On Thursday 24 February 2011 00:15:10 Ralph Corderoy wrote:
> Hi Dan,
>
> > On Wednesday 23 February 2011 23:12:31 Dan Dart wrote:
> > > 8.8.8.8 is Google's DNS service. If you're using it, then that'll be
> > > why.  The high port numbers are the responses. which were blocked :(
> >
> > I know 8.8.8.8 is google, I have had the same log entries when I was
> > using opendns IP (208.67.222.222).  I realise that the log entry is
> > telling me that a port scan was blocked but I want to know why the dns
> > is scanning my system on high port numbers when the dns port number is
> > normal 53, is this high level port number scanning normal activity??
>
> If I'm remembering my Stevens' correctly, and Andy Paterson will correct
> me if I'm wrong, IP packets use a 5-tuple to fully specify the
> "connection", e.g.  TCP.  Its members are
>
>     protocol, local address, local port, remote address, remote port
>
> When my machine sends a DNS request to Google that tuple might be
>
>     UDP, 87.113.175.32, 49681, 8.8.8.8, 53
>
> 87... is my IP address at the moment, 8.8.8.8 and 53 you recognise as
> one of Google's DNS servers' IP addresses and the domain service's port
> number.  The local port, 49681, has been picked randomly by my machine
> because the resolver software said it didn't care what the port number
> was so it just got a spare one.
>
> It's the well-known destination port, 53, that's important when
> initiating a request to a server.  The server will see the address and
> port number of the peer, 87.113.175.32 and 49681, and send the reply
> there.
>
> No two duplicate 5-tuples exist at the same moment.  If I ssh, port 22,
> from machine foo to machine bar in one terminal, and then do the same in
> another, the tuples may be
>
>     TCP, foo, 41839, bar, 22
>     TCP, foo, 38220, bar, 22
>
> It's the differing local port numbers that allow those two connections
> to exist at the same time;  every other member of the tuple is
> identical.
>
> So back to your original issue,
>
> > TCP- or UDP-based Port Scan DETECTED on Wed Feb 23 22:21:20 2011
> >  targeting ***.***.***.***,61169, sent from 8.8.8.8,53 (*=my ip
> > address)
>
> 61169 is the local port number that Google's DNS server thinks
> originated the request that it's replying to.  Your stateful firewall
> software thinks that's a port scan because it never saw the outgoing
> request or the request to Google didn't come from you and someone is
> spoofing your IP address.  Or your firewall is buggy.  :-)  If they are
> spoofing you then they're probably not picking on you per se, it's just
> one of those things and this email is long enough already.
>
> As for why they still occur when you use OpenDNS, I guess it's because
> something on your LAN is still configured to use Google.  You could use
> tcpdump or Wireshark on an appropriate machine to try and see the
> outgoing request.
>
>     sudo tcpdump port domain
>
> Cheers,
> Ralph.

So these inbound TCP\UDP based request, should I continue to block them? if I 
allow them through how do I do it, do I need to forward them to something on my 
netwrok possibly my firewall?

Tim

--
Next meeting:  Blandford Forum, Wednesday 2011-03-02 20:00
Meets, Mailing list, IRC, LinkedIn, ...  http://dorset.lug.org.uk/
How to Report Bugs Effectively:  http://goo.gl/4Xue

Reply via email to