[nsp-sec] High DNS load in germany
P.Quick at telekom.de
P.Quick at telekom.de
Thu Jan 7 14:01:15 EST 2010
Hi Gerard,
Many thanks for your quick response.
> I noticed that 90% of our DNS calls to your specific
> boxes @ dns01.btx.dtag.de & dns04.btx.dtag.de are for
> Domain Name Pointer (in-addr.arpa) queries.
I don't have the full picture jet .. But it looks like
the problem is only related to a hugh number of
Domain Name Pointer (in-addr.arpa) queries.
But in the moment it's look like, these queries don't
come from other DNS only. We see a lot of different sources.
BTW: we have a problem with a new malware distribution here.
(distributet via email).
Maybe this is related together.
Many thanks again....
Greetings,
Peter
-----Ursprüngliche Nachricht-----
Von: White, Gerard [mailto:Gerard.White at bellaliant.ca]
Gesendet: Donnerstag, 7. Januar 2010 19:21
An: Quick, Peter; nsp-security at puck.nether.net
Betreff: RE: [nsp-sec] High DNS load in germany
Greetings Peter.
Upon taking a quick sampling across all our DNS Infrastructure, I noticed that 90% of our DNS calls to your specific
boxes @ dns01.btx.dtag.de & dns04.btx.dtag.de are for Domain Name Pointer (in-addr.arpa) queries.
Although I haven't validated if the IPv4 addresses inside the queries are for your specific IP Space allotments,
could there be a possibility that your customer base is after getting hit with something - hence triggering
the large amount of in-addr.arpa queries from our DNS users?
GW
855 - Bell Aliant
-----Original Message-----
From: nsp-security-bounces at puck.nether.net [mailto:nsp-security-bounces at puck.nether.net] On Behalf Of P.Quick at telekom.de
Sent: January-07-10 2:24 PM
To: nsp-security at puck.nether.net
Subject: [nsp-sec] High DNS load in germany
----------- nsp-security Confidential --------
Hello nsp-sec,
During the last days, there are a lot of reports, that serveral german ISPs
have massiv problems with their DNS systems.
Major outages were reportet (eg. 1und1, InterntX, schlund,)
example: http://www.h-online.com/security/news/item/Attack-on-InterNetX-s-DNS-servers-898190.html
Since yesterday we also monitor a 500% increase of traffic
towards our authorised DNS. (till now we don't have any customer impact)
(mostly against dns01.btx.dtag.de and dns04.btx.dtag.de).
The hugh traffic is only temporary and from serveral sources all over the world.
I have tried to find some information, what coulde be the reason for this big
traffic increas.
Because of this i found the statistic-site from DENIC, about the
performace of the k-root-server of the DENIC.
http://k.root-servers.org/statistics/ROOT/recursion.html
There you can also seen an hugh increas of Recursion Requests since december.
(about 700%, also only temporary)
Does anybony see the same traffic-increase and does anybody know
whats the reason for that ?
In the moment i try to get in contact to other german ISP.
But my personal contacts didn't responde since now.
So if anybody from 1und1, schlund, InterntX ... is on the list
and is interest in sharing some information about this issue,
feel free to contact me offline.
Greetings,
Peter Quick
Deutsche Telekom AG
Service Zentrale, Group IT Security
Peter Quick
SZT-1
Karl-Lange Strasse 29, 44791 Bochum
+49 234 505 7800 (Tel.)
+49 2151 3660 4770 (Fax)
+49 160 7083944 (Mobil)
E-Mail: p.quick at telekom.de
http://www.telekom.com
Erleben, was verbindet.
Deutsche Telekom AG
Aufsichtsrat: Prof. Dr. Ulrich Lehner (Vorsitzender)
Vorstand: René Obermann (Vorsitzender),
Hamid Akhavan, Dr. Manfred Balz, Reinhard Clemens, Niek Jan van Damme,
Timotheus Höttges, Guido Kerkhoff, Thomas Sattelberger
Handelsregister: Amtsgericht Bonn HRB 6794
Sitz der Gesellschaft: Bonn
WEEE-Reg.-Nr.: DE50478376
_______________________________________________
nsp-security mailing list
nsp-security at puck.nether.net
https://puck.nether.net/mailman/listinfo/nsp-security
Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
community. Confidentiality is essential for effective Internet security counter-measures.
_______________________________________________
More information about the nsp-security
mailing list