Hi,

Since upgrading from 5.1.12 to 5.2.0 on the machine that I build
firewall rulesets for my shorewall-lite-running-router, I have seen a
massive increase in RST and FIN packets being logged such as:

Jun 15 15:30:02 gw kernel: [895825.983756] Shorewall:net2fw:DROP:IN=eth0.2 OUT= 
MAC=... SRC=72.143.208.198 DST=my.router.address LEN=52 TOS=0x00 PREC=0x00 
TTL=53 ID=0 DF PROTO=TCP SPT=26372 DPT=443 WINDOW=1517 RES=0x00 ACK FIN URGP=0 
MARK=0x100 
Jun 15 15:30:02 gw kernel: [895826.007873] Shorewall:net2fw:DROP:IN=eth0.2 OUT= 
MAC=... SRC=72.143.208.198 DST=my.router.address LEN=52 TOS=0x00 PREC=0x00 
TTL=52 ID=0 DF PROTO=TCP SPT=26386 DPT=443 WINDOW=1517 RES=0x00 ACK FIN URGP=0 
MARK=0x100 
Jun 15 15:30:02 gw kernel: [895826.031463] Shorewall:net2fw:DROP:IN=eth0.2 OUT= 
MAC=... SRC=72.143.208.198 DST=my.router.address LEN=52 TOS=0x00 PREC=0x00 
TTL=53 ID=0 DF PROTO=TCP SPT=26418 DPT=443 WINDOW=1517 RES=0x00 ACK FIN URGP=0 
MARK=0x100 
Jun 15 15:30:01 gw kernel: [895825.211953] Shorewall:net2fw:DROP:IN=eth0.2 OUT= 
MAC=... SRC=72.143.208.198 DST=my.router.address LEN=52 TOS=0x00 PREC=0x00 
TTL=52 ID=0 DF PROTO=TCP SPT=26386 DPT=443 WINDOW=1517 RES=0x00 ACK FIN URGP=0 
MARK=0x100 
Jun 15 15:30:01 gw kernel: [895825.235647] Shorewall:net2fw:DROP:IN=eth0.2 OUT= 
MAC=... SRC=72.143.208.198 DST=my.router.address LEN=52 TOS=0x00 PREC=0x00 
TTL=53 ID=0 DF PROTO=TCP SPT=26372 DPT=443 WINDOW=1517 RES=0x00 ACK FIN URGP=0 
MARK=0x100 
Jun 15 15:30:01 gw kernel: [895825.259243] Shorewall:net2fw:DROP:IN=eth0.2 OUT= 
MAC=... SRC=72.143.208.198 DST=my.router.address LEN=52 TOS=0x00 PREC=0x00 
TTL=53 ID=0 DF PROTO=TCP SPT=26418 DPT=443 WINDOW=1517 RES=0x00 ACK FIN URGP=0 
MARK=0x100 
Jun 15 15:30:01 gw kernel: [895825.282820] Shorewall:net2fw:DROP:IN=eth0.2 OUT= 
MAC=... SRC=72.143.208.198 DST=my.router.address LEN=52 TOS=0x00 PREC=0x00 
TTL=53 ID=0 DF PROTO=TCP SPT=26425 DPT=443 WINDOW=1517 RES=0x00 ACK FIN URGP=0 
MARK=0x100 
Jun 15 15:30:02 gw kernel: [895825.465867] Shorewall:net2fw:DROP:IN=eth0.2 OUT= 
MAC=... SRC=72.143.208.198 DST=my.router.address LEN=52 TOS=0x00 PREC=0x00 
TTL=52 ID=0 DF PROTO=TCP SPT=26386 DPT=443 WINDOW=1517 RES=0x00 ACK FIN URGP=0 
MARK=0x100 
Jun 15 15:30:02 gw kernel: [895825.489637] Shorewall:net2fw:DROP:IN=eth0.2 OUT= 
MAC=... SRC=72.143.208.198 DST=my.router.address LEN=52 TOS=0x00 PREC=0x00 
TTL=53 ID=0 DF PROTO=TCP SPT=26372 DPT=443 WINDOW=1517 RES=0x00 ACK FIN URGP=0 
MARK=0x100 
Jun 15 15:30:02 gw kernel: [895825.983756] Shorewall:net2fw:DROP:IN=eth0.2 OUT= 
MAC=... SRC=72.143.208.198 DST=my.router.address LEN=52 TOS=0x00 PREC=0x00 
TTL=53 ID=0 DF PROTO=TCP SPT=26372 DPT=443 WINDOW=1517 RES=0x00 ACK FIN URGP=0 
MARK=0x100 
Jun 15 15:30:02 gw kernel: [895826.007873] Shorewall:net2fw:DROP:IN=eth0.2 OUT= 
MAC=... SRC=72.143.208.198 DST=my.router.address LEN=52 TOS=0x00 PREC=0x00 
TTL=52 ID=0 DF PROTO=TCP SPT=26386 DPT=443 WINDOW=1517 RES=0x00 ACK FIN URGP=0 
MARK=0x100 
Jun 15 15:30:02 gw kernel: [895826.031463] Shorewall:net2fw:DROP:IN=eth0.2 OUT= 
MAC=... SRC=72.143.208.198 DST=my.router.address LEN=52 TOS=0x00 PREC=0x00 
TTL=53 ID=0 DF PROTO=TCP SPT=26418 DPT=443 WINDOW=1517 RES=0x00 ACK FIN URGP=0 
MARK=0x100 

Surely these are just "straggler" packets that come in once a TCP
conntrack session has been closed, so nothing terribly out of the
ordinary there.

But why are they being logged all of a sudden, as of the 5.2.0 upgrade?

Any ideas?

Cheers,
b.

Attachment: signature.asc
Description: This is a digitally signed message part

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to