In message <dEREv.46563$Fg7....@fx23.fr7>, Cliff Frisby
<
spam...@scarpia.demon.co.uk> writes
>David Rance wrote:
>
><snipped>
>
>> Before I left home I turned the wi-fi on the router off and blocked
>> outgoing packets to port 3544. Neither made any difference because I see
>> that the packets are coming in again this evening. That's now twice a
>> day!
>>
>> Just for the record, this is what the router is reporting to me:
>>
>> 2014/08/07 19:43:50 -- [DOS][Block][port_scan]
>> [94.245.121.251:3544->192.168.???.???:32956][UDP]
>> [HLen=20, TLen=137]
>
>Correct me is I've misunderstood, but that's the Thompson router reporting
>it, n'est-ce pas?
It looks as though it should be but the Thompson isn't configured to
report DOS attacks (or anything else).
>
>>
>> where 192.168.???.??? is the fixed IP address for my two routers to
>> communicate with each other
>
>B-b-but, that address 192.168.???.??? wouldn't be present in the IP headers
>of the packets received by the Draytek router on it's WAN interface, so why
>would the Draytek, having received those packets, unsolicited (if such they
>are), choose to then address-translate and forward them to 192.168.???.???
>in particular. It's baffling.
It certainly is. That's why I wondered if anyone here could shed light
on it. No other traffic has ever been redirected from the Draytek WAN
through to the Thompson. How would they have known about it? I use two
different ISPs for the two ADSL lines, thinking that, eventually, I
would ditch the Demon one so that I could cancel the other one. The
reason I haven't is that the line speed on the Thompson, which is also
my voice line, is not nearly as good as the other one. The Draytek line
was originally a bulletin board line.
If I were to switch the Thompson off, I suppose it would all stop.
>The impossibility of it is a side-effect of
>NAT that many users find quite comforting!
>
>If you're not doing the outgoing block on destination port 3544, that's
>where I would try doing it.
>
>But actually, I think I would additionally block *anything* outbound to
>94.245.121.251 (at the Draytek). I suspect that something on your network
>is a willing participant in trying to set up a Teredo tunnel, or whatever
>it is. I just can't see how those incoming packets could otherwise traverse
>though your Draytek NAT router.
>
>In your position, being as you are at a remote location, I would be tempted
>to send off a few of these packets home (yours, not mine) myself, to see if
>they get treated in exactly the same way regardless of the source address.
>
>And finally, here's an interesting thing. I was just educating myself about
>Teredo on Pikiwedia, and noticed the list of six public Teredo servers (the
>intermediaries that putative Teredo peers sitting behind NAT routers are
>supposed to use to subsequently establish their direct peer-to-peer
>tunnels). One of those six is run by Microsoft, and its IP address resolves
>to 94.245.121.253, which is different to, but incredibly close to,
>your 'friend'. (And it, also, does not have a reverse DNS entry.)
And 94.245.121.251 is also registered to Microsoft. Well, I suppose it
would be as they would have the whole block. Is someone at Microsoft
unofficially trying to set up a Teredo tunnel on my machine for the sake
of experimentation, I wonder? No, I'm just floundering.
>
>That certainly suggests that the 'Teredo' angle is not a red herring. It
>also suggests that 94.245.121.251 is not the intended peer for the tunnel.
>It would be rather interesting to know what is, though.
>
>For me, the key question is my first one: why are those incoming packets
>traversing the Draytek, if they are unsolicited.
Thanks for that info, Cliff. I was beginning to think I was imagining
it.
Incidentally, yesterday evening I had a concentrated bombardment of
these packets, as well as some in the morning. It's almost as though
whoever it is is reading me and knows I've gone away!
Paranoid? Me? Ha, ha!