The Slashdot DDoS: What Happened? 367
What follows is more-or-less Pat "BSD-Pat" Lynch's account of the DDoS... Pat is our super 31337 BSD Junkie sysadmin. He wants everyone to know that the timeline below is little screwy, but things are more or less in sequential order. Things might not be exactly perfect, but hey, what do you expect after 30 hours without sleep?
Having moved the day before, none of us were truly familiar with exactly how the new hardware would handle the full burden of being 'slashdot.org'. The cluster (known affectionately as The Matrix) had handled its premiere day with flying colors, but we didn't really have an accurate feel of how things would react. Combine this with a couple of extremely high traffic stories posted on both Thursday and Friday, and it took us a awhile to determine that the problems were external, and not a flaw in some new component in the cluster."
The Attacks began Thursday morning. Most of it came in the form of SYN floods, from obvious /16's no less, and some /24's. We didn't have any zombie-killing software or a firewall installed because of certain network topology issues. Later on, a second wave came, this closer to 8 or 9pm and the load balancer (an arrowpoint CS-100) died under the load.
The DDoS, as far as I could see, was a lot of SYN and Zero port packets coming from various /16's and /24's as well as a bunch of RFC1918 reserved addresses (10.0.0.0/8, 172.16.0.0/12 and 192.168.0.0/16) At one point we reached 109Mbits worth of traffic into our network.
Liz and I went back to Exodus and rebooted the Arrowpoint, then the site seemed "ok" for a bit. By 3 in the morning, Liz decided that the PIX (Cisco's firewall) could simply not do what it was supposed to do, so we went back and started building a FreeBSD box as a bridging firewall.
just before we went to plug it in, I tried to ssh into the vpn-gate and noticed that nothing was working right: while the site worked, outgoing traffic and source groups on the Arrowpoint was screwed. As if that wasn't enough, two ports died on it already!
At some unknown point (time blurs after 30 hours straight!) Martin and PatG show up (thank the gods!) and they force us to go to sleep, they bring the site up outside the Arrowpoint, while Liz and I watch from a hotel room.
As of Friday morning, the site is semi-working, but the adsystem can't be updated, and we have no access to the backend servers. I scream bloody murder to Arrowpoint, who eventually shows up to blame the router: a cisco 6509 switch with two RSM/MSFCs.
Liz and I do packet dumps and determine it's not the router, the little CS-100 had died the night before, and thats where it all started. The Arrowpoint guy insists we did something to make the Arrowpoint not work (CT: Explicit description of precisely where Liz and and Pat wanted to store the newly deceased Arrowpoint removed to keep things rated PG) By 7 the CS-800 CSS is up we're almost done for the day, but we stay to make sure. By 10pm we're exhausted but stable, although we're running 4 servers on a round-robin DNS while the new load balancer waits.
Netops (Liz , Martin and I) regroup, and do reintegration of new Arrowpoint CS-800 and installation of a new FreeBSD Firewall box instead of the PIX during Saturday Afternoon. Slashdot returns to normal. Sysadmins get well-deserved sleep.
So that was the story. It was a pretty hellish weekend for everyone involved, but thanks again to those that helped get our ducks back in a row. Again, Part #2 to this (which originally was gonna be run last Thursday, but with all this ddos stuff got pushed aside) is a fairly detailed description of the new Slashdot setup at Exodus, complete with all the changes mentioned above. Fun for the whole family if your family is really into clusters of web servers."
Defense in Depth (Score:5)
The simplest case is building two small walls instead of one humongous wall. If you build a humongous wall, it takes a long time to get through... unless the enemy finds a single weak point -- then you're screwed. Two walls each take less time to get through, but if they're well-built using different techniques, the enemy may not get through to begin with and if they breach the first they lose time covering ground and then adapting. They're also very obvious as they traverse the open ground between barriers.
Network security can benefit from the same concept. Others have already mentioned heterogeneous "airgap" systems -- one of the most common and least excusable faux pas by so-called "security admins" is a single firewall protecting a herd of boxen. Second to that is identical airgap firewalls.
Of course real defense doesn't end with the walls. Even services running behind an airgap should be structured with an eye toward reasonable security, as others have pointed out. Many companies think their firewalls make them safe; come the day those firewalls are breached and the attackers make off with everything stored on the NT intranet server before wiping the drive, they'll find out differently.
Any server, no matter how well shielded, should start life in a lockdown configuration and then be made less secure only as needed ("do we really need to enable daytime on this box?"). Admittedly I haven't kept up with developments in secure distros, but does anyone make a "locked-down by default" distro based off Red Hat/Debian/*BSD? It'd be a real service to admins and if not it's something I might consider starting a project for. I know of Bastille Linux but that's (as far as I know) not so much a distro as a set of scripts to tighten up Red Hat.
The only thing we have yet to figure out is how to effectively make systems under attack "shoot back". The most they can do at the moment is call in an airstrike (i.e. alert the admins). Any return-fire capability would only be as good as the intermediate links let it be. It might not even be a good idea, as it would increase network traffic and make the attack that much more severe.
Re:Uhh, not quite (Score:2)
Ok, so I'm dyslexic and get the spelling of words wrong sometimes (which a spell check helps with) and sometimes use the wrong word (which it doesn't) but there is a deeper issue here. Language is simply a means of communication, if the message is communicated then it has done it's job. Furthermore language is not defined by text books and dictionaries, these books record it. There is only something wrong with a statement when it fails to convey the intended message, not when a word is incorrectly spelt or a comma is out of place.
Referring to me as 'an ignorant looser' is nothing short of bigotry, if you really want a discussion I suggestion come out from behind the aptly named 'anonymous coward' hiding place, reveal your identity and discuss the matter without resorting to insult.
Re:What's the Cisco angle? (Score:5)
I disagree 100%. Knowledge of an installation's infrastructure should never comprimise the security of the setup. If it does, then you're relying (to a certain extent) on security through obscurity. Security should be provided by a well thought out layered approach: network layering (multiple firewalls, screening routers, IDS, etc...), host-based security (tcp wrappers, service minimalization & replacement, tripwire, etc..), and application security (ie. authentication, verification, etc...)
In designing networking/server infrastructures it's best to think of it as an open source project, and you should be willing to get opinions and discussion from any number of sources that could include crackers who may at some point want to use that knowledge to attack your site. This is one of the things I like about TIS Gauntlet once upon a time..."crystal box" was the term they used to describe it.
You should prepare for an attack ASSUMING that the infiltrators know as much about your setup as you do. In the long run, if you know that your infrastructure can hold up to someone with that amount of knowledge, then you'll be doing pretty well.
My only question...did I actually see in a comment that they're using NFS to publish data to the distributed webservers??? Ew. Run.
-buffy
(Hmm...I seem to really like parentheticals, don't I? (well maybe not. (really!)))
Re:Why a firewall? (Score:2)
Re:But who ... ? (Score:3)
I'd be suprised if he wasn't. I just wonder if he posts.
numb
Re:DDOS != 10.0.0.0 (Score:2)
I may sound like too much of a bastard, but not having time is not an excuse, you aren't doing your job. Each of those routers had to be configured to begin with, and most networking guys keep the entire configs in a text file that they upload to a router, add a couple of lines to the code and your done. Not doing this stuff is akin to doing a ("chmod -R 777
It's amazing how much time the admin seems to get when a site realizes that 80% of a T3 is full of bad traffic (the old saying and ounce of prevention...). If you don't have time to do this type of stuff, you need to have a serious talk with your boss; because sometime soon you are going to spend a whole week cleaning up some crap that would have only taken you a couple of hours to do in the first place (not to mention boss yelling, legal dept. yelling, ceo yelling, customers yelling...).
Re:A little more detail on the hardware setup (Score:2)
This is something I've been wondering about recently. How do you have clustered web servers sharing storage? Sure, use NFS you say. But that introduces a single point of failure. If your NFS server goes down, you lose the entire cluster. Are there any solutions to this that don't involve spending vast quantities of money on a Sun HA failover system or an Auspex mirrored NFS system or similar?
Re:10.0.0.0 net (Score:2)
Re:GODDAMIT A LINUX SITE SHOULD RUN LINUX! (Score:3)
OSX is covered cause even tho apple is a hugely proprietry company, everyone here loves microsoft competitors.
---
Well, Apple was a Microsoft competitor long before Slashdot started seriously covering them. I think it's more the hardware and Unix-based nature of their recent OS movements more than anything. Note that OSX is based on Mach/BSD, which goes to show you that they're not focused on Linux only.
---
Anyway, point was slashdot IS primarily a linux site.
---
If by that you mean that most of the people here have an interest in it, sure.
I'm not saying that Slashdot isn't incredibly biased toward Linux, but that doesn't mean the Slashdot editors won't use *BSD when the occasion warrants.
Anyhow, Slashdot may be Linux-oriented, but nowhere do they say that they are so to the exclusion of everything else (which was the point I was arguing).
- Jeff A. Campbell
- VelociNews (http://www.velocinews.com [velocinews.com])
Re:Blame Canada (Score:5)
Of course it was the router! (Score:3)
Re:Tracking DDOS or even DOS is difficult. (Score:2)
There are a variety of ways to trace DoS attacks back using the current infrastructure, including the 'manual traceback' technique that Christopher alluded to. However, they don't work very well for DDoS.
For DDoS, tracing back to he source still isn't good enough, as 'here's a list of 10,000 hosts that have been co-opted to do a DDoS' has made the problem simpler, but still pretty difficult (stopping those hosts from doing it again, making sure that a different set of 10,000 hosts are co-opeted, determining who co-opted the hosts in the original place, etc.). Also, I'm not convinced of Savage's trick with chunking working very well when you're talking about 10,000 traces.
Why a firewall? (Score:2)
-russ
Blame Univac (Score:2)
Re:Blame Canada (Score:2)
Exodus is full of people that don't pay or want the world for nothing. Digex on the other hand has great support, strict security and very effecient services. (No restrictions on bandwitdth, backup hardware/routers/nics/switches and enough power to last weeks after a nuclear strike :)
Go digex
Re:Why a firewall? (Score:3)
The CPU of a server spends time on a packet before it has checked what service it is destined for.
Filtering Broadcast packets on a network is a great way to improve workstation & server performance.
In the old days with Token Ring networks with cheap and nasty MAUs you could bring down the entire network with broadcast packets...
Re:How does a DDoS attack screw up the / code??? (Score:2)
The webpage where I work is located in 5 different files (PHP), and joined together when the user loads. But when it's all together, and you look at the source, the page looks like it should be one file.
Re:RSM/MSFC definations (Score:2)
On Cisco equipment this is touted as Netflow and on Cat5500s the feature resides on the Supervisor Module (III) - This is in Slot 1.
RSM
Essentially a Cisco series 7000 router, without any physical ports (except the backplane I suppose), like others have pointed out to route between VLANs within the VTP Domain of Cisco switches.
I have found that routing is pretty slow (as least for today's 1gb/100Mbit LANs) so you're probably better putting Gigabit cards on your servers that are capable of VLAN detagging, then just let the switch switch packets by physical address.
Re:10.0.0.0 net (Score:2)
Mandrake - Secure level 5 (Score:2)
Re:10.0.0.0 net (Score:2)
Customers with BGP sessions are allowed to advertise these networks either.
Re:No doubt it was MS/MPAA/RIAA/Metallica/Dr Dre (Score:2)
So ya thought ya might like to go to the show.
To feel the warm thrill of confusion, that special geek glow.
got me some bad news for you, Sunshine.
Roblimo isn't well, he stayed back at the hotel,
And he sent us along as a surrogate hand.
We're gonna find out where you fans really stand.
Are there any MCSEs on the slashdot tonight?
Get 'em up against the wall. -- 'Gainst the wall!
And that one with all the karma, he don't look right to me.
Get him up against the wall. -- 'Gainst the wall!
And that one is in RIAA, and that one's in MPAA.
Who let all this riffraff to have their say?
There's one smoking a joint, and another with spots!
If I had my way I'd have all of ya shot.
(I guess Pink Floyd's going to sue me now)
Re:Owned? - Nope (Score:2)
--
Re:Troll filters? (Score:2)
Re:How does a DDoS attack screw up the / code??? (Score:2)
--
Re:Of course it was the router! (Score:2)
kwsNI
Re:Why a firewall? (Score:2)
Re:Why a firewall? (Score:2)
-russ
UNIVAC 1107 (Score:2)
John Nagle
Slashdot kind of deserves this (Score:2)
A LOT of detail on the hardware setup (Score:2)
:)
Poetic Justice? (Score:3)
Congratulations on getting the new servers up and running, I've just moved my badtech cartoon site to digital nation (The old location of the slashdot servers).
Re:Of course it was the router! (Score:3)
Thanks for a decent explanation (Score:2)
Well, thanks to the /. crew for finally getting round to telling us what happened - so much for all the whiners who insist that CmdrTaco et al. are involved in some massive conspiracy to keep us in the dark about "important issues" :)
Any possibility on finding out more about the origin of the DDoS? I'm not really sure of the feasibility of doing anything myself.
Could someone point me to a networking tutorial? (Score:2)
I use systems, and I understand IP (a bit). I do not understand the stuff between the nodes. Switches. Routers. Hubs. Firewalls. Addressing.
Most people don't have to deal with this crap casue a network guy sets it up and we plug in and use the IP address he gives us, but if I ever want to set up my own network (beowulf lab or home network) I need some more info.
I have also heard that you can directly connect two NICs with a special cable. Do you need software changes to do this?
Sorry I am so clueless.
ed
Re:Why a firewall? (Score:2)
Exactly my point. You're exposing your weakest service. How does a firewall increase your security when you're giving away the farm? And as Slashdot proved, it's a single point of failure.
-russ
Re:Blame Exodus SQUARED (Score:4)
I would definitely look at Exodus for some of this trouble. At times, they have been less than helpful for the service level they claim they will provide.
-They changed their security policy a while ago, and neglected to tell us until after the fact. All visitors to your cage must be announced, and just try to get replacement parts in and out without a whole rigamarole. Previously, one person "on the list" could escort others in and out of the facility, but no more. Granted this makes some sense, but when we showed up the first time after they changed their policy, before informing us, we balked, and complained. The response was (I kid you not) - "Well, we're a big company now, so we can't give the same level of service we used to." WHAT KIND OF ORGANIZATION SHOOTS THEMSELVES IN THE FOOT LIKE THAT?
-Their HVAC is substandard, and they don't truly care what equipment is placed in a cage. I pity the poor sun techs who have to replace the Sun server at the bottom of a stack of 10 other machines (ie, no shelf).
-They continue to abide by their own notification procedures when their "monitoring" software reports trouble. We've gone over their policy several times with them, and verified they had correct contact information for us, and yet they still follow old ways of notification. In this case, it's paging one person instead of using the paging mechanism that contacts the actual people who will do the work - the effort is the same either way.
-The number of times that we've notified them of trouble before their monitors catch it - for example, try working with them to show DNS requests from the outside to their servers aren't being handled.
END rant
I could go on, but I won't.
Nice account, but who? (Score:5)
Re:Exodus? BAH! (Score:2)
If by sniff you mean write down while working there. That was an ex-employee, disgruntled and whatnot, that had access to the information. Not a technical exploit, but a social one.
Kintanon
Re:Why not a firewall. (Score:2)
So maybe he was a troll, but it's an obscure enough subject that somebody would take him for real.... and if I end up giving somebody somewhere the real picture, then I'll have done what I wanted to do.
--
Use the Force
Read the Source
/. hardware (Score:2)
send flames > /dev/null
Re:Why a firewall? (Score:5)
Having a firewall in place to filter invalid packets and other crud thrown at the servers means that more of the servers' time is spent generating slashdot pages. Also, the simpler the Unix box, the easier it is to secure - hence, securing a stripped down firewall instead of a big, complex slashdot server.
Re:Defense in Depth (Score:2)
Since most attacks are staged through innocent 3rd parties, auto-reprisals are likely to make the damage worse. And if someone effectively spoofs the reprisal software, they could use *your* defenses to stage an attack on someone else. Can you say "liability lawsuit"? I knew you could...
Re:Defense in Depth (Score:2)
> "locked-down by default" distro based off Red Hat/Debian/*BSD?
In the Linux area, take a look at the Nexus [nexus-project.org] project. It's being built from scratch, as opposed to being based on an existing distribution.
http://nexus-project.org/
MPAA (Score:4)
You'd better watch it with this comment... the MPAA might come after you too!
Timing (Score:5)
Re:Twas an inside job, my friend (Score:2)
He posted a flaimbait story, and disabled comment posting (the only story to EVER have this done that I know of, and I've been around since quite nearly the beginning of slashdot. Remember TCWWW anyone?), put his flaimbait opinion on it, posted some horribly incorrect information, and expected people to be happy with him about it. He marked it as a news piece, when it was more editorial than anything.
That's why you rarely see Sengan around anymore. After that he was constantly flamed on every story he posted (I think he continued to post for a little while longer).
Re:security by obscurity (Score:2)
I really don't see why that should be the case (in fact, it's obviously false), but, considering that the statement rhymes and uses alliteration nicely, I can see why someone might be convinced. Don't you hate it when you can't get stupid jingles like that out of your head? Especially that damned "Mmmm Bop" song...
-NooM
What's the Cisco angle? (Score:5)
Re:Why a firewall? (Score:2)
IOW, you can't secure mysqld properly if it's all on the same box.
Apply the same for Oracle and just about everything else you want to run. There's a maximum level of security attainable by any one of these things (I won't say they're all "un-securable", merely "of limited securability"), and the closer to the box on which the service runs the cracker gets, the higher the risk.
So you put things on two boxes, yeah?
~Tim
--
Re:Why are packets from reserved addrs geting thru (Score:2)
Nope, these 10.0.0.0/8 address you see in the traceroute are badly configured machines. For example, it breaks MTU path discovery very often...
Re:Why a firewall? (Score:3)
I totally agree that systems need to be individually secured against obvious problems. In any production setting you have to safeguard at least a bit against unauthorized access (even if from your own network). Firewalls just allow that to be done in a single layer, with a single access policy and set of rules.
It's a lot easier to set up a firewall (perhaps composed of multiple systems for redundancy and load management, perhaps even built into the very routers you're using) that's been designed for this task than it is to go through and audit every system individually.
What if you don't want systems to be reachable from the outside world at all? Your solution would be to use ipchains/whatever and just block all of the ports with that?
Are you aware that there are regularly discovered stack flaws that allow people to disable or crash a system where they have a direct network path like this? What about OS fingerprinting? I would be very uncomfortable if my servers could be touched at all by packets originating from the Internet. Firewalls not only keep people from accessing what may be potentially insecure systems, but it keeps them from doing *anything at all* to them that isn't explicitely allowed. By putting this functionality into a firewall, you have only one type of system (by "type" I mean "firewall" versus "web server" versus "NFS server" or "database server") seen by the outside world, and no critically vulnerable services that they can even *see* much less get to. If you were to put the load of network security onto the individual hosts, there are tons of things somebody can do, even if the service itself is secure, network threats are still quite serious.
If you legitimately are curious about actual network setups and why things like firewalls are necessary and aren't just trying to be an ignorant troll, I'd suggest you take some networking classes at your local university. Depending on their setup, they may have a lab for people to play around with various types of setups, even to the point of letting you simulate your own DDoS attacks and hacking into your own systems. Fun stuff.
Owned? (Score:4)
I wasn't going to talk about this in public because of /. silence about the DDoS, for I thought things could be somewhat related.
This is what I got this morning when I asked for www.slashdot.org:
<html>
//-->
? name=slahsdot.org&channel=www"
<head>
<title>Not Slashdot.org</title>
<meta name="keywords" content="">
<meta name="description" content="">
</head>
<script language="javascript">
<!--
if (top.frames.length != 0)
{
top.location=document.location
}
</script>
<frameset
rows="*,90" marginwidth="0" marginheight="0"
framespacing=0 frameborder=no border=0
>
<frame
marginwidth="5" marginheight="2"
src="http://slashdot.org"
name=thepage framespacing=0 frameborder=no border=0
>
<frame
marginwidth="0" marginheight="0"
src="http://red.namezero.com/strip2/strip.jhtml
name=pb scrollbars=no scrolling=no
framespacing=0 frameborder=no border=0
>
</frameset>
<noframes>
Sorry
</noframes>
</html>
Weird. Did anybody else see this?
Blame Exodus (Score:5)
Topology my ass. Exodus fights hard to make you use their 'value add' security services. Be honest guys, the reason you weren't protected was b/c those bastards were working you over for more money and don't want you running your own security, right? In fairness, there's some nice things about running out of an Exodus facility, but dealing with their physical and network security chimps is not one of the high points.
Re:Defense in Depth (Score:2)
How 'bout OpenBSD [openbsd.org]? Three years without a remote hole in the default install. Works for me.
Re:NAT != firewall (Score:2)
The use of a firewall in itself offers little if any security!
Cool. Does it make me more correct if I use boldface?
And yes, geez, if you have one compromised host it can lead to other hosts being compromised. Should that surprise anyone?
-russ
What Story? (Score:2)
Re:Why a firewall? (Score:4)
1. I'd say that they don't want to limit thier functionality. A tweaked firewall will let them keep useful schtuff turned on.
2.If the firewall uses its CPU to deflect the crap, then the web servers wont have to deal with it.
3. They have a BSD uberadmin who can make that BSD box walk the dog. If something else wierd goes on, it'll be in his back yard.
Dirk
Re:Defense in Depth (Score:2)
I read something a while back about a security team working for the Dept. of Defence (US) that designed and impleneted a set of scripts to "shoot back". The details are fuzzy, but basically this thing traced packets back to their source and "disabled" the attacking computer. The article I read did not contain many technical details, and I have since forgotten any it did have, but it was more concerned with legal issues.
In this case there was a legal problem because the thing had been implemented by the DOD (The US military is forbidden by law to take hostile action against US citizens except under specific circumstances), but here were plenty of other issues besides. It is way to easy to shoot "innocent" zombie computers for one thing. Just because a computer is attacking you doesn't mean the owner is, and counter attacking the computer is largely the same as attacking the owner (yes he SHOULD have secured his network, but when he sues you, will the courts accept that as a defence?). Even if you hit the right computer, you basically come out as guily as the attacker (there is no "self defence" clause in Information Security laws, and a "counter attack" is still an "attack"). He can insist that you be arrested at the same time he is, since you attacked him. There were some other things too, but like I said, it has been a while and the details are fuzzy.
Re:Defense in Depth (Score:2)
Re:Why a firewall? (Score:2)
You can do anti-spoofing somewhere external to the boxes, but theyn you've got an external firewall.
Re:Why are bogus packets getting to your routers? (Score:2)
However, in practice, we have incompetant admins, ignorant management, and underpowered hardware. In many backbone cases, ingress/egress filtering (or, indeed, most any kind of filtering) of these types of IP addresses isn't an option, due to the volume of data that these routers handle. They wouldn't be able to handle it. So, unfortunately, we must rely on ISP's on a more local scale to not only block these packets from coming in to the network (and likely on to their customers), but block them from leaving their network (or, perhaps, keep their customers from introducing them).
Along a similar line, these filters could/should be expanded to include the list of IP addresses that that network services. If done correctly (and down to an appropriate level of granularity), not only will all IP spoofing be eliminated, but anyone attempting to do so can be tracked down rather easily.
The fact that IP spoofing still shows absolutely no signs of abating is proof enough that few ISP's are filtering a damn thing.
Re:Why a firewall? (Score:3)
It might be possible to switch the main servers from Linux to FreeBSD, but as an interrim solution I think putting a FreeBSD firewall in front of them was a good tradeoff, giving time to evaluate whether an OS change on the servers themselves are warranted, or if there are reasons why keeping Linux make more sense.
Eivind.
Re:Curious about the setup... (Score:3)
The web page servers run Apache+mod_perl+DBI+adsystem module, and the image servers run a much lighter Apache httpd with cache friendly headers.
Where does MySQL sit? Any "reason" behind Debian vs. RH other than "just because"?
MySQL is on the VA 3500 box which is also the Red Hat box. The servers all came with Red Hat and we installed Debian on them, expect the 3500, and I think that was because VA installed extra drivers and stuff we wanted to leave it as is.
Also, any chance you could go through some of the configuration choices made for your apache processes on each of these?
I think this will be in Rob's next post. If not we'll post in that forum.
Re:Why a firewall? (Score:2)
It's called "security". The last thing you want is someone breaching your firewall and having instant access to your MySQL databases and everything. One (or more) sacrificial boxes facing forwards, critical stuff behind and an optional DMZ around the middle where you know exactly what's supposed to be going off.
It's also easier to administer these things if your logs are filterable on a per-hostname basis (if you want to do it that way) rather than having firewall things and local junk cluttering each other up on the same box.
~Tim
--
Tracking DDOS or even DOS is difficult. (Score:2)
Unfortunately, if I understand correctly, that can only be reliably done by manual traffic analysis by the sysadmins of the various routers en route, if I understand correctly. The origins and possibly routes of the incoming packets will have been forged, so you have to actually go from router to router looking for unusual traffic.
Disclaimer: I am not a networking guru.
Various modifications to routing software have been proposed that would make tracking easier (see the recent slashdot article [slashdot.org]). However, at present you're in for a lot of work and still probably out of luck.
Re:Why a firewall? (Score:2)
don't get me wrong, I see the point in having a separate firewall, which is to centralize security in one very secure machine with no services. but I don't think it's unreasonable to do it the other way either, if you only have a server or two to protect, and you have very tight control of their configurations.
Re:Why a firewall? (Score:4)
Also, a firewall acts like a choke point -- any attack must pass through it. By monitoring the health of that one machine, you can monitor the health of the entire networks. In addition, if you want to allow remote administration of the items in the cluster, you can provide a secured path through the firewall; again, you have only the one point of failure.
It's usually wise to have stacked firewalls (an "airgap") in front of a popular site, though, and it's often best to use a variety of operating systems on those firewalls. Somehow, though, I can't see Slashdot doing the wise thing there, though, and putting a FreeBSD->W2K airgap at the front, with the Linux-based Slash behind it.
Re:Nice account, but who? (Score:3)
In our case, we tracked the user down to his source by the "other" packets which he sent. The person sending the DoS often will send a ping and/or a name lookup of similar request prior to the attack or each time they add a new host in. Although it is a considerable exercise in collecting enough data to figure out which connects were real "valid" user contacts and which came from the kiddies. As a result we managed to isolate the DoS to specific hosts and subaddress ranges.
Of course, if you are into real fun assuming that you can get one of their target machines (which using a DoS scanner and a rough idea what subnet they are in) you can often port scan for eggdrop bots and other toys. Once you can convince a physical sysadmin to send you those files you then have a map of the kiddies entire bot and DoS network. Once I reach this stage I then post guards on IRC channels which their bots used and with a small ammount of detective work get their ISP. Script kiddies like to brag about what they do and it enevitably leads then them to surrender their identities.
In all the cases in which I managed to get that level of penitration into the kiddies network, I always managed to shut them down. ISP are very friendly about taking out malicious users especially when you supply logs and the attackers home address. :-) I even have gotten offers to have the attacker arrested (to bad I don't have the cash to fly there and file charges). Thus I can conclude although it is not an easly task it is not entirely necessarily impossible. (That is assuming your attackers are 14 year old kids and not paid professionals.)
--Karl
locked-down by default (Score:2)
Re:What's the Cisco angle? (Score:2)
I disagree 100%. Knowledge of an installation's infrastructure should never comprimise the security of the setup. If it does, then you're relying (to a certain extent) on security through obscurity.
As I keep telling people around here, Security through obscurity is a valid security model WHEN ADDED TO OTHER SECURITY MEASURES!
What's wrong about adding a little obscurity to your design? It makes it More secure than before. Not much, admittedly, but every layer counts and if your traffic logger is picking up a guy scanning around trying to get past your thin obscurity layer, it can set off alarms earlier than without.
I AM NOT saying that security through obscurity is a valid measure when used alone, but when used in conjunction with other security methods, it enhances overall security.
Do you post a sign on your house saying "My locks are Master model ES014, 6-pin with 1/8" slot width?" No, you don't put anything. Hence another layer of security (obscurity) on top of the physical lock. Similarly if you did have such a sign and a would-be thief knew about a trick for that exact model lock, you've just made his day easier. Why tell the world that you're using BSD/Linux/NT version x with software a, b and c? You're just eliminating options that they would-be attacker would otherwise have to try!
Security should be provided by a well thought out layered approach: network layering (multiple firewalls, screening routers, IDS, etc...), host-based security (tcp wrappers, service minimalization & replacement, tripwire, etc..), and application security (ie. authentication, verification, etc...)
Yes, and then don't go about advertising the exact methods you've used to lock yourself down. Keep 'em guessing long enough to trip something and alert you, and make sure the security model is thick enough to keep him at bay.
10.0.0.0 net (Score:4)
I've had alot of portscans for 31337 and 12345 in the past week on the mediaone network, all from 10.0.0.0/16 networks. I am massively annoyed that they let this through and block ports 137:139. Umm.. is this solving the problem? No! Oh, and they've taken a liking to scanning their customers boxen.. but I digress.
DDoS is the direct result of sloppy upstream administrators. IF I were in your shoes, I would be suing every person upstream for atleast a few hops for passing those 10.0.0.0 packets along for gross negligence.
Re:What's the Cisco angle? (Score:2)
They can instead install FreeBSD, rate limit SYN and ICMP (echo, echo-rep, or everything), block all SYN and ICMP right out from reserved and invalid IP ranges, and then drop in rules using IPfilter or ipfw when needed. You can do hundreds of mb/s on this setup.
I have this and more, including automa set up to establish damaging patterns, using my logging mechanism (no, I'm not writing to a file and creating a DoS for myself).
Part2: Can we get some pictures? (Score:3)
And while you're at it get CowboyNeal to give us a sexy pose *on* the servers (grin)
Re:Why not a firewall. (Score:2)
Not ignoring, just forgetting to dispense with it as an issue.
-russ
Re:Why not a firewall. (Score:2)
Why isn't your router blocking traffic with an unroutable source address?
You mean they build insecure boxes and then put them on the net? Why did they waste their time?
-russ
How does a DDoS attack screw up the / code??? (Score:3)
What about the children? (Score:5)
Firstly, I don't think the blame for this DDoS can be centered on just one person or group. Obviously, those who attacked Slashdot are to blame, as are Slashdot's sysadmins, and the people at Arrowpoint. And secondly, the costs of this are much greater than you might think.
I have an eight year old daughter. We had a family pet - a rabbit, black, named Midnight, and my daughter was very fond of it. Midnight, sadly, passed away about two months ago. A week or two after Midnight died, my daughter came to me in tears and asked me, "Daddy, why won't God bring Midnight back? I've been praying like Deacon Simmons told me to."
Naturally, I had to think about how to respond to this. I finally answered, "well, honey, God is a little like Slashdot. He can seem arbitrary, cruel, and unresponsive, but he's really a nice guy who's just a little out of touch and is a little slow at responding to requessts."
This was fine, and I thought that would be the end of it. However, when Slashdot went down last week, my daughter burst into my den, positively sobbing and wailing, and managed to choke out "Daddy! Daddy! I can't get to Slashdot!" "Honey," I said, "it's just a website." But, between sobs, she said, "but you said God is just like Slashdot, remember? Does this mean God is dead?"
I tried to console her as best I could, but nothing seemed to work. When Slashdot came back up, she seemed to return to normal, but she hasn't been quite the same since. She doesn't ask me about God so much any more, and she seems less interested in Church.
As a good Christian, I will turn the other cheek, and not call for the punishment of those responsible. But to the heinous criminals and negligents responsible for this, I must ask, how do you feel about destroying a small girl's sense of innocence and wonder about the world? About crushing her childish dreams and idealism? About shattering her faith in God and his benevolence? About possibly having crushed her soul and emotion forever, leaving her to live the rest of her days in spiritual agony as a broken, scarred husk of a person?
I hope all of you think long and hard about what you've done. What is the soul of a child worth, next to a few double-checks of the router?
Thank you.
No doubt it was MS/MPAA/RIAA/Metallica/Dr Dre (Score:4)
I'm sure that these great enemies of the Slashdot Empire have found this to be a convenient time to strike. We must systematically seek and destroy all those suspected of having sympathies with the MPAA, RIAA, or Microsoft for security reasons.
Therefore, all
Windows users
CD listeners
Movie watchers
Metallica fans
are asked to please leave now or face prosecution.
thank you.
Re:NAT != firewall (Score:2)
You say it's weak security, but you come up with a weak example of why it is.
-russ
Re:What Story? (Score:2)
If you were refering to my TCWWW statement, at one point Rob (Malda) had DNS screwed and we couldn't get to slashdot if you put the www. in front of it. He left it like that for quite some time, and he'd post articles that link to
Re:Of course it was the router! (Score:2)
Re:Why not a firewall. (Score:2)
If I can secure a firewall that I control, then I can secure a firewall that I control.
If X then X is true every time, but it's not much of an argument for a firewall.
I can't prevent the group behind the firewall from introducing vulnerabilities on their side of the street
If they're in public services, you're toast *anyway*, because your firewall is letting those services through. If they're in private services, then why for God's sake did you bind them to a public IP address???
Most of the things that people are using firewalls to protect against can be solved by using non-routable IP addresses and some small amount of filtering on your router.
-russ
"Shoot Back" is recipe for disaster - builtin DDOS (Score:2)
This is different from mostly-passive traps like teergrube (FAQ [iks-jena.de]; jargon [tuxedo.org]) or Deception Toolkit [all.net] or spider traps which sit around waiting for Bad Guys to attack them and react unexpectedly when attacked (e.g.
Re:Owned? - Nope (Score:5)
requested http://slahsdot.org (slaHSdot) not
slashdot.org...
I registered that domain (for free @ namezero) to
help the people who couldn't type. Sorry if I scared you
Cpyder@slahsdot.org
_
/
\_\ sig under construction
Is that what took so long.. (Score:3)
RSM/MSFC definations (Score:5)
- Basically a router on a card in the switch for routing between VLANs
MSFC - Multilayer Switch Feature Card
- Once a route for a packet flow is figured out (from the first packet going through the router) all other packets from the flow get switched instead of routed.
Re:how is this a troll??? (Score:2)
-russ
Re:What's the Cisco angle?[ERRATTA] (Score:3)
jf
A little more detail on the hardware setup (Score:5)
All of these machines were behind an Arrowpoint (CS-100) firewall/load balancer which took it on the chin when we got DDoSed, so basically the Arrowpoint was taking the full force of the attack. So as described above we replaced it with a CS-800 and a BSD firewall.
I guess we learned that if you're going to post a letter from a Microsoft attorney on your web site the same day you implement a few new troll filters you better be prepared for the fury of hell to rain down on you. Then again this is Slashdot, so we always should be prepared for the fury of hell to rain down on us.
DDOS != 10.0.0.0 (Score:5)
Um, no.
DDOS simply requires that a lot of compromized boxes be able to send you packets. Spoofing to non-existant return addresses is an orthogonal issue. You reply that it's used to mask the souce boxes? Any _valid_ address could also be used for that, so filtering would gain you nothing against that.
I agree that filtering of reserved addresses should be done, but that would not hinder a DDOS attack.
A link or two (Score:4)
Jason Schwarz Ethernet Tutorial [lothlorien.net]
Lantronix Networking Tutorials [lantronix.com]
You might also try typing "ethernet tutorial" or somesuch in your favorite web search engine. Hope this helps!
--
Re:Could someone point me to a networking tutorial (Score:3)
net3-4-howto [tucows.com]
firewall howto [tucows.com]
masq-howto [tucows.com]
I have also heard that you can directly connect two NICs with a special cable. Do you need software changes to do this?
Yes, you can do this with a crossover cable and no you don't really need any special software to do this. I use one when I bring my laptop into work and want to hook it to my workstation. You can either make one yourself or buy one at any decent site like hardwarestreet.com.
Sorry I am so clueless.
Anyway, good luck.
Re:What's the Cisco angle? (Score:5)
The idea behind the PIX, or any firewall-like object, is to allow 'good' traffic (http, smtp, etc) into the production network, and reject 'bad' traffic (oddball ports, like port 0, unauthorized UDP traffic, etc).
The problem with the PIX, is that it is essentially a fairly stupid router that can do network address translation and other bells and whistles, but it does it poorly. VERY poorly. It was designed as a network address translation system back in the mid 80's (anyone remember all the "We'll run out of IP's by 1997!") by a company that Cisco later bought. Cisco took the product, did a logic problem ( "Firewalls can do address translation. PIX does address translation. PIX is a firewall!"), and had themselves a firewall.
Its configuration makes a lot of sense to someone familiar with cisco router ACL rules, but no one else.
They are probably much better off with the BSD box. Although it's not a good idea to advertise their security infrastructure layout to the world. (Hint, Hint, CmdrTaco!)
jf
Re:Why a firewall? (Score:3)
In a DDOS attack, if your firewall falls over, then the odds are that your network would have fallen over, too. Slashdot "only" handles 100Mb/sec, though -- one high end machine should be able to handle a pipe that wide. But, if the pipe gets wider, then they can get a virtual "choke" with a load balancer in front of the firewall.
Re:PIX inusfficient? (Score:5)
The problem here is that we only had one subnet to work with. The PIX we had wouldn;t to the type of filtering/bridging that I wanted.
Cisco wants a DMZ on these things.
I needed a bridge...why I didn't use linux...
It was quicker and easier for me... ipchains has always been a pain in my arse... ipfw and ipfilter I know best.
The other thig is that we fried an arrowpoint cs-100 (little itty bitty dinky thing that was being replaced with a bigger one)
the little arrowpoint couldn't take the traffic of 109Mbits , it wasn;t meant for that, we were waiting on arrowpoint to ship us the unit we were *supposed* to have.
*BSD fills the gap because I know it inside and out, and it was the quickest to get up at that point.
As far as the router, we can't do any type of stateful filtering on the 6509, due to some setup that exodus has with the HSRP stuff, I'm sure given enough thought I could figure out how to do it, however we were running on crisis mode.
The BSD firewall filled that gap for us...I can now do access lists on that, instead of the cisco.
and we still have a "DMZ" but its on the same subnet.
The arrowpoint CS-800 was emergency shipped to us that afternoon....its about as big as a cisco 6509...and ummm won't die under that type of traffic/content checking (its layer 5 remember)
-Pat
Prevent SYN floods @ the MSFC (Score:3)
Re:Why a firewall? (Score:3)
The more hurdles you put in front of the kidies, the more likely they are to get bored..
Re:Anti-spoof filters on the Exodus network (Score:4)
even more wacky, we were getting stuff from 0.0.0.0/8 (gee, how the F#@% do you filter that??!?!) lets filter the equivalent of "any", gee...
we have been talking to Exodus to get this problem resolved.
Re:DDOS != 10.0.0.0 (Score:4)
As long as you aren't in wild and wooly peering arangements, one should be able to know all the ipaddress that are inside ones network (and within each segment of the network). Once a router sees something that can't possibly be coming from inside that network, it should be dropped and throw up alarms, bells, flashing lights, etc. cause something just ain't right (either a misconfigured client or someone trying something bad).
Doing this type of filtering doesn't prevent your system from being used in a DDOS attack, but it prevents your system from being used in the attack with a spoofed address. Hence see 50mb/sec from host w.x.y.z, contact owner of that address block and get it stopped, since it is not forged they have a compromised box internally. If everybody started doing that the world would be a MUCH better place to live in.