This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Dropped RST packets and fwrule 0

Currently running 9.705-3, with Firewall, Network Visibility, Wireless Protection, Remote access and WAF enabled, and I'm seeing the following in the logs: 

2020:12:29-14:07:53 home ulogd[5006]: id="2000" severity="info" sys="SecureNet" sub="packetfilter" name="Packet logged" action="log" fwrule="0" srcip="185.176.221.126" dstip="my.internet.ip.addr" proto="6" length="40" tos="0x00" prec="0x00" ttl="56" srcport="49892" dstport="31552" tcpflags="RST" info="nf_ct_tcp: invalid RST "

2020:12:29-14:07:54 home ulogd[5006]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60001" initf="eth1" srcmac="2a:8a:1c:ec:62:72" dstmac="00:30:18:cd:76:18" srcip="185.176.221.126" dstip="my.internet.ip.addr" proto="6" length="40" tos="0x00" prec="0x00" ttl="56" srcport="49892" dstport="31552" tcpflags="RST" 

In the live log, I see this:

the first one in the live log, in white, with no rule mentioned, this relates to the fwrule 0 log entry. What's fwrule 0? i can find a few mentions of it on here, but no answers to say what it is. I have a DNAT rule that *should* allow the packet to be passed on (the rule does work, as I have connections that hit it regularly). Unfortunately, the DNAT rule is set to not log, so I currently have no way of knowing if the connection ever existed. It is logging now, so that may help in future.

IPS is off, SYN flood and ICMP flood protection are enabled, UDP flood protection is not, anti-portscan is set to drop. Strict session handling is off, as is block invalid packets, both of which I imagine might cause some behaviour like this.

I guess I have two questions. What is fwrule 0, and why is my fully functional DNAT rule not passing the packet on? I am wondering if the two things are related.

Thanks

[Edit: I have 4000 log entries for fwrule="0" just for today, nearly all 'logs', but some drops too. The traffic I am particularly interested in is torrent-related, and i'm looking into an issue related to connections to peers. of these 4000, 1000 are addressed to the correct port for my client. The info field for the torrent traffic says one of these:

"nf_ct_tcp: invalid packet ignored in state SYN_RECV "

"nf_ct_tcp: invalid packet ignored in state ESTABLISHED "

"nf_ct_tcp: invalid RST "

are those conntrack messages?

of the wider 4000, 1300 are outbound from devices with all outbound traffic permitted by rule - again, suggests conntrack]



This thread was automatically locked due to age.
Parents
  • As Dirk said, I wouldn't worry about RST packets being dropped out of the INPUT chain (60001), and you're right that that's conntrack in action. The fwrule="0" messages indicate that you've made additional selections in the 'Protocol Handling' section on the 'Advanced' tab of 'Firewall'.  That's explained in the KB that Toni linked to, but that might not be clear if you've not played with XG.

    Cheers - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
  • No experience with XG besides installing it in a VM last week. Thanks for pointing out Toni's reply though, I totally missed it :-) and that does make sense. 

Reply Children
No Data