> I´m havin a lot of dnyed packets on port 53, like this one:
> Mar 14 13:46:13 tptrtr kernel: Packet log: input DENY eth0 PROTO=6
202.139.133.129:46069 200.45.110.178:53 L=44 S=0x00 I=0 F=0x0000 T=237 (#65)
>
> When I check them on http://www.echogent.com/cgi-bin/fwlog.pl
> I got no advice on it.
>
> The results of lising the rule are
> # ipchains -nvL --line-numbers
> 65     520 24564 DENY       all  ----l- 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             n/a

This is the "catch all" rule, which blocks any inbound traffic on the
external interface that hasn't explicitly been allowed.

> Can anyone help figuring out what's wrong (or may be right) and why arev
> these packets being blocked.

The packets are TCP (protocol 6) with a source port of 46069 and a
destination port of 53.  This is pretty wierd.  Port 53 is for DNS, but
typically DNS queries only use UDP.  TCP packets to/from port 53 *ARE* used
to do zone transfers, and occasionally to transfer particularly large DNS
queries/responses.  The high source port number of 46069 would lead me to
believe the remote end initiated the connection.

If you're not running a DNS server, I'd say the traffic is some sort of scan
or probe, and should be denied.  If you're actually running a DNS server,
this traffic isn't so unusual...you should look into references on packet
filtering and securing your DNS server...if you simply drop inbound TCP
queries, you can cause delays in name resolution for your domains, but fully
securing DNS is beyond the scope of this e-mail, and your original question.

HTH,

Charles Steinkuehler
http://lrp.steinkuehler.net
http://c0wz.steinkuehler.net (lrp.c0wz.com mirror)


_______________________________________________
Leaf-user mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user

Reply via email to