This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

DNS attacks

Hey BarryG,

thanks for your answer.

Spread of the whole day, I have several DNS "attacks" on two of my public ip addresses. currently we provide two public dns server behind the dmz, which are only responsable for a few domains. For that, there is a DNAT rule:

ANY - DNS (53) - public ip (address)
Auto firewall: no
Initial Log: no


Additionally, I have defined a new packet filter for that:
Internet IPv4 - DNS (53) - internal host

However, normally all incoming requests on port 53 through the correct public ip address, should be processed and match with the rule right?

Why then I see this entries in the log files as a default drop? I'm a little bit confused... [:)]

Default DROP  UDP     111.111.111.118  :  58108
→  123.123.123.5  :  53


Over the day the firewall drops 200.000 between 800.000 requests on port 53, requested to the public dns servers.

I´m wondering, why the IPS does not intervene and detect the requests. Some days the system detects 2-3 "DNS amplification attempts". The requests coming from various IP addresses. There is no visible pattern, they are really random. Otherwise i would give the contry blocking-feature a try. The requests take sometimes up to 1-2 hours.... :-(

Any idea?

Thanks!


This thread was automatically locked due to age.
Parents
  • Hi loneelever,

    The Firewall Live Log is for watching traffic as it arrives; it presents an abbreviated log line that's easier for the mind to grasp quickly.  When it comes to analyzing problems, the Live Log is virtually useless.  You need to go to 'Logging & Reporting >> View Log Files' to get the corresponding lines from the full Firewall log file.

    Cheers - Bob
    PS A rule here is "one topic per thread," so I've moved this question to a new thread.
  • I myself am seeing 10's of thousands over the last day or so from.

    /var/log/packetfilter/2014/04/packetfilter-2014-04-08.log.gz:2014:04:08-10:50:02 utm ulogd[19468]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60001" initf="eth1" mark="0x7c" app="124" srcmac="0:13:f7:9c:3d:38" dstmac="5c:26:a:1e:c3:3e" srcip="186.2.161.103" dstip="***.***.***.161" proto="17" length="70" tos="0x00" prec="0x20" ttl="240" srcport="80" dstport="53" 

    /var/log/packetfilter/2014/04/packetfilter-2014-04-08.log.gz:2014:04:08-10:50:02 utm ulogd[19468]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60001" initf="eth1" mark="0x7c" app="124" srcmac="0:13:f7:9c:3d:38" dstmac="5c:26:a:1e:c3:3e" srcip="186.2.161.103" dstip="***.***.***.161" proto="17" length="70" tos="0x00" prec="0x20" ttl="240" srcport="80" dstport="53" 

    /var/log/packetfilter/2014/04/packetfilter-2014-04-08.log.gz:2014:04:08-10:50:02 utm ulogd[19468]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60001" initf="eth1" mark="0x7c" app="124" srcmac="0:13:f7:9c:3d:38" dstmac="5c:26:a:1e:c3:3e" srcip="186.2.161.103" dstip="***.***.***.161" proto="17" length="70" tos="0x00" prec="0x20" ttl="240" srcport="80" dstport="53" 


    Do I need to worry since they are being blocked?

    Thanks
Reply
  • I myself am seeing 10's of thousands over the last day or so from.

    /var/log/packetfilter/2014/04/packetfilter-2014-04-08.log.gz:2014:04:08-10:50:02 utm ulogd[19468]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60001" initf="eth1" mark="0x7c" app="124" srcmac="0:13:f7:9c:3d:38" dstmac="5c:26:a:1e:c3:3e" srcip="186.2.161.103" dstip="***.***.***.161" proto="17" length="70" tos="0x00" prec="0x20" ttl="240" srcport="80" dstport="53" 

    /var/log/packetfilter/2014/04/packetfilter-2014-04-08.log.gz:2014:04:08-10:50:02 utm ulogd[19468]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60001" initf="eth1" mark="0x7c" app="124" srcmac="0:13:f7:9c:3d:38" dstmac="5c:26:a:1e:c3:3e" srcip="186.2.161.103" dstip="***.***.***.161" proto="17" length="70" tos="0x00" prec="0x20" ttl="240" srcport="80" dstport="53" 

    /var/log/packetfilter/2014/04/packetfilter-2014-04-08.log.gz:2014:04:08-10:50:02 utm ulogd[19468]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60001" initf="eth1" mark="0x7c" app="124" srcmac="0:13:f7:9c:3d:38" dstmac="5c:26:a:1e:c3:3e" srcip="186.2.161.103" dstip="***.***.***.161" proto="17" length="70" tos="0x00" prec="0x20" ttl="240" srcport="80" dstport="53" 


    Do I need to worry since they are being blocked?

    Thanks
Children
No Data