The DDoS Attacks, One Year Later 117
ATKeiper writes: "One year after the DDoS attacks against major Web sites, C|Net reports that there are still 'no strong defenses deployed' against such attacks. The only person so far accused by prosecutors is Canadian teen hacker mafiaboy, whose trial starts in a month. Was it a forgettable stunt? A much-needed wake-up call for insecure e-commerce sites? Lame script kiddies giving hackers a bad name?"
Warning! Approaching buzzword overload! (Score:1)
The front line. (Score:1)
Since December last year, we were on the wrong end of some SERIOUSLY large DoS attacks. Some of them were your run-of-the-mill smurf, but the most common has lately been a little SYN flooder which I won't mention here, lest the wannabies all go download it and try and take down Yahoo with their 56k modems. (Not that you could, you'd need more that that).
We use BTnet as our uplink provider, and initially we got very poor response from them. One attack which crippled us for 12 hours, however, managed to get their attention. Apart from the fact it wiped us from the face of the planet, stopping millions of users from dialling up or accessing their web-pages, they also managed to take out a huge chunk of BTnet's core infrastructure. BT are not happy, and neither are their customers. Strangely enough, BT has transformed into the most impressive anti-packetkiddie juggernaut I have ever seen.
Sure, it's hard to track them down, but we're learning a lot. I guess the packetkiddies think this is a one-way process. They attack and sites go down, and they think they can just keep doing it without anything happening.
Everything is in their favour, for the moment, but every single attack the packetkiddies do teaches us something. It won't be long until we have both the technology and the knowledge to actually track them down and arrest them.
And we've had some success in that arena, too.
I think the main thing here, is this:
You have everything to lose by attacking a company on the internet. The bigger the company you attack, the bigger the thing you are risking.
A large company has NOTHING to lose by tracking you down. Sure, it might cost it money, but they have plenty of that.
You might think it's a great laugh right now, but when you're arrested and taken to court, and suddenly a lot more is on the line than your reputation amongst the other kiddies on IRC, I think maybe then you will regret even getting involved.
It's not cool, it's not elite, and we will catch you.
Re:One way to stop DoS (Score:1)
The only fix for that is to have your ISP's end of the link put in rules, which depending on the skill of the DDoS'er or his scripts, would block out most incoming traffic, including legitimate inbound requests from clients, telecommuters, etc. The real sneaky thing about smart DDoSers is that they forge IP addresses from all over the IPv4 space and so you can't actually tell genuinely which net they're sourcing from without an extensive & laborious backtrace or software that can perform such backtraces by negotiating between peers automatically..
Pointy-hair summary: It's ugly any way you slice it
Your Working Boy,
Re:One way to stop DoS (Score:1)
Because many ISPs can't be bothered. UUNet, for example, refused to do backtraces on a DoS attack on my network at all. Multiple ISPs would need to cooperate in a very thorough way, and they don't see the $$$ in it I suppose.
I know at least 1 piece of software (Manhunt) is looking to get installed within ISPs to monitor routers and automate this backtracking and concomitant inter-ISP coordination, but I don't know if that's gotten anywhere.
Your Working Boy,
Re:There's no defense against tacks either (Score:1)
Re:DDOS and responsibility (Score:1)
Interestingly enough though, you can blame Slashdot for inciting DDoS attacks. When the editors post articles claiming that such and such company did something bad, you will often see comments (highly rated!) saying "let's DoS them" and even posting scripts to do it. I didn't take this seriously until one day Slashdot decided to pick on a place where I worked and suddenly hundreds of DoS attacks started.
This kind of thing doesn't exactly help with the hacker/cracker distinction that Slashdotters seem so keen to enforce.
Re: Randal Schwartz? (Score:1)
But the fact of the matter is that ORS 164.377 is overbroad and vague, and that the police and judge created a search warrant out of speculation. We are arguing that in court right now, and the jury is still out. Until that matter is resolved, the fat lady hasn't sang yet.
And in the meanwhile, Oregonians (and residents of many other states with very similar overbroad and vague laws) are at risk, for doing their job. I've had dozens of people come up to me and say "there but for the grace of God go I" over the past seven years.
Yes, I did stupid things, even with good intentions. Perhaps I should have gotten fired or worse. But being made a triple felon (and losing a cumulative year of work and a quarter million dollars) in the framework of bad legislation and bad implementation doesn't fly, and I won't bow down to it.
For more details on my ongoing case, visit the FORS archive [stonehenge.com].
Re:Cracking & DOS (Score:1)
Acutally, I prefer Spider Robinson's analogy that this DOS attack was like "a 12-year-old nincompoop gluing shut all the doors of the mall". Very appropriate as most of the sites are nothing more than commerce. I don't much care if I can't get into a store.
Spider on Nincompoops (Score:1)
Re:Defenses? (Score:1)
Even with this type of protection, there may still be topologies (DSL? Cablemodem?) where egress filtering may not be either possible or practical until much higher in the food chain. If the ISP in question is a large one, successful spoofing may only require spoofing that ISP's CIDR blocks or other addresses that could pass an 'exit router' egress filter.
I'm not sure that there is a real solution to DoS attacks with many current protocols. Requiring a brief client handshake/auth mechanism may be the only solution, and that makes the net a whole lot less anonymous.
Re:detail (Score:1)
And the behavior of ICMP protocols. I cant imagine someone who has been using the internet for a few years to surf and email understanding what mixter wrote in his papers. What normal users do you know of bought a book on TCP/IP and even know what ICMP stands for? No one I know.
Re:dDOS attack "relatively unheard of" attack? (Score:1)
Re:DDoS makes Microsoft .NET Impractical (Score:1)
You obviously have no clue how Microsoft's .NET architectures work. Data is stored locally, as well as on the server. The whole point of having the server in the architecture at all is for replication to other machines and/or devices. So, no, you won't be writing your monthly report online, but when you save it, it will get replicated to the server (and probably at intervals before you save it, as well, as a work-in-progress).
So, some skript kiddie takes out the connection to your .NET server. Maybe you can't get your e-mail, but any documents that have been replicated to your local store, and any documents you're currently working on, will be perfectly accessible. Any changes you make won't get replicated to the server yet, as you can't reach it, but at that point it's back to pre-.NET business-as-usual. You'll just have to do "old-fashioned" replication to your mobile devices and such.
Two companies with what sounds like solutions (Score:1)
dDOS attack "relatively unheard of" attack? (Score:1)
Re:Since the fall on the dot-coms (Score:1)
Closing the implementation would do nothing to enhance security. It just makes analyzing and fixing problems and preventing attacks that much harder.
The things that would actually make a more secure protocol - controls to prevent spoofing and protocol-layer encryption - are in no way easier to accomplish with closing the implementation. In fact, they will be the better for the openness.
And, it's worth pointing out that the openness of TCP/IP has allowed it to become the de-facto networking protocol, period, beating out closed candidates that were arguably better protocols.
F Jackie.
Boss of nothin. Big deal.
Son, go get daddy's hard plastic eyes.
Canadian Troublemakers (Score:1)
Re:Cracking & DOS (Score:1)
Cheers!
--
Remove the rocks to send email
Re:There's no defense against tacks either (Score:1)
The roads must roll!
Products to address these issues in the pipeline (Score:1)
http://www.mazunetworks.com/ [mazunetworks.com]
Marketing info states:Mazu's technology is uniquely suited to solving the DDoS problem because it enables a proactive, focused and intelligent approach instead of the after-the-fact, fragmented and manual methods that most businesses try to employ today. With Mazu, businesses can outwit, outflank and outplay DDoS because, for the first time, they can operate with more fine-grained knowledge and resources than the attackers.
Re:There's no defense against tacks either (Score:1)
Well now, that depends on the velocity of the thumbtack, doesn't it? (Hmm... I think I have a new project this weekend.)
Re:ATTENTION Script Kiddies! (Score:1)
Hmm, cracks and security. (Score:1)
-Moondog
Re:What we really need (Score:1)
What we really need (Score:1)
Additionally, this organization could set guidelines for ISPs, like requiring them to keep tracking information on certain packets for a period of time, or requiring them to block packets from unrouteable addresses. @Home is horrible about this. I've noticed routers in the 10.x.x.x subnet upstream from me on the @Home network! That is unacceptable. What happens if that router tries to send information to my computer? It gets blocked by my firewall because I don't allow IP spoofing!
Anyway, we NEED CyberCops to enforce laws on the Internet. Maybe we can get other countries besides America to help pay for it too. That could give them some say in the rules were.
Err. (Score:1)
I'm not saying you need to validate every packet that comes out (way too computationally expensive, i imagine), just that the same way you set up ingress filters preventing packets with a return address of 127.0.0.1 or 10.x.x.x and whatnot come in, you should prevent those obviously falsified packets from ever going out.
Speaking of script-kiddies... (Score:1)
Moral: the script kiddies are totally indiscriminate. Once you're connected, you're vulnerable if you haven't taken protective measures, which include applying patches or upgrading vulnerable software, turning off un-needed services and firewalling/packet filtering. File integrity checking is also a good idea to warn you ASAP of a compromise.
For nomination(s) to 'assholes of the century', how about the schmucks who write the scripts that script-kiddies use? Why would anyone do this?
Re:Since the fall on the dot-coms (Score:1)
Just because it was Yahoo, does that makes it ok. What if it was your online brokerage company that was being DOS'ed and you couldn't get through to tell you're broker to sell your RedHat stocks before they evaporated?
Does your above statement still work?
Re:I wonder... (Score:1)
Re:Mafiaboy pleaded guilty in January (Score:1)
A. Keiper
a nice suggestion for stopping DDoS attacks (Score:1)
well here is the idea i came up with if there's a known script kiddie or comprised box the admin refuses to deal with that network should be blackholed, don't allow them to route to any place outside their own network, until they can prove it has been fixed. some admins won't listen to another person screaming at them to fix THEIR problem, i know this from personal experience, but give them several hundred or thousand paying customers and people who pay them yelling to fix the problem and then you will see how fast things change.
Re:the word hacker has gone all wrong (Score:1)
the word hacker has gone all wrong (Score:1)
Re:One way to stop DoS (Score:1)
YOU try filtering 100+ MB/sec of traffic and tell me how well YOUR router handles it. Make sure you write about a hundred different rules which are applied to every incoming packet.
--
ALL YOUR KARMA ARE BELONG TO US
Betcha can't do it twice (Score:1)
You only become a credible threat when people believe you can hurt them again and again and again, whenever you want to. That's what it takes to be "a force to be reckoned with."
Even assuming that you aren't arrested shortly after taking down the root servers, you have to be able to convince everyone that you can and will cause similar havoc again and again.
But all of these holes are one-offs. Every time you abuse one, it will be fixed. You would have to convince us that you can invent new exploits faster than we can fix them.
...i'm using "you" figuratively here.
Re:What we really need (Score:1)
My thoughts (Score:1)
It was all the (Score:1)
hmm... (Score:1)
Ever wonder what real hackers such as Theo de Raadt (OpenBSD), and Alan Cox (Linux kernel), feel about this?
They are, after all, real hackers ...
Re:H4xx0r5 gave hackers a bad name. (Score:1)
Anyway, I had written up a whole history of the term 'hacking' on CNN, but then Netscape crashed and I am Not a Hacker so I can't really retrieve it all that easily. I WAS a Hacker, but that was Fortran on the DEC... *sigh* I can't keep up with hacking anymore... which may not be a bad thing if hacking is so evil...
Here's the links:
The Palmer Guy [cnn.com]
Goldstein [cnn.com]
Rethink (Score:1)
Hmm. It is the general belief of most
From that mindset, the person (or people) who first thought up a DDos attack are to be respected, since you must admit, it took some skill, programming, hacking, and theory to get it accomplished. (Note I leave morals out of this)
Yet who is REALLY to blame when a Script Kiddie does a bad deed? Personally, I blame the idiot who MADE the toolset easy enough for a mindless goon to use.
new networking in linux kernel? (Score:1)
an ode to the perpetrator (Score:1)
Unplugged? (Score:1)
Really though, DoS (or DDoS) attacks don't do anything except spank the owners of the site for not protecting themselves as best as possible, no? It's expensive for them, yes, and nothing's perfect, but as far as I know, it doesn't cause other vulnerabilities; so it seems to be a matter of convenience for most sites.
Perhaps I'm just insanely naive?
With years and wisdom, fifty winters
A king, when a dragon awoke from its darkness...(92) [everything2.com]
Re:dDOS (Score:1)
Re:dDoS's can be a good thing. (Score:1)
too bad you can't spell frontier.
on a more related note, 'online cops' won't do anything. have the police helped much in the physical world? as the number of enforcers increases, i'm willing to bet that the number of reactionary, psuedo-rebellious, angst-ridden script kiddies will increase too.
i don't let the man tell me where to sit on the freakin' bus, so i'm not gonna let him tell me how to compute! (or something, and some stuff. . .)
Re:punishment for script kiddies (Score:1)
o, how about adapting some of those cool punishments in tartarus, in the Aenied, or how about stealing from Dante's inferno?
We force a script kiddie to sit in front of a computer with a can of jolt and a box of twinkies. Whenere he reaches for the twinkies, they move further away, but the computer moves closer, whenever ehe reeaches for the coputer, the twinkies and jolt move out of reach! He can never have the twinkies, the jolt or the computer, they're all just out of reach!
how about forcing script kiddies to run vigorously with several hundred pounds of antiquitated computers strapped to their bodies? now, to add some fun to the whole thing, we could loose some rabid dogs!
i think my favourite punishment from the inferno was for heretics, maybe this applies to some script kiddies too. divergent computing practices, divergent religious beliefs, it's all the same, right? We could shove them in a hole, upside down, with their feet sticking out. Now, we can't light them on fire, because that would kill them, but we could fill the hole with something that itches (maybe wool), and they can't scratch the itch, because the hole is too narrow!
just a few ideas. i'll leave the rats and racks for another day.
Re:DDOS and responsibility (Score:1)
The internet is like a race track if you can't handle the load you need to, then get out of the race. Slashdotters are legitimate people (except for the trolls) that wish to view the page, if the site can't handle it perhaps they need to reevaluate their site. Slash dot irresponsible I think not, more like irresponsible web hosting.
I know what it was. (Score:1)
Lame script kiddies. All they had to do was download a DDoS proggy, then upload to many choice workstations (probably a school's computer labs). That wasn't hacking. Now DeCSS, THAT's hacking!
Re:It's not the script kiddies ... (Score:1)
Re:DNS is a kludge (Score:1)
DNS wasn't designed with true builtin redundancy in mind, which was the whole point of DARPA. Freenet attempts to add redundancy in addition to privacy.
DNS is a kludge (Score:1)
You have ALL been trolled. You have Lost... (Score:1)
Either that, or this is highly sarcastic and not very clearly written as such. However, a sarcastic piece disguised as a serious one is ALSO called a troll, because it's designed to catch the unobservant and hasty posters.
"...throw cash at the problem"
No one uses language like that except to argue AGAINST something. Not to mention the reference to the Tower of Babel, which seems like a sly joke to me.
"The internet needn't be a lawless frontier anymore"
Anyone who posts as much as this guy does has GOT to know what effect that sentence will have on
Thus, the above post is: A troll, a flamebait, or a moron who after posting a TON still can't see that this sort of thing is inflammatory here.
So what's with "5, Insightful"?! Maybe "4, Nicely Subtle Troll".
-Kasreyn
The Only Defense... (Score:1)
Re:DDOS and responsibility (Score:1)
You script kiddiez are pussies (Score:2)
I can't believe no one has taken down the root servers yet.
The attorney general went apeshit just because of Yahoo.com and e-trade. Imagine what would happen if the *.root-servers.net suddenly stopped responding. 99.9% of internet users would be paralyzed and helpless.
Here, instead of releasing poison gas into the subways or toppling the world trade center, this is really easy to do and americans will so get their panties in a bunch:
Killing a bus full of passengers is good for horrifying headlines, but in the end no government will really care. Mess with the internet on the other hand and you're a force to be reckoned with.
And for all you jackasses crying Treason, would you rather they poisoned your local water supply or that they just took down .com? I know what my priorities are.
Re:There's no defense against tacks either (Score:2)
The DDoS attacks last year relied on the ability for Mafiaboy to install programs that would help propigate the DDoS across a large number of unintental volunteers' computers, such that all he had to do was wake them up at a given time with a given target, and that's all he needed. He was able to get such programs installed thanks to the help of email viruses, web page javascripting, and activeX. IIRC, many of the computers that were found to be part of the attack were computer clusters at universities, implying how easy it was to get this propigated.
If we had OSes and browsers that would not run untrusted code unless the user said yes, the DDOS would not have had been as effective. Even if that option's there, the important of what untrusted code is is not well implied. MS's 'error' message if you use prompting for ActiveX controls and scripting is "Scripts and ActiveX controls are usually safe..."; this is NOT true. Sandbox the browser, do not let it access any system files (as there's need for it to!). And make sure that computer users KNOW this and the effects that running such programs can have, don't take a passive view of "oh, a new bug fix is out, you ought to install it when you get a chance...".
detail (Score:2)
MafiaBoy's father allegidly gave him information on the technicalities of such an attack.
Local newspapers have reported at some point during the year that this is what's going to be used as a defense. The father allegedly knew how to do such an attack, for having read about it, and discussed it to his son, which then tried it. The father did not know the extent of the attack, not being very technical himself, hence the defense relying on the fact that MafiaBoy did not know either that this would cause such a severe attack.
Another newspaper had reported that the kid itself was "frame through ignorance" by his friends to do th3e attack itself.
Both newspapers were full of inaccuracies, of course, such as for the usage of the word "hacker", as usual.
Karma karma karma karma karmeleon: it comes and goes, it comes and goes.
DDoS for fun and profit (Score:2)
Sell short EBay, DDoS them for a couple days, collect some cash. Day trading and the speed at which attack news travels has made the markets so much more reactive to the slightest bit of bad news. Do this just before some kind of major EBay event so you can claim a legit excuse for the sell and hide your tracks carefully when starting the DDoS (AOL via a stolen cell phone?)
You heard it here first.
c.
Re:There's no defense against tacks either (Score:2)
Then the media could go bonkers about attacks by crazed teenage Tackers out to bring down the highway system!
(But seriously, a thumbtack wouldn't do sh!t against a car tire...)
Re:There's no defense against tacks either (Score:2)
A whole year? (Score:2)
Oh, yeah. It all went back to real life, where this is no more than some offended 5kr1p7 k1dD13Z deciding to lash out. It had no influence on the world as a whole, had (as the article pointed out) no influence over the cyber-world...
This was an event that didn't shape anything. It didn't cause any sweeping changes (i.e., Columbine or the Challenger explosion), and certainly didn't bother anybody a week after it happened. I recall being astonished at the organization, having so many people DoS-ing at the same time... it gave me hope that the Internet community could bind together and fight for a common cause. Instead, it was just a trojan run by a single person.
It was a non-event of Y2K proportions. Get over it.
------
Defenses? (Score:2)
No, it won't prevent DDoS attacks, but if the checks are set up so as to prevent packets with spoofed IPs from ever leaving their segment, then the people being attacked can see who's attacking, drop packets from them and notify the ISP hosting the (inadvertent?) attacker, letting them know what's happening.
ICMP Traceback Messages (Score:2)
Essentially what these messages do is generate an ICMP packet with the previous IP address and the present IP address with, I believe, the first 60 bytes of the packet for every 20,000 packets that pass through the router. This packet will be sent to the source address so whoever the poor victim is can figure out who the REAL culprit is and not have to chase after spoofed IP addresses. Of course this should only be done on the edge routers and not the core so as to not generate unnessary traffic and to keep the internals of a service provider secret.
Now when this would happen is somewhat up in the air. Those of you that have attended IETF meetings know how slowly things can move (my personal experience is with diffserv... shudder, 4 years to argue about 6 bits of data in the IP header). Not to mention every single router vendor has to implement this and on top of this, the service providers have to update their routers with the software updates that support ICMP traceback messages.
Re:ATTENTION Script Kiddies! (Score:2)
May Day might be a historically consistent day for rebellion/mischief/etc. Hey, it works for the anarchists and whatnot, no?
Problem is that these "internet trash" have exactly 0 respect for rules to begin with, so thinking that all of them (or probably even a significant portion of them) would abide by the one-fun-day-a-year approach is probably optimistic. Cool idea though! :-)
--
Fuck Censorship.
Re:DNS is a kludge (Score:2)
Re:DNS is a kludge (Score:2)
Slashdot is the culprit (Score:2)
Re:Unplugged? (Score:2)
You are naive, but not insanely so
There is not a lot you can do if 500Mb/s starts trying to ram itself down your 100Mb line. These vulnerabilites are an inherent part of the infrastructure.
Re:State of the Art vs. Production Systems (Score:2)
Unfortunately my friend this has nothing to do with OS kernels, and everything to do with infrastructure elements like pipes, routers, switches, and firewalls.
The infrastructure cannnot handle the level of load being placed on it when these attacks take place.
I agree you can actually DOS a server, but these attacks were against the infrastructure.
ATTENTION Script Kiddies! (Score:2)
morons...
Re:DDOS and responsibility (Score:2)
the "/. effect" is not malicious(sp?), nor dose it "Kill" sites... the odd
In closing...Take yer reactionary karma whoring elsewhere.
As bad these attacks were..... (Score:2)
The rush-to-market took presidence over security, even though preventative measures against DDos attacks was outside the remit of most sites, it was a wake up call.
A year later secuity is a lot higher in the product requirements!
Okay. Maybe not. But it still scares me. (Score:2)
Okay. So, it's basically DNS that ships around Word documents instead of zone records...
Hmmm... Opening Word, hitting the space bar once, and then saving the document creates a file that is 19,456 bytes in size. (Under Word 97, Windows 95B, using the normal.dot template.) Adding a few generations of Microsoft Bloat, multiplying it by millions of proles... afraid to estimate the implications of PowerPoint...
Sounds like, through sheer volume, it might create its own DoS attacks...
;)
Efficiency of Microsoft Office 97. (Score:2)
There's a miniumum size for a LaTeX file with one space in it, too. What's your problem, then?
Bloat.
with two spaces in it is probably 19,460 bytes
(2/19,460)*100 = 0.01027749229188% efficiency.
Hmmm... I think that's even less than I expected from a Microsoft product.
And when files like that are being passed around between .NET machines the way zone records are for today's DNS servers, I worry about the future Internet traffic.
I think I'll stick with vi for all my text editing needs.
DDoS makes Microsoft .NET Impractical (Score:2)
How are we to protect ourselves, and save the new economy and way of life and working we see growing for the first time?
Yeah! But if Microsoft moves all of, for example, Office 2003 to their ".NET" philosophy before DDoS has been conclusively thwarted, they're shooting themselves in the foot.
Who is going to buy into .NET when any 15-year-old with a cable modem can lock every secretary in the world out of Word? Every accountant out of Excel? Every CEO out of PowerPoint?
(Okay, not *ALL* of them, but it will be enough that almost all global business stops at the mercy of a mouseclick over a WWF desktop in a New Jersey bedroom.)
The ease of committing a DDoS is therefore, in my view, a very convincing deterrent to the mass adoption of centralized pay-per-use software subscriptions.
I wonder... (Score:2)
Did anybody check this guy out? I mean, come on right?
The problem with capped Karma is it only goes down...
Let go of the Cookie (Score:2)
----------------------
Priorities are all messed up... (Score:2)
The sad thing is, e-business will probably decide that the better way to deal with events like these is NOT to secure their sites better, but instead prosecute the hell out of the offenders. That'll work well the moment someone else tries it and isn't too much of a stupid HaX0r to brag about it on a chat site. Also interesting is how these opportunities for learning generally end up involving the lawyers.
It's not the script kiddies ... (Score:2)
One way to stop DoS (Score:2)
I suppose some sort of stateful tracking would be handy as well, but that wouldn't stop DDos.
Its a game of chess
People are desensitized to it - like crime :) (Score:2)
Its a dangerous attitude in some respects, but in others its not. Its dangerous because it makes folks think hacking is harmless (till their credit report gets ripped off, etc) But heck most people survive just fine if the power goes out for a bit, why not the Internet?
I'm not agreeing with them, I just see that in responses from folks I talk with that aren't /. readers. The scary part is, DDos attacks ARE the tip of the iceberg. Its kinda like a doofus with a gun. Someone fires one in the air, everyone runs for cover, life stops for a sec, and then folks go about their business, not caring if the bullet came down and killed some poor sap. It just leaves folks unprepared for the real deal like when hackers manage to cull sensitive info on many of the top public officials (or their comuter systems) and hold the government hostage. They'll be totally unprepared.
The best we can do is a) spread the word to our less technically inclined friends that it IS a big deal, b) hacking is different from cracking, and c) contribute to hack prevention/detection systems like Snort [snort.org] (Not necessarily in that order!
I hate to say this... (Score:2)
When companies are informed of the potential liability of not properly securing their networks, they will finally take serious steps to prevent their property from being hijacked and used to attack other systems.
H4xx0r5 gave hackers a bad name. (Score:2)
Mafiaboy is nonetheless the fall-guy for a worldwide Society Of Loners who will get the message just in time for their little sisters to find the crack pipe behind the auth server.
Meanwhile, national ISPs like WWC.Com and Frontier.Net can't keep their billion-dollar networks running for a week without a major outage. MSN hires gorillas who don't know Cisco from Crisco. Go.Com is its own worst enemy rather than the cyberjewel of the most widely held corporation on Earth. And Intel jailed Randal Schwartz for doing his job.
Cracking is relatively about as debilitating to the net as keying Vint Cerf's car. But I don't want to be associated with that, either.
--Blair
"My tan is the color of a television tuned to a dead channel."
State of the Art vs. Production Systems (Score:2)
While the state of the art in withstanding an attack has advanced measurably with the new kernel (SYN cookies, etc.), the Ramen Worm and other recent security problems have shown pretty conclusively that it takes a long time for security patches and package updates to make it into production servers.
Red Hat hopes to make a splash through their automated update services, but so far they don't seem to be making much of a splash.
What is really amazing is that there aren't more DDoS attacks, considering the continued vulnerability.
Oh, dear lord, not again... (Score:2)
IMO, Urban Existentialists will be the curse of slashdot. They are becoming ever more frequent, and are frighteningly easy to implement. How are we to defend the moral upright citizens from attack when you can grab a hotmail address and troll away? Script Kiddies, with long winded trolls running amock, who needs 'em?
The e-economy is like a shining jewel, eh? Man, you smoke too much fuckin' pot, dude... lay off the weed.
My suggestion is to nuke your sorry ass off the planet, but that'd be unfair to those unfortunate enough to be near you.
punishment for script kiddies (Score:3)
Tie him to a table. then get about 20 people to stand in a circle around him. Then they should all converge on him, and poke him repeatedly. Just hard enough to hurt a little bit, but not too much. One person doing it would be annoying, but not bad. Multiply it by 20, or more and BWAHAHAHAHAHAH.
punishment for more serious attacks could replace sticks with finger poking. Lets see how long DDoS attacks would keep happening.
Of course, all of that would require that they actually put some effort into trying to find out who is responsible. All you have to do is get an infiltrator into some kiddie group. they like to bragincessently about their latest enterprise, whether it be leeching the latest warez release, or using 31337 sk1llz (some program made by someone who was actually semi intelligent) to h4x0r some computers.
For the people who actively try to crack systems, there should be a different punishment. If they get caught, they should be required to submit to a colonostomy. (To those non-medical geeks, a colonostomy makes a prostate exam look like a walk in the proverbial park.)Basically, they would be violated, and examined in the same way that they did to whatever system they got into.
Mostly script kiddies should obey my sig:
----------------------
Cracking & DOS (Score:3)
--
Remove the rocks to send email
Since the fall on the dot-coms (Score:3)
I'm still wondering why the attack against Microsoft the day after they fixed their DNS routing mistake made so little news. There are still plenty of major web/e-commerce shops out there, but perhaps the spector of DDoS just can't make news and grab eyes like it did just a few months ago.
But he uses a computer! He can't be bad! (Score:3)
Let's pretend that we're rational people. (Score:3)
Just because it was Yahoo, does that makes it ok.
No. It doesn't. In fact, Yahoo is my browser home page. I probably hit it dozens of times a day. As far as I'm concerned, it's the best all-around portal/search engine out there.
What if it was your online brokerage company that was being DOS'ed and you couldn't get through to tell you're broker to sell your RedHat stocks before they evaporated?[sigh]
Can we be rational about this for a moment? You write like you have exactly the same sort of momentum and hysteria going as NASDAQ in general did.
Okay. Brainflash: the Internet is merely a communication tool.
A DDoS interrupts your communication. Like walking into an elevator with a cellphone.
It's an outage, an interruption, inconvenient and frustrating but not the end of the world.
On the other hand, what would the ramifications be if someone could press a button and selectively give a cellphone user a brain tumor? (Oh, think of how useful that would be when you're driving!) For one thing, it would absolutely kill the cellphone. No one would use them.
This could be a parallel to more malicious and dangerous cyber-terrorism; breaking into secure machines and disseminating private information.
The DDoS is inconvenient and makes you reconsider your reliance on the medium. Hold the fire and brimstone: give your broker a call with a telephone.
Does your above statement still work?Unless the Internet is blown beyond all proportion, from being the (revolutionary) communications tool that it is to the realm of a lifestyle, yes, it does work.
A year ago, the Internet was basically down. The traffic from the DDoS was such that most other pages that I tried to load were unusably sluggish. At the time, I didn't know why. I pinged big sites (including Yahoo) and did traceroutes trying to figure out where the bottlenecks were. Satisfied that it wasn't on my LAN or even with my ISP, I gave up: Instead of looking up a supplier using www.four11.com, I picked up the Yellow Pages.
It sucked, it was inconvenient, I had dozens of users asking me why mail was bouncing and pages didn't load, but it wasn't the end of the world.
Re:Hmm, cracks and security. (Score:4)
I actually wrote all the Terms & Conditions of service for an Asian ISP last year, and I made a point of including a section which made the customer responsible for having a secure system, or the ISP could cut their access.
Unfortunately ISPs don't (generally) have the resource required to police all their customers, and thus the problem is ignored.
I strongly agree that the problem is with all those broken boxes hanging off the internet, and not the site administrators at the target.
We are slowly moving towards automated self-updating servers, but don't hold your breath!
Re:Since the fall on the dot-coms (Score:4)
There are still plenty of major web/e-commerce shops out there, but perhaps the spector of DDoS just can't make news and grab eyes like it did just a few months ago.
I think you hit the nail on the head exactly.
So Yahoo is down for a few hours. It's inconvenient to users, and it costs them money in lost revenue, but it doesn't mean the end of the Internet.
Now that the dot-com bubble has burst, perhaps we're starting to see a more rational approach to the whole issue of technology and its embrace by the proles.
I mean, who on Slashdot was really freaked out when the Yahoo DDoS happened? It's the same thing as we've been used to for years, just on an incrementally larger scale. No big whup. No credit card numbers got out. No one got the number to the cellphone on Air Force One.
I'm still wondering why the attack against Microsoft the day after they fixed their DNS routing mistake made so little news.Yeah, especially pushing their .NET concept. What happens to the users that I serve at work, when they're using Office 2003, and Microsoft makes a similar error?
Problems with software are inevitable, but I think this weakness has been glossed over in the mad frenzy for centralized software. I'd rather know that if Office blows up, I'll simply go to the computer in the next cubicle.
That way, I don't have to wait for them to get their servers back up before I can manipulate my document. Let alone my telco, my ISP, their backbone provider...
DDoS isn't a big deal. Yet.
Re:ATTENTION Script Kiddies! (Score:4)
Interesting idea - what if one day out of the year was known as the unofficial "hack" day, when all the 1337 SKs and true crackers concentrated all their attacks. The sys-admins would know as well, so they could actually take time to update software and try to secure their system, set up honeypots, etc. For one day, the limits of security would be tested. And, given that most sys admins don't know much about security, we'd all get a day off work.
But what date? The date Kevin Mitnick was arrested / released / scheduled to get off parole? The anniversary of the DDoS attack? Personally, I like the idea of the first Friday /Saturday in April. Every few years, it would fall on April Fools Day, it would give sys-admins a Friday to secure the systems, and would allow them to get the systems up and running by Monday.
Or maybe not, since it is all illegal. But wouldn't it be nice knowing when it was coming?
There IS a DEFENCE..... (Score:4)
That leaves us with attacks that are comming from super-high bandwidth systems, and attacks that are using large numbers of systems. The high-bandwidth systems are MOST likely NOT going to be responsible for many attacks, as most hackers can not afford to pay for the kind of bandwidth needed. This leaves us back to the issue that the person starting the attack will need to break into any/all systems that start the attack. Now this could be easily resolved if people were just informed correctly about what security issues they need to worry about (like placing your system behind a decent firewall, software or hardware based).
That would then block out a very high number of the people trying to do these attacks, because face it, most of these attacks are from novice hackers who can not actually hack the system/entity that they have a problem with so they launch a DoS attack because it is so easy to do. Increasing the difficulty of launching this type of attack and the people who are doing these attacks will either need to learn how to be a better hacking (in which case they will probably find a way to actually gain access to the system that they are DoS'ing and just wipe them) or they will get fedup with it and go piss and moan to they friends.
dDoS's can be a good thing. (Score:4)
How are we to protect ourselves, and save the new economy and way of life and working we see growing for the first time?
My suggestion is that we greatly improve punishments for script kiddies and throw cash at the problem by initiating 'online cops' with special dispensation to track them down. The Internet needn't be a lawless fronteir anymore.
Israel has done this to an extent. We should too.
You know exactly what to do-
Your kiss, your fingers on my thigh-
Stopping DDoS (Score:4)
Now as for the attacks themselves, this wasn't anything new as DDoS became popular after Mixter [antioffline.com] coded a scriptkiddiot [antioffline.com] tool, which allowed malicious users to actually implement these attacks on a
The foundations for DDoS though are a bit old and could have long been resolved had thorough network's been set up to deny any malicious activity to leave their networks and attack others.
Many admins have the knowledge to do so, but I think theyre resources are tied into making things work right then and there as opposed to doing it right.
Mafiaboy pleaded guilty in January (Score:5)
The linked article is out of date. On January 18th Mafiaboy pleaded guilty to 56 of the 66 charges. The other 10 charges were withdrawn. CBC has some details [montreal.cbc.ca].
Re:DDOS and responsibility (Score:5)
When slashdot links to a site all they are doing is advertising the existance of said site. Its not that much different from when a gas station does a roll back the clock sale and marks their prices down to $0.49 for the day and it has similar results. Every person going to a site linked to by slashdot has a legitimate reason to go there. Additionally many of the sites benifit from the added traffic. For many of the small sites if just 1 percent of the slashdotters that visit the site keep coming they will have increased their number of readers by an order of magnitude or more, and by increasing their numbers they have increased their earning from any advertising they may do.
The traffic generated by a DDOS attack on the other hand is not legitimate traffic. Its sole intenet is to bring down the site. It dosen't bring new people to the site, it dosen't generate banner revnue for the site it just brings it down. It'd be the equivalent to somehow brainwashing a bunch of people to all get in their cars at the same time, drive down to the gas station. Once they got there they'd pull up to the pump, take the nozzle out, flip the lever and then hang it back up again without pumping any gas. All you are doing is preventing legitimate access from taking place, and in the gas station example they'd all probably get prosocuted for trespassing.
You can't blame slashdot for a site's inability to keep up with legitimate demand, the same way you can't blame the community for a store's inability to keep a hot item in stock, say a Furby a couple Christmases ago. Who do you blame, the store who can't meet demand, and the site who can't keep up with traffic.
There's no defense against tacks either (Score:5)
Regard these attacks for what they are irresponsible acts by people with little regard for the public good.