On Thursday 24 February 2011 00:15:10 Ralph Corderoy wrote: > Hi Dan, > > > On Wednesday 23 February 2011 23:12:31 Dan Dart wrote: > > > 8.8.8.8 is Google's DNS service. If you're using it, then that'll be > > > why. The high port numbers are the responses. which were blocked :( > > > > I know 8.8.8.8 is google, I have had the same log entries when I was > > using opendns IP (208.67.222.222). I realise that the log entry is > > telling me that a port scan was blocked but I want to know why the dns > > is scanning my system on high port numbers when the dns port number is > > normal 53, is this high level port number scanning normal activity?? > > If I'm remembering my Stevens' correctly, and Andy Paterson will correct > me if I'm wrong, IP packets use a 5-tuple to fully specify the > "connection", e.g. TCP. Its members are > > protocol, local address, local port, remote address, remote port > > When my machine sends a DNS request to Google that tuple might be > > UDP, 87.113.175.32, 49681, 8.8.8.8, 53 > > 87... is my IP address at the moment, 8.8.8.8 and 53 you recognise as > one of Google's DNS servers' IP addresses and the domain service's port > number. The local port, 49681, has been picked randomly by my machine > because the resolver software said it didn't care what the port number > was so it just got a spare one. > > It's the well-known destination port, 53, that's important when > initiating a request to a server. The server will see the address and > port number of the peer, 87.113.175.32 and 49681, and send the reply > there. > > No two duplicate 5-tuples exist at the same moment. If I ssh, port 22, > from machine foo to machine bar in one terminal, and then do the same in > another, the tuples may be > > TCP, foo, 41839, bar, 22 > TCP, foo, 38220, bar, 22 > > It's the differing local port numbers that allow those two connections > to exist at the same time; every other member of the tuple is > identical. > > So back to your original issue, > > > TCP- or UDP-based Port Scan DETECTED on Wed Feb 23 22:21:20 2011 > > Â targeting ***.***.***.***,61169, sent from 8.8.8.8,53 (*=my ip > > address) > > 61169 is the local port number that Google's DNS server thinks > originated the request that it's replying to. Your stateful firewall > software thinks that's a port scan because it never saw the outgoing > request or the request to Google didn't come from you and someone is > spoofing your IP address. Or your firewall is buggy. :-) If they are > spoofing you then they're probably not picking on you per se, it's just > one of those things and this email is long enough already. > > As for why they still occur when you use OpenDNS, I guess it's because > something on your LAN is still configured to use Google. You could use > tcpdump or Wireshark on an appropriate machine to try and see the > outgoing request. > > sudo tcpdump port domain > > Cheers, > Ralph.
So these inbound TCP\UDP based request, should I continue to block them? if I allow them through how do I do it, do I need to forward them to something on my netwrok possibly my firewall? Tim -- Next meeting: Blandford Forum, Wednesday 2011-03-02 20:00 Meets, Mailing list, IRC, LinkedIn, ... http://dorset.lug.org.uk/ How to Report Bugs Effectively: http://goo.gl/4Xue