As much as I hate to help a Microsoftie ;) I would suggest that someone
is attempting to scan your DNS... poorly.

Have you tracked the location of the clients who are making these
requests? It's also interesting that they're calling from 137 (A NetBIOS
port I believe)... one possible answer being that alot of people with NT
networks ignore 137-139 traffic since it randomly happens on NT
networks... could be good cover.

I would find the clients and contact your local FBI. Let them contact
the clients Admin.



Brian Steele wrote:
> 
> This is a followup to a message I sent yesterday concerning a sysadmin
> reporting that our DNS server (NT4/SP6a/MS-DNS) was flooding his DNS server
> (Ultrix?/BIND8) with queries.  An example of his log file is given below:
> 
>     Mar 15 12:03:15 surfdns1 named[1817]: host name
>     "210\.212\.235\.95.hhss.edu.gd" IN (response from [205.214.207.99]) is
>     invalid - proceeding anyway
> 
> I cross-posted the message two both lists, as there could've been some
> security issues involved that the "firewall guys" might be aware of (the
> sysadmin's log file showed numerous entries like the one above, the only
> difference between the entries being the IP address being incremented by one
> for each entry).
> 
> Well, I used LAN Explorer (purchased from Sunbelt Software some time ago -
> thanks Stu!) to capture all of the packets seen by our DNS server, and
> basically this is what is going on.
> 
> There are TWO client systems at the root of all the problems here. The modus
> operandi of both clients is as follows:
> 
>     1. Client sends a request originating from port 137 to my DNS,
>         requesting the resolution of the name "nnn.nnn.nnn.nnn.hhss.edu.gd",
>         where "nnn.nnn.nnn.nnn" is an IP address.
> 
>     2. My DNS, being the authorative server for the edu.gd
>         domain, responds to the client with a name error.
> 
>     3. A request then originates from the BIND8 DNS, requesting
>         the resolution of the name name given in (1).
> 
>     4. My DNS responds to the BIND8 DNS, with a name
>         error.
> 
>     5. The process repeats itself, with the only difference being that
>         the IP address nnn.nnn.nnn.nnn is incremented by one.
> 
> Presently, the range being queried by one client is 213.131.24.nnn, and the
> other 205.68.216.nnn.  The modus operandi suggests that the clients are
> using both my DNS and the BIND8 DNS for lookups - when my DNS returns a name
> error, the clients then switch to querying the BIND8 DNS for resolution of
> the same name, and the BIND8 DNS then turns and queries mine, as my DNS is
> authorative for the domain in question.  In other words, it's NOT my DNS
> flooding his with queries, but vice-versa!
> 
> Any ideas on what software the clients could be running to generate these
> strange queries from port 137?  What could be the point behind all of these
> queries?  Is this really a security issue, or am I just panicking :-).
> 
> Finally, while checking the data, I came across ANOTHER client sending
> requests to my server and following a very similar modus operandi.  The only
> difference between this client and the two clients above is that
> "hhss.edu.gd" is not being apended to the name for which resolution is being
> requested. The IP address range being queried here is 135.121.10.nnn.  My
> DNS then forwards the request to one of the InterNIC root servers, which
> then returns a name error, which my DNS then returns to the client.
> 
> In all cases, the client's IP address does NOT reside in the range being
> queried.
> 
> Regards,
> Brian Steele
> 
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to