Re: Dropping UDP packets to port 53 containing known domain string?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 2021-07-27 2:09 a.m., Kerin Millar wrote:
Let us begin with `tcpdump -n -s0 -X udp port 53`. Here is the payload of an offending query, including the encapsulating IPv4 header.

0x0000:  4528 003a bb51 0000 f211 3319 4bad 43f9  E(.:.Q....3.K.C.
0x0010:  c422 8657 0035 0035 0026 0000 0001 0100  .".W.5.5.&......
0x0020:  0001 0000 0000 0000 0870 697a 7a61 7365  .........pizzase
0x0030:  6f03 636f 6d00 002e 0001                 o.com....
Thanks a lot for your very informative reply. Sorry for the delay in responding. With your help I got it to work. Thanks very much!



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux