Reflective multiplication attacks are the current vogue. Send a small
DNS query with a forged return address to a authoritative server and get
a much larger reply in turn.
NTP wouldn't be a good target for such an attack because the response is
the same size as the query. Could still be used in a reflective attack
but it wouldn't have the multiplication effect of a reflective DNS attack.
I put a rate limit on my DNS server to keep it from being used for this
sort of attack. Also have a rate limit on NTPD. In the long run the
only solution to this problem is for ISPs to stop forged packets as
their network edge. There's no reason they should be dumping packets
with return addresses outside their network onto the internet.
Tim
On 5/9/2013 10:05 AM, AlbyVA wrote:
Given this new age of Botnet Armies DDoSing servers for a variety of
reasons, this is something
to keep an eye on. Config Fat fingers can be fixed once word gets back
to the source. But deliberate
attacks may become more of a pain in the rear.
I now wonder about the implications if a DDoS attack is directed at
pool.ntp.org <http://pool.ntp.org> or the XX.ntpns.org
<http://XX.ntpns.org>
DNS servers. That might not be cool.
-Alby
On Thu, May 9, 2013 at 8:55 AM, <[email protected]
<mailto:[email protected]>> wrote:
Flood stopped around 22:50 EDT
Tim
On 5/8/2013 6:49 PM, [email protected] <mailto:[email protected]>
wrote:
I just fired off an e-mail to their abuse department. If you do the
same perhaps they'll take it seriously enough to investigate.
Might be
a reflective attack that they can't do anything about, but if
it's just
a customer with a badly configured NTP client they ought to be
able to
resolve the issue for us.
Tim
On 05/08/2013 10:58 AM, Stuart Berry wrote:
I have just checked my logs and I'm getting between 300 - 1500
requests a second from this IP. Looks like its been
happening for
roughly the last 72 hours.
I've just blocked it at my edge, not sure if its worth
worrying about
any further. I'll monitor it for the next few days and if it
doesn't
subside I'll contact the abuse for that block.
Stuart.
AlbyVA <[email protected] <mailto:[email protected]>> wrote:
I would contact your provider's abuse/security group
about a possible
DDoS attack from this address.
They should be able to filter the traffic before it eats up your
bandwidth.
AS | IP | AS Name
12083 | 75.76.155.206 | WOW-INTERNET - WideOpenWest
Finance LLC
-Alby
On Wed, May 8, 2013 at 10:03 AM, <[email protected]
<mailto:[email protected]>
<mailto:[email protected] <mailto:[email protected]>>> wrote:
For the last six hours or so I have seen an obnoxious
rate of
requests (ranging from 60 to 300 per second) from the
aforementioned
IP. Not sure if it's a badly implemented client or
someone trying
to use my server for some sort of reflective attack.
It has long
since been blocked by my firewall but I've been running
servers in
the pool for a few years now and never had to deal with
this before.
Curious if anybody else has seen this? Any suggestions
for what to
do about it other than block the traffic at my edge and
wait for it
to die down?
___________________________________________________
pool mailing list
[email protected] <mailto:[email protected]>
<mailto:[email protected] <mailto:[email protected]>>
http://lists.ntp.org/listinfo/____pool
<http://lists.ntp.org/listinfo/__pool>
<http://lists.ntp.org/__listinfo/pool
<http://lists.ntp.org/listinfo/pool>>
_________________________________________________
pool mailing list
[email protected] <mailto:[email protected]>
http://lists.ntp.org/listinfo/__pool
<http://lists.ntp.org/listinfo/pool>
_________________________________________________
pool mailing list
[email protected] <mailto:[email protected]>
http://lists.ntp.org/listinfo/__pool
<http://lists.ntp.org/listinfo/pool>
_______________________________________________
pool mailing list
[email protected]
http://lists.ntp.org/listinfo/pool