On 03/15/13 19:15, Reindl Harald wrote: > Am 15.03.2013 10:57, schrieb Ed Greshko: >> On 03/15/13 17:46, Ed Greshko wrote: >>> Is the destination IP address a single IP address or are there others. >>> >>> Is your system running a DNS server? If you are running one, is it supposed to be servicing requests from the Internet? If it is supposed to be taking requests from the Internet, have you made sure to configure such that recursion is disabled. >> Never mind.... >> >> In re-reading the original message I see the "source port" is 35442. I'm pretty sure recursion from a DNS server would show 53 as the source port. > pretty sure only if your DNS is very outdated > http://unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html > > http://en.wikipedia.org/wiki/DNS_spoofing > As stated above, source port randomization for DNS requests, combined with the use of cryptographically-secure > random numbers for selecting both the source port and the 16-bit cryptographic nonce, can greatly reduce the > probability of successful DNS race attacks. Good to know. It has been a long time since I've done DNS stuff at the network layer. It sounded like a DNSSEC and DNS amplification attack with the Bank's network as the target. But, the OP seems not to have a DNS server configured. -- From now on, at least during winter time, Im going to blame all spelling an grammar erros on the cat sitting on my chest every time I sit down at the computer....
Attachment:
signature.asc
Description: OpenPGP digital signature
-- users mailing list users@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe or change subscription options: https://admin.fedoraproject.org/mailman/listinfo/users Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines Have a question? Ask away: http://ask.fedoraproject.org