[54450] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: DDos syn attack

daemon@ATHENA.MIT.EDU (Sean Donelan)
Wed Jan 1 23:50:16 2003

Date: Wed, 1 Jan 2003 23:49:41 -0500 (EST)
From: Sean Donelan <sean@donelan.com>
To: Avleen Vig <lists-nanog@silverwraith.com>
Cc: "nanog@merit.edu" <nanog@merit.edu>
In-Reply-To: <20030101192642.T45157@guava.silverwraith.com>
Errors-To: owner-nanog-outgoing@merit.edu


On Wed, 1 Jan 2003, Avleen Vig wrote:
> Tracing back an IP from bind logs to see which name servers looked up an
> attacked address immediately before the attack started. This at leads to
> the offender's ISP which is a good start.

Relatively few people restrict the use of their name servers to only
local users.  More folks have been getting DNS servers from DHCP/Radius,
but there are still a lot of users with hard-coded resolvers.  There may
be a few DNS resolvers which keep track of query sources, but more than
likely you'll end up at another dead-end because the true source will be
somewhere else.

Let's add port 53 to the every growing list of ports to block.



home help back first fref pref prev next nref lref last post