[AusNOG] NTP Reflection coming in over Equinix IX
James Braunegg
james.braunegg at micron21.com
Thu Feb 13 16:18:06 EST 2014
Dear Sean
Thanks for your email and additional information, sounds exactly like what we have seen in the past, in fact we have seen almost 100% only NTP reflection attacks originating from within Australia.
I was going to write a blog article regarding this however just have not got around to it... Out of interest in what is the size of the inbound payload of each packet ? ?
Kindest Regards
James Braunegg
P: 1300 769 972 | M: 0488 997 207 | D: (03) 9751 7616
E: james.braunegg at micron21.com<mailto:james.braunegg at micron21.com> | ABN: 12 109 977 666
W: www.micron21.com/ddos-protection<http://www.micron21.com/ddos-protection> T: @micron21
[Description: Description: Description: Description: M21.jpg]
This message is intended for the addressee named above. It may contain privileged or confidential information. If you are not the intended recipient of this message you must not use, copy, distribute or disclose it to anyone other than the addressee. If you have received this message in error please return the message to the sender by replying to it and then delete the message from your computer.
From: Sean K. Finn [mailto:sean.finn at ozservers.com.au]
Sent: Thursday, February 13, 2014 4:05 PM
To: James Braunegg; ausnog at lists.ausnog.net
Subject: RE: NTP Reflection coming in over Equinix IX
G'day James,
Firstly thank you for sharing.
We've had in the order of 100-200 hosts being reflectors in the past few weeks launching outbound, however this is the first time we've been on the receiving end of an NTP.
What makes this stand out from the every-day DDOS is there were many, many hosts coming in across peering.
We're dropping the ntp traffic at the firewalls internally, it's not causing an issue once it gets to us, more of a curiosity that so many Australian connected peers are still reflecting, and importantly haven't yet been exploited or cleaned up.
Thankfully we've been able to clean up the hosts on our network one by one as they launch attacks outbound. (Much like in years past when DNS amplification was all the rage).
We've noticed a few older ESXi hosts have ntp enabled by default and are susceptible as well, these boxes only started participating in outbound attacks within the last two weeks though, as well as Junipers reflecting.
Prior to that it was mainly older linux hosts.
I'm guessing there are slightly different permutations to the NTP attack and its being refined slowly over time to identify the ever-diminishing reflection fruit.
-Another oddity:
The SOURCE IP's were all NTP, UDP port 123.
The RECEIVING IPs at this end were destination PORT 80, UDP.
iknowrite.
Sean.
From: James Braunegg [mailto:james.braunegg at micron21.com]
Sent: Thursday, February 13, 2014 2:52 PM
To: Sean K. Finn; ausnog at lists.ausnog.net<mailto:ausnog at lists.ausnog.net>
Subject: RE: NTP Reflection coming in over Equinix IX
Dear Sean
If you can filter on packet size you should find the attack request for the inbound NTP request is 50bytes in size, if you can drop this inbound request via pattern matching this will stop the request attack traffic in its place from reaching anything downstream !
It also is important to understand if you are being targeted by a NTP attack or do you have hosts within your network precipitating in an attack.
If you need any help just ask !
Kindest Regards
James Braunegg
P: 1300 769 972 | M: 0488 997 207 | D: (03) 9751 7616
E: james.braunegg at micron21.com<mailto:james.braunegg at micron21.com> | ABN: 12 109 977 666
W: www.micron21.com/ddos-protection<http://www.micron21.com/ddos-protection> T: @micron21
[Description: Description: Description: Description: M21.jpg]
This message is intended for the addressee named above. It may contain privileged or confidential information. If you are not the intended recipient of this message you must not use, copy, distribute or disclose it to anyone other than the addressee. If you have received this message in error please return the message to the sender by replying to it and then delete the message from your computer.
From: AusNOG [mailto:ausnog-bounces at lists.ausnog.net] On Behalf Of Sean K. Finn
Sent: Thursday, February 13, 2014 3:37 PM
To: ausnog at lists.ausnog.net<mailto:ausnog at lists.ausnog.net>
Subject: [AusNOG] NTP Reflection coming in over Equinix IX
Hey All,
I never thought I'd see the day, we're seeing local NTP Reflection attacks come in across Equinix peering!
Thankfully they are very small amounts of traffic but you can see the traffic jump percentage wise.
[cid:image002.png at 01CF28CC.B4ED8C60]
Does anyone have any mitigation stategies across the Equinix IX . (Apart from obvious, i.e. contacting the peer AS's to asking them to nice mitigate at their end and pray, or droping prefix from Equinix completely.)
PS Anyone else on Equinix Syd if you're smashing outbound on NTP please check :)
This is the first time we've seen reflection attack across peering!
What I once considered safe harbour has now been compromised.
Kind Regards,
Sean Finn,
Oz Servers.
________________________________
Premium Australian Hosting Solution Specialists
________________________________
Sean Finn, BInfTech(NetSys)Qld.UT
Oz Servers
e: sean.finn at ozservers.com.au<mailto:sean.finn at ozservers.com.au>
w: http://www.ozservers.com.au<http://www.ozservers.com.au/>
p: 1300 13 89 69
[ozlogo]
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.ausnog.net/pipermail/ausnog/attachments/20140213/5dcf582d/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image001.jpg
Type: image/jpeg
Size: 2683 bytes
Desc: image001.jpg
URL: <http://lists.ausnog.net/pipermail/ausnog/attachments/20140213/5dcf582d/attachment.jpg>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image002.png
Type: image/png
Size: 23838 bytes
Desc: image002.png
URL: <http://lists.ausnog.net/pipermail/ausnog/attachments/20140213/5dcf582d/attachment.png>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image003.gif
Type: image/gif
Size: 2556 bytes
Desc: image003.gif
URL: <http://lists.ausnog.net/pipermail/ausnog/attachments/20140213/5dcf582d/attachment.gif>
More information about the AusNOG
mailing list