> From: "Joe Blanchard" <[EMAIL PROTECTED]>
> Date: Mon, 18 Aug 2008 23:50:08 -0400
> 
> 
> I'm dealing with Hughsnet and have observed the following issue/
> 
> SOA is me for testing 72.169.156.122
> 
> Upstream router seems to be a public IP 
> Number:       15942
> Date:                 18Aug2008
> Time:                 23:03:21
> Product:              FireWall-1
> Interface:            eth0
> Origin:               rockgate (192.168.1.1)
> Type:                 Log
> Action:               Accept
> Protocol:             udp
> Service:              2016
> Source:               upstream_router (72.169.156.121)
> Destination:  Firewall_external (72.169.156.122)
> Rule:                 10
> Source Port:  domain-udp (53)
> 
> 
> Problem is that target port is not 53, in otherwords asking for a DNS
> response on an odd port while sourcing port 53.
> Is this normal, am I missing something that a bigger ISP knows? This would
> be Hughesnet. so I should be concerned? I have a ticket opened with them,
> #15048812 but am getting the run around with them. 
> I understand that the normal recourse is to "Reboot the modem" but in this
> case I think it's a bit more than that. 
> Can anyone point me in the right direction? Thanks in advance,

Are they asking for a DNS or is this a reply? 

Replies are from 53 to an ephemeral destination. If your firewall is set
up correctly and not losing state too quickly for DNS responses, this may
be backscatter. I see a bit of this from time to time and dark space
monitoring systems see a lot of it. With the cache poisoning attacks,
I'd expect to see more t it.
-- 
R. Kevin Oberman, Network Engineer
Energy Sciences Network (ESnet)
Ernest O. Lawrence Berkeley National Laboratory (Berkeley Lab)
E-mail: [EMAIL PROTECTED]                       Phone: +1 510 486-8634
Key fingerprint:059B 2DDF 031C 9BA3 14A4  EADA 927D EBB3 987B 3751

Attachment: pgpWyBFFQ2eZe.pgp
Description: PGP signature

Reply via email to