[AusNOG] NTP Reflection coming in over Equinix IX

James Braunegg james.braunegg at micron21.com
Thu Feb 13 15:51:56 EST 2014


Dear Sean

If you can filter on packet size you should find the attack request for the inbound NTP request is 50bytes in size, if you can drop this inbound request via pattern matching this will stop the request attack traffic in its place from reaching anything downstream !

It also is important to understand if you are being targeted by a NTP attack or do you have hosts within your network precipitating in an attack.

If you need any help just ask !

Kindest Regards


James Braunegg
P:  1300 769 972  |  M:  0488 997 207 |  D:  (03) 9751 7616
E:   james.braunegg at micron21.com<mailto:james.braunegg at micron21.com>  |  ABN:  12 109 977 666
W:  www.micron21.com/ddos-protection<http://www.micron21.com/ddos-protection>   T: @micron21


[Description: Description: Description: Description: M21.jpg]
This message is intended for the addressee named above. It may contain privileged or confidential information. If you are not the intended recipient of this message you must not use, copy, distribute or disclose it to anyone other than the addressee. If you have received this message in error please return the message to the sender by replying to it and then delete the message from your computer.

From: AusNOG [mailto:ausnog-bounces at lists.ausnog.net] On Behalf Of Sean K. Finn
Sent: Thursday, February 13, 2014 3:37 PM
To: ausnog at lists.ausnog.net
Subject: [AusNOG] NTP Reflection coming in over Equinix IX

Hey All,

I never thought I'd see the day, we're seeing local NTP Reflection attacks come in across Equinix peering!

Thankfully they are very small amounts of traffic but you can see the traffic jump percentage wise.

[cid:image004.png at 01CF28D3.8596D960]


Does anyone have any mitigation stategies across the Equinix IX . (Apart from obvious, i.e. contacting the peer AS's to asking them to nice mitigate at their end and pray, or droping prefix from Equinix completely.)

PS Anyone else on Equinix Syd if you're smashing outbound on NTP please check :)


This is the first time we've seen reflection attack across peering!

What I once considered safe harbour has now been compromised.

Kind Regards,
Sean Finn,
Oz Servers.


________________________________
Premium Australian Hosting Solution Specialists
________________________________
Sean Finn, BInfTech(NetSys)Qld.UT
Oz Servers
e: sean.finn at ozservers.com.au<mailto:sean.finn at ozservers.com.au>
w: http://www.ozservers.com.au<http://www.ozservers.com.au/>
p: 1300 13 89 69



[ozlogo]


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.ausnog.net/pipermail/ausnog/attachments/20140213/d71c0aa1/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image003.jpg
Type: image/jpeg
Size: 2683 bytes
Desc: image003.jpg
URL: <http://lists.ausnog.net/pipermail/ausnog/attachments/20140213/d71c0aa1/attachment.jpg>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image004.png
Type: image/png
Size: 23838 bytes
Desc: image004.png
URL: <http://lists.ausnog.net/pipermail/ausnog/attachments/20140213/d71c0aa1/attachment.png>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image005.gif
Type: image/gif
Size: 2556 bytes
Desc: image005.gif
URL: <http://lists.ausnog.net/pipermail/ausnog/attachments/20140213/d71c0aa1/attachment.gif>


More information about the AusNOG mailing list