[57026] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: Odd DNS Traffic

daemon@ATHENA.MIT.EDU (McBurnett, Jim)
Wed Mar 26 17:24:41 2003

Date: Wed, 26 Mar 2003 17:24:05 -0500
From: "McBurnett, Jim" <jmcburnett@msmgmt.com>
To: "Support Team" <support@snworks.com>, <nanog@merit.edu>
Errors-To: owner-nanog-outgoing@merit.edu


Michael,
Do you have a packet sniff of the traffic?
Possibly a sniff of at least 10000 packets?
HMMM..
I have seen some increase at our Corp DNS, but not that much...
drop me a note offlist with the sniff.. I would like to look at this..

Jim

> -----Original Message-----
> From: Support Team [mailto:support@snworks.com]
> Sent: Wednesday, March 26, 2003 4:01 PM
> To: nanog@merit.edu
> Subject: Odd DNS Traffic
>=20
>=20
>=20
> First I would like to note I am new to the list and group. =20
> It's nice to
> be here.
>=20
> Second, since Monday, March 24th at approx 1am we have been suffering
> from "odd" DNS traffic to our two primary DNS servers.  The=20
> odd traffic
> has increased our bandwidth utilization by about 20 Mbps, which is
> obviously putting a hurting on our network and our DNS servers.
>=20
> I know this must also be affecting other networks, and if anything the
> root servers.  If anyone has any suggestions, etc, they would be much
> appreciated.
>=20
> Thank you,
> Michael Mannella
> Support Team
> Synergy Networks, Inc.
>=20
> Here are the symptoms:
> =
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
>=20
> The odd traffic started with the root servers, namely
> (a-m).gtld-servers.net .  Most of the traffic is still coming=20
> from them,
> but other servers have also started sending us this odd traffic.
>=20
> We have 3 dns servers, only two are being affected, they are=20
> our Primary
> and Secondary servers that are listed with Network Solutions.=20
>  The third
> server (that is not being affected) is not listed with NetSol=20
> and has no
> DNS records setup in it.  It is strictly being used for lookups.
>=20
> The odd traffic is listed as a "DNS Spoof attempt" on our firewall.
>=20
> The odd traffic looks like this:
>=20
> Rcv   192.48.79.30    0cbb  R Q [0084 A     NOERROR]
> (8)=CE=D2=B5=C4=B5=E7=BB=B0(3)COM(0)
> UDP response info at 01ADC8BC
>   Socket =3D 380
>   Remote addr 192.48.79.30, port 53
>   Time Query=3D147367, Queued=3D0, Expire=3D0
>   Buf length =3D 0x0200 (512)
>   Msg length =3D 0x010e (270)
>   Message:
>     XID       0x0cbb
>     Flags     0x8400
>         QR        1 (response)
>         OPCODE    0 (QUERY)
>         AA        1
>         TC        0
>         RD        0
>         RA        0
>         Z         0
>         RCODE     0 (NOERROR)
>     QCOUNT    0x1
>     ACOUNT    0x1
>     NSCOUNT   0xd
>     ARCOUNT   0x0
>     Offset =3D 0x000c, RR count =3D 0
>     Name      "(8)=CE=D2=B5=C4=B5=E7=BB=B0(3)COM(0)"
>       QTYPE   A (1)
>       QCLASS  1
>     ANSWER SECTION:
>     Offset =3D 0x001e, RR count =3D 0
>     Name      "[C00C](8)=CE=D2=B5=C4=B5=E7=BB=B0(3)COM(0)"
>       TYPE   A  (1)
>       CLASS  1
>       TTL    300
>       DLEN   4
>       DATA   198.41.1.35
>     AUTHORITY SECTION:
>     Offset =3D 0x002e, RR count =3D 0
>     Name      "[C015](3)COM(0)"
>       TYPE   NS  (2)
>       CLASS  1
>       TTL    172800
>       DLEN   20
>       DATA   (1)g(12)gtld-servers(3)net(0)
>     Offset =3D 0x004e, RR count =3D 1
>     Name      "[C015](3)COM(0)"
>       TYPE   NS  (2)
>       CLASS  1
>       TTL    172800
>       DLEN   4
>       DATA   (1)h[C03C](12)gtld-servers(3)net(0)
>     Offset =3D 0x005e, RR count =3D 2
>     Name      "[C015](3)COM(0)"
>       TYPE   NS  (2)
>       CLASS  1
>       TTL    172800
>       DLEN   4
>       DATA   (1)d[C03C](12)gtld-servers(3)net(0)
>     Offset =3D 0x006e, RR count =3D 3
>     Name      "[C015](3)COM(0)"
>       TYPE   NS  (2)
>       CLASS  1
>       TTL    172800
>       DLEN   4
>       DATA   (1)j[C03C](12)gtld-servers(3)net(0)
>     Offset =3D 0x007e, RR count =3D 4
>     Name      "[C015](3)COM(0)"
>       TYPE   NS  (2)
>       CLASS  1
>       TTL    172800
>       DLEN   4
>       DATA   (1)i[C03C](12)gtld-servers(3)net(0)
>     Offset =3D 0x008e, RR count =3D 5
>     Name      "[C015](3)COM(0)"
>       TYPE   NS  (2)
>       CLASS  1
>       TTL    172800
>       DLEN   4
>       DATA   (1)l[C03C](12)gtld-servers(3)net(0)
>     Offset =3D 0x009e, RR count =3D 6
>     Name      "[C015](3)COM(0)"
>       TYPE   NS  (2)
>       CLASS  1
>       TTL    172800
>       DLEN   4
>       DATA   (1)b[C03C](12)gtld-servers(3)net(0)
>     Offset =3D 0x00ae, RR count =3D 7
>     Name      "[C015](3)COM(0)"
>       TYPE   NS  (2)
>       CLASS  1
>       TTL    172800
>       DLEN   4
>       DATA   (1)e[C03C](12)gtld-servers(3)net(0)
>     Offset =3D 0x00be, RR count =3D 8
>     Name      "[C015](3)COM(0)"
>       TYPE   NS  (2)
>       CLASS  1
>       TTL    172800
>       DLEN   4
>       DATA   (1)a[C03C](12)gtld-servers(3)net(0)
>     Offset =3D 0x00ce, RR count =3D 9
>     Name      "[C015](3)COM(0)"
>       TYPE   NS  (2)
>       CLASS  1
>       TTL    172800
>       DLEN   4
>       DATA   (1)k[C03C](12)gtld-servers(3)net(0)
>     Offset =3D 0x00de, RR count =3D 10
>     Name      "[C015](3)COM(0)"
>       TYPE   NS  (2)
>       CLASS  1
>       TTL    172800
>       DLEN   4
>       DATA   (1)f[C03C](12)gtld-servers(3)net(0)
>     Offset =3D 0x00ee, RR count =3D 11
>     Name      "[C015](3)COM(0)"
>       TYPE   NS  (2)
>       CLASS  1
>       TTL    172800
>       DLEN   4
>       DATA   (1)c[C03C](12)gtld-servers(3)net(0)
>     Offset =3D 0x00fe, RR count =3D 12
>     Name      "[C015](3)COM(0)"
>       TYPE   NS  (2)
>       CLASS  1
>       TTL    172800
>       DLEN   4
>       DATA   (1)m[C03C](12)gtld-servers(3)net(0)
>     ADDITIONAL SECTION:
>=20
> The DNS server encountered an invalid domain name in a packet from
> 192.48.79.30.  The packet is
> rejected.
>=20
>=20

home help back first fref pref prev next nref lref last post