[155077] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: DDoS using port 0 and 53 (DNS)

daemon@ATHENA.MIT.EDU (John Kristoff)
Wed Jul 25 10:45:02 2012

Date: Wed, 25 Jul 2012 09:43:43 -0500
From: John Kristoff <jtk@cymru.com>
To: Jimmy Hess <mysidia@gmail.com>
In-Reply-To: <CAAAwwbW3C6dLC-j+LgpVoOnyJOWPskfMaAJg5RKB22=oqy2pBA@mail.gmail.com>
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On Tue, 24 Jul 2012 23:10:52 -0500
Jimmy Hess <mysidia@gmail.com> wrote:

> It should be relatively safe to drop  (non-fragment)  packets to/from
> port 0.
[...]

Some UDP applications will use zero as a source port when they do not
expect a response, which is how many one-way UDP-based apps operate,
though not all.  This behavior is spelled out in the IETF RFC 768:

  "Source Port is an optional field, when meaningful, it indicates the
  port of the sending  process,  and may be assumed  to be the port to
  which a reply should  be addressed  in the absence of any other
  information.  If not used, a value of zero is inserted."

John


home help back first fref pref prev next nref lref last post