[42623] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Worm probes

daemon@ATHENA.MIT.EDU (z@s0be.net)
Tue Sep 18 14:17:52 2001

Date: Tue, 18 Sep 2001 10:31:35 -0700 (PDT)
From: <z@s0be.net>
To: Joseph McDonald <joe@vpop.net>
Cc: <nanog@merit.edu>
In-Reply-To: <122071095343.20010918095143@vpop.net>
Message-ID: <Pine.GSO.4.33.0109181026040.7552-100000@power.s0be.net>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Errors-To: owner-nanog-outgoing@merit.edu




On Tue, 18 Sep 2001, Joseph McDonald wrote:

>
>
> spc> Has anyone else been seeing a dramatic increase in /scripts/.. NT worm
> spc> probes this morning?  We're seeing about 8000/second, starting around 9:15
>
> Yes. We are seeing it here bigtime.  Does anyone have any apache hacks
> to lessen the impact?  One idea:  Once a probe is sent, the prober's
> IP# is stored in a hash (perhaps in shared memory or a mmap'd file
> that all children can share) and new connections from that IP are no
> longer accepted.


<--( SNIP )-->


  That would still allow the malicious network traffic to traverse your
network.

  I'm not seeing more than about 60 unique hosts that are scanning ( YMMV
), so that isn't a huge hit for me ACL-wise ( again YMMV ).   Your choice,
let them bang on your router or your web servers.   Depends on your
situation.

.z



home help back first fref pref prev next nref lref last post