On Fri, 15 Feb 2002, GREGOR wrote: > uuuups... I'm sorry for the typo..... the following lines are what actually > written in my ipfilter.conf file : > > # New Port 53 filter start > IP_LIST="`cat /etc/dns_floods`" > for IP in $IP_LIST; do > $IPCH -I input -j DENY -p tcp -s $IP/32 -d $EXTERN_IP/32 53 -i $EXTERN_IF > done; unset IP > #New Port 53 filter end
Well, it appears okay to me now. Perhaps you put it in the wrong place? I did look at the logs again: > Feb 14 07:31:08 firewall kernel: Packet log: input DENY eth0 PROTO=6 > 167.216.144.43:53 202.149.81.55:53 L=44 S=0x00 I=0 F=0x0000 T=239 (#48) and because the port is 53 (dns), the protocol is tcp (typically only used for zone transfers), the flags are zero (no SYN bit, so it is not a connection initiation packet) and given the number of packets, perhaps it could be due to you running a DNS server on your firewall that is attempting to initiate inbound zone transfers and these are reply packets? --------------------------------------------------------------------------- Jeff Newmiller The ..... ..... Go Live... DCN:<[EMAIL PROTECTED]> Basics: ##.#. ##.#. Live Go... Live: OO#.. Dead: OO#.. Playing Research Engineer (Solar/Batteries O.O#. #.O#. with /Software/Embedded Controllers) .OO#. .OO#. rocks...2k --------------------------------------------------------------------------- _______________________________________________ Leaf-user mailing list [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/leaf-user