Following up on yesterday's diary on an increase in Protocol 47 traffic. Thanks to everyone who sent the ISC PCAPs and more information.
Current speculation is the Protocol 47 uptick is backscatter from a DDOS containing GRE traffic and using random source IPs.
While all of the packets appear to be IPv4 packets encapsulated in GRE, there are two flavors of packets involved. The smaller packets are consistently 66 bytes long and contain no data.
The larger packets vary in size, but are typically in the high 500's of bytes and contain 512 bytes of data. The data appears to be random.
While the sources show IPs from over 50 countries, about 55% of the source IPs in my data were from Taiwan, presumably these IPs are the primary attack targets.
Top 10 Sources by Country
The majority of those were from IPs associated with Chungwa Telecom (HINET-NET), the largest ISP/Carrier in Taiwan.
Top 20 Sources by IP
However I can find no indication of an ongoing DDOS against Taiwan or Chungwa Telecom.
So while we have gotten further into the mystery, we still don't have the whole picture. Anybody have any ideas, or further information? If so, please contact us.
UPDATE 1919 UTC: Someone pointed out that there has been another, if smaller uptick against other protocols as well. My data shows that Protocols 132 and 255 are showing some traffic as well.
-- Rick Wanner MSISE - rwanner at isc dot sans dot edu - http://namedeplume.blogspot.com/ - Twitter:namedeplume (Protected)
Dec 30th 2016
1 month ago
heise.de published these infos yesterday 09.01.2017
Jan 10th 2017
1 month ago