On 9/14/19 8:35 AM, Tom Eastep wrote:
> On 9/14/19 12:45 AM, Timo Sigurdsson wrote:
>> There are a couple of areas that might have possibly changed:
>>
>> 1) shorewall's logging behavior:
>> Maybe these packets were dropped all along but I never saw them in the logs?
>> When I upgraded the machine I updated the configuration accordingly. I 
>> didn't change the log levels but I did update the default actions/macros 
>> like this:
>> -DROP_DEFAULT=Drop
>> -REJECT_DEFAULT=Reject
>> +BLACKLIST_DEFAULT="Broadcast(DROP),Multicast(DROP),dropNotSyn:$LOG_LEVEL,dropInvalid:$LOG_LEVEL,DropDNSrep:$LOG_LEVEL"
>> +DROP_DEFAULT="Broadcast(DROP),Multicast(DROP)"
>> +REJECT_DEFAULT="Broadcast(DROP),Multicast(DROP)"
>>
> 
> That is the cause. The deprecated Drop and Reject actions silently
> dropped these "late DNS reply" packets. To avoid masking a DDOS attack
> using such packets, they are now logged (such a DDOS attack has actually
> been observed). When seen in small numbers, they can be safely ignored.
> 

I should add that Drop and Reject, also dropped TCP packets that were in
the NEW conntrack state but were not SYN packets; that is why you are
seeing the TCP packets being logged.

-Tom
-- 
Tom Eastep        \   Q: What do you get when you cross a mobster with
Shoreline,         \     an international standard?
Washington, USA     \ A: Someone who makes you an offer you can't
http://shorewall.org \   understand
                      \_______________________________________________

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to