DNS Blocked packets (was RE: [Leaf-user] (no subject))

2002-03-14 Thread Sergio Morilla

Thanks.
Very clear and informative!!

More comments inline
  I´m havin a lot of dnyed packets on port 53, like this one:
  Mar 14 13:46:13 tptrtr kernel: Packet log: input DENY eth0 PROTO=6
 202.139.133.129:46069 200.45.110.178:53 L=44 S=0x00 I=0 
 F=0x T=237 (#65)
  The results of lising the rule are
  # ipchains -nvL --line-numbers
  65 520 24564 DENY   all  l- 0xFF 0x00  eth0
 0.0.0.0/00.0.0.0/0 n/a
 
 This is the catch all rule, which blocks any inbound traffic on the
 external interface that hasn't explicitly been allowed.
Perfect!!!


  Can anyone help figuring out what's wrong (or may be right) 
 The packets are TCP (protocol 6) with a source port of 46069 and a
 destination port of 53.  This is pretty wierd.  Port 53 is 
 for DNS, but
 typically DNS queries only use UDP.  TCP packets to/from port 
 53 *ARE* used
 to do zone transfers, and occasionally to transfer 
Fun is I have a DNS server but I have disallowed zone transfers.
Its an internal caching DNS (W2K)

 particularly large DNS
 queries/responses.  The high source port number of 46069 
 would lead me to
 believe the remote end initiated the connection.
Why should this happend?? Any threat??
 
 If you're not running a DNS server, I'd say the traffic is 
 some sort of scan
 or probe, and should be denied.  If you're actually running a 
 DNS server,
I DO (see above) but I (mis?)understand that if zone transfers are
not allowed (nor wanted) why will someone try to do a transfer to my
system??? Looking for bind??

 this traffic isn't so unusual...you should look into 
 references on packet
 filtering and securing your DNS server...if you simply drop 
 inbound TCP
 queries, you can cause delays in name resolution for your 
 domains, but fully
 securing DNS is beyond the scope of this e-mail, and your 
 original question.
Where and how?? Some pointers (links may be?)

 HTH,
Helped a LOT!!!

Thanks Charles

Sergio

___
Leaf-user mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user



Re: DNS Blocked packets (was RE: [Leaf-user] (no subject))

2002-03-14 Thread Charles Steinkuehler

  Can anyone help figuring out what's wrong (or may be right)
 The packets are TCP (protocol 6) with a source port of 46069 and a
 destination port of 53.  This is pretty wierd.  Port 53 is
 for DNS, but
 typically DNS queries only use UDP.  TCP packets to/from port
 53 *ARE* used
 to do zone transfers, and occasionally to transfer
Fun is I have a DNS server but I have disallowed zone transfers.
Its an internal caching DNS (W2K)

TCP is used for normal queries, as well as zone transfers.

 particularly large DNS
 queries/responses.  The high source port number of 46069
 would lead me to
 believe the remote end initiated the connection.
Why should this happend?? Any threat??

It's part of how DNS works...to determine any threat, you'd have to look at
the acutal contents of the packet and see if it's a normal query, an
attempted buffer overflow, an attempted zone transfer, etc...

 If you're not running a DNS server, I'd say the traffic is
 some sort of scan
 or probe, and should be denied.  If you're actually running a
 DNS server,
I DO (see above) but I (mis?)understand that if zone transfers are
not allowed (nor wanted) why will someone try to do a transfer to my
system??? Looking for bind??

TCP is used for more than just zone reqests...again, if you really want to
know exactly what these packets are, you'll have to dump them and examine
the contents.  It's not as simple as if I'm not doing zone transfers, all
inbound TCP packets to port 53 are malicious.

 this traffic isn't so unusual...you should look into
 references on packet
 filtering and securing your DNS server...if you simply drop
 inbound TCP
 queries, you can cause delays in name resolution for your
 domains, but fully
 securing DNS is beyond the scope of this e-mail, and your
 original question.
Where and how?? Some pointers (links may be?)

There are lots of resources for securing bind available online.  A quick
google search will turn up lots of howtos.  As for understanding DNS, and
how/why TCP packets are used for resolver queries, see any book or online
info on DNS in general...the DNS RFC's (and the source-code of your
name-server) are, of course, the ultimate source of information, but for a
practical discussion of packet-filtering aspects of DNS, you probably can't
go wrong with O'Reilly's Building Internet Firewalls.

Charles Steinkuehler
http://lrp.steinkuehler.net
http://c0wz.steinkuehler.net (lrp.c0wz.com mirror)


___
Leaf-user mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user



Re: DNS Blocked packets (was RE: [Leaf-user] (no subject))

2002-03-14 Thread seanecovel

This question comes up from time to time.  After much 
research and worrying, it usually turns out to be the 
results of a class of tools represented by a product 
called Big IP.  This tool is sold to companies that want 
to tailor the browsing experience of their visitors by 
positioning Web Servers around the net, and then 
pointing the browser to the nearest server.  To do 
this, they flood you with a type of ping request to 
get a round trip time.  You usually get hit by a few 
packets from a bunch of servers, all within a very short 
period of time.  The quickest response wins, and you get 
redirected to that server.  They have been using port 53 
lately.  If you review your logs, you'll find that these 
most often occur when you were browsing, and probably 
got one of those #$%# popup ads.

Sean
 Thanks.
 Very clear and informative!!
 
 More comments inline
   I´m havin a lot of dnyed packets on port 53, like 
this one:
   Mar 14 13:46:13 tptrtr kernel: Packet log: input 
DENY eth0 PROTO=6
  202.139.133.129:46069 200.45.110.178:53 L=44 S=0x00 
I=0 
  F=0x T=237 (#65)
   The results of lising the rule are
   # ipchains -nvL --line-numbers
   65 520 24564 DENY   all  l- 0xFF 0x00  
eth0
  0.0.0.0/00.0.0.0/0 n/a
  
  This is the catch all rule, which blocks any 
inbound traffic on the
  external interface that hasn't explicitly been 
allowed.
 Perfect!!!
 
 
   Can anyone help figuring out what's wrong (or may 
be right) 
  The packets are TCP (protocol 6) with a source port 
of 46069 and a
  destination port of 53.  This is pretty wierd.  Port 
53 is 
  for DNS, but
  typically DNS queries only use UDP.  TCP packets 
to/from port 
  53 *ARE* used
  to do zone transfers, and occasionally to transfer 
 Fun is I have a DNS server but I have disallowed zone 
transfers.
 Its an internal caching DNS (W2K)
 
  particularly large DNS
  queries/responses.  The high source port number of 
46069 
  would lead me to
  believe the remote end initiated the connection.
 Why should this happend?? Any threat??
  
  If you're not running a DNS server, I'd say the 
traffic is 
  some sort of scan
  or probe, and should be denied.  If you're actually 
running a 
  DNS server,
 I DO (see above) but I (mis?)understand that if zone 
transfers are
 not allowed (nor wanted) why will someone try to do a 
transfer to my
 system??? Looking for bind??
 
  this traffic isn't so unusual...you should look into 
  references on packet
  filtering and securing your DNS server...if you 
simply drop 
  inbound TCP
  queries, you can cause delays in name resolution for 
your 
  domains, but fully
  securing DNS is beyond the scope of this e-mail, and 
your 
  original question.
 Where and how?? Some pointers (links may be?)
 
  HTH,
 Helped a LOT!!!
 
 Thanks Charles
 
 Sergio
 
 ___
 Leaf-user mailing list
 [EMAIL PROTECTED]
 https://lists.sourceforge.net/lists/listinfo/leaf-user


___
Leaf-user mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user