nanog mailing list archives

Re: really nasty attacks


From: Jared Mauch <jared () puck nether net>
Date: Thu, 27 Sep 2012 11:21:06 -0400


On Sep 27, 2012, at 10:55 AM, Miguel Mata wrote:

Guys,

on recent days I've seen an UDP attack a couple of times. The attack is fairly simple, a full 
load of UDP packets filled with "X". The attacks comes from various sites from the other side 
of the pond (46.165.197.xx, 213.152.180.yy).

Has anyone seen this kind of attack? Basically, the attack aims to fill your pipe (150Mbps 
over an STM1... guess what...) Then the question goes like this: besides asking your 
upstream provider to block, drop or whatever on the offending traffic, and Kontaktieren Sie 
den Administrator, what else can be done?

Thanks in advance for any help you can provide.

Please contact me off list. I'll post a recap on due time.

There are a lot of different attack types that one might see as an ISP/SP of services. 10 years+ ago it would be an 
ICMP flood.  Some of us took to rate-limiting the icmp echo/echo-reply traffic to 2Mb/s on links to mitigate the flood.

UDP can be a powerful tool in the hands of a compromised server.  I recall in 96 putting 100M of udp through a 10m 
firewall/nat midpoint.  Had to drive to the office to kill the process.

Without knowing the nature of the pattern you are seeing, it is very hard to advise anything other than to contact your 
ISP for filtering.  Traffic against udp/0 (fragments) would be handled different than others (eg: udp/80).  I've seen 
many people just add udp/80 to their standard filters since I'm unaware of any UDP HTTP implementations.

You can try to determine why you were attacked, but that too can be as simple as a "script kiddie" on IRC to an attack 
with far more malicious motive and implications.

- Jared

Current thread: