[nsp-sec] ddos against amazon ec2 customer
Joel Rosenblatt
joel at columbia.edu
Wed Mar 3 10:08:51 EST 2010
Donald,
I'm have our network people check .. I don't have access to that info .. they should be coming in from Level 3 - I'll let you know as soon as I find out.
Thanks,
Joel
--On Wednesday, March 03, 2010 7:54 AM -0700 "Smith, Donald" <Donald.Smith at qwest.com> wrote:
> Joel, do you also get interface indexes in your netflow?
> If so can you check to see if these are coming in the "expected" interface?
>
>
> (coffee != sleep) & (!coffee == sleep)
> Donald.Smith at qwest.com<mailto:Donald.Smith at qwest.com>
> ________________________________
> From: nsp-security-bounces at puck.nether.net [nsp-security-bounces at puck.nether.net] On Behalf Of Joel Rosenblatt [joel at columbia.edu]
> Sent: Wednesday, March 03, 2010 7:40 AM
> To: Dave Burke
> Cc: nsp-security at puck.nether.net
> Subject: Re: [nsp-sec] ddos against amazon ec2 customer
>
> ----------- nsp-security Confidential --------
>
> Hi,
>
> I don't see flows toward them, but I'm seeing flows from one of them (last 5 minutes)
>
> Joel
>
> Calling flowdumper with the following filter:
> filter-primitive general-ip
> type ip-address-prefix
> permit 184.73.22.252/32
> permit 184.72.3.89/32
> permit 184.72.1.208/32
> permit 204.236.183.133/32
>
> filter-definition snoopy
> match ip-source-address general-ip
> or
> match ip-destination-address general-ipRunning the following files through the filter:
> /hmt/sirius1/netflow/flows/saved//ft-v05.2010-03-03.093000-0500
>
>
> --------------------------------------------------------------------------------
>
> For all non-ICMP traffic, output is
>
>
> date time srcip.srcport -> dstip.dstport protocol packets bytes
>
> --------------------------------------------------------------------------------
>
> 2010/03/03 09:29:24 204.236.183.133.53 -> 156.111.189.104.28893 17 1 198
> 2010/03/03 09:29:24 204.236.183.133.53 -> 156.111.189.110.30429 17 1 198
> 2010/03/03 09:29:24 204.236.183.133.53 -> 156.111.189.147.39901 17 1 198
> 2010/03/03 09:29:24 204.236.183.133.53 -> 156.111.189.151.40925 17 1 198
> 2010/03/03 09:29:24 204.236.183.133.53 -> 156.111.189.152.41181 17 1 198
> 2010/03/03 09:29:24 204.236.183.133.53 -> 156.111.189.153.41437 17 1 198
> 2010/03/03 09:29:24 204.236.183.133.53 -> 156.111.189.161.43485 17 1 198
> 2010/03/03 09:29:24 204.236.183.133.53 -> 156.111.189.187.50141 17 1 198
> 2010/03/03 09:29:24 204.236.183.133.53 -> 156.111.189.20.7389 17 1 198
> 2010/03/03 09:29:24 204.236.183.133.53 -> 156.111.189.30.9949 17 1 198
> 2010/03/03 09:29:24 204.236.183.133.53 -> 156.111.189.72.20701 17 1 198
> 2010/03/03 09:29:44 204.236.183.133.53 -> 156.111.77.47.12957 17 1 198
> 2010/03/03 09:29:55 204.236.183.133.53 -> 128.59.154.161.4480 17 1 198
> 2010/03/03 09:29:55 204.236.183.133.53 -> 128.59.154.207.16256 17 1 198
> 2010/03/03 09:29:55 204.236.183.133.53 -> 128.59.154.31.36735 17 1 198
> 2010/03/03 09:29:55 204.236.183.133.53 -> 128.59.154.53.42367 17 1 198
> 2010/03/03 09:29:56 204.236.183.133.53 -> 128.59.154.180.9344 17 1 198
> 2010/03/03 09:29:56 204.236.183.133.53 -> 128.59.154.183.10112 17 1 198
> 2010/03/03 09:29:56 204.236.183.133.53 -> 128.59.154.242.25216 17 1 198
> 2010/03/03 09:29:56 204.236.183.133.53 -> 128.59.154.37.38271 17 1 198
> 2010/03/03 09:29:56 204.236.183.133.53 -> 128.59.154.51.41855 17 1 198
> 2010/03/03 09:32:11 204.236.183.133.53 -> 156.111.194.132.36121 17 1 198
> 2010/03/03 09:32:11 204.236.183.133.53 -> 156.111.194.208.55577 17 1 198
> 2010/03/03 09:32:11 204.236.183.133.53 -> 156.111.194.64.18713 17 1 198
> 2010/03/03 09:32:12 204.236.183.133.53 -> 156.111.227.138.38053 17 1 198
> 2010/03/03 09:32:12 204.236.183.133.53 -> 156.111.227.221.59301 17 1 198
> 2010/03/03 09:32:12 204.236.183.133.53 -> 156.111.227.233.62373 17 1 198
> 2010/03/03 09:32:12 204.236.183.133.53 -> 156.111.227.239.63909 17 1 198
> 2010/03/03 09:32:12 204.236.183.133.53 -> 156.111.227.58.17573 17 1 198
>
>
> --On Wednesday, March 03, 2010 12:24 PM +0000 Dave Burke <dave at amazon.com> wrote:
>
>> ----------- nsp-security Confidential --------
>>
>> -----BEGIN PGP SIGNED MESSAGE-----
>> Hash: SHA1
>>
>> Hi,
>>
>> We currently have a customer getting hit with a large DDoS attack.
>> Can you please check if you have flows towards ..
>>
>> 184.73.22.252 ( Eastern USA, Syn Flood)
>> 184.72.3.89 ( Northern California, Syn Flood )
>> 184.72.1.208 ( Northern California, UDP/53 Flood )
>> 204.236.183.133 ( Nortern California, UDP/53 Flood )
>>
>> The Syn flood pkt lengths are really nice round numbers (950/850/450/650
>> bytes). The majority of the source IPs are associated with China.
>>
>> The attacks started about 09:54:19UTC this morning and are still ongoing.
>>
>> If you go have flows towards those IPs, please drop the traffic on the
>> floor towards them for a few hours.
>>
>> Sample srcIPs..
>> 4134 | 121.12.168.249 | CHINANET-BACKBONE No.31,Jin-rong Street
>> 4134 | 121.12.170.24 | CHINANET-BACKBONE No.31,Jin-rong Street
>> 4134 | 121.12.170.59 | CHINANET-BACKBONE No.31,Jin-rong Street
>> 4134 | 121.12.174.177 | CHINANET-BACKBONE No.31,Jin-rong Street
>> 4134 | 121.12.174.36 | CHINANET-BACKBONE No.31,Jin-rong Street
>> 4134 | 122.224.33.106 | CHINANET-BACKBONE No.31,Jin-rong Street
>> 4134 | 122.224.33.156 | CHINANET-BACKBONE No.31,Jin-rong Street
>> 4134 | 122.224.33.69 | CHINANET-BACKBONE No.31,Jin-rong Street
>> 4134 | 122.224.33.70 | CHINANET-BACKBONE No.31,Jin-rong Street
>> 4134 | 122.224.33.81 | CHINANET-BACKBONE No.31,Jin-rong Street
>> 4134 | 122.224.33.90 | CHINANET-BACKBONE No.31,Jin-rong Street
>> 4134 | 122.224.33.93 | CHINANET-BACKBONE No.31,Jin-rong Street
>> 4134 | 124.232.142.72 | CHINANET-BACKBONE No.31,Jin-rong Street
>> 4134 | 124.232.143.169 | CHINANET-BACKBONE No.31,Jin-rong Street
>> 4134 | 125.64.17.229 | CHINANET-BACKBONE No.31,Jin-rong Street
>> 4134 | 125.64.34.84 | CHINANET-BACKBONE No.31,Jin-rong Street
>> 4134 | 218.22.112.16 | CHINANET-BACKBONE No.31,Jin-rong Street
>> 4134 | 218.22.143.25 | CHINANET-BACKBONE No.31,Jin-rong Street
>> 4134 | 218.5.203.247 | CHINANET-BACKBONE No.31,Jin-rong Street
>> 4134 | 221.236.5.136 | CHINANET-BACKBONE No.31,Jin-rong Street
>> 4134 | 222.85.146.6 | CHINANET-BACKBONE No.31,Jin-rong Street
>> 4134 | 60.169.10.111 | CHINANET-BACKBONE No.31,Jin-rong Street
>> 4134 | 60.169.10.239 | CHINANET-BACKBONE No.31,Jin-rong Street
>> 4134 | 60.169.10.37 | CHINANET-BACKBONE No.31,Jin-rong Street
>> 4134 | 60.169.10.73 | CHINANET-BACKBONE No.31,Jin-rong Street
>> 4134 | 60.191.240.132 | CHINANET-BACKBONE No.31,Jin-rong Street
>> 4134 | 61.139.68.1 | CHINANET-BACKBONE No.31,Jin-rong Street
>> 4134 | 61.191.60.170 | CHINANET-BACKBONE No.31,Jin-rong Street
>> 4134 | 61.191.61.153 | CHINANET-BACKBONE No.31,Jin-rong Street
>> 4134 | 61.191.62.114 | CHINANET-BACKBONE No.31,Jin-rong Street
>> 4837 | 221.208.255.229 | CHINA169-BACKBONE CNCGROUP China169 Backbone
>> 17633 | 58.57.6.88 | CHINATELECOM-SD-AS-AP ASN for Shandong
>> Provincial Net of CT
>>
>>
>>
>> thanks!
>> dave
>> -----BEGIN PGP SIGNATURE-----
>> Version: GnuPG/MacGPG2 v2.0.14 (Darwin)
>> Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
>>
>> iEYEARECAAYFAkuOVRkACgkQvMJ1IGjTxcEEPQCgy0Kj2U+C0dMe0AqoKA2wuHlf
>> fhEAoKjHXJw4z6YzKikx+oK3DuZ3P428
>> =pjIZ
>> -----END PGP SIGNATURE-----
>>
>>
>>
>> Amazon Data Services Ireland Limited registered office: Riverside One, Sir John Rogerson's Quay, Dublin 2, Ireland. Registered in Ireland. Registration
>> number 390566.
>>
>>
>>
>>
>> _______________________________________________
>> nsp-security mailing list
>> nsp-security at puck.nether.net
>> https://puck.nether.net/mailman/listinfo/nsp-security
>>
>> Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
>> community. Confidentiality is essential for effective Internet security counter-measures.
>> _______________________________________________
>>
>
>
>
> Joel Rosenblatt, Manager Network & Computer Security
> Columbia Information Security Office (CISO)
> Columbia University, 612 W 115th Street, NY, NY 10025 / 212 854 3033
> http://www.columbia.edu/~joel
>
>
>
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
>
> Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
> community. Confidentiality is essential for effective Internet security counter-measures.
> _______________________________________________
>
> ________________________________
> This communication is the property of Qwest and may contain confidential or
> privileged information. Unauthorized use of this communication is strictly
> prohibited and may be unlawful. If you have received this communication
> in error, please immediately notify the sender by reply e-mail and destroy
> all copies of the communication and any attachments.
>
Joel Rosenblatt, Manager Network & Computer Security
Columbia Information Security Office (CISO)
Columbia University, 612 W 115th Street, NY, NY 10025 / 212 854 3033
http://www.columbia.edu/~joel
More information about the nsp-security
mailing list