Wrong, wrong, WRONG! methods of DDoS mitigation
Habr, this is a transcription of speeches CTO Qrator Labs Tyom ximaera Gavrichenkova at RIPE77 in Amsterdam. We could not translate its name into Russian with preservation of meaning, and therefore we decided to help Habra in entering the English-language market and left everything to as it is 3r311.
This is a quote from one of my favorite bands. Dave Gahan from Depeche Mode is a living proof that you can say the word “wrong” 65 times in 5 minutes and still remain a rock star. Let's see if I can do it.
security section StackExchange, I constantly stumble on the same approach to preventing cyber attacks.
Suppose we, as a company, do not expect the Spanish Inquisition, ugh, Chinese users. Why don't we just restrict access from their IP addresses? We are not Facebook after all, and our services are available only in a limited number of regions. And, actually, Facebook is also unavailable in China, why should we worry?
Outside the world of information technology, this technique is sometimes called 3r361. redlining
. The essence of this phenomenon is as follows.
Suppose you are the director of a taxis or pizzeria. You have accumulated some statistics that in some areas of the city can rob your courier, or there is a high probability that your car will be scratched. Well, you collect all the employees, draw a thick red line on the map of the city and announce that you do not provide services beyond the red border. (Due to the nature of the structure of most American cities, this, by the way, is almost equivalent to a denial of services on an ethnic basis and is considered a big problem.) 3r35353.
We can do the same with IP addresses, right? Any IP address belongs to a certain country; therefore, there is an official database maintained by the IETF and RIPE, confirming the allocation of each IP address.
If we confine ourselves only to technical aspects, then, for the time being, the first that comes to mind is the fact that geo-databases are commercial products of commercial companies, each of which collects data in its own, often not completely clear, ways. Such products can be used for statistical or other research, but providing a wide audience for a production-service based on such a product is an absolute idiocy for countless reasons.
The concept of "ownership" of an IP address does not exist at all. The IP address is not a phone number, the regional registrar does not transfer them to the property, which is explicitly written in its policies. If there is an entity in the world to which IP addresses "belong", then it is 3r3888. IANA
and not a country or a company.
As a side note - the process of protecting (your) copyrights has just become complicated at times.
Of course, some of this (although not all) can get better with the advent of IPv6. However, we are now talking about DDoS attacks; The era of real IPv6 DDoS has not come yet, and while we gain experience, completely different situations can arise. In general, it is still too early to think about it.
But, going back to DDoS: what if we know for sure that the remote side is doing something clearly malicious?
Our setup: 40G traffic, most likely DNS traffic, since it comes from port 53.
As we know, this behavior is typical for attacks like DNS amplification DDoS. Amplification attacks use a vulnerable server in order to, you know increase traffic, and the source IP address in them will be that same vulnerable server.
What if we use any technology from 3r3129. those that we have
, in order to restrict access to these vulnerable servers? Let all these DNS reflectors be finally patched to stop being a threat, right?
No not like this!
This is a true story. 3r3144. The events described occurred in the state of Minnesota in 198? 3-333229. . At the request of the survivors, all names have been changed. Out of respect for the dead, the rest of the events were displayed exactly as they occurred.
The company received DNS traffic in the face by gigabytes and decided to deal with them using black lists of IP addresses.
After two hours, the attackers somehow noticed this and immediately changed the pattern of attack. Their ability to conduct amplification attacks had previously been based on their ability to generate packets with fake source IP addresses, so they continued to do this, but in a slightly different way.
They began to flood the victim directly with UDP traffic from the source port 53 and fake IP addresses from the entire IPv4 address pool. The NetFlow script used by the company decided that the amplification attack was going on and began to ban sources.
Since you can sort out the entire IPv4 address space in a matter of hours, you guessed it, it took quite a bit of time for the network equipment to run out of memory and shut down completely.
To exacerbate the situation, the attackers began by sorting out the prefixes of the end users of the most popular and major broadband providers in this country, so the site was unavailable to visitors long before complete denial of service.
A lesson follows from this: do not produce blacklists automatically if you have not verified the IP address of the source of the attack. Especially when dealing with amplification /reflection attacks. They may not seem to be what they really are.
After that, the question remains.
What if we confirm at least the fact that there is indeed a malicious amplifier on the remote resource? Let's scan the Internet and collect IP addresses with all potential amplifiers. Then, if we see any of them in the source field of the package, we will simply block them - they are still amplifiers, right?
Guess what? Not this way!
There are a number of reasons, each of which states that you should never do this. There are millions of potential amplifiers all over the Internet, and it will be extremely easy to fool you by forcing once again to block an excessive number of IP addresses. IPv6 Internet in general is not easy to scan.
But what is really funny here is that in such a situation, the potential of not only false positives, but also false negatives increases. Whereby?
Redlining on other networks!
People hate network scanners. They block them, as their glamor IDS -equipment marks the scanners as a direct threat. They block scanners in a million different ways, and an attacker may have access to amplifiers with which you cannot do anything. No one will ask in advance how soft and fluffy your scanner is. IDS has no such concept as a “good external scanner”.
Here are the key findings:
Do not attempt to use blacklists without being sure that the remote side is not fake;
Do not use blacklists where you cannot do this or where there is a better solution;
Finally, stop breaking the Internet in ways that it is not designed for!
And remember: a complex decision is usually better than a simple one, because simple solutions, as a rule, have complex consequences.
It may be interesting
I definitely enjoying every little bit of it. It is a great website and nice share. I want to thank you. Good job! You guys do a great blog, and have some great contents. Keep up the good worklord of the mysteries
I'm constantly searching on the internet for posts that will help me. Too much is clearly to learn about this. I believe you created good quality items in Functions also. Keep working, congrats!read history's number 1 founder novel online free
We are truly thankful for your blog entry. You will discover a great deal of methodologies in the wake of going to your post. I was precisely scanning for. A debt of gratitude is in order for such post and please keep it up.read free novels online
This blog was extremely helpful. I really appreciate your kindness in sharing this with me and everyone else!read lady midnight online free
Hi there, I found your blog via Google while searching for such kinda informative post and your post looks very interesting for me.lord of the mysteries novel
I was very impressed by this post, this site has always been pleasant news Thank you very much for such an interesting post, and I meet them more often then I visited this site.history's number 1 founder
I know your aptitude on this. I should say we ought to have an online discourse on this. Composing just remarks will close the talk straight away! What's more, will confine the advantages from this data.romance novels online free reading
Fibro Blast Beauty provides non-surgical skin lightening and cosmetic therapy sessions so you can get rid of wrinkles, signs of aging, and other skin issues. Check Out: Fibro Blast Beauty