Openstack VM(也有Redhat)正在发送奇怪的DNS查询

时间:2018-08-22 12:11:40

标签: dns

我有一些奇怪的DNS查询,我找不到原因或哪个进程正在要求类似的东西。

奇怪的是,我的意思是要求“ -P”。看来,系统有某种虚假的“功能”正在发送“ -P”请求。

已检入/var/log/messages和所有其他日志,但未检入。

它看起来像这样:

750 4.880197       172.34.167.129        172.34.167.193        DNS      64     Standard query 0xa6d9 A -P
751 4.880228       172.34.167.129        172.34.167.193        DNS      64     Standard query 0xcf06 AAAA -P
752 4.882101       172.34.167.193        172.34.167.129        DNS      64     Standard query response 0xa6d9 Refused A -P
753 4.882122       172.34.167.193        172.34.167.129        DNS      64     Standard query response 0xcf06 Refused AAAA -P

详细信息:

No.     Time           Source                Destination           Protocol Length Info
    750 4.880197       172.34.167.129        172.34.167.193        DNS      64     Standard query 0xa6d9 A -P

Frame 750: 64 bytes on wire (512 bits), 64 bytes captured (512 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 172.34.167.129, Dst: 172.34.167.193
User Datagram Protocol, Src Port: 27798, Dst Port: 53
Domain Name System (query)
    [Response In: 752]
    Transaction ID: 0xa6d9
    Flags: 0x0100 Standard query
    Questions: 1
    Answer RRs: 0
    Authority RRs: 0
    Additional RRs: 0
    Queries
        -P: type A, class IN
            Name: -P
            [Name Length: 2]
            [Label Count: 1]
            Type: A (Host Address) (1)
            Class: IN (0x0001)

No.     Time           Source                Destination           Protocol Length Info
    751 4.880228       172.34.167.129        172.34.167.193        DNS      64     Standard query 0xcf06 AAAA -P

Frame 751: 64 bytes on wire (512 bits), 64 bytes captured (512 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 172.34.167.129, Dst: 172.34.167.193
User Datagram Protocol, Src Port: 27798, Dst Port: 53
Domain Name System (query)
    [Response In: 753]
    Transaction ID: 0xcf06
    Flags: 0x0100 Standard query
    Questions: 1
    Answer RRs: 0
    Authority RRs: 0
    Additional RRs: 0
    Queries
        -P: type AAAA, class IN
            Name: -P
            [Name Length: 2]
            [Label Count: 1]
            Type: AAAA (IPv6 Address) (28)
            Class: IN (0x0001)

No.     Time           Source                Destination           Protocol Length Info
    752 4.882101       172.34.167.193        172.34.167.129        DNS      64     Standard query response 0xa6d9 Refused A -P

Frame 752: 64 bytes on wire (512 bits), 64 bytes captured (512 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 172.34.167.193, Dst: 172.34.167.129
User Datagram Protocol, Src Port: 53, Dst Port: 27798
Domain Name System (response)
    [Request In: 750]
    [Time: 0.001904000 seconds]
    Transaction ID: 0xa6d9
    Flags: 0x8105 Standard query response, Refused
    Questions: 1
    Answer RRs: 0
    Authority RRs: 0
    Additional RRs: 0
    Queries
        -P: type A, class IN
            Name: -P
            [Name Length: 2]
            [Label Count: 1]
            Type: A (Host Address) (1)
            Class: IN (0x0001)

No.     Time           Source                Destination           Protocol Length Info
    753 4.882122       172.34.167.193        172.34.167.129        DNS      64     Standard query response 0xcf06 Refused AAAA -P

Frame 753: 64 bytes on wire (512 bits), 64 bytes captured (512 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 172.34.167.193, Dst: 172.34.167.129
User Datagram Protocol, Src Port: 53, Dst Port: 27798
Domain Name System (response)
    [Request In: 751]
    [Time: 0.001894000 seconds]
    Transaction ID: 0xcf06
    Flags: 0x8105 Standard query response, Refused
    Questions: 1
    Answer RRs: 0
    Authority RRs: 0
    Additional RRs: 0
    Queries
        -P: type AAAA, class IN
            Name: -P
            [Name Length: 2]
            [Label Count: 1]
            Type: AAAA (IPv6 Address) (28)
            Class: IN (0x0001)

0 个答案:

没有答案