But you do receive the SYN/ACK?
The way to open a TCP socket is the 3 way handshake. Sorry to write that
here... I feel it's useless.
1. SYN
2. SYN/ACK
3. ACK
Step 1: So hackers spoof the original SYN with your source IP of your
network.
Step 2: You should then receive those SYN/ACK packets with your network
as the dst ip and SONY as the src ip. Can you catch a few and post the
TCP flags that you see please? (This is step 2)
You don't need sony or imperva for that. Just a sniffer at the right
place in your network. You won't block anything, but we should see
something very interesting that will help you fix this.
If it is happening like you are describing, you should see those
packets and you should be able to capture them.
No worries if you can't.
Jean
On 2020-01-28 11:31, Octolus Development wrote:
I have tried numerous of times to reach out to Imperva.
Imperva said Sony have to contact them & said they cannot help me
because I am not a customer of theirs.
Something Sony will not do. Sony simply stopped responding my emails
after some time.
But yes you are right.
My IP's are being spoofed, spoofing SYN requests to hundreds of
thousands of web servers. Which then results in a blacklist, that
Imperva uses.. which prevents me and my clients from accessing Sony's
services.. because they use Imperva.
On 28.01.2020 17:29:12, Tom Beecher <beec...@beecher.cc> wrote:
Trying to summarize here, this convo has been a bit disjointed.
Is this an accurate summary?
- The malicious traffic with spoofed sources is targeting multiple
different destinations.
- The aggregate of all those flows is causing Impervia to flag your
IP range as a bad actor.
- Sony uses Impervia blacklists, and since Impervia has flagged your
space as bad, Sony is blocking you.
If that is true, my advice would be to go right to Impervia. Explain
the situation, and ask for their assistance in identifying and
or/reaching out to the networks that they are detecting this spoofed
traffic coming from. The backscatter, as Jared said earlier, could
probably help you a bit too, but Impervia should be willing to
assist. It's in their best interests to not have false positives, but
who knows.
On Tue, Jan 28, 2020 at 6:17 AM Octolus Development
<ad...@octolus.net <mailto:ad...@octolus.net>> wrote:
The problem is that they are spoofing our IP, to millions of IP's
running port 80.
Making upstream providers filter it is quite difficult, i don't
know all the upstream providers are used.
The main problem is honestly services that reports SYN_RECV as
Port Flood, but there isn't much one can do about misconfigured
firewalls.I am sure there is a decent amount of honeypots on the
internet acting the same way, resulting us (the victims of the
attack) getting blacklisted for 'sending' attacks.
On 28.01.2020 05:50:14, "Dobbins, Roland"
<roland.dobb...@netscout.com
<mailto:roland.dobb...@netscout.com>> wrote:
On Jan 28, 2020, at 11:40, Dobbins, Roland
<roland.dobb...@netscout.com
<mailto:roland.dobb...@netscout.com>> wrote:
And even if his network weren't on the receiving end of a
reflection/amplification attack, OP could still see
backscatter, as Jared indicated.
In point of fact, if the traffic was low-volume, this might in
fact be what he was seeing.
--------------------------------------------
Roland Dobbins <roland.dobb...@netscout.com
<mailto:roland.dobb...@netscout.com>>