%20env%C3%ADa%20consultas%20DNS%20extra%C3%B1as.png)
Tengo algunas consultas de DNS extrañas y no puedo encontrar por qué o qué proceso solicita algo así.
Bajo extraño me refiero a solicitud de "-P". Parece que el sistema tiene algún tipo de "característica" fantasma que envía solicitudes "-P".
Se registró /var/log/messages y todos los demás registros, pero nada.
Se parece a esto:
750 4.880197 172.34.167.129 172.34.167.193 DNS 64 Standard query 0xa6d9 A -P
751 4.880228 172.34.167.129 172.34.167.193 DNS 64 Standard query 0xcf06 AAAA -P
752 4.882101 172.34.167.193 172.34.167.129 DNS 64 Standard query response 0xa6d9 Refused A -P
753 4.882122 172.34.167.193 172.34.167.129 DNS 64 Standard query response 0xcf06 Refused AAAA -P
Detalles:
No. Time Source Destination Protocol Length Info
750 4.880197 172.34.167.129 172.34.167.193 DNS 64 Standard query 0xa6d9 A -P
Frame 750: 64 bytes on wire (512 bits), 64 bytes captured (512 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 172.34.167.129, Dst: 172.34.167.193
User Datagram Protocol, Src Port: 27798, Dst Port: 53
Domain Name System (query)
[Response In: 752]
Transaction ID: 0xa6d9
Flags: 0x0100 Standard query
Questions: 1
Answer RRs: 0
Authority RRs: 0
Additional RRs: 0
Queries
-P: type A, class IN
Name: -P
[Name Length: 2]
[Label Count: 1]
Type: A (Host Address) (1)
Class: IN (0x0001)
No. Time Source Destination Protocol Length Info
751 4.880228 172.34.167.129 172.34.167.193 DNS 64 Standard query 0xcf06 AAAA -P
Frame 751: 64 bytes on wire (512 bits), 64 bytes captured (512 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 172.34.167.129, Dst: 172.34.167.193
User Datagram Protocol, Src Port: 27798, Dst Port: 53
Domain Name System (query)
[Response In: 753]
Transaction ID: 0xcf06
Flags: 0x0100 Standard query
Questions: 1
Answer RRs: 0
Authority RRs: 0
Additional RRs: 0
Queries
-P: type AAAA, class IN
Name: -P
[Name Length: 2]
[Label Count: 1]
Type: AAAA (IPv6 Address) (28)
Class: IN (0x0001)
No. Time Source Destination Protocol Length Info
752 4.882101 172.34.167.193 172.34.167.129 DNS 64 Standard query response 0xa6d9 Refused A -P
Frame 752: 64 bytes on wire (512 bits), 64 bytes captured (512 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 172.34.167.193, Dst: 172.34.167.129
User Datagram Protocol, Src Port: 53, Dst Port: 27798
Domain Name System (response)
[Request In: 750]
[Time: 0.001904000 seconds]
Transaction ID: 0xa6d9
Flags: 0x8105 Standard query response, Refused
Questions: 1
Answer RRs: 0
Authority RRs: 0
Additional RRs: 0
Queries
-P: type A, class IN
Name: -P
[Name Length: 2]
[Label Count: 1]
Type: A (Host Address) (1)
Class: IN (0x0001)
No. Time Source Destination Protocol Length Info
753 4.882122 172.34.167.193 172.34.167.129 DNS 64 Standard query response 0xcf06 Refused AAAA -P
Frame 753: 64 bytes on wire (512 bits), 64 bytes captured (512 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 172.34.167.193, Dst: 172.34.167.129
User Datagram Protocol, Src Port: 53, Dst Port: 27798
Domain Name System (response)
[Request In: 751]
[Time: 0.001894000 seconds]
Transaction ID: 0xcf06
Flags: 0x8105 Standard query response, Refused
Questions: 1
Answer RRs: 0
Authority RRs: 0
Additional RRs: 0
Queries
-P: type AAAA, class IN
Name: -P
[Name Length: 2]
[Label Count: 1]
Type: AAAA (IPv6 Address) (28)
Class: IN (0x0001)
Respuesta1
Supongo que esto es el resultado de una simple mala configuración en la que se espera una variable de nombre de host pero falta y la siguiente opción de línea de comando, -P
se interpreta como el parámetro de nombre de host.
Algo como esto:
HOST=""
PORT=""
/path/to/command $OTHER_ARGS -H $HOST -P $PORT
que debido a variables vacías y faltantes se ve así:
/path/to/command -H -P
Encontrar qué aplicación es, podría ser tan simple o tan difícil como encontrar la aplicación (que no se ejecuta correctamente) que admita un -P
cambio de línea de comandos...