[ale] Being used in a DOS attack against others
Jonathan Rickman
jonathan at xcorps.net
Thu Aug 8 10:14:53 EDT 2002
On 8 Aug 2002, Michael Hirsch wrote:
> Someone has been using our mail server to amplify a DOS attack against
> some other mail servers. It works like this. Then send a mail to
> randomuser at nubridges.com with a return address of attackedcompany.com.
> Since random user does not exist we send a reply that the user does not
> exit to attackedcompany's mail server. So we flood their mail server.
>
> I've never seen this attack before, though it seems quite simiple. Is
> this a well know DOS attack? Has anyone else been experiencing this?
>
> It seems to have stopped this morning, but it was ongoing for the last
> two days.
That would be a somewhat inefficient was to generate a denial of service.
More than likely you have a spammer that is probing addresses in your
domain and just happened to pick the other company as his spoofed return
address. I suppose it's possible to generate a DoS if you send enough
email, and the other party host mail on a 56k dial up. However, the
attacker would first need to know that your mail server/connection speed
was that much greater than the other party.
--
Jonathan Rickman
X Corps Security
http://www.xcorps.net
---
This message has been sent through the ALE general discussion list.
See http://www.ale.org/mailing-lists.shtml for more info. Problems should be
sent to listmaster at ale dot org.
More information about the Ale
mailing list