[42616] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Worm probes

daemon@ATHENA.MIT.EDU (Daniel Senie)
Tue Sep 18 13:46:39 2001

Message-Id: <5.1.0.14.2.20010918132603.03ea8c20@mail.amaranth.net>
Date: Tue, 18 Sep 2001 13:26:53 -0400
To: Joseph McDonald <joe@vpop.net>, nanog@merit.edu
From: Daniel Senie <dts@senie.com>
In-Reply-To: <122071095343.20010918095143@vpop.net>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
Errors-To: owner-nanog-outgoing@merit.edu


At 12:51 PM 9/18/01, Joseph McDonald wrote:


>spc> Has anyone else been seeing a dramatic increase in /scripts/.. NT worm
>spc> probes this morning?  We're seeing about 8000/second, starting around 
>9:15
>
>Yes. We are seeing it here bigtime.  Does anyone have any apache hacks
>to lessen the impact?  One idea:  Once a probe is sent, the prober's
>IP# is stored in a hash (perhaps in shared memory or a mmap'd file
>that all children can share) and new connections from that IP are no
>longer accepted.

Or better: script which causes a filter rule to be added to ipchains list, 
blocking all ports.
-----------------------------------------------------------------
Daniel Senie                                        dts@senie.com
Amaranth Networks Inc.                    http://www.amaranth.com


home help back first fref pref prev next nref lref last post