Eskimo North


          [Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

          DOS attacks - New filter rules


          • To: outages-list@eskimo.com
          • Subject: DOS attacks - New filter rules
          • From: Robert Dinse <nanook@eskimo.com>
          • Date: Wed, 10 Mar 1999 05:10:21 -0800 (PST)
          • Resent-Date: Wed, 10 Mar 1999 05:10:25 -0800
          • Resent-From: outages-list@eskimo.com
          • Resent-Message-ID: <"F7CaR2.0.Jb2.1zcvs"@mx1>
          • Resent-Sender: outages-list-request@eskimo.com

          
          Subject: DOS attacks - New Filters which affect Ping
          Newsgroups: lobby,announcements
          
          
               Because our site has been the target of a number of denial of service
          attacks that have come in the form either of UDP or ICMP floods, I have
          implemented new filter rules at the Sprint end of the T1 links to prevent
          saturation of our links by net terrorists. 
          
               The vast majority of these attacks are directed at either our IRC servers
          or Chat, the machine used to run bots, and so for some time we have had ICMP
          and UDP filtered towards those machines upstream. 
          
               More recently, eskimo, tia1, and various dial-up PPP addresses have been
          targeted. 
          
               About 99.99% of the time, these attacks occur when someone in IRC angers
          someone else, or someone else wants to take over their channel, and so they
          launch a denial of service attack against thier ISP in an effort to blow them
          off the net. 
          
               The IRC servers are attacked because one method of taking over channels
          involves splitting a server from the rest of the net.  And though with time
          stamps its not terribly effective they still try it.  There are also jerks that
          just get off on blowing 400 clients off a busy server or disrupting network
          connectivity in general. 
          
               Chat is targeted because bots are run there and if someone wants to take
          over a channel protected by a bot, a prerequesite is to get rid of the bot, so
          they try to flood that machine off the net. 
          
               Eskimo is targeted because people run Unix IRC clients here, and because
          it's an obvious target if you're just trying to saturate the links and blow
          everyone on the ISP off the net. 
          
               Tia1 is targeted because people run irc clients on their own machines
          connected via emulated SLIP or PPP.
          
               Dial-up IP addresses are targeted because people run irc clients or bots
          via real PPP or SLIP. 
          
               Filtering IP is a bit of a double-edged sword, it is impossible to filter
          all possible attacks and still provide any services because any service is a
          possible target of an attack.  So there is a trade off between functionality
          and security that must be made. 
          
               Since the majority of recent attacks are smurf attacks, which work by
          sending ICMP echo request packets to the open broadcast address of a network
          that has a lot of hosts, a lot of bandwidth and no meaningful security, with
          the source address forged to be that of the target machine thus causing every
          host on that network to send echo replies flooding the target, filtering ICMP
          echo replies is the largest part of these filtering rules. 
          
               ICMP echo replies are now blocked to all of the irc, hub, chat, eskimo,
          and tia1, as well as all of the dial-up address space.  This has the
          unfortunate side effect of breaking ping.  I apologize for this but the
          alternative is to have regular 15-20 minute (however long it takes us to get
          Sprint to respond on the fly) outages when some twit in IRC gets his nose bent
          out of joint or is just plain acting maliciously and launches a DOS attack. 
          
               UDP is also blocked to chat, irc, hub, and tia1, with holes cut through
          for uping on hub and irc, and a hole for name service on tia1.  IRCD is a tcp
          based service as are bots, and so is not necessary for irc or hub except for
          uping and not necessary for chat.  These rules aren't new, but blocking udp to
          tia1 is.  Since UDP services aren't supported by emulated SLIP/PPP this should
          not affect functionality on that machine.  Anybody needing UDP over PPP should
          request non-dedicated SLIP/PPP which does support this. 
          
               These filters as I've stated won't stop all possible attacks, but is
          really difficult to be more thourough without really causing major
          functionality problems. 
          
               If someone who knows Cisco filtering rules can show me how to make an
          access list entry that would deny ICMP echo reply with packet sizes larger than
          about 100 bytes, this would allow us to stop smurf attack (which use large
          packets, usually about 1kb) without breaking ping. 
          
          
          

          • Prev by Date: Smurf Attack
          • Next by Date: tia1 reboot today (3-18) at ~4:50pm.
          • Prev by thread: tia1 reboot today (3-18) at ~4:50pm.
          • Next by thread: Smurf Attack
          • Index(es):
            • Date
            • Thread