[39672] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Code Red

daemon@ATHENA.MIT.EDU (lucifer@lightbearer.com)
Thu Jul 19 23:12:42 2001

Message-ID: <20010720031208.23684.qmail@prophecy.lightbearer.com>
From: lucifer@lightbearer.com
In-Reply-To: <v04210102b77d36d07e75@[198.108.60.39]> from Jeff Ogden at "Jul
 19, 2001 09:32:12 pm"
To: Jeff Ogden <jogden@merit.edu>
Date: Thu, 19 Jul 2001 20:12:08 -0700 (PDT)
Cc: nanog@merit.edu
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Errors-To: owner-nanog-outgoing@merit.edu


Jeff Ogden wrote:
> 
> Here at Merit we are seeing large numbers of Code Red infected hosts. 
> These hosts may be on our regional network MichNet or they may be 
> elsewhere out on the greater Internet. It is the port scanning of 
> random IP address that causes problems, because the scanning in turn 
> is causing network problems due to heavy ARP loads when the local 
> site routers ARP for what turn out to be unused IP addresses.  This 
> is an issue when there are large blocks of IP addresses behind a 
> router. It is less of a problem when there is a relatively small 
> number of IP addresses behind a router (say one class C worth). Are 
> others seeing these sorts of problems?  What strategies are there for 
> dealing with this?

Reports from our monitoring systems saw the CPU usage jump by somewhere
between 150-200% for our core routers today; our current theory is that
much of this was caused by excessively short and rapid flows from the
probing, causing a lot of new paths to be learned (and rapidly discarded),
rather than being able to just switch it through.
-- 
***************************************************************************
Joel Baker                           System Administrator - lightbearer.com
lucifer@lightbearer.com              http://www.lightbearer.com/~lucifer

home help back first fref pref prev next nref lref last post