免费注册 查看新帖 |

Chinaunix

  平台 论坛 博客 文库
最近访问板块 发新帖
查看: 3545 | 回复: 5
打印 上一主题 下一主题

[系统安全] 操作系统一直在被大量的NTP包攻击 [复制链接]

论坛徽章:
0
跳转到指定楼层
1 [收藏(0)] [报告]
发表于 2014-03-14 14:45 |只看该作者 |倒序浏览
我的服务器没有开NTP服务,但是一直有外部IP发送大量的ntp报文到我的123端口,每分钟大概15w个报文,经常把我的网络冲死必须得重启network才能解决,这算是攻击么,我改怎么解决??

我已经增加了iptables策略,将udp目标端口为123的报文drop,但是效果不是很好啊。

14:15:13.837653 IP 192.95.43.227.34618 > ***.***.***.52.123: NTPv2, Reserved, length 8
14:15:13.837780 IP 68.2.20.165.80 > ***.***.***.52.123: NTPv2, Reserved, length 8
14:15:13.839361 IP 68.2.20.165.80 > ***.***.***.52.123: NTPv2, Reserved, length 8
14:15:13.851085 IP 68.2.20.165.80 > ***.***.***.52.123: NTPv2, Reserved, length 8
14:15:13.857552 IP 192.95.43.227.80 > ***.***.***.52.123: NTPv2, Reserved, length 8
14:15:13.857564 IP 192.95.43.227.80 > ***.***.***.52.123: NTPv2, Reserved, length 8
14:15:13.857566 IP 192.95.43.227.80 > ***.***.***.52.123: NTPv2, Reserved, length 8
14:15:13.857568 IP 192.95.43.227.80 > ***.***.***.52.123: NTPv2, Reserved, length 8
14:15:13.858967 IP 68.2.20.165.80 > ***.***.***.52.123: NTPv2, Reserved, length 8
14:15:13.861576 IP 192.95.43.227.39305 > ***.***.***.52.123: NTPv2, Reserved, length 8
14:15:13.861585 IP 192.95.43.227.39305 > ***.***.***.52.123: NTPv2, Reserved, length 8
14:15:13.861588 IP 192.95.43.227.39305 > ***.***.***.52.123: NTPv2, Reserved, length 8
14:15:13.861590 IP 192.95.43.227.39305 > ***.***.***.52.123: NTPv2, Reserved, length 8
14:15:13.874200 IP 192.95.43.227.36328 > ***.***.***.52.123: NTPv2, Reserved, length 8
14:15:13.874215 IP 192.95.43.227.36328 > ***.***.***.52.123: NTPv2, Reserved, length 8
14:15:13.874218 IP 192.95.43.227.36328 > ***.***.***.52.123: NTPv2, Reserved, length 8
14:15:13.874229 IP 192.95.43.227.36328 > ***.***.***.52.123: NTPv2, Reserved, length 8
14:15:13.879357 IP 192.95.43.227.19619 > ***.***.***.52.123: NTPv2, Reserved, length 8
14:15:13.879366 IP 192.95.43.227.19619 > ***.***.***.52.123: NTPv2, Reserved, length 8
14:15:13.879580 IP 192.95.43.227.19619 > ***.***.***.52.123: NTPv2, Reserved, length 8
14:15:13.879589 IP 192.95.43.227.19619 > ***.***.***.52.123: NTPv2, Reserved, length 8
14:15:13.884428 IP 68.2.20.165.80 > ***.***.***.52.123: NTPv2, Reserved, length 8
14:15:13.925329 IP 192.95.43.227.17088 > ***.***.***.52.123: NTPv2, Reserved, length 8
14:15:13.925353 IP 192.95.43.227.17088 > ***.***.***.52.123: NTPv2, Reserved, length 8
14:15:13.925356 IP 192.95.43.227.17088 > ***.***.***.52.123: NTPv2, Reserved, length 8
14:15:13.925358 IP 192.95.43.227.17088 > ***.***.***.52.123: NTPv2, Reserved, lengt
14:15:13.927300 IP 68.2.20.165.80 > ***.***.***.52.123: NTPv2, Reserved, length 8
14:15:13.948565 IP 68.2.20.165.80 > ***.***.***.52.123: NTPv2, Reserved, length 8
14:15:13.952981 IP 192.95.43.227.80 > ***.***.***.52.123: NTPv2, Reserved, length 8
14:15:13.952990 IP 192.95.43.227.80 > ***.***.***.52.123: NTPv2, Reserved, length 8
14:15:13.952993 IP 192.95.43.227.80 > ***.***.***.52.123: NTPv2, Reserved, length 8
14:15:13.952996 IP 192.95.43.227.80 > ***.***.***.52.123: NTPv2, Reserved, length 8

论坛徽章:
0
2 [报告]
发表于 2014-03-14 15:22 |只看该作者
iptables -A INPUT -p tcp –dport 123 -j DROP
iptables -A INPUT -p udp –dport 123 -j DROP

ntp.conf配置添加

restrict default noquery nomodify notrap nopeer
restrict -6 default noquery nomodify notrap nopeer

论坛徽章:
0
3 [报告]
发表于 2014-03-15 06:33 |只看该作者
传说中的ntp放大攻击?

论坛徽章:
3
狮子座
日期:2013-11-08 20:54:51酉鸡
日期:2013-11-28 13:44:39IT运维版块每日发帖之星
日期:2015-12-18 06:20:00
4 [报告]
发表于 2014-03-15 20:32 |只看该作者
联系下SP。试试封掉这些IP到你的服务器得了

论坛徽章:
0
5 [报告]
发表于 2014-03-18 10:38 |只看该作者
回复 4# eva2021hd

ip是变的,不过这真的是攻击么
   

论坛徽章:
3
狮子座
日期:2013-11-08 20:54:51酉鸡
日期:2013-11-28 13:44:39IT运维版块每日发帖之星
日期:2015-12-18 06:20:00
6 [报告]
发表于 2014-03-18 12:52 |只看该作者
回复 5# yanxiaolu
十有八九是了,放大攻击
ip变不变无所谓,要求sp封掉到你机器的,目的端口是 ntp的包就可以了


   
您需要登录后才可以回帖 登录 | 注册

本版积分规则 发表回复

  

北京盛拓优讯信息技术有限公司. 版权所有 京ICP备16024965号-6 北京市公安局海淀分局网监中心备案编号:11010802020122 niuxiaotong@pcpop.com 17352615567
未成年举报专区
中国互联网协会会员  联系我们:huangweiwei@itpub.net
感谢所有关心和支持过ChinaUnix的朋友们 转载本站内容请注明原作者名及出处

清除 Cookies - ChinaUnix - Archiver - WAP - TOP