RE: dns replies (udp) blocked but why ?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



:
>
> > Hi,
> >
> > I'm seeing a lot of these messages in my iptables logs lately:
> >
> > Aug 25 14:46:21 dobermann kernel: -drop_the_rest-IN=
> OUT=eth1 SRC=172.21.3.1
> > DST=172.21.3.10 LEN=62 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF
> PROTO=UDP SPT=53
> > DPT=3412 LEN=42
> >
> >
> > however, the iptables config should accept it:
> >
> > i have this rule on the firewall (which is also the dns
> server, hence the
> > 'INPUT')
> >
> > $IPTABLES -A INPUT   -m state --state ESTABLISHED,RELATED -j ACCEPT
> > $IPTABLES -A INPUT -p udp  -s 172.21.0.0/16  --source-port
> > 024:65535  --destination-port 53  -m state --state NEW  -j ACCEPT
>
> I can't understand the topology of your network and what 172.21.0.0/16
> should represent but a server to server query might be from port 53.
> Why are you filtering based on the source port?

172.21.0.0/16 is our lan. i made a habit of limiting the source ports that
can connect to a service to the upper 1024 ports. it was recommended
somewhere i thought as a security measure. anyway, that's not really the
problem here.


>
> >
> > the 172.21.3.10 is the only one causing problems, i noticed
> howerver that
> > this is udp, whereas most dns related traffic i can see is tcp.
>
> Most DNS traffic you see should be UDP though. Why are you seeing more
> TCP than UDP?

you're right. i misinterpreted the output of tcpdump, it is indeed mostly
udp.

>
> > could it be a connection tracking problem ?
>
> If 172.21.3.10 is too slow in replying and the reply time exceeds the
> UDP conntrack timeout you'd see this behaviour. Maybe that's
> the reason.


it's the opposite. 172.21.3.10 was the client and 172.21.3.1 was the server.
so what was being dropped was the reply from the dns server to the client.

the client is an nt4, whereas 99% of our computers are either win2k or aix
or linux. maybe that's the reason ?

anyway, as a test, i added a rule which would allow all traffic from the dns
server on port 53 to a port > 1024 on our lan (like in the days of ipchains,
where you needed an 'in' rule and a 'out' rule for each 'logical' rule), and
i watched if it would trigger some traffic.

it actually did:

Aug 25 15:56:19 dobermann kernel: - dns_udp_reverse - IN= OUT=eth1
SRC=172.21.3.1 DST=172.21.3.10 LEN=62 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF
PROTO=UDP SPT=53 DPT=3574 LEN=42

so this strenghtens my belief that it's a connection tracking issue...




>
> Ramin
>
> >
> >
> >
> > thx,
> >
> >
> > Tom.
>

****************************************************************************
Disclaimer: 
This electronic transmission and any files attached to it are strictly 
confidential and intended solely for the addressee. If you are not 
the intended addressee, you must not disclose, copy or take any
action in reliance of this transmission. If you have received this 
transmission in error, please notify the sender by return and delete
the transmission.  Although the sender endeavors to maintain a
computer virus free network, the sender does not warrant that this
transmission is virus-free and will not be liable for any damages 
resulting from any virus transmitted. 
Thank You.
****************************************************************************



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux