[163573] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: chargen is the new DDoS tool?

daemon@ATHENA.MIT.EDU (Damian Menscher)
Wed Jun 12 02:26:50 2013

In-Reply-To: <kp7gbj$it9$1@ger.gmane.org>
From: Damian Menscher <damian@google.com>
Date: Tue, 11 Jun 2013 23:26:02 -0700
To: Bernhard Schmidt <berni@birkenwald.de>
Cc: NANOG mailing list <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On Tue, Jun 11, 2013 at 8:39 AM, Bernhard Schmidt <berni@birkenwald.de>wrote:

> we have been getting reports lately about unsecured UDP chargen servers
> in our network being abused for reflection attacks with spoofed sources
>
> Anyone else seeing that? Anyone who can think of a legitimate use of
> chargen/udp these days? Fortunately I can't, so we're going to drop
> 19/udp at the border within the next hours.
>

FWIW, last August we noticed 2.5Gbps of chargen being reflected off ~160
IPs (with large responses in violation of the RFC).  As I recall, some
quick investigation indicated it was mostly printers.  I notified several
of the worst offenders (rated by bandwidth).

While I think it's silly to be exposing chargen to the world (especially as
a default service in a printer!), the real problem here is networks that
allow spoofed traffic onto the public internet.  In the rare cases we see
spoofed traffic I put special effort into tracing them to their source, and
then following up to educate those providers about egress filtering.  I'd
appreciate it if others did the same.

Damian

home help back first fref pref prev next nref lref last post