I see these all the time on my freesco, and I think they are attacks. See the ":53"? They're going after bind, the DNS server. I guess there are buffer overflow attacks against some versions of bind, and they could be trying that. Or maybe they're trying to do a DNS Zone Transfer; I think that's a way for the attacker to gain more information about your LAN. Nothing to worry about, I think, with port 53 blocked like it is. My understanding is that this is so common because there's a Windows based worm out there that is going after bind. Wayne Conrad On Sun, 22 July 2001, "Sean Roe" wrote: > I have been experimenting with freesco http://www.freesco.org (FREE ciSCO) > router distro as a replacement for Linux Router Project. I have a DNS Server > setup behind the firewall servicing port 53 requests. > > I have Freesco and running and all is well except for DNS. I have a DNS > server behind it and I have ports 53 udp and tcp passed through to it. I > keep getting these errors: > > Jul 21 18:47:21 - kernel: IP fw-in rej eth0 UDP 64.14.66.100:11415 > 206.165.207.198:53 L=58 S=0x00 I=0 F=0x0040 T=51 > Jul 21 18:47:36 - last message repeated 4 times > Jul 21 18:47:36 - kernel: IP fw-in rej eth0 UDP 64.14.66.100:12057 > 206.165.207.198:53 L=69 S=0x00 I=0 F=0x0040 T=51 > Jul 21 18:47:44 - kernel: IP fw-in rej eth0 UDP 64.14.66.100:11415 > 206.165.207.198:53 L=58 S=0x00 I=0 F=0x0040 T=51 > Jul 21 18:47:56 - last message repeated 4 times > Jul 21 18:47:58 - kernel: IP fw-in rej eth0 UDP 64.14.66.100:12057 > 206.165.207.198:53 L=58 S=0x00 I=0 F=0x0040 T=51 > Jul 21 18:48:00 - kernel: IP fw-in rej eth0 UDP 64.14.66.100:11415 > 206.165.207.198:53 L=58 S=0x00 I=0 F=0x0040 T=51 > Jul 21 18:48:25 - last message repeated 4 times > Jul 21 18:48:27 - kernel: IP fw-in rej eth0 UDP 64.14.66.100:12057 > 206.165.207.198:53 L=58 S=0x00 I=0 F=0x0040 T=51 > Jul 21 19:04:20 - kernel: IP fw-in rej eth0 UDP 151.203.0.85:44947 > 206.165.207.198:53 L=64 S=0x00 I=61649 F=0x0040 T=245 > > > My question is what causes these? Is it a hack attempt?