On Tue, 2009-01-20 at 14:55 -0600, Todd T. Fries forwarded:
>  From: ISPrime Support <supp...@isprime.com>
>  These are the result of a spoofed dns recursion attack against our servers. 
> The actual packets in question (the ones reaching your servers) do NOT 
> originate from our network as such there is no way for us to filter things 
> from our end.
>  If you are receiving queries from 76.9.31.42/76.9.16.171 neither of these 
> machines make legitimate outbound dns requests so an inbound filter of 
> packets to udp/53 from either of these two sources is perfect.
>  If you are receiving queries from 66.230.128.15/66.230.160.1 these servers 
> are authoritative nameservers. Please do not blackhole either of these IPs as 
> they host many domains. However, these IPs do not make outbound DNS requests 
> so filtering requests to your IPs from these ips with a destination port of 
> 53 should block any illegitimate requests.

I've been seeing a lot of noise from the latter two addresses after
switching on query logging (and finishing an application of Team Cymru's
excellent template) so I decided to DROP traffic from the addresses
(with source port != 53) at the hosts in question.

Well, blow me down if they didn't completely stop talking to me. Four
dropped packets each, and they've gone away.

Something smells "not quite right" here - if the traffic is spoofed, and
my "Refused" responses have been flying right back to the *real* IP
addresses, how are the spoofing hosts to know that I'm dropping the
traffic?

Even if I used a REJECT policy, I'd expect the ICMP messages to go back
to the appropriate - as in real - hosts, rather than the spoofing
sources.

Something here is very odd, very odd indeed... or I'm being dumb. It's
happened before.

Graeme


Reply via email to