[Info-vax] Warning: Your VMS system may be attacking other systems

Michael Moroney moroney at world.std.spaamtrap.com
Sat Feb 1 10:40:58 EST 2014


There is a NTP-based DDOS going on, and VMS systems will participate.

Recently, a friend wondered why the NTP process on his Alpha was racking
up hours of CPU time and zillions of I/Os.  Figuring it was a bug in NTP,
he stopped and restarted NTP a couple of times, to no effect.  Later he
and another friend figured it was part of a DDOS amplification attack. A
system on the internet sends a NTP query packet with the forged source of
a victim.  The target responds (to the victim) with packets many times
larger than the original query.  Doing this to many systems results in a
flood of data to the victim with little outgoing traffic from the bad guy.

Last night I noticed my TCPIP$NTP_1 process had racked up 2 1/2 hours of
CPU time and enough I/Os to run into the next column.  Looking at NTP, I
see some 600 systems on the internet (all likely zombies) had poked at NTP
on my system.  My system was participating in the DDOS.  I stopped NTP 
until I figure out what to do to exclude random attackers.

Anyway, if you are running a VMS system connected to the net, look at
your TCPIP$NTP_1 process, if it's racking up hours of CPU time and 
zillions of I/Os, it is likely participating.

I don't know what other OS's participate, but it's probably several, since
so many widgets use NTP to set time these days.

I'll reply to this when I find a good way to handle this.



More information about the Info-vax mailing list