[nsp-sec] CW ip doing some very weird DNS DDOS?

Smith, Donald Donald.Smith at CenturyLink.com
Mon Oct 24 13:37:10 EDT 2011



TTL==49 hop count from a system in our network was 12 so initial ttl was probably 64.
Very few current IP stacks would use a ITTL that low. Win95 did, some old UNIX versions did.

The flags are 23456789ABCDE are used by some windows for the content of echo requests but are invalid from a dns pov so it is not a reflective attack (at least I don't think it is).

It didn't reply to a dns query I sent it so it's not an open dns resolver.

It's a cable and wireless ip behind one of their bras.

10  alandick-brs-gw.lnt.mrs.cw.net (195.2.23.2)  116.150 ms  113.820 ms  113.678  ms
11  195.59.50.2 (195.59.50.2)  115.344 ms  115.537 ms  115.430 ms
12  195.59.50.107 (195.59.50.107)  115.249 ms  115.469 ms  115.187 ms

It was causing 8000 errors per second so we dropped this IP into a blacklist on our dns resolvers.
But something is definetly up and weird about that ip :(



"Pampers use multiple layers of protection to prevent leakage.
Rommel used defense in depth to defend European fortresses." (A.White)
Donald.Smith at CenturyLink.com



This communication is the property of CenturyLink and may contain confidential or privileged information. Unauthorized use of this communication is strictly
prohibited and may be unlawful.  If you have received this communication
in error, please immediately notify the sender by reply e-mail and destroy
all copies of the communication and any attachments.




More information about the nsp-security mailing list