Re: constant barrage from rfc 1918 addresses source port 6293

2008-04-14 Thread Chris Smith
I did find the following thread - users with the same problem:

http://www.globalaffairs.org/forum//showthread.php?t=51413

However, not really any resolution.

-- 
Chris



Re: constant barrage from rfc 1918 addresses source port 6293

2008-04-14 Thread Chris Smith
On Monday 14 April 2008, Chris Smith wrote:
> I took a tcpdump and they are all TCP RST packets.
>
> Further investigation shows that the destination ports match state
> entries of gmail pop3s connections. I do use fetchmail on my server
> to fetch my Google hosted email via pop3s. But why would TCP RST
> packets be sent from these rfc1918 addresses?

Also have since verified that if I stop my fetchmail service the TCP RST 
packets from 172.21.x.y stop as well. When I start fetchmail back up 
the TCP RST packets return.

-- 
Chris



Re: constant barrage from rfc 1918 addresses source port 6293

2008-04-14 Thread Chris Smith
On Thursday 10 April 2008, Lord Sporkton wrote:
> It is possible that its not really ment for you, but perhaps your
> modem, something along the lines of a modem checkin?

I took a tcpdump and they are all TCP RST packets.

Further investigation shows that the destination ports match state 
entries of gmail pop3s connections. I do use fetchmail on my server to 
fetch my Google hosted email via pop3s. But why would TCP RST packets 
be sent from these rfc1918 addresses?

-- 
Chris



Re: constant barrage from rfc 1918 addresses source port 6293

2008-04-10 Thread Lord Sporkton
On 10/04/2008, Chris Smith <[EMAIL PROTECTED]> wrote:
> I block and log rfc 1918 connection attempts and am seeing the following
>  in pflog continuously ad nauseum:
>
>  Apr 10 15:10:21.414289 rule 9/(match) block in on fxp1:
>  172.21.153.70.6293 > 68.61.77.3.50716: [|tcp] (DF) [tos 0x20]
>  Apr 10 15:10:22.833822 rule 9/(match) block in on fxp1:
>  172.21.233.57.6293 > 68.61.77.3.54518: [|tcp] (DF) [tos 0x20]
>  Apr 10 15:10:23.789209 rule 9/(match) block in on fxp1:
>  172.21.153.22.6293 > 68.61.77.3.57836: [|tcp] (DF) [tos 0x20]
>  Apr 10 15:10:24.256891 rule 9/(match) block in on fxp1:
>  172.21.97.2.6293 > 68.61.77.3.50417: [|tcp] (DF) [tos 0x20]
>  Apr 10 15:10:24.821674 rule 9/(match) block in on fxp1:
>  172.21.225.72.6293 > 68.61.77.3.53965: [|tcp] [tos 0x20]
>  Apr 10 15:11:28.559238 rule 9/(match) block in on fxp1:
>  172.21.240.45.6293 > 68.61.77.3.58733: [|tcp] (DF) [tos 0x20]
>  Apr 10 15:11:29.397925 rule 9/(match) block in on fxp1:
>  172.21.240.63.6293 > 68.61.77.3.62274: [|tcp] [tos 0x20]
>
>  The source IP addresses do repeat (but not in a specific order) and the
>  source port remains constant at 6293.
>
>  As these addresses (AFAIK) aren't generally routed I'm wondering about
>  their source.
>
>  Possibly all spoofed, but as I'm using cable service, they could also be
>  from a system on the local shared subnet. Another thought is that the
>  ISP (Comcast) is using and routing them for their own purposes (VOIP
>  service, etc.). Any ideas?
>
>  Thanks.
>
>  --
>
> Chris
>
>

I would highly doubt that you are seeing internal traffic from your
ISP, what ever it is, its pointing directly at you, its not just stray
traffic thats passing on your link. I would suggest contacting your
ISP concerning this, they may be able to track it and/or prevent it.

It is possible that its not really ment for you, but perhaps your
modem, something along the lines of a modem checkin? hypothetically
speaking, if your modem was trying to "report home" sourcing from your
public ip but the public was actaully assigned on your router, you
could see return traffic from your modem "report home" <-- that is of
course a stretch and highly unlikely. Any isp that set up something
like that would be retarded beyond the capability of their sales team.

-- 
-Lawrence



constant barrage from rfc 1918 addresses source port 6293

2008-04-10 Thread Chris Smith
I block and log rfc 1918 connection attempts and am seeing the following 
in pflog continuously ad nauseum:

Apr 10 15:10:21.414289 rule 9/(match) block in on fxp1:
172.21.153.70.6293 > 68.61.77.3.50716: [|tcp] (DF) [tos 0x20]
Apr 10 15:10:22.833822 rule 9/(match) block in on fxp1:
172.21.233.57.6293 > 68.61.77.3.54518: [|tcp] (DF) [tos 0x20]
Apr 10 15:10:23.789209 rule 9/(match) block in on fxp1:
172.21.153.22.6293 > 68.61.77.3.57836: [|tcp] (DF) [tos 0x20]
Apr 10 15:10:24.256891 rule 9/(match) block in on fxp1:
172.21.97.2.6293 > 68.61.77.3.50417: [|tcp] (DF) [tos 0x20]
Apr 10 15:10:24.821674 rule 9/(match) block in on fxp1:
172.21.225.72.6293 > 68.61.77.3.53965: [|tcp] [tos 0x20]
Apr 10 15:11:28.559238 rule 9/(match) block in on fxp1:
172.21.240.45.6293 > 68.61.77.3.58733: [|tcp] (DF) [tos 0x20]
Apr 10 15:11:29.397925 rule 9/(match) block in on fxp1:
172.21.240.63.6293 > 68.61.77.3.62274: [|tcp] [tos 0x20]

The source IP addresses do repeat (but not in a specific order) and the 
source port remains constant at 6293.

As these addresses (AFAIK) aren't generally routed I'm wondering about 
their source.

Possibly all spoofed, but as I'm using cable service, they could also be 
from a system on the local shared subnet. Another thought is that the 
ISP (Comcast) is using and routing them for their own purposes (VOIP 
service, etc.). Any ideas?

Thanks.

-- 
Chris