[nsp-sec] UDP 7100 Increase?

claude.labbe at bell.ca claude.labbe at bell.ca
Tue Mar 4 14:35:53 EST 2008



 
Hi,

I have the same proportion in my flow records, with about 10% 
of 80/tcp & 7100/tcp flows mixed in with the majority of 7100/udp
reaching mostly dsl customers on ports in the 60k-65k range

Regards


-----Original Message-----
From: nsp-security-bounces at puck.nether.net
[mailto:nsp-security-bounces at puck.nether.net] On Behalf Of Smith, Donald
Sent: March 4, 2008 1:46 PM
To: Neil Long; NSP nsp-security
Subject: Re: [nsp-sec] UDP 7100 Increase?

----------- nsp-security Confidential --------

The 7100 <-> 7100 traffic is interesting.

The vast majority of the packets are 104 in length however a fair number
of them are 1144 long.
Out of 215,121 total 7100 <-> 7100 records I see the following.
bytes records
104 = 86,799 records
1144 = 38,912
208 = 5,739 (2 instances of 104)
2288 = 4,799 (2 instances of 1144)
312 = 1279 (3x104)
3432 = 989 (3x1144)

RM=for(1)
{manage_risk(identify_risk(product[i++]) &&
(identify_threat[product[i++]))}
Donald.Smith at qwest.com giac 

> -----Original Message-----
> From: nsp-security-bounces at puck.nether.net 
> [mailto:nsp-security-bounces at puck.nether.net] On Behalf Of Neil Long
> Sent: Tuesday, March 04, 2008 11:16 AM
> To: NSP nsp-security
> Subject: Re: [nsp-sec] UDP 7100 Increase?
> 
> ----------- nsp-security Confidential --------
> 
> Hi
> 
> Very odd and slightly ominous increases. Darknets can grab udp data  
> segments of course via tcpdump.
> 
> The darknet collectors saw a lot of this starting yetserday -  all  
> 76byte data segments (but with a 32byte "string" e.g.  
> "FE893F2BD50B21AE6CE96F9AD1669564".
> 
> Some have srcport=dstport but by no means all and some srcIP packets  
> have a fixed srcport while other sequences are incrementing srcport.
> 
> There is almost a unique string per srcIP but looking more closely I  
> see the data change even though it is targeting the same /24.
> 
> The change seems to be more closely related to the timestamp 
> i.e. the  
> packets are going out in bursts which don't always cover the full /24
> 
> Fairly weird but 32bytes seems way too small to be a payload?? P2p?
> 
> regards
> Neil
> 
> 
> 
> 
> On 4 Mar 2008, at 17:45, <claude.labbe at bell.ca>  
> <claude.labbe at bell.ca> wrote:
> 
> > ----------- nsp-security Confidential --------
> >
> >
> >
> >
> >   Hi,
> >
> > We are seeing 5 to 6 times the usual traffic since Feb 24th
> > will try to get more details on this in the next couple of hours
> >
> > Regards
> >
> > -----Original Message-----
> > From: nsp-security-bounces at puck.nether.net
> > [mailto:nsp-security-bounces at puck.nether.net] On Behalf Of
> > Matthew.Swaar at us-cert.gov
> > Sent: March 3, 2008 10:12 PM
> > To: nsp-security at puck.nether.net
> > Subject: [nsp-sec] UDP 7100 Increase?
> >
> > ----------- nsp-security Confidential --------
> >
> >
> > Anyone seeing a UDP-7100 traffic increase?  If so, does anyone know
> > what's causing it?
> >
> > My historical flowdata shows that traffic increased from ~4 
> flows per
> > day to 1,072,861 on 3 March.  What's troubling, is that I logged  
> > over 6k
> > unique sources.  I first thought that it might be a DDoS against  
> > one or
> > more customers, but SANS port charts are showing some 
> recent volatile
> > activity, too.  (http://www.incidents.org/port.html?port=7100
> > <http://www.incidents.org/port.html?port=7100> )
> >
> > Here's the breakout for the (inbound) flows I show for 
> March 3rd - 4th
> > GMT:
> >
> >                Date|          Records|                Bytes|
> > Packets|
> > 2008/03/03T00:00:00|            20.00|              3419.00|
> > 20.00|
> > 2008/03/03T01:00:00|            20.00|              3460.00|
> > 21.00|
> > 2008/03/03T02:00:00|            16.00|              2376.00|
> > 16.00|
> > 2008/03/03T03:00:00|            19.00|              3151.00|
> > 19.00|
> > 2008/03/03T04:00:00|         46794.00|           6641566.00|
> > 63803.00|
> > 2008/03/03T05:00:00|         43807.00|           6295043.00|
> > 60467.00|
> > 2008/03/03T06:00:00|            32.00|              4947.00|
> > 37.00|
> > 2008/03/03T07:00:00|         51664.00|           7380310.00|
> > 70930.00|
> > 2008/03/03T08:00:00|         96702.00|          13909022.00|
> > 133478.00|
> > 2008/03/03T09:00:00|           245.00|             36531.00|
> > 342.00|
> > 2008/03/03T10:00:00|            24.00|              3518.00|
> > 24.00|
> > 2008/03/03T11:00:00|        127143.00|          18289175.00|
> > 175324.00|
> > 2008/03/03T12:00:00|         28062.00|           4024740.00|
> > 38661.00|
> > 2008/03/03T13:00:00|        248105.00|          36357095.00|
> > 347733.00|
> > 2008/03/03T14:00:00|        341644.00|          50365557.00|
> > 483065.00|
> > 2008/03/03T15:00:00|           989.00|            147064.00|
> > 1396.00|
> > 2008/03/03T16:00:00|            41.00|              7851.00|
> > 42.00|
> > 2008/03/03T17:00:00|        112995.00|          16194471.00|
> > 155000.00|
> > 2008/03/03T18:00:00|           177.00|             24751.00|
> > 221.00|
> > 2008/03/03T19:00:00|            37.00|              7942.00|
> > 39.00|
> > 2008/03/03T20:00:00|            34.00|              5587.00|
> > 34.00|
> > 2008/03/03T21:00:00|            35.00|              6553.00|
> > 37.00|
> > 2008/03/03T22:00:00|            23.00|              3402.00|
> > 23.00|
> > 2008/03/03T23:00:00|         70267.00|          10319436.00|
> > 99170.00|
> > 2008/03/04T00:00:00|            22.00|              3212.00|
> > 26.00|
> > 2008/03/04T01:00:00|            25.00|              4340.00|
> > 25.00|
> > 2008/03/04T02:00:00|            15.00|              2272.00|
> > 15.00|
> > 2008/03/04T03:00:00|             1.00|               121.00|
> > 1.00|
> >
> > The above certainly doesn't resemble the traffic patterns I've  
> > observed
> > in the past during worm outbreaks.  Looked at with a different  
> > bias, the
> > above numbers originated from over 6k+ unique sources (possibly  
> > spoofed)
> > and targeted over 500k unique destination IPs, so it doesn't look  
> > like a
> > DDoS either.
> >
> > This port went from being invisible to being #14 on my top 
> 20, and I'm
> > wondering 'why'.
> >
> > More details:  The traffic seems to be UDP sport 7100 to dport  
> > 7100, 104
> > bytes per packet.  (My flowdata includes the header size, which I  
> > think
> > is 28 bytes, so you may see this as 76 bytes per packet.)
> >
> >
> > Matt Swaar
> > US-CERT Analyst
> >
> >
> > _______________________________________________
> > nsp-security mailing list
> > nsp-security at puck.nether.net
> > https://puck.nether.net/mailman/listinfo/nsp-security
> >
> > Please do not Forward, CC, or BCC this E-mail outside of the
> > nsp-security
> > community. Confidentiality is essential for effective Internet  
> > security
> > counter-measures.
> > _______________________________________________
> >
> >
> > _______________________________________________
> > nsp-security mailing list
> > nsp-security at puck.nether.net
> > https://puck.nether.net/mailman/listinfo/nsp-security
> >
> > Please do not Forward, CC, or BCC this E-mail outside of the nsp- 
> > security
> > community. Confidentiality is essential for effective Internet  
> > security counter-measures.
> > _______________________________________________
> >
> 
> --
> Neil Long, Team Cymru
> http://www.cymru.com | +1 312 924 4022 | neil at cymru.com
> 
> 
> 
> 
> 
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
> 
> Please do not Forward, CC, or BCC this E-mail outside of the 
> nsp-security
> community. Confidentiality is essential for effective 
> Internet security counter-measures.
> _______________________________________________
> 
> 


This communication is the property of Qwest and may contain confidential
or
privileged information. Unauthorized use of this communication is
strictly 
prohibited and may be unlawful.  If you have received this communication

in error, please immediately notify the sender by reply e-mail and
destroy 
all copies of the communication and any attachments.


_______________________________________________
nsp-security mailing list
nsp-security at puck.nether.net
https://puck.nether.net/mailman/listinfo/nsp-security

Please do not Forward, CC, or BCC this E-mail outside of the
nsp-security
community. Confidentiality is essential for effective Internet security
counter-measures.
_______________________________________________



More information about the nsp-security mailing list