> -----Original Message----- > From: netfilter-bounces@xxxxxxxxxxxxxxxxxxx > [mailto:netfilter-bounces@xxxxxxxxxxxxxxxxxxx] On Behalf Of > afshin lamei > Sent: Tuesday, October 04, 2005 8:52 AM > To: netfilter@xxxxxxxxxxxxxxxxxxx > Subject: port scan detector problem > > hi all, > I am using the "port scan match" with its default values, my > rules are like > this: > iptables -A INPUT -m psd -j LOG --log-prefix "port scan:" > iptables -A INPUT -m psd -j DROP // Drop it silently > > one of my DNS servers is 4.2.2.4 <http://4.2.2.4/> , and I'm > seeing these logs, which say the 4.2.2.4 <http://4.2.2.4/> is > port scanning my box (external interface: 192.168.100.151 > <http://192.168.100.151/>) !! > > Oct 3 17:23:35 kernel: Port scan:IN=eth0 OUT= SRC=4.2.2.4 > <http://4.2.2.4/>DST= > 192.168.100.151 <http://192.168.100.151/> LEN=8 PROTO=UDP > SPT=53 DPT=32769 Oct 3 17:23:35 kernel: Port scan:IN=eth0 > OUT= SRC=4.2.2.4 <http://4.2.2.4/>DST= > 192.168.100.151 <http://192.168.100.151/> LEN=1 PROTO=UDP > SPT=53 DPT=32761 Oct 3 17:23:35 kernel: Port scan:IN=eth0 > OUT= SRC=4.2.2.4 <http://4.2.2.4/>DST= > 192.168.100.151 <http://192.168.100.151/> LEN=1 PROTO=UDP > SPT=53 DPT=32773 Oct 3 17:23:35 kernel: Port scan:IN=eth0 > OUT= SRC=4.2.2.4 <http://4.2.2.4/>DST= > 192.168.100.151 <http://192.168.100.151/> LEN=1 PROTO=UDP > SPT=53 DPT=32775 Oct 3 17:23:35 kernel: Port scan:IN=eth0 > OUT= SRC= 4.2.2.4 <http://4.2.2.4/>DST= > 192.168.100.151 <http://192.168.100.151/> LEN=1 PROTO=UDP > SPT=53 DPT=32780 > > I think these are false positives, isn't it? if so, dropping > them will cause problems, so what should i do? > regards, It probably is a false positive. If you have a mail server, your DNS server might be working overtime resolving remote MX hosts for domains (you can fix that by installing a caching-only nameserver on that machine). As far as I know, Linux hosts do not cache DNS unless you specifically install a caching-only server on them, so unless you do they'll be asking for DNS all the time. To fix your port-scan problem you should insert a rule which allows outbound traffic from your DNS server using source port 53 before your port-scanning rules. Derick Anderson