Re: Weird TCP flags?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, 2003-12-12 at 01:05, an unknown sender wrote:
> On December 11, 2003 11:11 pm, Ian Hunter wrote:
> > OK, I have a router (lucy) with a webserver (192.168.254.242) in a DMZ (off
> > eth1), and everything works fine -- when you hit my ip, you get the site,
> > all is well.  However, I get STORMS of this nonsense in my logs:
> >
> > Dec 11 22:58:52 lucy kernel: Fwd DMZ->Internet DROP: IN=eth1 OUT=ppp0
> > SRC=192.168.254.242 DST=204.157.6.223 LEN=60 TOS=0x00 PREC=0x00 TTL=63
> > ID=56169 DF PROTO=TCP SPT=80 DPT=56319 WINDOW=32476 RES=0x00 ACK SYN URGP=0
> 
> Perhaps this is some sort of spoofing you are seeing.  -- at least at this 
> moment bart.routesys.com (204.157.6.223) does NOT appear to be alive ... 
> 	(you too that snap at 10:58 your time .. I'm looking at 12:30 my time..EST)
> 
> 
> >
> > (That's responding to these rules at the end of the FORWARD chain of filter
> > table:)
> >
> > iptables -A FORWARD -i eth1 -o ppp0 -j LOG --log-prefix "Fwd DMZ->Internet
> > DROP: "
> > iptables -A FORWARD -i eth1 -o ppp0 -j DROP
> >
> >
> > Now if web traffic is working, my "-m state --state ESTABLISHED,RELATED -j
> > ACCEPT" must be working on forwards from eth1 -> ppp0, so why am I seeing
> > these messages?  Are these broken TCP connections that netfilter doesn't
> > consider established?
> >
> > Where do I look now?
> >
> > Thanks,
> >
> > Ian
Is there any chance that port 80 traffic is being allowed in under a
rule that does not enter the connection in conntrack?
In other words, if you have a rule such as:

iptables -A FORWARD -d 192.168.254.242 -p tcp --dport 80 -j ACCEPT

The SYN packet will be sent to your web server and the web server will
respond with a SYN, ACK packet but it will not be related to anything in
the conntrack table.  The connection may be being allowed by a more
general rule than one to the web services.

So, I suppose we should ask what your ACCEPT rules look like - John
-- 
John A. Sullivan III
Chief Technology Officer
Nexus Management
+1 207-985-7880
john.sullivan@xxxxxxxxxxxxx
---
If you are interested in helping to develop a GPL enterprise class
VPN/Firewall/Security device management console, please visit
http://iscs.sourceforge.net 



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux