[Firehol-support] dmesg and logging overflowing

rider rider at ridersoft.net
Wed Dec 30 20:12:46 GMT 2015


Thanks again. But yes, I've seen that, the top of my firehol file is 
now;

version 6

FIREHOL_LOG_MODE = "NFLOG"
FIREHOL_LOG_LEVEL = 6

FIREHOL_DROP_ORPHAN_TCP_ACK_FIN=1
FIREHOL_LOG_DROP_INVALID=0

And still I get these in dmesg

[Wed Dec 30 21:02:56 2015] IN-InetZiggo:IN=eth4 OUT= 
MAC=bc:5f:f4:1c:90:b4:00:01:5c:6c:7c:46:08:00 SRC=74.125.136.156 
DST=83.84.30.242 LEN=40 TOS=0x08 PREC=0x40 TTL=50 ID=31640 PROTO=TCP 
SPT=443 DPT=56805 WINDOW=0 RES=0x00 RST URGP=0
[Wed Dec 30 21:02:56 2015] IN-InetZiggo:IN=eth4 OUT= 
MAC=bc:5f:f4:1c:90:b4:00:01:5c:6c:7c:46:08:00 SRC=74.125.136.156 
DST=83.84.30.242 LEN=40 TOS=0x08 PREC=0x40 TTL=50 ID=31641 PROTO=TCP 
SPT=443 DPT=56805 WINDOW=0 RES=0x00 RST URGP=0

So it doesn't seem to work...

And I have little to no idea why.

Phil Whineray schreef op 2015-12-30 19:13:
> Have you seen this?
> 
> https://firehol.org/guides/firehol-welcome/#the-log
> On 30 Dec 2015 17:19, "rider" <rider at ridersoft.net> wrote:
> 
>> Hi, thanks, that gives some insights.
>> 
>> But I can't control the clients connecting to me. And I have quite a
>> bit of portscanning and other loging attemps, could that be the
>> cause?
>> 
>> Right now dmesg and syslog are all but unusable, is there a way to
>> just turn this logging off?
>> 
>> Phil Whineray schreef op 2015-12-30 14:54:
>> Hi Mark
>> 
>> This isn't a complete answer but hopefully will increase your
>> understanding enough to help you move forward.
>> 
>> On Wed, Dec 30, 2015 at 01:14:12PM +0100, Mark de Ruijter wrote:
>> Hi,
>> 
>> I've asked this on numerous places on the web, but couldn't get any
>> solid
>> answers. So now I turn to developers and users of Firehol. I've used
>> Firehol
>> for many years and was very happy with it. But, ever since the
>> update, I
>> can't get rid of the logs;
>> 
>> I've been running a firehol firewall for many years, but since I
>> upgraded to
>> Ubuntu 15.10 my dmesg and syslog are filling to the brim with these;
>> 
>> [Tue Dec 29 11:52:40 2015] IN-InetZiggo:IN=eth4 OUT=
>> MAC=bc:5f:f4:1c:90:b4:00:01:5c:6c:7c:46:08:00 SRC=95.101.203.240
>> DST=83.84.30.242 LEN=40 TOS=0x08 PREC=0x40 TTL=60 ID=10038 DF
>> PROTO=TCP
>> SPT=80 DPT=57036 WINDOW=0 RES=0x00 RST URGP=0
>> [Tue Dec 29 11:53:02 2015] IN-InetZiggo:IN=eth4 OUT=
>> MAC=bc:5f:f4:1c:90:b4:00:01:5c:6c:7c:46:08:00 SRC=74.125.136.156
>> DST=83.84.30.242 LEN=40 TOS=0x08 PREC=0x40 TTL=50 ID=49737 PROTO=TCP
>> SPT=443
>> DPT=49443 WINDOW=0 RES=0x00 RST URGP=0
>> [Tue Dec 29 11:53:14 2015] IN-InetZiggo:IN=eth4 OUT=
>> MAC=bc:5f:f4:1c:90:b4:00:01:5c:6c:7c:46:08:00 SRC=74.125.136.17
>> DST=83.84.30.242 LEN=40 TOS=0x08 PREC=0x40 TTL=50 ID=64713 PROTO=TCP
>> SPT=443
>> DPT=54200 WINDOW=0 RES=0x00 RST URGP=0
>> [Tue Dec 29 11:53:14 2015] IN-InetZiggo:IN=eth4 OUT=
>> MAC=bc:5f:f4:1c:90:b4:00:01:5c:6c:7c:46:08:00 SRC=74.125.136.17
>> DST=83.84.30.242 LEN=40 TOS=0x08 PREC=0x40 TTL=50 ID=64714 PROTO=TCP
>> SPT=443
>> DPT=54200 WINDOW=0 RES=0x00 RST URGP=0
>> [Tue Dec 29 11:53:59 2015] IN-InetZiggo:IN=eth4 OUT=
>> MAC=bc:5f:f4:1c:90:b4:00:01:5c:6c:7c:46:08:00 SRC=74.125.136.139
>> DST=83.84.30.242 LEN=40 TOS=0x08 PREC=0x40 TTL=50 ID=33101 PROTO=TCP
>> SPT=443
>> DPT=49439 WINDOW=0 RES=0x00 RST URGP=0
>> [Tue Dec 29 11:54:49 2015] IN-InetZiggo:IN=eth4 OUT=
>> MAC=bc:5f:f4:1c:90:b4:00:01:5c:6c:7c:46:08:00 SRC=74.125.136.102
>> DST=83.84.30.242 LEN=40 TOS=0x08 PREC=0x40 TTL=50 ID=30637 PROTO=TCP
>> SPT=443
>> DPT=49501 WINDOW=0 RES=0x00 RST URGP=0
>> [Tue Dec 29 11:54:49 2015] IN-InetZiggo:IN=eth4 OUT=
>> MAC=bc:5f:f4:1c:90:b4:00:01:5c:6c:7c:46:08:00 SRC=74.125.136.102
>> DST=83.84.30.242 LEN=40 TOS=0x08 PREC=0x40 TTL=50 ID=30638 PROTO=TCP
>> SPT=443
>> DPT=49501 WINDOW=0 RES=0x00 RST URGP=0
>> 
>> And I don't know why.
>> Take for instance this;
>> 
>> PASS-unknown:IN=br0 OUT=eth4
>> MAC=00:1b:21:09:ef:5a:64:27:37:19:66:42:08:00
>> SRC=192.168.40.54 DST=54.230.13.39 LEN=40 TOS=0x00 PREC=0x00 TTL=127
>> ID=21253 DF PROTO=TCP SPT=49419 DPT=443 WINDOW=0 RES=0x00 ACK RST
>> URGP=0
>> 
>> All of the packets above, including this one are TCP RST [1] (reset)
>> packets. These are not run-of-the-mill connection packets.
>> 
>> This seems to be a packet for a HTTPS site at 52.230.13.39, from the
>> bridge
>> br0 on the LAN, going via eth4 to the internet. Why would that show
>> up in
>> dmesg?
>> 
>> The PASS-unknown: prefix means that no rule matched the packet at
>> all.
>> 
>> How can this happen when you have:
>> 
>> client all      accept
>> server all      accept
>> 
>> In your config? Because firehol sets up a stateful firewall: unless
>> a packet is starting a connection (TCP SYN) it must already belong
>> to
>> an existing connection to be allowed.
>> 
>> This "belonging" is determined by the Linux kernel connection
>> tracker.
>> It seems either it is losing track of the connection before the RST
>> is
>> sent or that they were not part of a valid connection to start with.
>> 
>> If it were me, at this point I would try to capture tcpdump of a
>> complete connection finishing with a RST (so dump from the LAN side)
>> to check there was a proper connection to start with. If so, the
>> next thing to check will be whether the connection tracker timeout
>> [2]
>> is happening before the client side.
>> 
>> Are you seeing this? [3]
>> 
>> Phil
>> 
>> [1]
>> http://stackoverflow.com/questions/7735618/tcp-rst-packet-details
>> [2]
>> 
> https://www.kernel.org/doc/Documentation/networking/nf_conntrack-sysctl.txt
>> [3]
>> 
> https://ask.wireshark.org/questions/13986/why-tcp-reset-sent-after-receive-finack-packet



More information about the Firehol-support mailing list