On Fri, 15 Feb 2002, GREGOR wrote:

> uuuups... I'm sorry for the typo..... the following lines are what actually 
> written in my ipfilter.conf file :
> 
> # New Port 53 filter start
> IP_LIST="`cat /etc/dns_floods`"
> for IP in $IP_LIST; do
> $IPCH -I input -j DENY -p tcp -s $IP/32 -d $EXTERN_IP/32 53 -i $EXTERN_IF
> done; unset IP
> #New Port 53 filter end 

Well, it appears okay to me now.  Perhaps you put it in the wrong place?

I did look at the logs again:

> Feb 14 07:31:08 firewall kernel: Packet log: input DENY eth0 PROTO=6
> 167.216.144.43:53 202.149.81.55:53 L=44 S=0x00 I=0 F=0x0000 T=239 (#48) 

and because the port is 53 (dns), the protocol is tcp (typically only used
for zone transfers), the flags are zero (no SYN bit, so it is not a
connection initiation packet) and given the number of packets, perhaps
it could be due to you running a DNS server on your firewall that is
attempting to initiate inbound zone transfers and these are reply packets?

---------------------------------------------------------------------------
Jeff Newmiller                        The     .....       .....  Go Live...
DCN:<[EMAIL PROTECTED]>        Basics: ##.#.       ##.#.  Live Go...
                                      Live:   OO#.. Dead: OO#..  Playing
Research Engineer (Solar/Batteries            O.O#.       #.O#.  with
/Software/Embedded Controllers)               .OO#.       .OO#.  rocks...2k
---------------------------------------------------------------------------




_______________________________________________
Leaf-user mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user

Reply via email to