127.0.0.1 source flood and dhcpd DOS

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



hi,

Does someone else observe the problem with Blaster spoofed flood attack
affecting Dhcpd daemon?

The output from the Tcpdump -i eth1 -ne host 127.0.0.1 (eth1 - internal
interface):
18:18:48.933129 0:a:cd:1:b:39 0:10:15:34:23:34 0800 60: 127.0.0.1.80 >
10.0.143.221.1806: R 0:0(0) ack 357826561 win 0
18:18:48.943879 0:2:44:57:364 0:10:15:34:23:34 0800 60: 127.0.0.1.80 >
10.0.192.42.1689: R 0:0(0) ack 83165185 win 0
18:18:48.955866 0:a:cd:0:a7:7f 0:10:15:34:23:34 0800 60: 127.0.0.1.80 >
10.0.57.67.1197: R 0:0(0) ack 1552613377 win 0
18:18:48.956093 0:30:4f:20:e0:8b 0:10:15:34:23:34 0800 60: 127.0.0.1.80 >
10.0.56.108.1893: R 0:0(0) ack 952369153 win 0
18:18:48.956519 0:30:4f:26:c7:96 0:10:15:34:23:34 0800 60: 127.0.0.1.80 >
10.0.2.37.1812: R 0:0(0) ack 1434583041 win 0
18:18:48.956715 0:a:cd:1:b:39 0:10:15:34:23:34 0800 60: 127.0.0.1.80 >
10.0.209.93.1642: R 0:0(0) ack 992411649 win 0
18:18:48.963920 0:2:44:57:364 0:10:15:34:23:34 0800 60: 127.0.0.1.80 >
10.0.2.169.1524: R 0:0(0) ack 717750273 win 0

00:10:15:34:23:34 out server DHCPd mac address
flood is about 1200p/s and from 4 different MAC's

and another output (out client DHCP request with no response from out
server)
tcpdump -i eth1 -n udp port 67:

tcpdump: listening on eth1
18:38:34.071188 0.0.0.0.68 > 255.255.255.255.67:  xid:0x1e429414 secs:55030
file ""[|bootp]
18:38:35.702552 0.0.0.0.68 > 255.255.255.255.67:  xid:0x1c6f144e secs:56566
flags:0x8000 file ""[|bootp]
18:38:36.298190 0.0.0.0.68 > 255.255.255.255.67:  xid:0x4a34ea34 secs:57846
flags:0x8000 file ""[|bootp]
18:38:37.894439 0.0.0.0.68 > 255.255.255.255.67:  xid:0xa41add0d secs:57846
flags:0x8000 file ""[|bootp]
18:38:40.527775 0.0.0.0.68 > 255.255.255.255.67:  xid:0xb20b790e secs:59382
flags:0x8000 file ""[|bootp]

It seems that it is affecting only dhcpd daemon, on different version of
kernel and iptables.
iptables v1.2.9 and iptables v1.2.8
kernel 2.4.23 and 2.4.24
Internet Software Consortium DHCP Server V3.0pl2

And why iptables -I FORWARD -s 127.0.0.1 -i eth1 -j DROP and iptables -I
INPUT -s 127.0.0.1 -i eth1 -j DROP
does not blocking the traffic?

Only solution is: iptables -I PREROUTING -t mangle -s 127.0.0.1 -i eth1 -j
DROP
After that Dhcpd starts working normaly again (And we are not 100% surre of
that)

ifconfig lo down or ifconfig lo 192.168.1.1/32 does not work

Any idea?




[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux