Yes, us too.  I got a response from the relevant admins, 
where this is traffic generated from geographical latency 
analyzing software, used for www page distribution.

I thought it was an odd probe too, and am not convinced 
that they should be doing it this way.  Their response is below.

-- Joshua
___________________________________________________________________
Joshua Chamas                      Chamas Enterprises Inc.
NODEWORKS - web link monitoring    Long Beach, CA    1-562-432-2469
http://www.nodeworks.com           http://www.chamas.com

> From: Ng, Alex [SMTP:[EMAIL PROTECTED]]
> Sent: Monday, June 07, 1999 11:05 AM
> Subject:      RE: Probable attack from your domain
> 
> Dear Sir,
>       
>       We are currently using the product GlobalDispatch from Resonate Inc.
> for our Wide Area 
> Data Distribution.  Please see letter below for a detail explaination on
> this product.  Thanks.
> 
> Sincerely,
> 
> Alex Ng
> 
> 
> --------------------
> 
> Hello Sir,
>  
> Alex at Doubleclick asked us to work with you regarding this ticket.
>  
> We have reason to believe that the reports you've received regarding
> these three machines being compromised is a misunderstanding as a result
> of our enterprise traffic management software: Global Dispatch.  Global
> Dispatch is a WAN-based scheduler that makes it easy to place content
> close to geographically dispersed users and and intelligently directs
> requests
> to the best-suited Point of Presence (POP). 
>  
> In the course of determining the best suited POP, Global Dispatch preforms
> a
> latency measurement.  This latency measurement is done by making a
> connection 
> to the client DNS server on TCP port 7 and then dropping the connection.
> After
> the latency measurement has been done, the latency values are cached, and
> the
> IP of the most responsive POP is returned to the requesting machine.
>  
> I hope this help clear up the confusion. We are looking into other ways to
> preform this latency mesurment, and hope we have not caused you any
> inconvenience.
>  
> --
> Resonate Technical Support <[EMAIL PROTECTED]>
> 
> 
>       ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>       Richard Day     Call Center Manager
> 
>       Resonate, Inc.
>       465 Fairchild Drive 
>       Suite 115
>       Mountain View, CA 94040
> 
>       Main Phone   650 967.6500
>       Fax          650 967.6561
>       Support Line 650 967.4800
>       ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
> 


Roger Marquis wrote:
> 
> We recently began seeing an interesting pattern of tcp packets, from 6
> unique IPs, none with reverse dns, 5 or 6 packets per src IP to a single
> destination IP, port 7 (echo).  These packets are all logged within a few
> seconds of each other which leads me to suspect that most of them could be
> spoofed.  The "source" IPs are:
> 
>  199.95.207.91  DOUBLECLICK.NET
>  199.95.208.85  DOUBLECLICK.NET
>  207.239.35.71  @PLAN (webplan.net)
>  208.32.211.71  DOUBLECLICK.NET
>  209.67.38.49   EXODUS.NET (no reverse dns in subnet)
>  209.67.38.50   EXODUS.NET (no reverse dns in subnet)
> 
> Anyone else seen this traffic pattern?
> 
> >Jun  4 07:44:59 server1 /kernel: Connection attempt to TCP 192.168.1.1:7 from 
>207.239.35.71:64314
> >Jun  4 07:44:59 server1 /kernel: Connection attempt to TCP 192.168.1.1:7 from 
>208.32.211.71:44619
> >Jun  4 07:44:59 server1 /kernel: Connection attempt to TCP 192.168.1.1:7 from 
>199.95.208.85:45641
> >Jun  4 07:44:59 server1 /kernel: Connection attempt to TCP 192.168.1.1:7 from 
>199.95.207.91:40861
> >Jun  4 07:44:59 server1 /kernel: Connection attempt to TCP 192.168.1.1:7 from 
>209.67.38.49:36966
> >...
> >Jun  4 07:45:35 server1 /kernel: Connection attempt to TCP 192.168.1.1:7 from 
>207.239.35.71:33107
> >Jun  4 07:45:35 server1 /kernel: Connection attempt to TCP 192.168.1.1:7 from 
>199.95.208.85:47895
> >Jun  4 07:45:35 server1 /kernel: Connection attempt to TCP 192.168.1.1:7 from 
>199.95.207.91:42421
> >Jun  4 07:45:35 server1 /kernel: Connection attempt to TCP 192.168.1.1:7 from 
>208.32.211.71:46178
> >Jun  4 07:45:35 server1 /kernel: Connection attempt to TCP 192.168.1.1:7 from 
>207.239.35.71:33108
> >...
> >cont. for several pages
> 
> --
> Roger Marquis
> Roble Systems Consulting
> http://www.roble.com/
> 
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to