Good afternoon,
I have received an alert about a DDoS attack that appears to be using your network as part of the attack.
The service being abused is NTP (Network Time Protocol).
If you would please, forward this email to your network technician (if that is not part of your role) for isolation and resolution.
Also, you may want to review the alert from the U.S. Cert http://www.us-cert.gov/ncas/alerts/TA14-013A
Thank you very much,
Randy Heim | Abuse Specialist
Integra | 4400 NE 77th Ave | Vancouver, WA 98662
Phone 800.322.3961 | fax 360.816.5317
A public NTP server on your network, running on IP address 70.102.34.162, participated in a very large-scale attack against a customer of ours today, generating UDP responses to spoofed "monlist" requests that claimed to be from the attack target.
Please consider reconfiguring this NTP server in one or more of these ways:
1. If you run ntpd, upgrading to the latest version, which removes the "monlist" command that is used for these attacks; alternately, disabling the monitoring function by adding "disable monitor" to your /etc/ntp.conf file.
2. Setting the NTP installation to act as a client only. With ntpd, that can be done with "restrict default ignore" in /etc/ntp.conf; other daemons should have a similar configuration option. More information on configuring different devices can be found here: https://www.team-cymru.org/ReadingRoom/Templates/secure-ntp-template.html.
3. Adjusting your firewall or NTP server configuration so that it only serves your users and does not respond to outside IP addresses.
If you don't mean to run a public NTP server, we recommend #1 and #2. If you do mean to run a public NTP server, we recommend #1, and also that you rate-limit responses to individual source IP addresses -- silently discarding those that exceed a low number, such as one request per IP address per second. Rate-limit functionality is built into many recently-released NTP daemons, including ntpd, but needs to be enabled; it would help with different types of attacks than this one.
Fixing open NTP servers is important; with the 400x+ amplification factor of NTP DRDoS attacks -- one 40-byte-long request usually generates 18252 bytes worth of response traffic -- it only takes one machine on an unfiltered 1 Gbps link to create a 450+ Gbps attack!
If you are an ISP, please also look at your network configuration and make sure that you do not allow spoofed traffic (that pretends to be from external IP addresses) to leave the network. Hosts that allow spoofed traffic make possible this type of attack.
Further reading:
https://cert.litnet.lt/en/docs/ntp-distributed-reflection-dos-attacks
https://isc.sans.org/forums/diary/NTP+reflection+attack/17300
You can find more vulnerable servers on a network through this site: http://openntpproject.org/
Example NTP responses from the host during this attack are given below.
Timestamps (far left) are PST (UTC-8), and the date is 2014-02-10.
16:03:20.861468 IP 70.102.34.162.123 > 74.91.121.x.27015: NTPv2, Reserved, length 440
0x0000: 4500 01d4 0000 4000 3b11 10d5 4666 22a2 E.....@.;...Ff".
0x0010: 4a5b 79e1 007b 6987 01c0 ead1 d700 032a J[y..{i........*
0x0020: 0006 0048 0000 0355 0000 0019 0000 0000 ...H...U........
0x0030: 0000 763f d8da feca 4666 22a2 0000 0001 ..v?....Ff".....
0x0040: 007b 0404 0000 0000 0000 0000 .{..........
16:03:20.861507 IP 70.102.34.162.123 > 74.91.121.x.27015: NTPv2, Reserved, length 440
0x0000: 4500 01d4 0000 4000 3b11 10d5 4666 22a2 E.....@.;...Ff".
0x0010: 4a5b 79e1 007b 6987 01c0 ead1 d700 032a J[y..{i........*
0x0020: 0006 0048 0000 0355 0000 0019 0000 0000 ...H...U........
0x0030: 0000 763f d8da feca 4666 22a2 0000 0001 ..v?....Ff".....
0x0040: 007b 0404 0000 0000 0000 0000 .{..........
(The final octet of our customer's IP address is masked in the above output because some automatic parsers become confused when multiple IP addresses are included. The value of that octet is "225".)
-John
President
Nuclearfallout, Enterprises, Inc. (NFOservers.com)
(We're sending out so many of these notices, and seeing so many auto-responses, that we can't go through this email inbox effectively. If you have follow-up questions, please contact us at n...@nfoe.net.)