ongoing DDoS...
Suresh Ramasubramanian
ops.lists at gmail.com
Fri Jan 27 05:05:01 UTC 2006
On 1/27/06, Barry Shein <bzs at world.std.com> wrote:
> Besides the obvious SMTP traffic this also generates a lot of DNS
> traffic. At this point the DNS traffic seems to be more of a nuisance
> probably because so many target hosts are retrying. At one point we
> were doing around 10K pkts/second in DNS traffic, very unusual.
>
> This has been going on for about a week.
At least some broken resolvers will keep re-querying you so see if you
cant throttle or rate limit dns queries from problem IPs for a while.
That, and increase TTLs a bit.
As for the smtp -
* Dont accept email for catchall aliases - try to reject all you can
at the gateway
* Bounces and backscatter - RFC violation or not, accepting bounces
takes a backseat to keeping your mail system up and running.
TEMPORARILY turn off accepting mail from:<>, especially if you're
seeing far, far more bounce traffic to nonexistent addresses on your
site than valid bounces.
Long term - see if you can't use http://www.mipassoc.org/batv/
especially if all your users send email through your smtp server from
outside (say using AUTH) or ssh in and use pine / elm or whatever on
your shell servers.
>
> So where does one start. It seems a mother ship needs to be shut down
> somewhere, etc. Obviously ID'ing a miscreant would be a nice result.
>
You sure its just one botnet hitting you? Shutting off a mothership
often means that the zombies become even more zombied and keep
pounding on your server long after the mothership is dead.
--srs
--
Suresh Ramasubramanian (ops.lists at gmail.com)
More information about the NANOG
mailing list