[42619] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Worm probes

daemon@ATHENA.MIT.EDU (Iljitsch van Beijnum)
Tue Sep 18 14:00:19 2001

Date: Tue, 18 Sep 2001 19:36:27 +0200 (CEST)
From: Iljitsch van Beijnum <iljitsch@muada.com>
To: Joseph McDonald <joe@vpop.net>
Cc: <nanog@merit.edu>
In-Reply-To: <122071095343.20010918095143@vpop.net>
Message-ID: <20010918192000.H22074-100000@sequoia.muada.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Errors-To: owner-nanog-outgoing@merit.edu


On Tue, 18 Sep 2001, Joseph McDonald wrote:

> Yes. We are seeing it here bigtime.  Does anyone have any apache hacks
> to lessen the impact?  One idea:  Once a probe is sent, the prober's
> IP# is stored in a hash (perhaps in shared memory or a mmap'd file
> that all children can share) and new connections from that IP are no
> longer accepted.

Or what about this: redirect your 404 to a PHP script with something like:

ErrorDocument 404 /404.php

and then let a script like this waste the attacker's time:

<?
  echo "404 This page is not available.\n";
  flush();
  sleep(150);
?>

This should slow the scanning and thus the waste of bandwidth and spread
rate of the infections down. At least, if the worm is single threaded.

Iljitsch van Beijnum


home help back first fref pref prev next nref lref last post