/usr/bin/netstat -i -b -n -I igc1 1 input igc2 output packets errs idrops bytes packets errs bytes colls 18832 0 0 23961931 19142 0 2056571 0 20732 0 0 26692436 21197 0 2246518 0 18420 0 0 23084666 18980 0 1939937 0 17791 0 0 22109171 18277 0 2206791 0 15123 0 0 18495639 15479 0 1704420 0 20523 0 0 25776829 20787 0 3209901 0 9622 0 0 10348462 9872 0 1743120 0 12389 0 0 14020727 12975 0 2070747 0 10903 0 0 12418180 11251 0 1902214 0 16921 0 0 21012711 17189 0 2412258 0 17918 0 0 22356183 18418 0 2024011 0 20811 0 0 26971250 21166 0 2231476 0 21643 0 0 27830204 21867 0 2555701 0 12362 0 0 14710851 12806 0 1664004 0 6961 0 0 6636610 7218 0 1299675 0 12274 0 0 14071152 12703 0 1757263 0 30882 1 0 39894920 8935 0 3341910 0 46458 0 0 62128264 4893 0 3045759 0 46478 1 0 62121562 4900 0 2750044 0 46438 1 0 62133530 5133 0 2723948 0 46599 1 0 62123711 5206 0 2504516 0 input igc2 output packets errs idrops bytes packets errs bytes colls 46493 0 0 62124955 5224 0 2187363 0 46617 1 0 62129957 5418 0 2452033 0 46596 1 0 62132498 5122 0 2913734 0 46650 1 0 62113622 5109 0 2384515 0 46714 1 0 62127545 5357 0 2296607 0 46584 3 0 62126785 5081 0 2390958 0 46612 0 0 62118032 5144 0 2270248 0 46739 1 0 62130613 5681 0 3326115 0 46514 0 0 62125384 5159 0 2275629 0 46653 0 0 62130561 5433 0 2302723 0 46600 0 0 62121725 5158 0 2322515 0 46792 1 0 62120351 5220 0 2617294 0 46811 0 0 62124396 5280 0 2484596 0 46597 0 0 62126038 5131 0 2381244 0 46725 1 0 62127029 5429 0 2406458 0 46595 0 0 62125301 5437 0 2592203 0 46661 3 0 62125865 5419 0 2400710 0 46650 1 0 62124639 5248 0 2519844 0 46610 0 0 62122192 5254 0 2346030 0 46676 0 0 62130274 5459 0 2687552 0 46898 0 0 62119543 5806 0 3204420 0.. etc
08:36:35.176685 IP 42.62.176.70 > 111.222.333.444: ip-proto-1708:36:35.176688 IP 42.62.176.70.53 > 111.222.333.444.1723: 1| 33/0/0 RRSIG, RRSIG, RRSIG, RRSIG, RRSIG, TXT "google-site-verification=yuAuTV0V218aUY-z4yyaeBY0B-icA3PcEFNCd72ZKk4", TXT "apple-domain-verification=ivyxTJSvycL1rKet", TXT "v=spf1 a mx include:spfa.renault.com include:spfb.renault.com include:spfc.renault.com include:spfd.renault.com exists:%{i}.spf.hc1506-8.eu.iphmx.com -all", TXT "3nnqAmrH2geG0012FzpfPzCbY+qeghGXlr0K+LYPlNZ04rbgRysxD+XwBO/kYhyrhm+O6pU0naULPJY0gHPjRQ==", TXT "zoho-verification=zb90149015.zmverify.zoho.com", TXT "mongodb-site-verification=hWhMU7S6paGXSMiTRzdhFYFc0NckzLdF", RRSIG[|domain]08:36:35.176689 IP 36.91.138.130.53 > 111.222.333.444.1723: 1 6/13/1 RRSIG, RRSIG, RRSIG, RRSIG, RRSIG, RRSIG (1472)08:36:35.176707 IP 111.222.333.444 > 36.91.138.130: ICMP 111.222.333.444 udp port 1723 unreachable, length 57608:36:35.176715 IP 111.70.2.171.53 > 111.222.333.444.1723: 1 13/2/0 RRSIG, MX mx1.hc1506-8.eu.iphmx.com. 10, MX smtp2.renault.fr. 30, MX smtp.renault.fr. 20, MX mx2.hc1506-8.eu.iphmx.com. 10, RRSIG, RRSIG, SOA, RRSIG, RRSIG, NS anna.renault.fr., RRSIG, NS xenia.renault.fr. (1304)08:36:35.176726 IP 111.222.333.444 > 111.70.2.171: ICMP 111.222.333.444 udp port 1723 unreachable, length 57608:36:35.176749 IP 180.190.200.192.53 > 111.222.333.444.1723: 1| 32/0/0 DNSKEY, RRSIG, RRSIG, RRSIG, TXT "mongodb-site-verification=hWhMU7S6paGXSMiTRzdhFYFc0NckzLdF", TXT "3nnqAmrH2geG0012FzpfPzCbY+qeghGXlr0K+LYPlNZ04rbgRysxD+XwBO/kYhyrhm+O6pU0naULPJY0gHPjRQ==", TXT "2ml7l54tncj0sfz85z19bhy6kmbvhf40", TXT "onetrust-domain-verification=fc8a2586b8b247a28c56053c67dcd418", RRSIG, RRSIG, RRSIG[|domain]08:36:35.176804 IP 178.205.90.201 > 111.222.333.444: ICMP 178.205.90.201 udp port 53 unreachable, length 6508:36:35.176810 IP 189.3.74.18.53 > 111.222.333.444.1723: 1| 32/0/0 TXT "mt-24773710", TXT "docusign=c3a18a16-788c-484b-968b-6b4982433a67", TXT "amazonses:uINC55vCnY508CUO8Je4gL6XWtPX3btBCtcQjz2Vwjs=", TXT "3nnqAmrH2geG0012FzpfPzCbY+qeghGXlr0K+LYPlNZ04rbgRysxD+XwBO/kYhyrhm+O6pU0naULPJY0gHPjRQ==", TXT "facebook-domain-verification=8s50q3dhwvfs01uvnrwm8h29rpcntw", TXT "4l1SWsiprbXNsfRUEAfWklXtaSbfXsRaotj7HOf01kNe5wyIUw6dDiBNfAUjk8M/Dj9Gc8PzowuISHPOgAW83w==", TXT "tmes=281fb1a4ecc0f16f779e7a637e2df968", TXT "zoho-verification=zb90149015.zmverify.zoho.com", TXT "apple-domain-verification=ivyxTJSvycL1rKet", TXT "autodesk-domain-verification=4zOZypex_sR1HLFsXs7E", TXT "onetrust-domain-verification=811456c061094fd787edfbea1f50e0c2", TXT "google-site-verification=yuAuTV0V218aUY-z4yyaeBY0B-icA3PcEFNCd72ZKk4", TXT "apple-domain-verification=71mEATCbpJsvgxSj", RRSIG, RRSIG, RRSIG[|domain]08:36:35.176814 IP 201.184.117.60.53 > 111.222.333.444.1723: 1| 41/0/0 SOA, RRSIG, RRSIG, RRSIG, RRSIG, RRSIG, RRSIG, RRSIG, RRSIG, RRSIG[|domain]08:36:35.176818 IP 201.184.117.60 > 111.222.333.444: ip-proto-1708:36:35.176819 IP 197.91.174.102.53 > 111.222.333.444.1723: 1| 37/0/0 RRSIG, RRSIG, MX smtp2.renault.fr. 30, MX smtp.renault.fr. 20, SOA, DS, DNSKEY, RRSIG, RRSIG, A 35.71.164.53, A 52.223.12.199, RRSIG, RRSIG, RRSIG[|domain]
dmesg | grep igc2igc2: <Intel(R) Ethernet Controller I225-V> mem 0x7fa00000-0x7fafffff,0x7fc00000-0x7fc03fff at device 0.0 on pci3igc2: Using 1024 TX descriptors and 1024 RX descriptorsigc2: Using 4 RX queues 4 TX queuesigc2: Using MSI-X interrupts with 5 vectorsigc2: Ethernet address: 64:62:66:22:01:b1igc2: netmap queues/slots: TX 4/1024, RX 4/1024
dig +short @36.91.138.130 www.google.com64.233.170.14764.233.170.10464.233.170.9964.233.170.10364.233.170.10664.233.170.105dig +short @201.184.117.60 www.google.com142.250.78.164dig +short @111.70.2.171 www.google.com142.251.42.228
08:36:35.176707 IP 111.222.333.444 > 36.91.138.130: ICMP 111.222.333.444 udp port 1723 unreachable, length 576
"An attacker wants to know whether the target has an open port, so it sends a spoofed UDP message from the authoritative server to that port. If the port is open, no ICMP reply is sent and the rate counter remains unchanged. If the port is inaccessible, then an ICMP reply is sent (back to the authoritative server, not to the attacker) and the rate is increased by one. Although the attacker doesn’t see the ICMP response, it has influenced the counter. The counter itself isn’t known outside the server, but whether it has hit the rate limit or not can be measured by any outside observer by sending a UDP packet and waiting for a reply. If an ICMP “port unreachable” reply comes back, the rate limit hasn’t been reached. No reply means the rate limit has been met. This leaks one bit of information about the counter to the outside observer, which in the end is enough to reveal the supposedly secret information (whether the spoofed request got through or not)."
and yes this is a new block to me.. but obviously used. So no 1723 incoming..
Hopeless apparently. Said that there's nothing to fix at perimeter FW about 5 times already. And there we are with absurd suggestions such as blocking ICMP.Sigh.
Which HW errors? So you are getting single errors (error is e.g. a malformed packet or out of buffer space) under DDoS? Sounds perfectly expected to me.
Does it matter if it's maformed *OR* out of buffer space? Are those the same? Would they appear the same? Where would that be?