Finding Packet Drop Location

route

Yesterday I write a blog about finding outgoing and incoming latency data with uping.

While testing the program with different ports, I have an issue with port 53.
You know port 53 is used for DNS, maybe ISP or data center apply a rule for the safer network. Let’s try to look a path is anyone drops my packet. I execute traceroute command to the server with port 53.
route
Seems like a no problem but for a now.

Does the packet arrive at the server? To ensure, I inspect my server traffic with tcpdump. route
The packets are arrived into the server and responded without any error.
So I also tested in different Source IP which is announced in UK (in real, Ip is physically located in Marmaris). It does not have any issue, it means port 53 is not closed for everyone in my server.

Where is My Packet?

We see the packet in tcpdump, so my packets drop at between server to the client which is an incoming path for client.
Let’s look at it.
route

It seems like has a problem. In normal, the packet will be arriving 18th hop but in this time it does not arrive. Here are other packets.
route

17th hop is my home router, so the problem is happening at 15th or 16th hop.

Here is full route path, I also draw route path on maps and added as an image beginning of this post.

        > Istanbul (Gayrettepe Turknet) > Sofia (Cogent) > Belgrade (Cogent) > Vienna (Cogent) > Munich (Cogent) > Frankfurt (Cogent) > Amsterdam (Cogent) >
client                                                                                                                                                        Server
        < Istanbul (Gayrettepe Turknet) < Istanbul (Acibadem TurkTelekom)                       < Frankfurt (TurkTelekom) < Level3 (Frankfurt) < Amsterdam <

But WHY?

Port 53 is used for DNS and Port 53 is a sweet port for non protected servers to use as reflection attacks. 15th or 16th hop is my Service provider and they might apply a white list for port 53.

Let’s control this idea.
I temporally run socat for forwarding Port 53 is to common Public DNS server on the server-side.

docker run -it --rm --network host ahmetozer/cna socat UDP4-RECVFROM:53,fork UDP4-SENDTO:1.1.1.1:53

On the client side, I execute nslookup for testing.

$ nslookup example.com server
Server:         research1.sv.local
Address:        research1.sv.local#53

Non-authoritative answer:
Name:   google.com
Address: 216.58.214.14
Name:   google.com
Address: 2a00:1450:400e:804::200e

Wait a second

So what happened my other packets?

If the port sensitive for data it means very great firewall between me and server (16th hop) to check is it real DNS question or all packets forwarded to some proxy.

It is another post and I will write in this week.

I hope you liked this blog. If so don’t forget to share, stay safe and see you next blog.


© 2020 . All rights reserved.

Powered by Hydejack v7.5.0