LinuxQuestions.org
Download your favorite Linux distribution at LQ ISO.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Networking
User Name
Password
Linux - Networking This forum is for any issue related to networks or networking.
Routing, network cards, OSI, etc. Anything is fair game.

Notices


Reply
  Search this Thread
Old 07-10-2017, 01:20 PM   #1
SciFi-Bob
Member
 
Registered: Aug 2008
Location: Denmark
Distribution: Ubuntu
Posts: 62

Rep: Reputation: 18
IPv6 Firewall incoming ACK,RST and others from source port 80 and 443


I like to think that I run a tight firewall on my IPv6 network, and I also like to watch the firewall log during the day (and night) so I create many rules as deny and log.
(If I don't like or understand it, drop it)

The last couple of years I noticed that many websites, especially Google, likes to try a reconnect on my previous connection via IPv6.

I never found any definitive answers out there, other that Google is running a test using some reverse web connections via SSL to speed up the general internet, but as usual, they have no documentation on how it works and what I should do with my firewall.

I'm tired of looking at all those ACK,RST,etc. messages from Google, but do they imply a security risk? They usually occurs after I visited some website, so I guess it's the website that wants to keep an open tcp connection to me in case I want to view it again.
A really horrible thought for a paranoid firewall geek like me.

I'm suspicious of all incoming connections and block almost everything I dont like, but should I look at these with new eyes? Is there some new accepted protocol in IPv6 that I missed?

I don't want to keep any unnecessary connection open to Google (or others) unless I really need it, and the continuous requests I see in my firewall log are considered hacking attempts from someone not me, so I block them.

Does anyone have an answer to what is going on here?
 
Old 07-11-2017, 03:36 AM   #2
camp0
Member
 
Registered: Dec 2016
Location: Dublin
Distribution: Fedora
Posts: 70

Rep: Reputation: 4
Hi,

If you receive packets to that ports that means, in the majority of the cases, that you have a process listening on that port, and in some rare cases lost packets. Probably you should post your firewall rules (ip6tables) here for help and also for understand your problem and make a proper diagnosis of the problem
 
Old 07-12-2017, 05:33 AM   #3
JJJCR
Senior Member
 
Registered: Apr 2010
Posts: 2,096

Rep: Reputation: 436Reputation: 436Reputation: 436Reputation: 436Reputation: 436
IPV6?

I think keep your MAC address private, if it leaks then IPV6 is able to track your device wherever you are on this planet.

or check out this link: https://www.quora.com/With-MAC-addre...y-be-protected

this one as well: http://searchnetworking.techtarget.c...nsure-security

I am not sure though whether MAC security risk in IPV6 has changed in the course of time.

Last edited by JJJCR; 07-12-2017 at 05:35 AM. Reason: edit
 
Old 07-14-2017, 01:48 AM   #4
elcore
Senior Member
 
Registered: Sep 2014
Distribution: Slackware
Posts: 1,719

Rep: Reputation: Disabled
Quote:
Originally Posted by SciFi-Bob View Post
I don't want to keep any unnecessary connection open to Google (or others) unless I really need it
Lot of sites embed services, including but not limited to: ytimg, gstatic, cache, fonts, ajax, maps, youtube, plus, hangouts, search, translate, analytics, tagservices, and adservices.
It's all cached, and whenever you hit the site with one of those services it will connect to cache server which created a shadow profile for you in case you haven't created one willingly.
I've had some success with redirecting it all into a blackhole by using a huge hosts file on my dns server, but it will break many websites beyond repair.
Maybe consider a local webcache filter for selected websites to keep the site functionality but minimize the traffic.
Personally, I'd just whitelist a few and silently drop everything else.
 
1 members found this post helpful.
Old 09-02-2017, 09:32 AM   #5
SciFi-Bob
Member
 
Registered: Aug 2008
Location: Denmark
Distribution: Ubuntu
Posts: 62

Original Poster
Rep: Reputation: 18
I think I'll follow elcore's tip, just whitelist the ones I trust, and ignore the rest.

I haven't noticed any errors on webpages so far due to this, so I think it's just some scripts running trying to get the most out of my visits.
(Or, as I see it, trying to suck as much valuable info as they can out of my connection)

So for now I'll just drop them all, and whitelist as I see fit.
 
Old 09-03-2017, 10:50 AM   #6
Habitual
LQ Veteran
 
Registered: Jan 2011
Location: Abingdon, VA
Distribution: Catalina
Posts: 9,374
Blog Entries: 37

Rep: Reputation: Disabled
Anyone who stares at logs all day is a friend of mine.

But I have concerns but not in the IPv6 arena. God, don't even wish to go there.
"google" in my logs don't mean jack-all to me, all liars.

You could have Tang in your pantry but that don't make you an astronaut.

Just sayin'. I hear you.
My only issue is I feel that once I become a "store detective" sooner or later, everyone
is a shoplifter.
I use ELK and I live in the Kibana dashboard on a daily basis.

PM me if you wish to compare methods and notes. I could use some feedback myself.
And I wasn't even sure I'd toss that out there, as I rarely discuss "situations" in public.

Peace.
John
 
Old 09-10-2017, 09:08 AM   #7
SciFi-Bob
Member
 
Registered: Aug 2008
Location: Denmark
Distribution: Ubuntu
Posts: 62

Original Poster
Rep: Reputation: 18
Quote:
Originally Posted by Habitual View Post
Anyone who stares at logs all day is a friend of mine.
Well, I do that, but I don't think I have the same workload as you.

Quote:
Originally Posted by Habitual View Post
But I have concerns but not in the IPv6 arena. God, don't even wish to go there.
I don't know when I started experimenting with IpV6, but it's quite a few years ago. At least 10.

Quote:
Originally Posted by Habitual View Post
I use ELK and I live in the Kibana dashboard on a daily basis.
Maybe I'm not there yet, I didn't even know what ELK/Kibana was until I googled it
 
  


Reply

Tags
firewall, incoming, ipv6


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
My firewall gets hammered with traffic to port 443 after switching ISP, what's going on? trafikpolisen General 3 06-19-2016 12:18 PM
IPv6 firewall question - opening port on router to single v6 address psycroptic Linux - Networking 4 05-16-2014 12:00 PM
RST ACK from Server soaptechie Linux - Networking 0 10-07-2010 11:39 PM
TCP stack imediately sends RST after it receives SYN-ACK berkon Linux - Networking 2 05-03-2009 02:56 PM
Repeated, targeted port 1025 ACK RST scottman Linux - Security 2 10-06-2004 02:35 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Networking

All times are GMT -5. The time now is 04:01 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration