Pages:
Author

Topic: DDOS Attacks. What you can do to help stop them! - page 2. (Read 4384 times)

full member
Activity: 186
Merit: 100
Was that your educated guess? Sorry to tell you, but you are wrong!
From all emails sent only in 2 cases they really needed to have it open. But even som they were conscious about the problem and they even tightened the number of queries per minute they allow.
All the remaining cases, simply didn't know about the problem and where looking for malware/virus on their servers.

US-CERT as some nice info about this and how to fix it:
http://www.us-cert.gov/ncas/alerts/TA13-088A

Cheers,
khaos
 
I consider it SPAM, and I offer ddos protection services.
...
As as a person who offers DDOS protection services and deals with a ton of these false positives every day, I know a thing or two about this.

As a person who offers DDOS protection services, you have a vested interest in not seeing actions like this having much effect. It's called a Conflict of Interest.

People need to understand the value of receiving third party email regarding problems on their network. I've been an admin for years, and some of the most effective tools for identifying servers that have been, to some degree, compromised are third-party notifications.

/Salute to KhaOS and Serraz for trying to do something positive, and then spreading it to the community.


You are missing the point, you are sending emails to a source that has either sent nothing at all or is an open recursive DNS server MOST of the time.

full member
Activity: 134
Merit: 100
I consider it SPAM, and I offer ddos protection services.
...
As as a person who offers DDOS protection services and deals with a ton of these false positives every day, I know a thing or two about this.

As a person who offers DDOS protection services, you have a vested interest in not seeing actions like this having much effect. It's called a Conflict of Interest.

People need to understand the value of receiving third party email regarding problems on their network. I've been an admin for years, and some of the most effective tools for identifying servers that have been, to some degree, compromised are third-party notifications.

/Salute to KhaOS and Serraz for trying to do something positive, and then spreading it to the community.


You are missing the point, you are sending emails to a source that has either sent nothing at all or is an open recursive DNS server MOST of the time.
newbie
Activity: 42
Merit: 0
Are there addresses that we could donate to, per chance? Maybe put it in the OP?
newbie
Activity: 29
Merit: 0
I consider it SPAM, and I offer ddos protection services.
...
As as a person who offers DDOS protection services and deals with a ton of these false positives every day, I know a thing or two about this.

As a person who offers DDOS protection services, you have a vested interest in not seeing actions like this having much effect. It's called a Conflict of Interest.

People need to understand the value of receiving third party email regarding problems on their network. I've been an admin for years, and some of the most effective tools for identifying servers that have been, to some degree, compromised are third-party notifications.

/Salute to KhaOS and Serraz for trying to do something positive, and then spreading it to the community.
full member
Activity: 134
Merit: 100
I consider it SPAM, and I offer ddos protection services.
The reason for this... If you log a ddos attack, you get 99% false positives.
The emails won't do any significant damage to the threat, and are just an annoyance for most people.
As as a person who offers DDOS protection services and deals with a ton of these false positives every day, I know a thing or two about this.
hero member
Activity: 812
Merit: 1001
-
Deafboy, do you honestly think that only mining pools get DDoS attacks?

XRcode, spamming? When I was taking care of information security of an ISP I very much appreciated reports from third parties about any possible problems on my networks, whether it was manual or automatically generated. It, of course, was like a decade ago, but I do not think that much has changed since then. I'd say most modern day sysadmins will appreciate such reports and in fact the emails used for this according to relevant RFCs are specifically intended for such purposes.


full member
Activity: 134
Merit: 100
Spamming innocent people?
We reported a problem to the network/system admin of the affected server?
From all emails sent, the common thing I see among all answers is: "Thank you for informing us about the problem".

And in the end, at least we try to do something. I would like to see your suggestions then...


You do realize 99% of ddos attacks are spoofed right, and the ones that aren't are usually reflection attacks.. ie, DNS amplification attacks.
Sending emails like that is just spamming a ton of innocent people most of the time.


And how many emails go to admins of public DNS servers that they can't or won't reconfigure to not be open recursive??.
I get a shitload of emails everyday complaining about "my ip's attacking" when in reality, I deal with multigigabit DNS amplifaction attacks at my end.
I don't think emailing the world helps, DDOS needs to be mitigated, not complained about.
full member
Activity: 186
Merit: 100
Spamming innocent people?
We reported a problem to the network/system admin of the affected server?
From all emails sent, the common thing I see among all answers is: "Thank you for informing us about the problem".

And in the end, at least we try to do something. I would like to see your suggestions then...


You do realize 99% of ddos attacks are spoofed right, and the ones that aren't are usually reflection attacks.. ie, DNS amplification attacks.
Sending emails like that is just spamming a ton of innocent people most of the time.

full member
Activity: 134
Merit: 100
You do realize 99% of ddos attacks are spoofed right, and the ones that aren't are usually reflection attacks.. ie, DNS amplification attacks.
Sending emails like that is just spamming a ton of innocent people most of the time.
sr. member
Activity: 476
Merit: 250
Keep it Simple. Every Bit Matters.
Definitely is good plan forward, if enough people use scripts such as yours it, it would reduce the over all number of compromised networks in the long run, which these DDOS attackers make use of. Not necessarily a cure, but certainly make them weak enough to be easier to deal with.

I don't run a pool, but I do run a few servers, so I'll probably rewrite this to make it work along side one of my other scripts which usually just blocks these IP address' in the 1st layer firewall.

Great please post your script here also to share with everyone Smiley

I will do, I plan to rewrite one of my pfsense packages. It might take a little while, but I can't rush it, it is a live production server.
sr. member
Activity: 658
Merit: 270
As long as the attackers' bandwidth exceeds the server's it would most probably down.

You clearly don't know much about DDoS' in general to make that such misinformed suggestion.
sr. member
Activity: 359
Merit: 250
As long as the attackers' bandwidth exceeds the server's it would most probably down.
sr. member
Activity: 332
Merit: 250
Definitely is good plan forward, if enough people use scripts such as yours it, it would reduce the over all number of compromised networks in the long run, which these DDOS attackers make use of. Not necessarily a cure, but certainly make them weak enough to be easier to deal with.

I don't run a pool, but I do run a few servers, so I'll probably rewrite this to make it work along side one of my other scripts which usually just blocks these IP address' in the 1st layer firewall.

Great please post your script here also to share with everyone Smiley
sr. member
Activity: 476
Merit: 250
Keep it Simple. Every Bit Matters.
Definitely is good plan forward, if enough people use scripts such as yours it, it would reduce the over all number of compromised networks in the long run, which these DDOS attackers make use of. Not necessarily a cure, but certainly make them weak enough to be easier to deal with.

I don't run a pool, but I do run a few servers, so I'll probably rewrite this to make it work along side one of my other scripts which usually just blocks these IP address' in the 1st layer firewall.
sr. member
Activity: 332
Merit: 250
I often use report emails autogeneration. Sometimes this even could destroy the botnet, but usually makes it weaker.

100% what i was saying thanks balth
legendary
Activity: 3108
Merit: 1359
I often use report emails autogeneration. Sometimes this even could destroy the botnet, but usually makes it weaker.
newbie
Activity: 56
Merit: 0
Jesus, people apparently do not know how to read on this forum. The point of Khaos and serraz's script is to notify the netblock owner, and their associated Abuse/NOC team of malicious and abusive traffic.

Most respectable, and legitimate data centers(actual data centers, not some kid that is renting dedis pretending to BE a datacenter) have dedicated Abuse teams(I created one and ran it for quite some time) to handle these kind of complaints. As long as the script is directing the abuse complaints to the IP block owners abuse (Must have one registered with RIPE, ARIN, APNIC, etc..) contact, these zombie nodes will decrease. That doesn't meant that htey can't get more, that just means they are getting reported, and hopefully action taken.

Learn to read and not pretend like you know everything yacoin.
hero member
Activity: 482
Merit: 502
sr. member
Activity: 332
Merit: 250
Booters cost like $5/month and the pools need corporate grade protection to counter them; it's not cheap (2-4k/month for TCP applications like Stratum). If we manage to knock off 50% of the nodes, the booter price might go to $10/month or something so it's still a losing battle. These aren't the sophisticated attacks that mtgox has to deal with, but a simple UDP flood. Most hosts that offer DDoS protection, from my shopping experience, max out at 10Gbit/1-5MPPS, and I consistently saw attacks stronger than that with CNC (peak was 22Gbit, 75% of the attacks were over 10).

Some prices for dedicated DDoS protection I found: (not shared like awknet or VPS)
Staminus     $1k/month for 10Gbit/1MPPS (not strong enough)
BlackLotus $675/month for 10Gbit/6MPPS
Some other  $1k/month + $4k setup for similar

The solution I've come up with is to just use a suite of reverse proxies:
buyvm/etc VPS (10Gbit/5MPPS)
Minecraft-oriented VPS/Dedicated (Varies)
Cloud Load Balancer

For example, I used an amazon elastic load balancer and some micro instances for forwarding. By using the ELB, amazon soaks up the packet floods and does some filtering. I also use cloudflare free, but there's a risk. If your site gets a http-layer attack, and you're not on the 200/m plan, cloudflare will change your DNS record and effectively direct the traffic to your server. The pro is a packet flood goes to the CDN node, and that's not associated with any single domain, so it blocks those (you can route longpolling through cloudflare since it's HTTP traffic)

We do have protection in place. read up to my previous posts this is not going to stop DDOS attacks not by a long shot.

If enough people use this script we might be able to make their job that little bit harder by shutting down bots and spreading awareness of tactics they are using. In the end its up the the person if they want to use it or not i just figured others might also find this useful
Pages:
Jump to: