First things first. The address is a local one. It is one of two Mageia 5 desktops at this location which are both running x2go sessions for me. I am using these sessions from a third room in the house. Both "remote" sessions have sound enabled. As I still (+2 years and counting) have not mastered the documented method of tunnelling x2go session sound over ssh I have configured my local firewall to accept 4713/tcp connections and I get acceptable performance from both of the "remote" desktops on my LAN.
The full text of the error message written by mandi - specifically in
static void process_attack(plugin_t *, DBusConnection *, int, msg_usr_t *)
- is as quoted, where the xxx address is, in my case, 192.168.1.80.
The extra stuff is just the usual added in the journal; date/time, host name and process name/id. The process is, of course, mandi.
The strange thing is that right at this moment I have unattended sessions (x2go) running on both of the other Mageia 5 desktops but only one of them is spamming my journal. I begin to suspect some difference in the way the x2go connections for the remote servers have been configured, but there is nothing obvious.
The conditions under which mandi will fire off this message, which despite its casual appearance appears to be intended as an attack warning, are difficult to determine without a closer analysis of the workings of mandi, but on the face of it it seems to be any address which has already appeared in things called the black list, the white list and the report list - that looks quite comprehensive. The question now seems to be why does one remote x2go session produce the response from mandi whilst the other one does not?
For completeness I ran your suggested command
- Code: Select all
journalctl -ab| grep -iE "mandi|ifw"
but there is little point in reporting the result here as at this moment it results only in 2311 lines of the type already described covering the time from 15:05:13 to 15:43:44. The first two lines are:
- Code: Select all
Mar 06 15:05:12 attica.local kernel: IFWLOG: register target
Mar 06 15:05:13 attica.local mandi[2232]: skipping known address: 192.168.1.80
Would you agree that one of these two x2go sessions is producing connection attempts to my local pusle audio which look to mandi like attacks?
Richard
PS. I saw that Owncloud stuff yesterday but found it hard to understand as I have no knowledge of Owncloud or its use in a LAN.