[127409] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Very Strange - TCP SWEEP Alerts / Inconsistent with traffic on

daemon@ATHENA.MIT.EDU (John Kristoff)
Sun Jun 27 22:32:57 2010

Date: Sun, 27 Jun 2010 21:32:41 -0500
From: John Kristoff <jtk@cymru.com>
To: khatfield@socllc.net
In-Reply-To: <1277673771.085423881@192.168.2.228>
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On Sun, 27 Jun 2010 17:22:51 -0400 (EDT)
khatfield@socllc.net wrote:

> Here is an example report we received from AT&T:
> 04:29:27 x.x.x.x 0.0.0.0 [TCP-SWEEP]
> (total=23,dp=1024,min=212.1.185.6,max=212.1.191.127,Jun27-04:21:01,Jun27-04:29:26)
> (USI-amsxaid01) 04:29:27 x.x.x.x 0.0.0.0 [TCP-SWEEP]
> (total=16,dp=3072,min=212.1.189.1,max=212.1.188.118,Jun27-04:21:15,Jun27-04:29:09)
> (USI-amsxaid01) 04:36:44 x.x.x.x 0.0.0.0 [TCP-SWEEP]

This looks like the trademark signature of back scatter as a result of
someone using the juno.c or derivative code to SYN flood a host.  You
are most likely getting this traffic from a host that is getting
attacked.  In the junos.c code you'll see this:

     syn->sport           = htons(1024 + (random() & 2048));

A random number is ANDed against 2048, the result is then added to
1024.  What will be added is always either 0 or 2048, because 2048 has
only one bit set.  1024 + 2048 = 3072.  Therefore, syn-sport will only
ever equal 1024 or 3072.  Or in your case, it shows up as the dport on
the way back.

John


home help back first fref pref prev next nref lref last post