On 12/23/14, 15:41, Mouse wrote:
* Rapid7 has joined the scanning party (many addresses including
71.6.216.62). They also have the strange ICMP unreachable behavior,
and they are also just doing READVAR commands.
This sounds suspiciously like DoS source hiding. While the "many
addresses" part argues against that, the ICMP unreachables argue for
it. (At least, if they're port unreachables. Are they? Or are they
net unreachables, host unreachables, what?)
I wondered about that as well. The actual ICMP is 3/3 (Destination
Unreachable/Port Unreachable). I *suspect* that their scanning code
operates as follows:
* Send out packets using raw ip. The TTL on one packet when it got to me
is 236. (= 255 - 19)
* The response packet is generated and transmitted with TTL 60. It gets
back to the OS and is bounced as the local port is not a genuine local port.
* The ICMP that comes back has TTL 45 (= 64 - 19). The inner packet
(which is my response) has ttl 41 (=60 - 19)
* I expect that the scanner is capturing the return packets using
tcpdump, libpcap or some other monitoring tool.
This is circumstantial evidence that the person sending the scans, and
the IP (185.35.62.106) are both 19 hops away.
Philip
_______________________________________________
pool mailing list
[email protected]
http://lists.ntp.org/listinfo/pool