Re: ICMP/SYN Flood

From: CTA (dnsadminat_private)
Date: Thu May 22 2003 - 12:31:55 PDT

  • Next message: Stephen P. Berry: "Re: A question for the list..."

    Looks like your ISP has an open router. If its a CISCO be sure 
    that they have the basics set:
    
    no ip directed-broadcast
    no ip source-route
    no cdp running
    no cdp enable
    no service tcp-small-servers
    no service udp-small-servers
    no service finger
    no ip bootp server
    no ip http server
    
    Also, they should have basic Anti-Spoofing Access List Filter 
    set to drop and log, and Ingress Filters to stop untrusted 
    internal hosts.
    
    
    On 22 May 2003, at 7:47, Muhammad Naseer Bhatti wrote:
    
    > Hi list ..
    > 
    > I am experiencing a bad DDoS attack toward one of my server. The attack is
    > pointed to only 1 IP on which a governmental site is hosted. Seems some
    > folks don't like the site to stay up. As far as the Server (Linux) security
    > is concerned, I am able to make that up serving all requests without any
    > hesitation. My network with which I am connected to is poorly configured and
    > allowing the DDoS attack to pass thru their routers. I am getting two kind
    > of attacks here:
    > 
    > - ICMP Flood
    >         Simple ICMP flood from various spoofed hosts. This I know can be
    > blocked on the router for the particular IP. Unfortunately the network guys
    > are still not able to do that.
    > 
    > - SYN Flood
    >         Interesting thing. Loots of SYN requests from these kind of
    > network/broadcasts towards port 80 only.
    > 
    > 37.72.0.0
    > 128.89.0.0
    > 173.66.0.0
    > 37.155.0.0
    > 177.225.0.0
    > 37.94.0.0
    > 36.162.0.0
    > 117.77.0.0
    > 151.162.0.0
    > 36.216.0.0
    > 134.248.0.0
    > 175.129.0.0
    > 
    > And the list goes oon .. The question I want to ask here, is the
    > network/router poorly configured at my NOC which is allowing
    > broadcasts/networks to pass through it? If so, how can I assist them to fix
    > it? I am not a Cisco guru, so might need someone to give me some hints so
    > that I can pass that to the poor NOC techs.
    > 
    > Any help would be appreciated.
    > 
    > 
    > Thanks,
    > 
    > Muhammad Naseer
    > 
    
    -
    
    -
    ****************************************************
    Bernie 
    Chief Technology Architect
    Chief Security Officer
    ctaat_private
    Euclidean Systems, Inc.
    *******************************************************
    // "There is no expedient to which a man will not go 
    //    to avoid the pure labor of honest thinking."   
    //     Honest thought, the real business capital.    
    //      Observe> Think> Plan> Think> Do> Think>      
    *******************************************************
    
    
    ----------------------------------------------------------------------------
    *** Wireless LAN Policies for Security & Management - NEW White Paper ***
    Just like wired networks, wireless LANs require network security policies 
    that are enforced to protect WLANs from known vulnerabilities and threats. 
    Learn to design, implement and enforce WLAN security policies to lockdown enterprise WLANs.
    
    To get your FREE white paper visit us at:    
    http://www.securityfocus.com/AirDefense-incidents
    ----------------------------------------------------------------------------
    



    This archive was generated by hypermail 2b30 : Fri May 23 2003 - 11:27:50 PDT