[Firehol-support] dmesg and logging overflowing

Mark de Ruijter rider at ridersoft.net
Wed Dec 30 13:14:12 CET 2015


Hi,

I've asked this on numerous places on the web, but couldn't get any 
solid answers. So now I turn to developers and users of Firehol. I've 
used Firehol for many years and was very happy with it. But, ever since 
the update, I can't get rid of the logs;

I've been running a firehol firewall for many years, but since I 
upgraded to Ubuntu 15.10 my dmesg and syslog are filling to the brim 
with these;

[Tue Dec 29 11:52:40 2015] IN-InetZiggo:IN=eth4 OUT= 
MAC=bc:5f:f4:1c:90:b4:00:01:5c:6c:7c:46:08:00 SRC=95.101.203.240 
DST=83.84.30.242 LEN=40 TOS=0x08 PREC=0x40 TTL=60 ID=10038 DF PROTO=TCP 
SPT=80 DPT=57036 WINDOW=0 RES=0x00 RST URGP=0
[Tue Dec 29 11:53:02 2015] IN-InetZiggo:IN=eth4 OUT= 
MAC=bc:5f:f4:1c:90:b4:00:01:5c:6c:7c:46:08:00 SRC=74.125.136.156 
DST=83.84.30.242 LEN=40 TOS=0x08 PREC=0x40 TTL=50 ID=49737 PROTO=TCP 
SPT=443 DPT=49443 WINDOW=0 RES=0x00 RST URGP=0
[Tue Dec 29 11:53:14 2015] IN-InetZiggo:IN=eth4 OUT= 
MAC=bc:5f:f4:1c:90:b4:00:01:5c:6c:7c:46:08:00 SRC=74.125.136.17 
DST=83.84.30.242 LEN=40 TOS=0x08 PREC=0x40 TTL=50 ID=64713 PROTO=TCP 
SPT=443 DPT=54200 WINDOW=0 RES=0x00 RST URGP=0
[Tue Dec 29 11:53:14 2015] IN-InetZiggo:IN=eth4 OUT= 
MAC=bc:5f:f4:1c:90:b4:00:01:5c:6c:7c:46:08:00 SRC=74.125.136.17 
DST=83.84.30.242 LEN=40 TOS=0x08 PREC=0x40 TTL=50 ID=64714 PROTO=TCP 
SPT=443 DPT=54200 WINDOW=0 RES=0x00 RST URGP=0
[Tue Dec 29 11:53:59 2015] IN-InetZiggo:IN=eth4 OUT= 
MAC=bc:5f:f4:1c:90:b4:00:01:5c:6c:7c:46:08:00 SRC=74.125.136.139 
DST=83.84.30.242 LEN=40 TOS=0x08 PREC=0x40 TTL=50 ID=33101 PROTO=TCP 
SPT=443 DPT=49439 WINDOW=0 RES=0x00 RST URGP=0
[Tue Dec 29 11:54:49 2015] IN-InetZiggo:IN=eth4 OUT= 
MAC=bc:5f:f4:1c:90:b4:00:01:5c:6c:7c:46:08:00 SRC=74.125.136.102 
DST=83.84.30.242 LEN=40 TOS=0x08 PREC=0x40 TTL=50 ID=30637 PROTO=TCP 
SPT=443 DPT=49501 WINDOW=0 RES=0x00 RST URGP=0
[Tue Dec 29 11:54:49 2015] IN-InetZiggo:IN=eth4 OUT= 
MAC=bc:5f:f4:1c:90:b4:00:01:5c:6c:7c:46:08:00 SRC=74.125.136.102 
DST=83.84.30.242 LEN=40 TOS=0x08 PREC=0x40 TTL=50 ID=30638 PROTO=TCP 
SPT=443 DPT=49501 WINDOW=0 RES=0x00 RST URGP=0

And I don't know why.
Take for instance this;

PASS-unknown:IN=br0 OUT=eth4 
MAC=00:1b:21:09:ef:5a:64:27:37:19:66:42:08:00 SRC=192.168.40.54 
DST=54.230.13.39 LEN=40 TOS=0x00 PREC=0x00 TTL=127 ID=21253 DF PROTO=TCP 
SPT=49419 DPT=443 WINDOW=0 RES=0x00 ACK RST URGP=0

This seems to be a packet for a HTTPS site at 52.230.13.39, from the 
bridge br0 on the LAN, going via eth4 to the internet. Why would that 
show up in dmesg?

This is the output of iptables for logging

iptables -L | grep LOG
LOG        all  --  anywhere             anywhere limit: avg 1/sec burst 
5 LOG level warning prefix "IN-unknown:"
LOG        all  --  anywhere             anywhere limit: avg 1/sec burst 
5 LOG level warning prefix "PASS-unknown:"
LOG        all  --  anywhere             anywhere limit: avg 1/sec burst 
5 LOG level warning prefix "OUT-unknown:"
LOG        all  --  anywhere             anywhere limit: avg 1/sec burst 
5 LOG level warning prefix "IN-Bridge:"
LOG        all  --  anywhere             anywhere limit: avg 1/sec burst 
5 LOG level warning prefix "IN-InetZiggo:"
LOG        all  --  anywhere             anywhere limit: avg 1/sec burst 
5 LOG level warning prefix "IN-LAN:"
LOG        all  --  anywhere             anywhere limit: avg 1/sec burst 
5 LOG level warning prefix "OUT-Bridge:"
LOG        all  --  anywhere             anywhere limit: avg 1/sec burst 
5 LOG level warning prefix "OUT-InetZiggo:"
LOG        all  --  anywhere             anywhere limit: avg 1/sec burst 
5 LOG level warning prefix "OUT-LAN:"


For reference, this is the firehol.conf

# FireHOL configuration file
#
# See firehol.conf(5) manual page and FireHOL Manual for details.
#
# This configuration file will allow all requests originating from the
# local machine to be send through all network interfaces.
#
# No requests are allowed to come from the network. The host will be
# completely stealthed! It will not respond to anything, and it will
# not be pingable, although it will be able to originate anything
# (even pings to other hosts).
#

version 6

FIREHOL_LOG_MODE = "LOG"
FIREHOL_LOG_LEVEL = "6"

FIREHOL_DROP_ORPHAN_TCP_ACK_FIN=1
FIREHOL_LOG_DROP_INVALID=0

# My SSH thing
server_SSH_ports="tcp/22"
client_SSH_ports="default"

# VPN Server
server_openvpn_ports="tcp/1194"
client_openvpn_ports="default"

# IMAP SSL
server_imapssl_ports="tcp/993"
client_imapssl_ports="default"

# MySQL
server_mysql_ports="tcp/3306"
client_mysql_ports="default"

# Teampspeak
server_teamspeak_ports="udp/8767"
client_teamspeak_ports="default"

# Torrent
server_torrent_ports="udp/51300:51500 tcp/51300:51500"
client_torrent_ports="default"

# voip
server_voip_ports="udp/5060 tcp/5060"
client_voip_ports="default"
server_ts_ports="udp/9987"
client_ts_ports="default"

# block
# block
server_blocker_ports="  tcp/23        udp/23
             tcp/57        udp/67
             tcp/68        udp/68
             tcp/111        udp/111
             tcp/135         udp/135
                         tcp/137         udp/137
                         tcp/138         udp/138
                         tcp/139         udp/139
                         tcp/445         udp/445
                         tcp/1433        udp/1433
                         tcp/1434        udp/1434
                         tcp/2967        udp/2967
                         tcp/5900        udp/5900
                         tcp/6881        udp/6881
                         tcp/3128        udp/3128
                         tcp/59001       udp/59001"
client_blocker_ports="default"

# My Internet Host Ziggo
interface eth4 InetZiggo
     policy drop
     server ident reject with tcp-reset

     # I don't know why this doesn't work
     # client multicast reject with proto-unreach

     server SSH        accept
     server http        accept
     server smtp        accept
     server dns        accept
     server openvpn        accept
     server imapssl        accept
     server torrent        accept
     server icmp        accept
     server blocker        reject

     client all            accept
     server all            reject

# Accept all on the Lan
interface eth0 LAN
     client all    accept
     server all    accept

# Accept all on the Bridge
interface br0 Bridge
     client all    accept
     server all    accept

# LXC Bridge
interface lxcbr0 LXCBridge
     policy accept
     server all        accept
     client all        accept

# LXC Nic
interface veth+ LXCNIC
     policy accept
     server all        accept
     client all        accept

# VPN Tap Device
interface tap0 TapDecvice
     policy accept
     server  all        accept
     client  all        accept

# Allow routing for the lan
router lan2internet inface eth0 outface eth4
     masquerade
     client all      accept
     server all     accept

# Allow routing for the Bridge
router br2internet inface br0 outface eth4
     masquerade
     client all      accept
     server all      accept

# Allow routing for Bridge To Bridge
router br2br inface br0 outface br0
     policy accept

# Allow all routing for inface lxcbr0
router lx2veth inface lxcbr0 outface veth+
     masquerade
     server all     accept
     client all    accept

router veth2lx inface veth+ outface lxcbr0
     masquerade
     client all    accept
     server all    accept


More information about the Firehol-support mailing list