LinuxQuestions.org
Help answer threads with 0 replies.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Networking
User Name
Password
Linux - Networking This forum is for any issue related to networks or networking.
Routing, network cards, OSI, etc. Anything is fair game.

Notices


Reply
  Search this Thread
Old 08-17-2010, 05:40 PM   #1
hoodez
LQ Newbie
 
Registered: Jul 2010
Posts: 12

Rep: Reputation: 0
Windows UDP Flood?


I keep getting a lot of these and I've noticed it take a few boxes off the net and I'm not sure why...

I've found no viruses of any kind on the systems.

Code:
Security log:
Tue Aug 17 17:21:51 2010
=>Found attack from 192.168.2.8.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:21:51 2010
=>Found attack from 192.168.2.4.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:22:21 2010
=>Found attack from 192.168.2.4.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:22:51 2010
=>Found attack from 192.168.2.8.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:23:21 2010
=>Found attack from 192.168.2.4.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:23:51 2010
=>Found attack from 192.168.2.8.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:35:12 2010
=>Found attack from 192.168.2.8.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:35:42 2010
=>Found attack from 192.168.2.4.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:35:42 2010
=>Found attack from 192.168.2.8.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:36:12 2010
=>Found attack from 192.168.2.8.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:36:42 2010
=>Found attack from 192.168.2.4.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:36:42 2010
=>Found attack from 192.168.2.8.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:37:12 2010
=>Found attack from 192.168.2.8.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:37:42 2010
=>Found attack from 192.168.2.4.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:37:42 2010
=>Found attack from 192.168.2.8.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:38:12 2010
=>Found attack from 192.168.2.8.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:38:42 2010
=>Found attack from 192.168.2.4.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:38:42 2010
=>Found attack from 192.168.2.8.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:39:12 2010
=>Found attack from 192.168.2.8.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:39:42 2010
=>Found attack from 192.168.2.4.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:39:42 2010
=>Found attack from 192.168.2.8.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:40:12 2010
=>Found attack from 192.168.2.8.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:40:12 2010
=>Found attack from 192.168.2.7.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:40:42 2010
=>Found attack from 192.168.2.4.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:40:42 2010
=>Found attack from 192.168.2.7.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:40:42 2010
=>Found attack from 192.168.2.8.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:41:12 2010
=>Found attack from 192.168.2.8.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:41:12 2010
=>Found attack from 192.168.2.7.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:41:42 2010
=>Found attack from 192.168.2.7.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:41:42 2010
=>Found attack from 192.168.2.4.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:41:42 2010
=>Found attack from 192.168.2.8.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:42:12 2010
=>Found attack from 192.168.2.8.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:42:12 2010
=>Found attack from 192.168.2.7.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:42:42 2010
=>Found attack from 192.168.2.7.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:42:42 2010
=>Found attack from 192.168.2.4.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:42:42 2010
=>Found attack from 192.168.2.8.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:43:12 2010
=>Found attack from 192.168.2.7.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:43:42 2010
=>Found attack from 192.168.2.7.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:43:42 2010
=>Found attack from 192.168.2.4.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:44:43 2010
=>Found attack from 192.168.2.7.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:44:43 2010
=>Found attack from 192.168.2.4.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:44:43 2010
=>Found attack from 192.168.2.8.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:45:13 2010
=>Found attack from 192.168.2.8.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:45:13 2010
=>Found attack from 192.168.2.7.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:45:44 2010
=>Found attack from 192.168.2.7.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:45:44 2010
=>Found attack from 192.168.2.4.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:45:44 2010
=>Found attack from 192.168.2.8.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:46:14 2010
=>Found attack from 192.168.2.8.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:46:14 2010
=>Found attack from 192.168.2.7.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:46:44 2010
=>Found attack from 192.168.2.7.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:46:44 2010
=>Found attack from 192.168.2.4.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:46:44 2010
=>Found attack from 192.168.2.8.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:47:14 2010
=>Found attack from 192.168.2.8.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:47:14 2010
=>Found attack from 192.168.2.7.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:47:14 2010
=>Found attack from 192.168.2.4.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:47:44 2010
=>Found attack from 192.168.2.7.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:47:44 2010
=>Found attack from 192.168.2.4.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:47:44 2010
=>Found attack from 192.168.2.8.
Source port is 137 and destination port is 137 which use the UDP protocol.
Tue Aug 17 17:48:14 2010
=>Found attack from 192.168.2.8.
Source port is 137 and destination port is 137 which use the UDP protocol. 
...
...
...
 
Old 08-17-2010, 06:53 PM   #2
frankbell
LQ Guru
 
Registered: Jan 2006
Location: Virginia, USA
Distribution: Slackware, Ubuntu MATE, Mageia, and whatever VMs I happen to be playing with
Posts: 19,323
Blog Entries: 28

Rep: Reputation: 6142Reputation: 6142Reputation: 6142Reputation: 6142Reputation: 6142Reputation: 6142Reputation: 6142Reputation: 6142Reputation: 6142Reputation: 6142Reputation: 6142
I am assuming that 192.168.2.x is inside your network behind your firewall. You don't mention what OS is running on the 192.168.2.4 and 192.168.2.8.

Could this apply?
 
Old 08-17-2010, 07:00 PM   #3
hoodez
LQ Newbie
 
Registered: Jul 2010
Posts: 12

Original Poster
Rep: Reputation: 0
the entire 192.168.2.x range is on the router. no dedicated hardware firewall.

OS are Windows Vista and 7. However, i've randomly noticed some systems not being able to access websites or the internet at random times and i can only assume that the udp alerts are causing this.
 
Old 08-17-2010, 07:27 PM   #4
joec@home
Member
 
Registered: Sep 2009
Location: Galveston Tx
Posts: 291

Rep: Reputation: 70
If this is a small office network without a Microsoft Windows Server, you may be faced with a license issue that can cause this error. Standard Windows Home Edition or Pro Edition that are not Server Edition have a licensed consecutive connection limit of 5 connections. So for example if you have a printer shared on the network, or a network shard that is a workstation and more that 5 other computers connect to it concurrently, it will show up as a UDP flood as it was not designed to allow for that many connections.

Another common error is that you have a set of printer shares in a loop on the network. All printer shares are supposed to be setup hierarchically, where as most people do not follow this rule and have network glitches. So for example if you have 3 computers each with a printer, you are not supposed to network all the printers to all the computers. The first computer can share the printer to computers two and three. Computer two can shard the printer to computer 3. But computer 3 should not share the printer. All share connections flow in one direction and never in a loop.

These issues aside, scan for any memory resident viruses, but otherwise the flood can be ignored. As soon as you try to tell most office managers the two above mentioned rules, they do not want to hear the truth, they just want everything networked together. As such that is why we have jobs, things will always break.
 
Old 08-17-2010, 08:17 PM   #5
hoodez
LQ Newbie
 
Registered: Jul 2010
Posts: 12

Original Poster
Rep: Reputation: 0
So because I have around 8 Windows computers on the network, I'm facing this issue? We recently setup a new wireless printer to replace the printer that was connected to a Windows Vista machine that all the systems used. I'm not sure if that might be part of the cause or not I never knew about this lic issue.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
iptables rules against udp flood and ddos attack callbiz Linux - Networking 12 02-19-2010 08:13 AM
Flood of UDP 59002 from various IP's gadgetx23 Linux - Security 12 02-13-2010 07:58 AM
udp flood behind router darthaxul Linux - Software 3 08-17-2008 10:25 AM
Filter UDP flood using iptables LandRover Linux - Security 1 10-18-2007 05:18 PM
How To Stop a UDP Packet Flood ! murder Linux - Newbie 2 09-19-2005 10:14 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Networking

All times are GMT -5. The time now is 11:45 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration