[GRLUG] Rogue SSH connections
Adam Tauno Williams
awilliam at whitemice.org
Sun Oct 6 20:04:59 EDT 2013
On Sun, 2013-10-06 at 17:53 -0500, L. V. Lammert wrote:
> When one does fstat [lsof] on a BSD box, it returns detailed information
> about open files, e.g.:
> lvl ssh 19533 4* internet stream tcp 0xd9041800 \
> 206.197.251.191:3160 --> 206.197.251.252:2206
> How does one get similar info on Linux? One of our workgroup servers is
> opening ssh connections to a BSD server and leaving them open, but I
> cannot figure out what is causing them. Need to track back the IP to a
> PID/process on the Linux box for a clue.
<http://www.wmmi.net/documents/Debugging2012.pdf>
lsof is 'standard' UNIX. It works on LINUX, BSD, AIX, Slowaris, etc...
If you want to see details on a specific socket connection then "ss" can
tell you much much more. See slide 20 of 20 from the above link.
--
Adam Tauno Williams <mailto:awilliam at whitemice.org> GPG D95ED383
Systems Administrator, Python Developer, LPI / NCLA
More information about the grlug
mailing list