Created on 07-14-2011 01:38 AM
1 2011-07-14 10:05:14 alert 192.168.5.1 195.50.140.41 dns_decoder: DNS.Name.Overflow192.168.5.1 --> this is my local DNS Server 195.50.140.41 --> this is an unknown IP Adress This entry repeated at least everey two minutes. Allways the same message, but with different (all me unknown) destination Adresses. On Fortinet KnowledgeBase; they said, that the severitly is low. But i find, that coud be the problem for my slow LAN. Have anybody an idea, to solve this problem? Is there a wron entry in my DNS Zonefile? Thank you alot and regards.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Created on 07-14-2011 06:04 AM
Created on 07-15-2011 12:24 AM
It indicates detection of a Domain Name Service (DNS) message with an oversized full domain nameI think its a very big effort to check all this IPs, and find out why the DNS Request has an oversized FDN, or what do you think? Thank you.
Created on 07-18-2011 05:50 AM
=0419070000 type=ips subtype=signature pri=alert vd=root serial=117583569 attack_id=8912901 severity=low src=192.168.2.1dst=157.161.9.7 src_port=53 dst_port=51511 src_int=dmz1 dst_int=wan1 status=detected proto=17 service=51511/udp user=N/A group=N/A ref=" http://www.fortinet.com/ids/ID8912901" msg=" dns_decoder: DNS.Name.Overflow" 8 2011-07-18 14:06:10 log_id=0419070000 type=ips subtype=signature pri=alert vd=root serial=117583569 attack_id=8912901 severity=low src=192.168.2.1 dst=157.161.9.7 src_port=53 dst_port=51511 src_int=dmz1 dst_int=wan1 status=detected proto=17 service=51511/udp user=N/A group=N/A ref=" http://www.fortinet.com/ids/ID8912901" msg=" dns_decoder: DNS.Name.Overflow" 9 2011-07-18 14:01:14 log_id=0419070000 type=ips subtype=signature pri=alert vd=root serial=117548501 attack_id=8912901 severity=low src=192.168.2.1 dst=82.117.0.70 src_port=53 dst_port=1032 src_int=dmz1 dst_int=wan1 status=detected proto=17 service=1032/udp user=N/A group=N/A ref=" http://www.fortinet.com/ids/ID8912901" msg=" dns_decoder: DNS.Name.Overflow" 10 2011-07-18 14:01:14 log_id=0419070000 type=ips subtype=signature pri=alert vd=root serial=117548501 attack_id=8912901 severity=low src=192.168.2.1dst=82.117.0.70 src_port=53 dst_port=1032 src_int=dmz1 dst_int=wan1 status=detected proto=17 service=1032/udp user=N/A group=N/A ref=" http://www.fortinet.com/ids/ID8912901" msg=" dns_decoder: DNS.Name.Overflow" 11 2011-07-18 13:58:01 log_id=0419070000 type=ips subtype=signature pri=alert vd=root serial=117524248 attack_id=8912901 severity=low src=192.168.2.1 dst=213.55.128.6 src_port=53 dst_port=51835 src_int=dmz1 dst_int=wan1 status=detected proto=17 service=51835/udp user=N/A group=N/A ref=" http://www.fortinet.com/ids/ID8912901" msg=" dns_decoder: DNS.Name.Overflow" 12 2011-07-18 13:57:51 log_id=0419070000 type=ips subtype=signature pri=alert vd=root serial=117524248 attack_id=8912901 severity=low src=192.168.2.1 dst=213.55.128.6 src_port=53 dst_port=51835 src_int=dmz1 dst_int=wan1 status=detected proto=17 service=51835/udp user=N/A group=N/A ref=" http://www.fortinet.com/ids/ID8912901" msg=" dns_decoder: DNS.Name.Overflow" 13 2011-07-18 13:57:16 log_id=0419070000 type=ips subtype=signature pri=alert vd=root serial=117519605 attack_id=8912901 severity=low src=192.168.2.1 dst=82.144.41.14 src_port=53 dst_port=43577 src_int=dmz1 dst_int=wan1 status=detected proto=17 service=43577/udp user=N/A group=N/A ref=" http://www.fortinet.com/ids/ID8912901" msg=" dns_decoder: DNS.Name.Overflow" 14 2011-07-18 13:57:11 log_id=0419070000 type=ips subtype=signature pri=alert vd=root serial=117519605 attack_id=8912901 severity=low src=192.168.2.1 dst=82.144.41.14 src_port=53 dst_port=43577 src_int=dmz1 dst_int=wan1 status=detected proto=17 service=43577/udp user=N/A group=N/A ref=" http://www.fortinet.com/ids/ID8912901" msg=" dns_decoder: DNS.Name.Overflow" 15 2011-07-18 13:57:02 log_id=0419070000 type=ips subtype=signature pri=alert vd=root serial=117518505 attack_id=8912901 severity=low src=192.168.2.1 dst=212.23.97.3 src_port=53 dst_port=5544 src_int=dmz1 dst_int=wan1 status=detected proto=17 service=5544/udp user=N/A group=N/A ref=" http://www.fortinet.com/ids/ID8912901" msg=" dns_decoder: DNS.Name.Overflow" 16 2011-07-18 13:57:02 log_id=0419070000 type=ips subtype=signature pri=alert vd=root serial=117518505 attack_id=8912901 severity=low src=ydwan1 status=detected proto=17 service=5544/udp user=N/A group=N/A ref=" http://www.fortinet.com/ids/ID8912901" msg=" dns_decoder: DNS.Name.Overflow" 17 2011-07-18 13:54:12 log_id=0419070000 type=ips subtype=signature pri=alert vd=root serial=117497540 attack_id=8912901 severity=low src=192.168.2.1 dst=130.82.89.10 src_port=53 dst_port=26671 src_int=dmz1 dst_int=wan1 status=detected proto=17 service=26671/udp user=N/A group=N/A ref=" http://www.fortinet.com/ids/ID8912901" msg=" dns_decoder: DNS.Name.Overflow" 18 2011-07-18 13:54:05 log_id=0419070000 type=ips subtype=signature pri=alert vd=root serial=117497540 attack_id=8912901 severity=low src=192.168.2.1 dst=130.82.89.10 src_port=53 dst_port=26671 src_int=dmz1 dst_int=wan1 status=detected proto=17 service=26671/udp user=N/A group=N/A ref=" http://www.fortinet.com/ids/ID8912901" msg=" dns_decoder: DNS.Name.Overflow" 19 2011-07-18 13:53:55 log_id=0419070000 type=ips subtype=signature pri=alert vd=root serial=117495449 attack_id=8912901 severity=low src=192.168.2.1 dst=82.212.62.39 src_port=53 dst_port=36700 src_int=dmz1 dst_int=wan1 status=detected proto=17 service=36700/udp user=N/A group=N/A ref=" http://www.fortinet.com/ids/ID8912901" msg=" dns_decoder: DNS.Name.Overflow" 20 2011-07-18 13:53:47 log_id=0419070000 type=ips subtype=signature pri=alert vd=root serial=117495449 attack_id=8912901 severity=low src=192.168.2.13 dst=82.212.62.39 src_port=53 dst_port=36700 src_int=dmz1 dst_int=wan1 status=detected proto=17 service=36700/udp user=N/A group=N/A ref=" http://www.fortinet.com/ids/ID8912901" msg=" dns_decoder: DNS.Name.Overflow" 21 2011-07-18 13:53:25 log_id=0419070000 type=ips subtype=signature pri=alert vd=root serial=117492054 attack_id=8912901 severity=low src=192.168.2.1 dst=218.213.141.50 src_port=53 dst_port=51880 src_int=dmz1 dst_int=wan1 status=detected proto=17 service=51880/udp user=N/A group=N/A ref=" http://www.fortinet.com/ids/ID8912901" msg=" dns_decoder: DNS.Name.Overflow, repeated 2 times" 22 2011-07-18 13:53:16 log_id=0419070000 type=ips subtype=signature pri=alert vd=root serial=117491815 attack_id=8912901 severity=low src=192.168.2.1 dst=218.213.141.49 src_port=53 dst_port=4959 src_int=dmz1 dst_int=wan1 status=detected proto=17 service=4959/udp user=N/A group=N/A ref=" http://www.fortinet.com/ids/ID8912901" msg=" dns_decoder: DNS.Name.Overflow" 23 2011-07-18 13:53:16 log_id=0419070000 type=ips subtype=signature pri=alert vd=root serial=117491815 attack_id=8912901 severity=low src=192.168.2.1 dst=218.213.141.49 src_port=53 dst_port=4959 src_int=dmz1 dst_int=wan1 status=detected proto=17 service=4959/udp user=N/A group=N/A ref=" http://www.fortinet.com/ids/ID8912901" msg=" dns_decoder: DNS.Name.Overflow" 24 2011-07-18 13:42:15 log_id=0419070000 type=ips subtype=signature pri=alert vd=root serial=117414316 attack_id=8912901 severity=low src=192.168.2.1 dst=212.4.64.139 src_port=53 dst_port=59922 src_int=dmz1 dst_int=wan1 status=detected proto=17 service=59922/udp user=N/A group=N/A ref=" http://www.fortinet.com/ids/ID8912901" msg=" dns_decoder: DNS.Name.Overflow" 25 2011-07-18 13:42:15 log_id=0419070000 type=ips subtype=signature pri=alert vd=root serial=117414316 attack_id=8912901 severity=low src=192.168.2.1 dst=212.4.64.139 src_port=53 dst_port=59922 src_int=dmz1 dst_int=wan1 status=detected proto=17 service=59922/udp user=N/A group=N/A ref=" http://www.fortinet.com/ids/ID8912901" msg=" dns_decoder: DNS.Name.Overflow" 26 2011-07-18 13:40:18 log_id=0419070000 type=ips subtype=signature pri=alert vd=root serial=117399417 attack_id=8912901 severity=low src=192.168.2.1 dst=213.20.173.12 src_port=53 dst_port=58487 src_int=dmz1 dst_int=wan1 status=detected proto=17 service=58487/udp user=N/A group=N/A ref=" http://www.fortinet.com/ids/ID8912901" msg=" dns_decoder: DNS.Name.Overflow" 27 2011-07-18 13:40:09 log_id=0419070000 type=ips subtype=signature pri=alert vd=root serial=117399417 attack_id=8912901 severity=low src=192.168.2.1 dst=213.20.173.12 src_port=53 dst_port=58487 src_int=dmz1 dst_int=wan1 status=detected proto=17 service=58487/udp user=N/A group=N/A ref=" http://www.fortinet.com/ids/ID8912901" msg=" dns_decoder: DNS.Name.Overflow" 28 2011-07-18 13:39:59 log_id=0419070000 type=ips subtype=signature pri=alert vd=root serial=117398273 attack_id=8912901 severity=low src=192.168.2.1 dst=195.50.140.155 src_port=53 dst_port=57353 src_int=dmz1 dst_int=wan1 status=detected proto=17 service=57353/udp user=N/A group=N/A ref=" http://www.fortinet.com/ids/ID8912901" msg=" dns_decoder: DNS.Name.Overflow" 29 2011-07-18 13:39:59 log_id=0419070000 type=ips subtype=signature pri=alert vd=root serial=117398273 attack_id=8912901 severity=low src=192.168.2.1 dst=195.50.140.155 src_port=53 dst_port=57353 src_int=dmz1 dst_int=wan1 status=detected proto=17 service=57353/udp user=N/A group=N/A ref=" http://www.fortinet.com/ids/ID8912901" msg=" dns_decoder: DNS.Name.Overflow"The 192.168.2.1 is my (public) DNS Server. Thank you and regards.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1661 | |
1077 | |
752 | |
443 | |
220 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.