[nsp-sec] TCP Flood to 2.1.4.245

Rob Shakir rjs at eng.gxn.net
Wed Nov 18 12:24:39 EST 2009


Hi nsp-sec,

This afternoon we saw some odd traffic towards one of the RIPE NCC's  
de-bogonising prefixes (2.1.0.0/21), and in particular 2.1.4.245/32  
within this. The traffic looked to be from spoofed sequential sources,  
and was 650 byte TCP packets with randomised source and destination  
ports (approximately uniform distribution of src/dst port pairs).

We mitigated this by ceasing to transit _12654_ at the current time --  
however, I'd be very interest if anyone else saw similar traffic, and  
if there are any pointers to the sources. We saw this attack ingress  
over our upstream providers.

I haven't managed to speak to anyone at RIPE about what they saw yet,  
but am happy to assist with any debug if anyone else is pursuing this.

Kind regards,
Rob


-- 
Rob Shakir                      <rjs at eng.gxn.net>
Network Development Engineer    GX Networks/Vialtus Solutions
ddi: +44208 587 6077            mob: +44797 155 4098
pgp: 0xc07e6deb                 nic-hdl: RJS-RIPE

This email is subject to: http://www.vialtus.com/disclaimer.html






More information about the nsp-security mailing list