North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: Ping flooding (fwd)

  • From: Michael Dillon
  • Date: Mon Jul 08 19:29:21 1996

Are there any procedures in place to track down this kind of network
abuse. In particular, is it possible that it is a stealth attack?
Before you answer, take note that this is going to appear in Bob
Metcalfe's column next week.

---------- Forwarded message ----------
Date: Mon, 8 Jul 1996 15:30:43 -0600 (MDT)
From: Kevin Rosenberg <[email protected]>
Reply-To: [email protected]
To: [email protected]
Subject: Re: Ping flooding
Resent-Date: Mon, 8 Jul 1996 15:30:53 -0600 (MDT)
Resent-From: [email protected]

> Some months later we had an incident of massive amounts of forged email
> from a site called SUNSETDIRECT.COM.  For several weeks they sent forged

We are currently undergoing a ping flood attack, though our upstream
provider has filtered icmp from the host so the flood is no longer
affecting our T1 line.

The system administrator of the site that appears to be flooding us
doesn't believe his site is the source of the attack. He states that he
can't see the icmp packets, though I don't know how he is sniffing his

My questions are these: 

Is it possible for someone to forged the source IP address of an icmp

If so, do they have to be in some routing proximity, or can they forge the
source address while they are connected from anywhere in the world?


Kevin Rosenberg             | CyberPort Station
Chief System Administrator  | The Finest Internet Service Possible!
[email protected]         |
          Finger [email protected] for PGP Public Key

============================== ISP Mailing List ==============================
Email ``unsubscribe'' to [email protected] to be removed.
Do not post flames to the list -- if you must flame, use private email.

- - - - - - - - - - - - - - - - -