[60536] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: How much longer..

daemon@ATHENA.MIT.EDU (Matthew Sullivan)
Wed Aug 13 17:48:12 2003

Date: Thu, 14 Aug 2003 07:46:09 +1000
From: Matthew Sullivan <matthew@sorbs.net>
To: nanog@merit.edu
In-Reply-To: <20030813170715.GC10568@netsys.com>
Errors-To: owner-nanog-outgoing@merit.edu


Len Rose wrote:

>How much longer will people put up with the millions of 
>dollars of losses in time, resources and service inflicted 
>on the net by the joke vulnerabilities in the toy operating 
>system known as Windows? Enough is Enough.
>
>Sure, let's just filter everything..all service providers
>please become M$'s virtual firewall now please.
>
>Haven't you windows lamers learned anything yet?
>  
>
You could of course just filter spoofed traffic, which would then stop a
lot of the DDoS attack that I'm suffering with.

For the second time in 2 weeks, 2 of my IPs have been null routed at the
USA -> Australia  International links because of a massive DDoS attack.

If anyone is seeing traffic directed at: 203.15.51.34 203.15.51.44 or
216.168.20.77 and 216.168.20.77 (the latter 2 not being my hosts but
seeing DDoS traffic as well) you might be well advise to
shutdown/disconnect the machines as they are likely hacked and/or trojaned.

Last attack was a mixture of SYN flood (which has virtually no effect
here), 1k packets  UDP send at a high volume from distributed machines
all aimed at ports arounf 1024.  ICMP echo floods, and bogus DNS
requests from hosts with the IP: 'x.x.0.0'

Obviously some of the floods are not using sppoofed addresses, but I am
really at a loss to see why I see _any_ spoofed traffic, I would have
expected ISPs out there to be filtering traffic not from their networks
by default nowadays.  I must just be nieve.

Yours

Mat




home help back first fref pref prev next nref lref last post