I'm seeing a significant amount of unsolicited inbound traffic from Rogers' DNS servers, trying to establish a UDP connection on multiple ports on my internet connection from port 53 on the servers.
Note: this is not response traffic to an outbound query - this is unsolicited inbound targetting multiple IANA User Ports & Dynamic Ports. My firewall is successfully blocking these "attacks".
This is from the past two hours:
I started discussing this with our DNS engineering team and they are asking if you would have a traffic capture available for that.
If you can, reach out to me via PM and we'll see how you can sent that out to me.
Just to close this off for anyone else reading this in the future.
This was not a security issue.
The Rogers DNS team has investigated and it appears it's a load-balancer/caching server timing issue for non-existent domains and the fact that my firewall rejects responses from servers it doesn't initiate contact with.
@RogersMoin can you please close this thread?
after a vulnerability scan ... found that rogers modem has many of open access /port that could expose customers to bad guys..
Could Rogers explains why many ports are open and why the firewall are set to auto forwarding event if you block it.
see bellow :
DNS Server Cache Snooping Remote Information Disclosure
suggested Solution by NESSUS scanner