Re: External IP addresses on internal network

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hey all,

You guys must hate me by now. I've had a handful of good responses and been responding and cc'ing the list trying to keep everyone current, but with the list lag it isn't working very well. If your box isn't full yet, it will be. Sorry.

Ramin Dousti wrote:

On Thu, Aug 28, 2003 at 12:05:24PM -0400, Jeffrey Laramie wrote:


Could it be that the client machine dials up to AOL, receives that IP
address and later it needs to resolve a name and vecause of the DNS
settings on the client machine it tries the query 192.168.0.24 with
its source 172.144.233.136?



Thanks for the suggestion. That was my first thought since one of the LAN
clients is a notebook with dialup ability, but with a DSL connection through
the LAN it's not used now. I did check it though to see if it still had an
AOL IP assigned to it or an AOL server listed for DNS. It didn't, and the log
timestamp indicates that these packets are occuring when a different client
(with no dialup) is checking AOL mail.




What about this theory (although I don't know anything about the AOL stuff) that the client connects to AOL. AOL sets up a tunnel with this client and assigns 172.144.233.136 to it. Then due to the static DNS settings on the client, a DNS query is made to your named on the firewall, instead of using AOL's DNS server?

I don't know much about tunneling, but this sounds possible. Almost like a remote shell where the server session runs on client hardware, except here the DNS call gets mis-handled and sent to the client nameserver instead?

Chris had a very good theory too: (quoted here in case you didn't get it yet)

This obviously is not a legit DNS request because the source port is wrong (should be 53 or >1023). My guess is a brain dead Windoze system or even more likely, a load balancer.

The firewall host is also a DNS server for my LAN so this would be a normal request coming from the LAN **except** for the client IP address.


I've seen this before. An internal client goes to access a Web site (say www.fubar.org) and the authoritative NS is actually a load balancer. It spews suspicious looking traffic at the requesting NS in order to generate performance metrics to figure out what IP to serve back (assumption being the client is close to the NS).

So if this is the case, you should see a query for a host within the AOL domain (owner of the address space) just prior to this traffic.

This is good stuff, thanks guys. I'll let you know if I find out anything definative.


Jeff



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux