Page 2 of 3 FirstFirst 123 LastLast
Results 11 to 20 of 26

Thread: Misconceptions about DOS & DDOS

  1. #11
    AO Ancient: Team Leader
    Join Date
    Oct 2002
    Posts
    5,197
    Even in the case of fairly large scale DDoS, if the attackers are not spoofing, you can filter them all, or create some sufficiently clever scripts to dynamically create rules without affecting most legit users
    In the case of a DDoS that's a pretty big job you just gave yourself. Filter them all day if you like.... They are still coming through if the source is picking random IP's to send from. That would be an issue wouldn't it? "If" is a big word..... They don't do that any more unless they are stupid....

    Then there RDDoS that spoofs too.... How do you mitigate that?

    Not meant to be "offensive" Just want to make sure we all undersatnd the potential...
    Don\'t SYN us.... We\'ll SYN you.....
    \"A nation that draws too broad a difference between its scholars and its warriors will have its thinking done by cowards, and its fighting done by fools.\" - Thucydides

  2. #12
    Hoopy Frood
    Join Date
    Jun 2004
    Posts
    662

    Re: Misconceptions about DOS & DDOS

    Originally posted here by Darksnake
    The second is a flood type DoS that fills the pipe in which you are still up the river without the proverbial paddle because the traffic in your pipe is blocking valid requests anyway so the firewall dropping the invalid ones is of no help.
    Had no thought of that before. Thanks!
    "Personality is only ripe when a man has made the truth his own."

    -- Søren Kierkegaard

  3. #13
    Senior Member
    Join Date
    Jan 2002
    Posts
    1,207
    Originally posted here by Tiger Shark
    [B]In the case of a DDoS that's a pretty big job you just gave yourself. Filter them all day if you like.... They are still coming through if the source is picking random IP's to send from.
    No, if they are not spoofing, even DDoSers have only a relatively limited number of IP addresses to use. You won't in practice see more than a couple of hundred, and in any case, you can start using some automated tools to identify them.

    Fully-formed TCP connections cannot (easily) be spoofed, so any attack which requires them forces the attacker to use their real IP address (or at least *A* real routable one). So you can block this IP and stop their attack getting through, even if there are hundreds, you're extremely unlikely to take out legit users.

    If it's a type of DoS which does spoofing, you stand almost no chance of telling even if it *is* a distributed or localised attack, because you've no idea where the packets are coming from, they tend to randomise source addresses.

    The problem is that some protocols use UDP (example: streaming services, game servers, possibly DNS) exclusively, and that generally means they can be DoS'd quite easily using spoofed packets (as the server does not require a handshake with the client before it expends resources on it). And TCP syn_cookies are only for TCP, so unless the application itself has something equivalent to syn_cookies, you're going to be stuffed.

    Of course a lot of games,streaming etc, have a parallel TCP channel, and don't set the UDP channel up until they've got a valid TCP connection; this is a good approach as it makes IP spoofing to the app much harder.

    Slarty

  4. #14
    Senior Member nihil's Avatar
    Join Date
    Jul 2003
    Location
    United Kingdom: Bridlington
    Posts
    17,188
    This is very interesting, as it is an area I have had no involvement in.

    What I am curious about is that a few weeks ago several security sites were taken down by DoS attacks. All at the same time, and it lasted several days, not just a few hours? (I think spywareinfo, Tom Coyote etc.)

    How was that done?.............hey, they should know all about firewalls and stuff?

    It seemed to me that they had to get additional bandwidth/resource to be able to fend off the attacks.



  5. #15
    Senior Member
    Join Date
    Jan 2002
    Posts
    1,207
    I've no idea how these attacks "were done", I've only been describing symptoms I've seen.

    But if someone did know, I would advise them not to announce it in a public forum to discourage copycat attacks

    Slarty

  6. #16
    Senior Member nihil's Avatar
    Join Date
    Jul 2003
    Location
    United Kingdom: Bridlington
    Posts
    17,188
    I take your point Slarty, but I do not see it as a technical issue.

    As far as I can see the attacks I referred to were professional, and must have relied on volume/weight of numbers, rather than some "hidden knowledge"? I think that the methodologies have already been discussed here, what I would be really interested in are the defence strategies.

    Cheers

  7. #17
    Senior Member
    Join Date
    Apr 2004
    Posts
    1,130
    you can see some details about classic DoS attack
    http://www.grc.com/dos/grcdos.htm
    and a DRDos attack
    http://www.grc.com/dos/drdos.htm
    (Gibson use to be a target. He deserves )
    Methods of attack are public. Attacks that just wanna to "fill the pipe" are easy to implement.
    a) bot system
    - attack and install trojan on several adsl-clients - they have 128kb-1mb BW
    - command your bots from your pc (or other zombie machine) to flood victim computer
    - use crafted packets with random source ip.
    - its done. Victim must call ISP to try to block traffic at ISP side. However, if you craft very random packets, ISP will need some time to analyse packets and try to see a "pattern".
    b) Broadcast ping
    - some dumb companies with several IPs on internet continue to answer broadcast PING
    - send a ping to a broadcast address (4+ ips)
    - craft echo request packet with victim IP as source address
    - its done. Everybody will send echo reply to victim, flooding his link.
    - Hard to block.
    And there are others. And tools ready to download and use.
    Meu sítio

    FORMAT C: Yes ...Yes??? ...Nooooo!!! ^C ^C ^C ^C ^C
    If I die before I sleep, I pray the Lord my soul to encrypt.
    If I die before I wake, I pray the Lord my soul to brake.

  8. #18
    Antionline's Security Dude instronics's Avatar
    Join Date
    Dec 2002
    Posts
    901
    If using iptables, there is some form of protection against Denial of Service attacks.

    Using the:

    -m limit
    or
    --match-limit

    options.

    Examples:

    Syn-Flood-Protections: iptables -A FORWARD -p tcp --syn -m limit 1/s -j ACCEPT

    If this limit is exceeded, then depending on your RULES, the apropriate action will be taken.

    Certain portscanning protections:
    iptables -A FORWARD -p TCP --tcp-flags SYN,ACK,FIN,RST RST -m limit 1/s -j ACCEPT

    and protection against 'ping-of-death':
    iptables -A FORWARD -p icmp --icmp-type echo-request -m limit 1/s -j ACCEPT

    Here again, its the same thing. If the limit is exceeded, action is taken depending on your rulesets.

    These examples are taken from a tutorial in which im in the process of writing. For the deeper meaning of this, wait a few days till im done with it.

    Cheers.

    //addon
    For some info on attacks, have a look at:

    http://www.antionline.com/showthread...hreadid=239990

    Cheers.
    Ubuntu-: Means in African : "Im too dumb to use Slackware"

  9. #19
    Actually if you are talking types of DoS, you must consider all types....Including DNS poisoning, account deletion and something as simple as cutting power or impeding physical access to a system. Not really what you think of when you say DoS but these are still other types besides the 2 mentioned earlier.....

  10. #20
    Antionline's Security Dude instronics's Avatar
    Join Date
    Dec 2002
    Posts
    901
    Yes, offcourse there are many other types. I just gave 2 examples here, but there are also defense mechanisms for many various other types of DoS, which cannot all be controlled by the end target. I just wanted to point out that a firewall is NOT useless against DoS. It is still a very important tool in security.

    Cheers.
    Ubuntu-: Means in African : "Im too dumb to use Slackware"

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •