DescriptionIt'd be good to generate a list of which IP's have been seen connecting to which ports.
Given there might be client connections coming into a monitored system, need to know which end is the destination so that we don't clog up the file with client ports. So it'll have to be based on the initial SYN so that we know exactly who is initiating the connection and what the service port is.
Activity
2015-11-25 15:25:03
The simplest way to be sure is probably going to be to extract a full list and then have three runs through the data
- Native IPv4
- Native IPv6
- Tunnelled IPv6
We still want to record that the tunnel endpoint was connected to though, so may need to come up with some sort of indicator to mark it as such.
2015-11-25 16:14:52
- For both native IPv4 and IPv6, Tunnelled will be N_
- For IPv4 encapsulated IPv6, _Tunnelled will be Y_
- For IPv4 addresses identified as a tunnel endpoint, port will be empty and _Tunnelled will be _T_
2015-11-25 16:52:16
2015-11-25 16:53:41
Webhook User-Agent
View Commit
2015-11-25 17:02:36
I don't want to simply exclude high-numbered ports, because there's nothing to stop you from having something listen on one of those and the resulting traffic would be excluded from the reports.
Ideally it needs to be done in a way that's more or less protocol agnostic. With DNS (for example) we can easily see whether it's a query or a response, but that means that just to generate a list of dest IP/ports the script has to understand every protocol which might be run over UDP.
That said, also want to think about whether other protocols should be included. Recording ICMP echo requests (for example) would introduce a lot of noise, though by the same token there might be cause to be interested in looking at what hosts have been pinged and how regularly (leading up to looking at the ping payloads themselves to see if it's being used for communication). There are other types of ICMP which might be of interest too.
Also, it occurred that the output of this feature can be used to help decide what other tshark runs to perform later in the script, so I've raised PAS-11 to cover the implementation of that. Can't do very much on it until a sensible solution has been found for non-TCP traffic though.
2015-11-25 17:05:41
Webhook User-Agent
View Commit
2015-11-25 17:24:32
2015-11-25 17:24:54
2015-11-25 17:25:41
Webhook User-Agent
View Commit