Tightened DNS security question re: DNS amplification attacks.
graeme at graemef.net
Wed Jan 28 08:32:11 CST 2009
On Wed, 2009-01-28 at 13:16 +0100, fredrik danerklint wrote:
> At 12:07:16 local time here in sweden, I saw a new address 188.8.131.52.
> At 12:09:36 another new address 184.108.40.206
> At 12:20:10 the address 220.127.116.11 started to ask for funny domain name like:
> "pjphcdaaaafwu0000dgaaabaaacboinf". This ended at 12:55:01 when it was back to
> just ask for the .NS records again.
Same here - times different, though, in that it appeared at 1120 UTC and
disappeared at 1159 UTC. There were 194 entries.
Every query was the same format - a 32-byte lower case alphanumeric
string, differing at the following positions marked with a period:
I expect that others will have seen similar patterns with differing
fixed strings. I'm also starting to wonder if this is something to with
the downadup/conficker worm, or another botnet.
More information about the NANOG