NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Forum Discussion
brado77
Nov 30, 2022Star
Trying to understand nature of "DoS attack: RST Scan" log messages
Disclaimer: I am a security engineer, so my questions which follow are not to understand what a DoS attack or RST scan are; I know what those are -- I'm trying to understand the behavior of my router...
Razor512
Nov 30, 2022Prodigy
Things that will get logged, are scans that will look for signs of a closed port (this is used to check if a host is live even if it can't get much info on what is actually using the port.
While it will use some resources, often it is less than 1% load even when you connect the WAN port directly to another PC and do a DOS attack directly to it. The router will not generate a separate log entry for each packet, thus it effectively self regulates to avoid flooding the log file with junk.
If you want the router to give you a nice set of a range of log entries, run this scan on all service ports. https://www.grc.com/shieldsup
Beyond that, many log entries of DOS and other attacks are very common and are simply what many people tend to refer to as internet background radiation. Often from random infected devices, e.g., the person still running windows XP that is still endlessly scanning the entire IPv4 range looking for systems to spread the sasser worm to, or other junk. Or people who have old IOT devices that never receive security updates and are now endlessly scanning the IPv4 space or even IPv6 space and endlessly running exploit toolkits on every host it finds. Overall, it is a constant thing and there is not much that can be done about it. For example, a 2 minute packet flood at 1Gbps will generate around 7 log entries.
As for destination, they are not really listed for such attacks since they are directed at your WAN IP. Devices behind the NAT are not exposed enough to be directly targeted unless you have a device deliberately exposing itself via port forwarding or UPnP.
PS most security entries with a destination IP are not blocked, and instead are listed for your information. For example, if you have a Verizon Fios DVR, and have the DVR connected to your netgear router using a MoCA to Ethernet bridge, and have the proper ports forwarded, then you will occasionally see entries beginning with "[LAN access from remote]", especially when you are using the remote DVR service to manage recordings.
As for the logging, I feel that they are intentionally kept to a minimum, especially considering that there is far more detail if you capture a debug log via the debug.htm page of the router.
As for using a separate firewall, what makes it through could depend on how it is configured and how it handles established connections, as they have to strike a balance between preventing unrequested traffic, but also allowing connections to be established by any LAN side device when a packet matches the LAN to Any ruleset. Sometimes things can get complex when a device may have other services running on different ports, e.g., if the company wants to grab analytics data or other stuff unrelated to your streaming.
In addition to that, many more advanced firewalls will also default to very permissive rules (unless they have a more security focused setup wizard), where you may have an allow all rule, and then a bunch of specific blocking rules, and things can be a lot more permissive than many default rules of many consumer routers, since the more advanced units focus on giving the user more control.
While normally a response due a LAN client's request will not result in a DOS or other flag in the logs, unrelated traffic from a device that you requested data from can still result in entries. For example, if you do the GRC scan, even though you requested traffic to the page, you did not request specifically each individual scan from that server, thus that traffic will be logged.
- brado77Dec 01, 2022Star
Razor512 thanks for the reply. To your quotes:
If you want the router to give you a nice set of a range of log entries, run this scan on all service ports
…
As for destination, they are not really listed for such attacks since they are directed at your WAN IP. Devices behind the NAT are not exposed enough to be directly targeted unless you have a device deliberately exposing itself via port forwarding or UPnP.
That’s just it though — the NETGEAR router does not have a publicly routable IP address. Its WAN IP is a private IP address/network sitting behind another firewall device which is NAT’ing all traffic, UPnP is off and there is no port forwarding whatsoever. This router isn’t even visible or reachable from the Internet. The only traffic which reaches it are responses to client network requests which originally initiated from inside the NETGEAR network. There is no ability to scan it from outside the network using ShieldsUp, Nmap, whatever. You can’t ping it. The log entries indicate the source hosts are public IPs — those can’t see the WAN IP — the only way network traffic from one of those public hosts could even reach the router is if it were a response in a TCP dialog initiated from within my network. Therein is a primary part of the question.
Also, this quote:
Or people who have old IOT devices that never receive security updates and are now endlessly scanning the IPv4 space or even IPv6 space and endlessly running exploit toolkits on every host it finds.
A compromised iOT device external to my network can scan all it wants to no avail — again, my NETGEAR router is not visible publicly, the network traffic won’t reach it — it would be dropped at the external firewall. If a compromised iOT device happened to be on my network (which it isn’t, but just for argument), that would not be network traffic coming from a public IP, it would be coming from a private IP on the local network destined for the router’s LAN IP, not the WAN IP.
There are any number of things which might be in play, but my gut says that either the log entry is best described as, to quote the meme-able “Princess Bride” movie, “I don’t think it means what you think it means”; or, this is a false positive, which is probably better described as just faulty criteria or implementation which is not understanding packet traffic properly — and possibly both.
I’ll see if I can’t get a packet capture on the router and the external firewall and compare the two, see what I can come up with. Thanks for taking the time to respond, I really appreciate it!
Thx…