David,
Apologies for the lack of info.
The VPN is set up as an IPSEC tunnel providing transatlantic site to site
connectivity running on cisco ios (UK to Canada). There are no machines on
the address range, and no references to these addresses are configured on
any of the routers / firewalls in our organisation. This link is used for
the VPN only. There are also no DNS entries for these addresses.
The hostile traffic's destination addresses are in the far/middle east.
Beirut, Colombia, Korea, Malaysia and recently France.
The ACL's are blocking this traffic inbound from our ISP. today, I have also
seen some BGP packets destined for another ISP claiming to be from us. The
ACLs are configured to only allow AHP and ISAKMP from the Canadian Peer,
plus the valid Remote RFC1918 addresses.
The IPSEC box is on a switched DMZ. Layer 2 filtering is applied such that
the box can only speak to the Firewalls looking after this area.
Regarding Routing, the internal infrastructure has the default route out of
an entirely seperate building, and the IPSEC router (Where we are seeing the
logs) has a default route to Null0. If i traceroute to any of these
addresses assigned to us, the packets go out to the ISP via the correct
link, traverse their backbone, and then hit the ACL's on the IPSEC box. IP
accounting shows no traffic internally heading outbound for any of these
addresses (only valid traffic to the RFC1918 addresses the other side of the
tunnel).
What I don't understand (and my experience is limited) is how this traffic
is routing to us.
I have informed our ISP, and they are also investigating.
Thanks for your time.
Wayne
-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
Sent: Friday, June 15, 2001 10:08 AM
To: Norris, Wayne; [EMAIL PROTECTED]
Subject: Re: Strange Logs.
You haven't really given us much to go on -- no clue what the
address range is, whether there are other machines on it, what
make/model/version VPN it is, whether it's being used to provide site-
to-site connectivity or remote individual connectivity. Not even
what the geographical region is.
In fact, we can't even tell wheter you're seeing outbound packets,
or inbound packets apparently trying to reply to outbound traffic
that shouldn't and doesn't exist.
Sure, it could be a smurf attempt, or side-effects of someone
spoofing you as the source address. (There are a couple of ways a
spoofer might be managing to sniff the return traffic.)
But it could just as easily be one of your own users with an
incorrect default gateway set, or perhaps leakage of route
information for this link to other routers within your
organization....
David Gillett
On 15 Jun 2001, at 8:17, Norris, Wayne wrote:
> Hi,
>
> Can anyone shed some light on the following.
>
> We have multiple connections to the internet, One of which is used purely
as
> a VPN connection. It is not used for Mail, browsing etc etc. I recently
> noted some strange activity on in the logs on the perimiter router.
>
> IP addresses supposedly coming from our registered address space assigned
to
> this link, are trying to access various remote sites, FTP, WWW, RPC etc.
>
> There is not a great deal of activity like this, but the destinations
always
> seem to be in the same geographic areas.
>
> The question is, how are the packets trying to route via this link, if the
> destination addresses he/she is trying to get to are not in any way
> connected to our organisation, and the source addresses are supposedly
ours
> ?
>
> And what would be the point, as the traffic back would route to us ?
>
> Could this be part of a DDOS ?
>
> Many thanks
>
> Wayne
>
>
>
>
EUROPEAN FINANCIAL DATA SERVICES (UK) LTD Tel: +44 1277 84 2700
********************** N O T I C E *********************************
This message and any attachments is intended only for the individual or company to
which it is addressed and may contain information which is privileged, confidential or
prohibited from disclosure or unauthorised use. If the recipient of this transmission
is not the intended recipient, or the employee or agent responsible for delivering
such materials to the intended recipient, you are hereby notified that any use, any
form of reproduction, dissemination, copying, disclosure, modification, distribution
and/or publication of this e-mail message or its attachments other than by it's
intended recipient is strictly prohibited by the sender. If you have received it in
error, please notify us immediately by telephone on the number above and destroy the
message and all copies in your possession.
This footnote also confirms that this email message has been swept by MIMEsweeper for
the presence of computer viruses.
**********************************************************************
_______________________________________________
Firewalls mailing list
[EMAIL PROTECTED]
http://lists.gnac.net/mailman/listinfo/firewalls