Questions tagged [udp]

UDP (User Datagram Protocol) is a simple connectionless transmission model formally defined in RFC 768.

92 questions
1
vote
1 answer

Can I use transport mode in IPsec if I tunnel via UDP?

Can I use tranport mode (instead of tunnel mode) in IPsec if I tunnel a VPN via UDP? I don't see why the header (that sets the protocol and port) needs to be encrypted in my case (I suspect it would be dropped if the firewall cannot see it as UDP…
Skaperen
  • 315
  • 2
  • 11
1
vote
1 answer

UDP-Only Linux Dedicated Server?

I am running my own small UDP linux service on a dedicated server. my service responds to single-package requests with single-package responses. I don't want this server to do anything else. I don't want it to access or serve the web, allow…
ivo Welch
  • 111
  • 2
1
vote
1 answer

How to ensure security between devices from different manufacturers over multicast

I'm involved in the design of a protocol that allows different manufacturers to share data amongst their products. The protocol uses multicast over Ethernet so any device can join. Note that it's very likely there won't be an internet connection on…
parsley72
  • 195
  • 7
1
vote
1 answer

How to prevent outgoing UDP attacks?

My server has been the target from hackers 3 times in the last month, and the attack seem to follow the same pattern. The attack another site from my server using UDP connection. The report from my ISP is the following: 19 Dec 2014 21:45:41:202 GMT …
jchatard
  • 111
  • 3
1
vote
1 answer

Outgoing messages while under massive denial-of-service attack

As I understand it, there is no internet protocol that provides true broadcast like in say a card game or a partially synchronous network assumption. How close can internet protocols come though? We've many parties playing some card game. Alice…
Jeff Burdges
  • 837
  • 5
  • 9
1
vote
0 answers

How Should Multiple Checksums Be Performed On the Same Data?

I am using CRC32 to verify the integrity of received UDP packets. Along with the generator polynomial, the sender will also specify how many checksums to perform on the sent data, as well as what iteration to start at in its body. How should this be…
1
vote
2 answers

What is the most powerful type of DDOS/DOS attack?

What I mean is what protocol are best to DOS something like TCP, UDP, HTTP?
1
vote
1 answer

UDP amplification: length(response_packet) < length(request_packet)

I was researching the GitHub DDoS attack of 2018, in which memcached UDP amplification was used. I noticed that a GitHub blog post referenced a CloudFlare post which described memcached-based UDP amplification attacks in general. At one point,…
1
vote
1 answer

Why do processes on servers have socket types associated to the port number?

Why do some servers have TCP/UDP alongside the port they're listening to. To my understanding TCP and UDP are socket layers, they're methods of determining how the traffic is being sent over the network, so why would this be relevant when sending a…
J.Doe
  • 11
  • 2
1
vote
1 answer

is -nU an option with nmap?

My coworkers seem to have -nU (no udp) as an option for their nmap scripts but I've never seen this in use and when I try to use this option with nmap, it does not work. I thought no udp was enabled by default and -sU had to be used for udp to be…
UCProgrammer
  • 113
  • 6
1
vote
0 answers

Machine reaching out to Microsoft IP address using NBTstat command

I have limited logs for this event but the IPS says its a NBTstat query outbound over UDP port 137 to a Microsoft owned IP address. Should UDP 137 ever reach out externally? This is about all the information I have as its very limited access to…
Kajunga
  • 11
  • 1
1
vote
2 answers

Why is spoofing allowed in reputed VPS services?

I just learned about IP spoofing and so I set up VMs and sent spoofed UDP packets (8.8.8.8, Facebook's IP, Twitter's IP) to myself (home PC and mobile) from well-reputed VPS providers like AWS, Softlayer, Intellectica Systems, etc. and I was able to…
Al-Alamin
  • 121
  • 5
1
vote
0 answers

Spoofing an IP/MAC address to avoid ICMP Destination Unreachable being sent back

As far as I understand UDP flooding the idea is to send UDP packets across all ports from e.g. Alice to Bob, and get Bob's machine to check who listens to certain ports and generate many ICMP destination unreachable packets to be sent back (+ Bob's…
chao
  • 111
  • 1
1
vote
0 answers

No authentication, AES encrypted JSON over UDP

I was recently assigned the task of testing a new hardware device which communicates with a JSON API over UDP. For some reason or another, it was decided that AES-CBC-128 should be used to encrypt the traffic. I believe this was to prevent someone…
1
vote
1 answer

UDP replay "attack"

Suppose that there is a client-server application using UDP and you have full control over client. The task is to automate few known actions on the client and make them very fast.(Possibly bypass client application completely).So my question is: Is…
dev034
  • 13
  • 2