can be used for DoS attacks on | |
| other processes of the "protected" system. | |
| ----[ Example Code | |
| Finally, here you get scanlogd for Linux. It may compile on other systems | |
| too, but will likely not work because of the lack of raw TCP sockets. For | |
| future versions see http://www.false.com/security/scanlogd/. | |
| NOTE THAT SOURCE ADDRESSES REPORTED CAN BE SPOOFED, DON'T TAKE ANY ACTION | |
| AGAINST THE ATTACKER UNLESS OTHER EVIDENCE IS AVAILABLE. | |
| <++> Scanlogd/scanlogd.c | |
| /* | |
| * Linux scanlogd v1.0 by Solar Designer. You're allowed to do whatever you | |
| * like with this software (including re-distribution in any form, with or | |
| * without modification), provided that credit is given where it is due, and | |
| * any modified versions are marked as such. There's absolutely no warranty. | |
| */ | |
| #include <stdio.h> | |
| #include <unistd.h> | |
| #include <signal.h> | |
| #include <string.h> | |
| #include <ctype.h> | |
| #include <time.h> | |
| #include <syslog.h> | |
| #include <sys/times.h> | |
| #include <sys/types.h> | |
| #include <sys/socket.h> | |
| #include <netinet/in_systm.h> | |
| #include <netinet/in.h> | |
| #if (linux) | |
| #define __BSD_SOURCE | |
| #endif | |
| #include <netinet/ip.h> | |
| #include <netinet/tcp.h> | |
| #include <arpa/inet.h> | |
| /* | |
| * Port scan detection thresholds: at least COUNT ports need to be scanned | |
| * from the same source, with no longer than DELAY ticks between ports. | |
| */ | |
| #define SCAN_COUNT_THRESHOLD 10 | |
| #define SCAN_DELAY_THRESHOLD (CLK_TCK * 5) | |
| /* | |
| * Log flood detection thresholds: temporarily stop logging if more than | |
| * COUNT port scans are detected with no longer than DELAY between them. | |
| */ | |
| #define LOG_COUNT_THRESHOLD 5 | |
| #define LOG_DELAY_THRESHOLD (CLK_TCK * 20) | |
| /* | |
| * You might want to adjust these for using your tiny append-only log file. | |
| */ | |
| #define SYSLOG_IDENT "scanlogd" | |
| #define SYSLOG_FACILITY LOG_DAEMON | |
| #define SYSLOG_LEVEL LOG_ALERT | |
| /* | |
| * Keep track of up to LIST_SIZE source addresses, using a hash table of | |
| * HASH_SIZE entries for faster lookups, but limiting hash collisions to | |
| * HASH_MAX source addresses per the same hash value. | |
| */ | |
| #define LIST_SIZE 0x400 | |
| #define HASH_LOG 11 | |
| #define HASH_SIZE (1 << HASH_LOG) | |
| #define HASH_MAX 0x10 | |
| /* | |
| * Packet header as read from a raw TCP socket. In reality, the TCP header | |
| * can be at a different offset; this is just to get the total size right. | |
| */ | |
| struct header { | |
| struct ip ip; | |
| struct tcphdr tcp; | |
| char space[60 - sizeof(struct ip)]; | |
| }; | |
| /* | |
| * Information we keep per each source address. | |
| */ | |
| struct host { | |
| struct host *next; /* Next entry with the same hash */ | |
| clock_t timestamp; /* Last update time */ | |
| time_t start; /* Entry creation time */ | |
| struct in_addr saddr, daddr; /* Source and destination addresses */ | |
| unsigned short sport; /* Source port, if fixed */ | |
| int count; /* Number of ports in the list */ | |
| unsigned short ports[SCAN_COUNT_THRESHOLD - 1]; /* List of ports */ | |
| unsigned char flags_or; /* TCP flags OR mask */ | |
| unsigned char flags_and; /* TCP flags AND mask */ | |
| unsigned char ttl; /* TTL, if fixed */ | |
| }; | |
| /* | |
| * State information. | |
| */ | |
| struct { | |
| struct host list[LIST_SIZE]; /* List of source addresses */ | |
| struct host *hash[HASH_SIZE]; /* Hash: pointers into the list */ | |
| int index; /* Oldest entry to be replaced */ | |
| } state; | |
| /* | |
| * Convert an IP address into a hash table index. | |
| */ | |
| int hashfunc(struct in_addr addr) | |
| { | |
| unsigned int value; | |
| int hash; | |
| value = addr.s_addr; | |
| hash = 0; | |
| do { | |
| hash ^= value; | |
| } while ((value >>= HASH_LOG)); | |
| return hash & (HASH_SIZE - 1); | |
| } | |
| /* | |
| * Log this port scan. | |
| */ | |
| void do_log(struct host *info) | |
| { | |
| char s_saddr[32]; | |
| char s_daddr[32 + 8 * SCAN_COUNT_THRESHOLD]; | |
| char s_flags[8]; | |
| char s_ttl[16]; | |
| char s_time[32]; | |
| int index, size; | |
| unsigned char mask; | |
| /* Source address and port number, if fixed */ | |
| snprintf(s_saddr, sizeof(s_saddr), | |
| info->sport ? "%s:%u" : "%s", | |
| inet_ntoa(info->saddr), | |
| (unsigned int)ntohs(info->sport)); | |
| /* Destination address, if fixed */ | |
| size = snprintf(s_daddr, sizeof(s_daddr), | |
| info->daddr.s_addr ? "%s ports " : "ports ", | |
| inet_ntoa(info->daddr)); | |
| /* Scanned port numbers */ | |
| for (index = 0; index < info->count; index++) | |
| size += snprintf(s_daddr + size, sizeof(s_daddr) - size, | |
| "%u, ", (unsigned int)ntohs(info->ports[index])); | |
| /* TCP flags: lowercase letters for "always clear", uppercase for "always | |
| * set", and question marks for "sometimes set". */ | |
| for (index = 0; index < 6; index++) { | |
| mask = 1 << index; | |
| if ((info->flags_or & mask) == (info->flags_and & mask)) { | |
| s_flags[index] = "fsrpau"[index]; | |
| if (info->flags_or & mask) | |
| s_flags[index] = toupper(s_flags[index]); | |
| } else | |
| s_flags[index] = '?'; | |
| } | |
| s_flags[index] = 0; | |
| /* TTL, if fixed */ | |
| snprintf(s_ttl, sizeof(s_ttl), info->ttl ? ", TTL %u" : "", | |
| (unsigned int)info->ttl); | |
| /* Scan start time */ | |
| strftime(s_time, sizeof(s_time), "%X", localtime(&info->start)); | |
| /* Log it all */ | |
| syslog(SYSLOG_LEVEL, | |
| "From %s to %s..., flags %s%s, started at %s", | |
| s_saddr, s_daddr, s_flags, s_ttl, s_time); | |
| } | |
| /* | |
| * Log this port scan unless we're being flooded. | |
| */ | |
| void safe_log(struct host *info) | |
| { | |
| static clock_t last = 0; | |
| static int count = 0; | |
| clock_t now; | |
| now = info->timestamp; | |
| if (now - last > LOG_DELAY_THRESHOLD || now < last) count = 0; | |
| if (++count <= LOG_COUNT_THRESHOLD + 1) last = now; | |
| if (count <= LOG_COUNT_THRESHOLD) { | |
| do_log(info); | |
| } else if (count == LOG_COUNT_THRESHOLD + 1) { | |
| syslog(SYSLOG_LEVEL, "More possible port scans follow.\n"); | |
| } | |
| } | |
| /* | |
| * Process a TCP packet. | |
| */ | |
| void process_packet(struct header *packet, int size) | |
| { | |
| struct ip *ip; | |
| struct tcphdr *tcp; | |
| struct in_addr addr; | |
| unsigned short port; | |
| unsigned char flags; | |
| struct tms buf; | |
| clock_t now; | |
| struct host *current, *last, **head; | |
| int hash, index, count; | |
| /* Get the IP and TCP headers */ | |
| ip = &packet->ip; | |
| tcp = (struct tcphdr *)((char *)packet + ((int)ip->ip_hl << 2)); | |
| /* Sanity check */ | |
| if ((char *)tcp + sizeof(struct tcphdr) > (char *)packet + size) | |
| return; | |
| /* Get the source address, destination port, and TCP flags */ | |
| addr = ip->ip_src; | |
| port = tcp->th_dport; | |
| flags = tcp->th_flags; | |
| /* We're using IP address 0.0.0.0 for a special purpose here, so don't let | |
| * them spoof us. */ | |
| if (!addr.s_addr) return; | |
| /* Use times(2) here not to depend on someone setting the time while we're | |
| * running; we need to be careful with possible return value overflows. */ | |
| now = times(&buf); | |
| /* Do we know this source address already? */ | |
| count = 0; | |
| last = NULL; | |
| if ((current = *(head = &state.hash[hash = hashfunc(addr)]))) | |
| do { | |
| if (current->saddr.s_addr == addr.s_addr) break; | |
| count++; | |
| if (current->next) last = current; | |
| } while ((current = current->next)); | |
| /* We know this address, and the entry isn't too old. Update it. */ | |
| if (current) | |
| if (now - current->timestamp <= SCAN_DELAY_THRESHOLD && | |
| now >= current->timestamp) { | |
| /* Just update the TCP flags if we've seen this port already */ | |
| for (index = 0; index < current->count; index++) | |
| if (current->ports[index] == port) { | |
| current->flags_or |= flags; | |
| current->flags_and &= flags; | |
| return; | |
| } | |
| /* ACK to a new port? This could be an outgoing connection. */ | |
| if (flags & TH_ACK) return; | |
| /* Packet to a new port, and not ACK: update the timestamp */ | |
| current->timestamp = now; | |
| /* Logged this scan already? Then leave. */ | |
| if (current->count == SCAN_COUNT_THRESHOLD) return; | |
| /* Update the TCP flags */ | |
| current->flags_or |= flags; | |
| current->flags_and &= flags; | |
| /* Zero out the destination address, source port and TTL if not fixed. */ | |
| if (current->daddr.s_addr != ip->ip_dst.s_addr) | |
| current->daddr.s_addr = 0; | |
| if (current->sport != tcp->th_sport) | |
| current->sport = 0; | |
| if (current->ttl != ip->ip_ttl) | |
| current->ttl = 0; | |
| /* Got enough destination ports to decide that this is a scan? Then log it. */ | |
| if (current->count == SCAN_COUNT_THRESHOLD - 1) { | |
| safe_log(current); | |
| current->count++; | |
| return; | |
| } | |
| /* Remember the new port */ | |
| current->ports[current->count++] = port; | |
| return; | |
| } | |
| /* We know this address, but the entry is outdated. Mark it unused, and | |
| * remove from the hash table. We'll allocate a new entry instead since | |
| * this one might get re-used too soon. */ | |
| if (current) { | |
| current->saddr.s_addr = 0; | |
| if (last) | |
| last->next = last->next->next; | |
| else if (*head) | |
| *head = (*head)->next; | |
| last = NULL; | |
| } | |
| /* We don't need an ACK from a new source address */ | |
| if (flags & TH_ACK) return; | |
| /* Got too many source addresses with the same hash value? Then remove the | |
| * oldest one from the hash table, so that they can't take too much of our | |
| * CPU time even with carefully chosen spoofed IP addresses. */ | |
| if (count >= HASH_MAX && last) last->next = NULL; | |
| /* We're going to re-use the oldest list entry, so remove it from the hash | |
| * table first (if it is really already in use, and isn't removed from the | |
| * hash table already because of the HASH_MAX check above). */ | |
| /* First, find it */ | |
| if (state.list[state.index].saddr.s_addr) | |
| head = &state.hash[hashfunc(state.list[state.index].saddr)]; | |
| else | |
| head = &last; | |
| last = NULL; | |
| if ((current = *head)) | |
| do { | |
| if (current == &state.list[state.index]) break; | |
| last = current; | |
| } while ((current = current->next)); | |
| /* Then, remove it */ | |
| if (current) { | |
| if (last) | |
| last->next = last->next->next; | |
| else if (*head) | |
| *head = (*head)->next; | |
| } | |
| /* Get our list entry */ | |
| current = &state.list[state.index++]; | |
| if (state.index >= LIST_SIZE) state.index = 0; | |
| /* Link it into the hash table */ | |
| head = &state.hash[hash]; | |
| current->next = *head; | |
| *head = current; | |
| /* And fill in the fields */ | |
| current->timestamp = now; | |
| current->start = time(NULL); | |
| current->saddr = addr; | |
| current->daddr = ip->ip_dst; | |
| current->sport = tcp->th_sport; | |
| current->count = 1; | |
| current->ports[0] = port; | |
| current->flags_or = current->flags_and = flags; | |
| current->ttl = ip->ip_ttl; | |
| } | |
| /* | |
| * Hmm, what could this be? | |
| */ | |
| int main() | |
| { | |
| int raw, size; | |
| struct header packet; | |
| /* Get a raw socket. We could drop root right after that. */ | |
| if ((raw = socket(AF_INET, SOCK_RAW, IPPROTO_TCP)) < 0) { | |
| perror("socket"); | |
| return 1; | |
| } | |
| /* Become a daemon */ | |
| switch (fork()) { | |
| case -1: | |
| perror("fork"); | |
| return 1; | |
| case 0: | |
| break; | |
| default: | |
| return 0; | |
| } | |
| signal(SIGHUP, SIG_IGN); | |
| /* Initialize the state. All source IP addresses are set to 0.0.0.0, which | |
| * means the list entries aren't in use yet. */ | |
| memset(&state, 0, sizeof(state)); | |
| /* Huh? */ | |
| openlog(SYSLOG_IDENT, 0, SYSLOG_FACILITY); | |
| /* Let's start */ | |
| while (1) | |
| if ((size = read(raw, &packet, sizeof(packet))) >= sizeof(packet.ip)) | |
| process_packet(&packet, size); | |
| } | |
| <--> | |