Hello,
we've got a fairly busy DNS server that we see intermitent filtering problems on. When the issue happens, the box is unreachable over the network. In the logs, we see that the filter's blocked traffic from some of the ports where we've got allow rules for. The issue seems to be with ipfilter (or the rules), as the problems go away after running an ipf -Fa. Oddly enough, these issues don't seem to occur on other servers running similar rule sets.
Does anyone have any ideas/recommendations?

Thanks in advance,

uname:
SunOS ns5.so.cg 5.9 Generic_112233-11 sun4u sparc SUNW,Sun-Fire-V240
isainfo -vk
64-bit sparcv9 kernel modules
netstat -i
Name Mtu Net/Dest Address Ipkts Ierrs Opkts Oerrs Collis Queue lo0 8232 loopback localhost 135730 0 135730 0 0 0 bge0 1500 ns5.so.cg ns5 437077 0 424487 0 0 0 netstat -s -P ip

IPv4    ipForwarding        =     2     ipDefaultTTL        =   255
       ipInReceives        =434119     ipInHdrErrors       =     0
       ipInAddrErrors      =     0     ipInCksumErrs       =     0
       ipForwDatagrams     =     0     ipForwProhibits     =     0
       ipInUnknownProtos   =     0     ipInDiscards        =     0
       ipInDelivers        =555814     ipOutRequests       =425908
       ipOutDiscards       =     0     ipOutNoRoutes       =    12
       ipReasmTimeout      =    60     ipReasmReqds        =     0
       ipReasmOKs          =     0     ipReasmFails        =     0
       ipReasmDuplicates   =     0     ipReasmPartDups     =     0
       ipFragOKs           =     0     ipFragFails         =     0
       ipFragCreates       =     0     ipRoutingDiscards   =     0
       tcpInErrs           =     1     udpNoPorts          = 11808
       udpInCksumErrs      =     6     udpInOverflows      =     0
       rawipInOverflows    =     0     ipsecInSucceeded    =     0
       ipsecInFailed       =     0     ipInIPv6            =     0
       ipOutIPv6           =     0     ipOutSwitchIPv6     =     2
ipf -V
ipf: IP Filter: v3.4.31 (496)
Kernel: IP Filter: v3.4.31 Running: yes
Log Flags: 0 = none set
Default: pass all, Logging: available
Active list: 1
dropped packets:        in 0    out 0
non-data packets:       in 1    out 1
no-data packets:        in 0    out 0
non-ip packets:         in 0    out 0
  bad packets:         in 0    out 0
copied messages:        in 2195 out 0
IPv6 packets:          in 0 out 0
input packets: blocked 2009 passed 434869 nomatch 37298 counted 0 short 0 output packets: blocked 0 passed 427197 nomatch 35435 counted 0 short 0
input packets logged:  blocked 1873 passed 0
output packets logged:  blocked 0 passed 0
packets logged:        input 1233 output 0
log failures:          input 0 output 0
fragment state(in):     kept 0  lost 0
fragment state(out):    kept 0  lost 0
packet state(in):       kept 53 lost 95
packet state(out):      kept 47408      lost 127133
ICMP replies:   0       TCP RSTs sent:  0
Invalid source(in):     0
Result cache hits(in):  130898  (out):  114013
IN Pullups succeeded:   0       failed: 0
OUT Pullups succeeded:  1869    failed: 0
Fastroute successes:    0       failures:       0
TCP cksum fails(in):    0       (out):  0
Packet log flags set: (0)
       none
ipfstat -i

pass in quick on lo0 from any to any
pass in quick proto icmp from any to any
pass in quick proto udp from any port 66 >< 69 to any port = 67 keep state
pass in quick proto tcp from HOSTA/32 to any port = 22 flags S/FSRPAU keep state keep frags pass in quick proto tcp from NETA/23 to any port = 22 flags S/FSRPAU keep state keep frags pass in quick proto tcp from NETB/24 to any port = 22 flags S/FSRPAU keep state keep frags
pass in quick proto udp from NETA/23 to any port = 161
pass in quick proto udp from NETB/24 to any port = 161
pass in quick proto tcp from NETA/23 to any port = 8400 flags S/FSRPAU keep state keep frags pass in quick proto tcp from NETB/24 to any port = 8400 flags S/FSRPAU keep state keep frags
pass in quick proto tcp/udp from any to any port = domain
block in quick proto tcp from any to any port = 80
block in quick proto tcp from any to any port = 445
block in quick proto tcp/udp from any to any port 134 >< 140
block in log from any to any

ipfstat -o
pass out quick on lo0 from any to any
pass out quick proto tcp from any to any flags S/FSRPAU keep state
pass out quick proto tcp from any to any flags A/A
pass out quick from any to any keep state
block out log from any to any

no ipnat


--
Erik Huizing

Reply via email to