NEW Packets without the SYN flag

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello,

            My firewall is blocking NEW Packets which haven’t the SYN flag Active on the FORWARD chain, with the following rule:

$IPTABLES -A FORWARD -p tcp ! --syn -m state --state NEW -j LOG --log-prefix "FW -NEW-WITHOUT-SYN-"

$IPTABLES -A FORWARD -p tcp ! --syn -m state --state NEW -j DROP

 

            Although I am watching a lot of these Logs on the firewall with origin on one of my servers (Which id DNATed):

 

Jan 28 06:36:01 firewall kernel: FW -NEW-WITHOUT-SYN-IN=eth1 OUT=eth0 SRC="" DST=XXX.XXX.XXX.XXX LEN=1500 TOS=0x00 PREC=0x00 TTL=63 ID=15003 DF PROTO=TCP SPT=80 DPT=33710 WINDOW=32120 RES=0x00 ACK PSH URGP=0

 

            If I stop the HTTP server, this packets stop. Notice that the Source Port is 80. Why is Apache making these requests? Is it really Apache, or can it be any other Application? One connection is identified by: SourceIP+SourcePort + DestIP+DestPort…

 

            The Desktops (work places running windows) also originate some of these packets, with a different SPT….Why?

 

            I have another question. My servers are DNATed, and all outgoing traffic is SNATed. This way, all the traffic whose destiny is one of the DNATed servers will go through the FORWARD chain. Although in my case I am also doing IP Aliasing on the firewall, ié, the firewall answers for a few Public IP addresses. These packets are also traversing my FORWARD chain. Can any one tell me if the Aliasing changes any thing on the firewall behavior?

            The Packet arrives to the machine with one of the aliased IPs, enters on the firewall, DNAT is executed and the packet is sent to the FORWARD chain, is this true? The fact of having a packet arriving with an aliased IP or not has any influence?

 

            Any help would be welcome.

            Thanks in advance,

                        Victor Batista


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux