Forum Discussion

John_Krum's avatar
Icon for Cirrus rankCirrus
Oct 03, 2022

Can you stop RST from being sent by VIP

I work for a large regional public transportation company. We are in the beginning process of rolling out phones with a VoIP over the top application on them. This will eliminate the need for radios (radio transmittion towers are now very expensive). I have determined that, for whatever reason, these phones send a DNS request on TCP port 853 and with that the VIP sends an RST to the requesting phone. That in turn resets the connection, the VoIP app beeps, disconnects for 30 sends, and then reconnects.

I have both the phone and app vendor looking at this but thought I would see what it would take to mask this problem from the F5 side. I do realize that all DNS traffic currently hits this VIP, so at this time I am only exploring my options.


8 Replies

  • TCP port 853 is usually DNS-over-TLS (DoT).

    • Are you handling DNS at the BIG-IP?
    • Are you attempting to decrypt this DoT at the VIP? And proxy to another DoT, or pure DNS resolver?


    • John_Krum's avatar
      Icon for Cirrus rankCirrus


      I have 3 DNS servers in a pool, that sit behind a VIP The VIP is UDP port 53. In trouble shooting these Sonim cell phones running an Over the Top VoIP application for some reason try and do DoT to the VIP. The VIP sends a RST, the phone drops the cell connection (really it swaps virtual nics, which in the cell world is miliseconds) but with that the application waits 30 seconds and reconnects. This is all over a private cellular network (an APN) so I can pcap ingress cell traffic and have a phone sitting next to me, and when the phone beeps a warning that it is offline, seconds before this RST is sent from the vip to my phone.

      With this information I wondered if I could instruct the VIP to just ignore, vs sending a RST to the device.

      After posting the initial question I have learned additional information regarding the phone and qualicom chip set. Once this trouble happens I have to pull the battery to start a fresh VoIP session, otherwise every 3 to 5 min. this disconnect happens. (and the TCP over 853 to the VIP as well) So this really isn't and never intended to be a fix, just maybe used to help roll out the phones.



      • Kevin_Stewart's avatar
        Icon for Employee rankEmployee

        Yes, but is it doing a RST after trying and failing to establish a TLS handshake? You should see a ClientHello coming from the client after 3WHS, and the probably failure after that.

  • I should have included the initial SYN. Phone sends the SYN, VIP responds back RST ACK.


      • John_Krum's avatar
        Icon for Cirrus rankCirrus

        O.K. I see where you are going with this. I was looking to stop the RST packets, just dropped. You are looking at it from the perspective of terminating TLS on the F5 and passing upd 53 to the pool.