[44123] in SIPB IPv6

home help back first fref pref prev next nref lref last post

Re: [help.mit.edu #2973238] Exploitable NTP server used for an

daemon@ATHENA.MIT.EDU (Alex Chernyakhovsky)
Tue Sep 16 11:01:30 2014

In-Reply-To: <43BB1AEC-0432-476E-A470-2515E8488084@mit.edu>
Date: Tue, 16 Sep 2014 11:01:27 -0400
From: Alex Chernyakhovsky <achernya@mit.edu>
To: Andrew Munchbach <amunch@mit.edu>
Cc: "sipb-machine-room@mit.edu" <sipb-machine-room@mit.edu>, sipbv6@mit.edu

Hi Andrew,

This appears to be a machine part of the SIPBv6 service, forwarding
this to them. The contact should be sipbv6@mit.edu, not
sipb-machine-room.

Sincerely,
-Alex

On Tue, Sep 16, 2014 at 10:30 AM, Andrew Munchbach <amunch@mit.edu> wrote:
> SIPB,
>
> Could you check your servers and make sure they do not respond to NTP, SN=
MP, DNS, and/or CHARGEN requests that originate from outside our network?
>
> Regards,
> Andrew
> --
> Andrew Munchbach
> Network Security Analyst
> Massachusetts Institute of Technology
> IS&T | Operations & Infrastructure | Security Operations
> amunch@mit.edu
> +1 (617) 324-4571
>
> http://ist.mit.edu/secure
>
> Begin forwarded message:
>
>> From: NFOservers.com DDoS notifier via RT <security@mit.edu>
>> Subject: [help.mit.edu #2973238] Exploitable NTP server used for an atta=
ck: 18.187.1.231
>> Date: September 13, 2014 at 1:29:11 PM EDT
>> To: undisclosed-recipients:;
>> Reply-To: <security@mit.edu>
>>
>>
>> Sat Sep 13 13:29:11 2014: Request 2973238 was acted upon.
>> Transaction: Ticket created by ddos-response@nfoservers.com
>>       Queue: Security
>>     Subject: Exploitable NTP server used for an attack: 18.187.1.231
>>       Owner: Nobody
>>  Requestors: ddos-response@nfoservers.com
>>      Status: new
>> Ticket <URL: https://help.mit.edu/Ticket/Display.html?id=3D2973238 >
>>
>>
>> A public NTP server on your network, running on IP address 18.187.1.231 =
and UDP port 123, participated in a very large-scale attack against a custo=
mer of ours, generating UDP responses to spoofed "monlist" requests that cl=
aimed to be from the attack target.
>>
>> Please consider reconfiguring this NTP server in one or more of these wa=
ys:
>>
>> 1. If you run ntpd, upgrading to the latest version, which removes the "=
monlist" command that is used for these attacks; alternately, disabling the=
 monitoring function by adding "disable monitor" to your /etc/ntp.conf file=
.
>> 2. Setting the NTP installation to act as a client only. With ntpd, that=
 can be done with "restrict default ignore" in /etc/ntp.conf; other daemons=
 should have a similar configuration option. More information on configurin=
g different devices can be found here: https://www.team-cymru.org/ReadingRo=
om/Templates/secure-ntp-template.html.
>> 3. Adjusting your firewall or NTP server configuration so that it only s=
erves your users and does not respond to outside IP addresses.
>>
>> If you don't mean to run a public NTP server, we recommend #1 and #2. If=
 you do mean to run a public NTP server, we recommend #1, and also that you=
 rate-limit responses to individual source IP addresses -- silently discard=
ing those that exceed a low number, such as one request per IP address per =
second. Rate-limit functionality is built into many recently-released NTP d=
aemons, including ntpd, but needs to be enabled; it would help with differe=
nt types of attacks than this one.
>>
>> Fixing open NTP servers is important; with the 1000x+ amplification fact=
or of NTP DRDoS attacks -- one 40-byte-long request can generate up to 4680=
0 bytes worth of response traffic -- it only takes one machine on an unfilt=
ered 100 Mbps link to create a 100+ Gbps attack!
>>
>> If you are an ISP, please also look at your network configuration and ma=
ke sure that you do not allow spoofed traffic (that pretends to be from ext=
ernal IP addresses) to leave the network. Hosts that allow spoofed traffic =
make possible this type of attack.
>>
>> Further reading:
>>
>> https://cert.litnet.lt/en/docs/ntp-distributed-reflection-dos-attacks
>> https://isc.sans.org/forums/diary/NTP+reflection+attack/17300
>> http://www.symantec.com/connect/blogs/hackers-spend-christmas-break-laun=
ching-large-scale-ntp-reflection-attacks
>> http://kb.juniper.net/InfoCenter/index?page=3Dcontent&id=3DJSA10613&smlo=
gin=3Dtrue
>>
>> You can find more vulnerable servers on a network through this site: htt=
p://openntpproject.org/
>>
>> Example NTP responses from the host during this attack are given below.
>> Timestamps (far left) are PDT (UTC-7), and the date is 2014-09-13.
>>
>> 10:27:14.852527 IP 18.187.1.231.123 > 70.42.74.x.29070: NTPv2, Reserved,=
 length 440
>>       0x0000:  4500 01d4 2663 0000 3311 ba0b 12bb 01e7  E...&c..3.......
>>       0x0010:  462a 4adf 007b 718e 01c0 e0d5 d700 032a  F*J..{q........*
>>       0x0020:  0006 0048 0000 0000 0000 0000 0000 0000  ...H............
>>       0x0030:  0000 02d7 462a 4adf 12bb 01e7 0000 0001  ....F*J.........
>>       0x0040:  718e 0702 0000 0000 0000 0000 0000 0000  q...............
>>       0x0050:  0000                                     ..
>> 10:27:14.852570 IP 18.187.1.231.123 > 70.42.74.x.29070: NTPv2, Reserved,=
 length 440
>>       0x0000:  4500 01d4 2664 0000 3311 ba0a 12bb 01e7  E...&d..3.......
>>       0x0010:  462a 4adf 007b 718e 01c0 c86d d701 032a  F*J..{q....m...*
>>       0x0020:  0006 0048 0000 001c 0000 0051 0000 0000  ...H.......Q....
>>       0x0030:  0000 0fcc d59d 5c48 12bb 01e7 0000 0001  ......\H........
>>       0x0040:  31ac 0702 0100 0000 0000 0000 0000 0000  1...............
>>       0x0050:  0000                                     ..
>> 10:27:14.852571 IP 18.187.1.231.123 > 70.42.74.x.29070: NTPv2, Reserved,=
 length 440
>>       0x0000:  4500 01d4 2665 0000 3311 ba09 12bb 01e7  E...&e..3.......
>>       0x0010:  462a 4adf 007b 718e 01c0 7fb3 d702 032a  F*J..{q........*
>>       0x0020:  0006 0048 0000 0001 0000 14ae 0000 0000  ...H............
>>       0x0030:  0000 00ef 2e69 c7e3 12bb 01e7 0000 0001  .....i..........
>>       0x0040:  1775 0702 0000 0000 0000 0000 0000 0000  .u..............
>>       0x0050:  0000                                     ..
>> 10:27:14.852638 IP 18.187.1.231.123 > 70.42.74.x.29070: NTPv2, Reserved,=
 length 440
>>       0x0000:  4500 01d4 2666 0000 3311 ba08 12bb 01e7  E...&f..3.......
>>       0x0010:  462a 4adf 007b 718e 01c0 ef2f d703 032a  F*J..{q..../...*
>>       0x0020:  0006 0048 0000 0000 0000 269a 0000 0000  ...H......&.....
>>       0x0030:  0000 000d 6d40 0b33 12bb 01e7 0000 0001  ....m@.3........
>>       0x0040:  6986 0702 0000 0000 0000 0000 0000 0000  i...............
>>       0x0050:  0000                                     ..
>> 10:27:14.852645 IP 18.187.1.231.123 > 70.42.74.x.29070: NTPv2, Reserved,=
 length 440
>>       0x0000:  4500 01d4 2667 0000 3311 ba07 12bb 01e7  E...&g..3.......
>>       0x0010:  462a 4adf 007b 718e 01c0 dd8f d704 032a  F*J..{q........*
>>       0x0020:  0006 0048 0000 0000 0000 27fc 0000 0000  ...H......'.....
>>       0x0030:  0000 0980 b27b fa5f 12bb 01e7 0000 0001  .....{._........
>>       0x0040:  0050 0702 0000 0000 0000 0000 0000 0000  .P..............
>>       0x0050:  0000                                     ..
>> 10:27:14.852679 IP 18.187.1.231.123 > 70.42.74.x.29070: NTPv2, Reserved,=
 length 440
>>       0x0000:  4500 01d4 2668 0000 3311 ba06 12bb 01e7  E...&h..3.......
>>       0x0010:  462a 4adf 007b 718e 01c0 52e3 d705 032a  F*J..{q...R....*
>>       0x0020:  0006 0048 0000 0000 0000 2bfd 0000 0000  ...H......+.....
>>       0x0030:  0000 0473 545e d566 12bb 01e7 0000 0001  ...sT^.f........
>>       0x0040:  0050 0702 0000 0000 0000 0000 0000 0000  .P..............
>>       0x0050:  0000                                     ..
>>
>>
>> (The final octet of our customer's IP address is masked in the above out=
put because some automatic parsers become confused when multiple IP address=
es are included. The value of that octet is "223".)
>>
>> -John
>> President
>> Nuclearfallout, Enterprises, Inc. (NFOservers.com)
>>
>> (We're sending out so many of these notices, and seeing so many auto-res=
ponses, that we can't go through this email inbox effectively. If you have =
follow-up questions, please contact us at noc@nfoe.net.)
>>
>>
>

home help back first fref pref prev next nref lref last post