Date: Sun, 25 Nov 2007 17:05:56 -0800 From: Doug Barton <dougb@FreeBSD.org> To: "Joel V." <joel@smail.ee> Cc: freebsd-hackers@freebsd.org Subject: DNS DDoS Message-ID: <474A1BF4.5060901@FreeBSD.org> In-Reply-To: <003301c82e99$6c099360$0200a8c0@windsor> References: <003301c82e99$6c099360$0200a8c0@windsor>
next in thread | previous in thread | raw e-mail | index | archive | help
Joel V. wrote: > As a lot of people recommended using tcpdump, here it is. The only thing > that stands out, are hundreds and thousands of lines like this: > > 13:45:49.991592 IP 82.165.252.222.36887 > ns1.galandrex.ee.43077: UDP, > length 9216 ... > That IP resolves to u15194704.onlinehome-server.com. Seems to be a german > ISP. After five seconds the capture.out file was already 2.8MB. You can see > the file here: https://89.219.136.126/capture.out Your name server IP is not answering, so I'm guessing here, but it seems to me that you're being used as a reflector for a DNS based DDoS attack. If ns1.galandrex.ee is not authoritative for any domains (i.e., not listed at any registries/registrars as the NS for a domain), you should make sure that it's firewalled off so that the outside world cannot reach it. This type of attack is becoming very common, but fortunately the answer is simple. If you need any help with the DNS side of the equation feel free to contact me directly. Doug -- This .signature sanitized for your protection
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?474A1BF4.5060901>