[33425] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: DNS requests from 209.67.50.203

daemon@ATHENA.MIT.EDU (Kevin Houle)
Wed Jan 10 09:38:28 2001

Message-ID: <3A5C736B.27D6CBD9@cert.org>
Date: Wed, 10 Jan 2001 09:36:27 -0500
From: Kevin Houle <kjh@cert.org>
MIME-Version: 1.0
To: jtk@aharp.is-net.depaul.edu
Cc: nanog@merit.edu
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Errors-To: owner-nanog-outgoing@merit.edu


John Kristoff wrote:
> 
> On a university list many sites are reporting large amounts of traffic
> appearing to come from 209.67.50.203 to their DNS servers.  The
> administrator of the source IP (spoofed of course) is the victim of a
> brutal DoS attack.  The traffic is UDP/DNS queries that are appear to be
> going directly to available DNS servers (as opposed to random hosts).
> Most sites are reporting on the order of 6 or more packets per second to
> their DNS servers.  The victim has apparently seen upwards of 90 Mb/s of
> traffic coming back in to them.  Does anyone here have anymore
> information on this attack?

In general, this attack method is known. There is some information 
about it documented at:

  Denial of Service Attacks Using Nameservers
  http://www.cert.org/incident_notes/IN-2000-04.html

Regards,
Kevin


home help back first fref pref prev next nref lref last post