Security Incidents mailing list archives
New DNS connection with SYN ACK
From: Jerry Perser <jerry.perser () spirentcom com>
Date: 11 Jan 2002 16:50:59 -0000
Iptables on my firewall just dropped 2204 packets that
were new TCP connections but had both the SYN
and ACK flags set. What is interesting about this is
what these packets have in common AND what they
dont have in common.
All the packets came from 19 different hosts targeting
my firewall. The TCP source port was high random
number, the destination port was always 53
(domain). Having both the SYN and ACK flags set is
a response to a TCP connection request (SYN only).
But the TCP port numbers are reversed. My DNS
only runs over UDP. Here is are same of a few
packets:
Jan 10 13:30:12 bender kernel: FireWall
INPUT_New_not_syn IN=eth0 OUT=
MAC=00:e0:29:68:64:e7:00:02:17:e5:08:38:08:00
SRC=203.194.166.182 DST=bender LEN=44
TOS=0x00 PREC=0x00 TTL=236 ID=0
PROTO=TCP SPT=15700 DPT=53 WINDOW=4128
RES=0x00 ACK SYN URGP=0
Jan 10 13:30:12 bender kernel: FireWall
INPUT_New_not_syn IN=eth0 OUT=
MAC=00:e0:29:68:64:e7:00:02:17:e5:08:38:08:00
SRC=216.220.39.42 DST= bender LEN=44
TOS=0x00 PREC=0x00 TTL=235 ID=0
PROTO=TCP SPT=52475 DPT=53 WINDOW=4128
RES=0x00 ACK SYN URGP=0
Jan 10 13:30:12 bender kernel: FireWall
INPUT_New_not_syn IN=eth0 OUT=
MAC=00:e0:29:68:64:e7:00:02:17:e5:08:38:08:00
SRC=194.205.125.26 DST= bender LEN=44
TOS=0x00 PREC=0x00 TTL=240 ID=0
PROTO=TCP SPT=57687 DPT=53 WINDOW=4128
RES=0x00 ACK SYN URGP=0
There are 19 unique source IP addresses. I went to
ARIN to see who own the IP addresses. The
addresses have been assign around the world (US,
Hong Kong, Germany, Australia). NSLOOKUP could
not find any entries for these addresses. I can ping
each of the addresses (so I know there is a machine
there). I did a quick port scan, and none of the
machine had any open sockets. Here are the 19 ip
addresses:
128.121.10.146 128.242.105.34
129.250.244.10 193.148.15.128
194.205.125.26 194.213.64.150
202.139.133.129 203.194.166.182
203.81.45.254 216.220.39.42 216.33.35.214
216.34.68.2
216.35.167.58 62.23.80.2 62.26.119.34
64.14.200.154
64.37.200.46 64.56.174.186 64.78.235.14
What is really weird is the timing of the packets.
Over a 4 day period, the packets only arrived at 6
unique times lasting a duration of 11 to 12 seconds.
It looks like a DDOS attack for 11 seconds. The time
between attacks is not constant, so that would rule
out a cron job. Here are the 6 event times (in Pacific
Standard Time):
Jan 8 19:10:35 Jan 8 19:40:15 Jan 8
20:38:45
Jan 8 21:16:15 Jan 9 20:20:29 Jan 10
13:30:00
I cant find any connection between the 19 ip
addresses, or the time, or even what the packets
were trying to do. Any ideas?
----------------------------------------------------------------------------
This list is provided by the SecurityFocus ARIS analyzer service.
For more information on this free incident handling, management
and tracking system please see: http://aris.securityfocus.com
Current thread:
- New DNS connection with SYN ACK Jerry Perser (Jan 11)
- Re: New DNS connection with SYN ACK Richard Arends (Jan 11)
- Re: New DNS connection with SYN ACK Nick Drage (Jan 14)
- Re: New DNS connection with SYN ACK Patrick Benson (Jan 14)
- Re: New DNS connection with SYN ACK Nick Drage (Jan 14)
- RE: New DNS connection with SYN ACK Dan Hawrylkiw (Jan 14)
- RE: New DNS connection with SYN ACK Jason Dixon (Jan 14)
- Re: New DNS connection with SYN ACK John Hall (Jan 15)
- Unusual DNS requests (not related to previous DNS thread) measl (Jan 15)
- Re: Unusual DNS requests (not related to previous DNS thread) Ryan Russell (Jan 15)
- Re: Unusual DNS requests (not related to previous DNS thread) measl (Jan 17)
- Re: Unusual DNS requests (not related to previous DNS thread) Greg A. Woods (Jan 18)
- RE: New DNS connection with SYN ACK Jason Dixon (Jan 14)
- Re: New DNS connection with SYN ACK Richard Arends (Jan 11)
