Hmmm. Do you not run a default deny at your border, which would catch this sort of thing? Granted thats not always possible I suppose. Maybe block all UDP you dont specifically need? Do you have an ids/ips? If not, look at SecurityOnion on a SPAN port, it will provide great insight into whats happening. Generally these sort of legacy services are only used for malicious activity and will light up an ids/ips like a Christmas tree. They must be old boxes. I cant think of any recent os distributions which would even have these services listening, let alone installed. Bernhard Schmidt <berni@birkenwald.de> wrote:
Heya everyone,
we have been getting reports lately about unsecured UDP chargen servers in our network being abused for reflection attacks with spoofed sources
http://en.wikipedia.org/wiki/Character_Generator_Protocol
| In the UDP implementation of the protocol, the server sends a UDP | datagram containing a random number (between 0 and 512) of characters | every time it receives a datagram from the connecting host. Any data | received by the server is discarded.
We are seeing up to 1500 bytes of response though.
This seems to be something new. There aren't a lot of systems in our network responding to chargen, but those that do have a 15x amplification factor and generate more traffic than we have seen with abused open resolvers.
Anyone else seeing that? Anyone who can think of a legitimate use of chargen/udp these days? Fortunately I can't, so we're going to drop 19/udp at the border within the next hours.
Regards, Bernhard
-- Charles Wyble charles@knownelement.com / 818 280 7059 CTO Free Network Foundation (www.thefnf.org)