OARC is coordinating collection of DNS packet captures to assist researchers and security groups increase our understanding of some recent DDoS attacks (against ISPrime in particular). We'd like your help.
You can help out by running the following shell script on nameservers that are receiving spoofed queries:
#!/bin/sh # # tcpdump-to-oarc.sh # # This script captures DNS packets related to an ongoing # DDoS attack and uploads them to DNS-OARC. Current # version can be found at https://www.dns-oarc.net/node/171 # You can set FROM to whatever you like. We just # use it to reduce the chance of filename collisions # if [ `uname` = "Linux" ]; then FROM=`hostname --fqdn` else FROM=`hostname` fi while test `date +%Y%m%d` -lt 20090201 ; do tcpdump -c 100 \ -s 0 \ -w - \ -n port domain and '( src host 72.249.127.168 or src host 69.64.87.156 or src host 72.20.3.82 or src 64.57.246.123 or src 70.86.80.98 )' \ | gzip -9c \ > _oarc.pcap.gz mv _oarc.pcap.gz oarc.pcap.gz ( ssh -oPubkeyAuthentication=no \ -o StrictHostKeyChecking=no \ ddos-200901@capture.ditl.dns-oarc.net \ pcap $FROM \ oarc.pcap.gz & ) done