Thu Mar 11, 2021 10:35 pm
You haven't provided any context. If it is your home router, and you didn't have any rules blocking access to your DNS before, bots around the planet got used to the possibility to use your device as a DNS amplifier for DDoS attacks, and it will take some time until they find out it does not make any sense any more and unlist you. The principle of the attack is to send a small DNS query to these publicly open DNS caches, for which a large response is known to be sent (I have seen a 4 kbyte response to 100 byte query in the wild). The sender uses the address and port the DDoS target is listening at as the source address and port of the query, so the DNS sends the much larger response to the victim service.
Another possibility is that some of the device on the LAN side of your router is sending its DNS queries using port 53 as source, so the drop rule in raw is actually dropping the responses to these queries. And the device really wants to know the answer so it repeats the queries all the time.
You would have to sniff the traffic to find out which variant is the correct one, i.e. whether the packets being dropped are queries or responses.
Last edited by
sindy on Thu Mar 11, 2021 11:35 pm, edited 1 time in total.