Greetings All,
                We are currently having problems with a vpn application. The app
initially negotiates a successful handshake on udp port 500 and then
switches to udp port 10000 which presumably is the tunnel.  The machine
initiating the sessions is 130.216.97.234 which is located on our
network and has out bound access on both udp 500 and 100000, return
traffic should be handed by the keep state option on the rule and in
fact we do see bi directional traffic  on both ports (as observed by
independent application).

However the incoming traffic is being fragmented and some of these
fragments are being dropped: 

11:12:01.669842 rule 4/0(match): block in on bge1: 128.125.253.225.10000 > 
130.216.97.234.10000:  udp 1532 (frag 56706:[EMAIL PROTECTED])
11:12:01.669859 rule 4/0(match): block in on bge1: 128.125.253.225 > 130.216.97.234: 
(frag 56706:[EMAIL PROTECTED])
11:12:01.824700 rule 4/0(match): block in on bge1: 128.125.253.225.10000 > 
130.216.97.234.10000:  udp 1532 (frag 56892:[EMAIL PROTECTED])
11:12:01.824717 rule 4/0(match): block in on bge1: 128.125.253.225 > 130.216.97.234: 
(frag 56892:[EMAIL PROTECTED])
11:12:01.979229 rule 4/0(match): block in on bge1: 128.125.253.225.10000 > 
130.216.97.234.10000:  udp 1532 (frag 57074:[EMAIL PROTECTED])
11:12:01.979246 rule 4/0(match): block in on bge1: 128.125.253.225 > 130.216.97.234: 
(frag 57074:[EMAIL PROTECTED])
11:12:04.552666 rule 4/0(match): block in on bge1: 128.125.253.225.10000 > 
130.216.97.234.10000:  udp 1532 (frag 59870:[EMAIL PROTECTED])
11:12:04.552682 rule 4/0(match): block in on bge1: 128.125.253.225 > 130.216.97.234: 
(frag 59870:[EMAIL PROTECTED])
11:12:04.991560 rule 4/0(match): block in on bge1: 128.125.253.225.10000 > 
130.216.97.234.10000:  udp 1532 (frag 60341:[EMAIL PROTECTED])
11:12:04.991577 rule 4/0(match): block in on bge1: 128.125.253.225 > 130.216.97.234: 
(frag 60341:[EMAIL PROTECTED])
11:12:05.145053 rule 4/0(match): block in on bge1: 128.125.253.225.10000 > 
130.216.97.234.10000:  udp 1532 (frag 60511:[EMAIL PROTECTED])
11:12:05.145071 rule 4/0(match): block in on bge1: 128.125.253.225 > 130.216.97.234: 
(frag 60511:[EMAIL PROTECTED])
11:12:05.297440 rule 4/0(match): block in on bge1: 128.125.253.225.10000 > 
130.216.97.234.10000:  udp 1532 (frag 60663:[EMAIL PROTECTED])

Notes:
      * that rule 4 is the generic drop everything coming in rule at the
        start of the rule set.
      * we are not using scrub rules.

Does anyone have any ideas as to why these fragments are not being
covered by the state mechanisms?

Rules:
4) block in log on $ext_if all
pass out quick on $ext_if from <external> to any keep state

30.216.97.234 is a member of table <external>

 

-- 
Russell Fulton, Information Security Officer, The University of Auckland
New Zealand

Reply via email to