Re: Leaking ICMP and UDP packets

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




Ok, so if I understand correctly, the 10.101.10.103 host is trying to 
respond to this windows box -- it only knows the default gateway to get to 
that 169 address.  It doesn't NAT because it doesn't have a corresponding 
"initiated" NAT entry?  I guess I'm confused as to why it doesn't match 
the global NAT entry -- I suspect it's my lack of understanding of how NAT 
is implemented.  In the end, I should be blocking these 169 requests in 
the FORWARD table anyway.  Is it common practice to set thet NAT chains 
default policies to DROP?  I guess, I'd like to know the best way to stop 
these bad boys from getting out to be a good netizen.

-Dan



On Tue, 20 Apr 2004, Antony Stone wrote:

> On Tuesday 20 April 2004 6:13 pm, Daniel David Benson wrote:
> 
> > > Are you sure they are un-NATted packets "leaking" through netfilter, and
> > > not ICMP packets being sent back to some remote system by the firewall
> > > itself, saying "host unreachable" etc?
> >
> > Finally, after 24 hours I got the following packets on my front edge
> > (public) interface:
> >
> > 09:57:48.388232 10.101.10.103 > 169.254.85.249: icmp: time exceeded
> > in-transit 09:58:03.386143 10.101.10.103 > 169.254.85.249: icmp: time
> > exceeded in-transit 09:58:18.386973 10.101.10.103 > 169.254.85.249: icmp:
> > time exceeded in-transit
> >
> > * This internal IP isn't any of the 1 to 1 NATs listed below and should
> > come out as the global NAT IP.
> 
> Correct me if I'm wrong, but isn't 169.254.85.249 one of those Microsoft 
> "let's make up a network range if we can't find anyone to talk to" addresses?
> 
> In other words, the original packet did not come from the outside world, 
> therefore did not come through your firewall (it came from a lonely Windows 
> machine inside your network which has decided to create its own IP address, 
> and has then decided to send packets to 10.101.10.103, which returned an ICMP 
> error through your default gateway), and therefore there was no automatic 
> reverse NAT in place to set the source address to what you would expect?
> 
> I bet you can't find the original packet, to which this ICMP TTL exceeded 
> message corresponds, in your packet sniffer logs, because it never came in 
> through the firewall in the first place.
> 
> Regards,
> 
> Antony.
> 
> 



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux