Problem

Sergey Kuznetsov skuznets-WRMZ5ucGVl4BXFe83j6qeQ at public.gmane.org
Tue Jan 27 10:54:51 UTC 2004


>
> Actually, it turns out it may have been a DOS attack. I could not get
> in, and connect via web, SSH, etc. but upon calling the tech at the
> location, the server was on, but traffic could not get through because
> it was being bombarded by traffic. Any way to check which domains were
> being targeted?
>
   It is not necesary to be exact domain or set of domains. It could be just 
simplest SYN or FIN or something like that.

First of all, check the traffic on-site at the moment of attack ( is it's 
possible ) by tcpdump. If it's impossible then make the cron job, which will 
start aproximately at the time of attack and will grab any incoming/outgoing 
packet to the tcpdump's binary format file. ( you need lots of space, if your 
sites are heavily used ), and cron job which kill the tcpdump session after 
some time.

If you will see the 3-way TCP handshake in the tcpdump logs - you probably can 
recognize the attacker, if it's SYN/FIN attack - forget about it, source 
address could be forged. Even for 3-way TCP handshake the attacker can use 
the anonymous SOCKS-proxies. In this case you should ask Your hoster to 
initiate security investigation, to trace the attackers. Any big providers 
like MCI/ATT/Sprint have their security specialists who know how to trace the 
attacker and interoperate with other networks.



PS: Security guys from my previous work ( MCI Canada) successfuly traced, 
localized and filtered at origin such kind of attacks ( it came from China ) 
for some of their customers.

-- 
All the Best!
-----------------
Sergey Kuznetsov
Senior Software Developer
Blueprint Initiative
Samuel Lunenfeld Research Institute
at Mount Sinai Hospital
--
The Toronto Linux Users Group.      Meetings: http://tlug.ss.org
TLUG requests: Linux topics, No HTML, wrap text below 80 columns
How to UNSUBSCRIBE: http://tlug.ss.org/subscribe.shtml





More information about the Legacy mailing list