real-time DDoS help?

Howdy,

Is there any place where people with experience dealing with DDoS attacks
hang out? I'm getting very little assistance from my upstream beyond
"call whomever is in charge of each IP attacking and make them stop", and
"even though we null route the destination IP being attacked, this traffic
will be billed".

I've got a nice snippet of flows, so I can mostly see where everything is
coming from, and it's obvious what the target is, but my
flow-stat/flow-report skills are pretty weak.

Oddly, in eight years of working for smallish ISPs I've never been hit
very hard, believe it or not. Is the response from my upstream typical?
I was expecting a bit more cooperation rather than them seeing as this as
an opportunity to bill me for lots of traffic.

Thanks,

Charles

Charles Sprickman wrote:

Hmmm.....
Maybe if NANOG had irc.nanog.org, maybe that might be something to
consider - a real-time network of communication for network operators
to deal with issues, etc.

-- Jonathan

There's always http://puck.nether.net/mailman/listinfo/nsp-security

> Maybe if NANOG had irc.nanog.org, maybe that might be something to
> consider - a real-time network of communication for network operators
> to deal with issues, etc.

There's always http://puck.nether.net/mailman/listinfo/nsp-security

I can tell you right off AS8059 doesn't meet the requirements. I'd gladly
respond to any reports of attacks from them, but I don't think you'd ever
see any.

Basement multihomers unite.

Charles

Is there any place where people with experience dealing with DDoS attacks
hang out? I'm getting very little assistance from my upstream beyond
"call whomever is in charge of each IP attacking and make them stop", and
"even though we null route the destination IP being attacked, this traffic
will be billed".

It seems that you should look somewhere else for your next bandwidth
contract...

I've got a nice snippet of flows, so I can mostly see where everything is
coming from, and it's obvious what the target is, but my
flow-stat/flow-report skills are pretty weak.

Fake or real source IPs ? TCP SYNs, ICMPs, UDPs ?

Rubens

Howdy,

Is there any place where people with experience dealing with DDoS attacks
hang out? I'm getting very little assistance from my upstream beyond
"call whomever is in charge of each IP attacking and make them stop", and
"even though we null route the destination IP being attacked, this traffic
will be billed".

That's outrageous but not unheard of....if it never makes it to you then you shouldn't be billed for it.

I've got a nice snippet of flows, so I can mostly see where everything is
coming from, and it's obvious what the target is, but my
flow-stat/flow-report skills are pretty weak.

Oddly, in eight years of working for smallish ISPs I've never been hit
very hard, believe it or not. Is the response from my upstream typical?
I was expecting a bit more cooperation rather than them seeing as this as
an opportunity to bill me for lots of traffic.

The normal flow unless you're a big guy yourself is to talk to your upstreams who contact theirs and put null routes in place at both steps. Depending on the size of the DDoS. My current place of employment we got nailed down with 100mbit+ SYN attack here recently (I had an eng from one of the major upstreams, can't rememebr which, quote it at north of 200mbit, but by the time it made it to me we were only attempting to sink about 90-120mbit, but we couldn't hardly keep up with that).

Most places will not charge for that. And I think it's absurd that anyone does, and that you should probably take your business elsewhere if your upstream is engaged in this sort of gouging.

Charles Sprickman wrote:

Is there any place where people with experience dealing with DDoS attacks
hang out? I'm getting very little assistance from my upstream beyond
"call whomever is in charge of each IP attacking and make them stop", and
"even though we null route the destination IP being attacked, this traffic
will be billed".

While I hate the "blame the victim" mentality in general, I'd guess that up to half of all the packet floods we've experienced were aimed at compromised client boxes that were hosting illegitimate services. If your victim has no idea why they're being attacked, I'd scrutinize the target host very carefully.

Or if your victim is a shell host who's probably got some skript kiddie engaged in channel wars, it will likely save you a lot of time and grief to just dump that client. Is losing one worth sacrificing the rest?

Unless you know exactly why you're being attacked and are willing to suffer these consequences indefinitely, you will do yourself a big favor by looking at the victim to see why the attack is occurring and removing the target from your network.

>
> > Maybe if NANOG had irc.nanog.org, maybe that might be something to
> > consider - a real-time network of communication for network operators
> > to deal with issues, etc.
>
> There's always http://puck.nether.net/mailman/listinfo/nsp-security

I can tell you right off AS8059 doesn't meet the requirements. I'd gladly
respond to any reports of attacks from them, but I don't think you'd ever
see any.

which of your 2 upstreams isn't helping out? I'm fairly certain both
providers have security groups, and do mitigate attacks for customers on a
regular basis. Perhaps you are not getting in touch with the correct
customer service folks? We often have this issue ;(

Basement multihomers unite.

hurray!

which of your 2 upstreams isn't helping out? I'm fairly certain both
providers have security groups, and do mitigate attacks for customers on a
regular basis. Perhaps you are not getting in touch with the correct
customer service folks? We often have this issue ;(

I don't want to go too much into it, but HE.net, once they supplied me
with the proper channels immediately null-routed the IP, hurrah! I'm
waiting on the answer as to whether we get billed or not for this traffic.

The other upstream whom I won't name is through a reseller. That wasn't
necessarily our first choice, but their own sales department told us to go
with a reseller as they were not interested in two cabinets and a 100Mb
handoff, so that's what we did.

I'm hoping their reseller is just misunderstanding something here. For a
long time he kept telling me "this is illegal, you need to contact the
source networks and make them stop it", so I'm guessing DDoS is not a
subject he's intimately familiar with (nor am I, but I understand the
mechanics of it, and I don't think that I could contact each source in my
lifetime).

Thanks to everyone for your input. To answer some other questions, the
box under attack is not a client box, but it is the main webserver for the
ISP's own site and ~user sites. It's also has shell accounts, but since
I've been here I've not seen one complaint about any of our users. Most
seem to not know much beyond how to use "pine". I think most of our
heavy-duty irc users are using windows clients at home, any irc tools on
the server are horribly dated. Not saying it's not a possibility, but I
do personally watch "abuse@" and I've not seen anyone complain about the
box.

Thanks again,

Charles

Charles Sprickman wrote:

I don't want to go too much into it, but HE.net, once they supplied me
with the proper channels immediately null-routed the IP, hurrah! I'm
waiting on the answer as to whether we get billed or not for this traffic.

One other way to get a hold of clueful contacts, especially if you have your own AS, is the inoc-dba project - http://www.pch.net/inoc-dba/

  srs

I could host and/or setup the irc server if anyone is interested.

> which of your 2 upstreams isn't helping out? I'm fairly certain both
> providers have security groups, and do mitigate attacks for customers on a
> regular basis. Perhaps you are not getting in touch with the correct
> customer service folks? We often have this issue ;(

I don't want to go too much into it, but HE.net, once they supplied me
with the proper channels immediately null-routed the IP, hurrah! I'm
waiting on the answer as to whether we get billed or not for this traffic.

obviously I can't speak for eiteher of your providers, but normally you'd
only get billed for traffic that goes down your link to the provider, not
for traffic which enters the provider and isn't delivered to you.

I'm hoping their reseller is just misunderstanding something here. For a
long time he kept telling me "this is illegal, you need to contact the
source networks and make them stop it", so I'm guessing DDoS is not a
subject he's intimately familiar with (nor am I, but I understand the
mechanics of it, and I don't think that I could contact each source in my
lifetime).

Depending on the situation you might not have much other recourse :frowning: To
stop the pain though, each provider should provide you with some immediate
actions. Perhaps asking them if you can do customer triggered blackholing?

Just following up with a bit more info.

While I have no way of knowing whether these IPs are the true source, and
there's likely more that I didn't capture in the short windows where the
router was up and exporting netflow data, this is what I have. If anyone
here is in charge of the following blocks, perhaps you might want to have
a look:

208.39.142 (comcast, business cable)
216.235.244 (e-xpedient)
218.244.162 (chinacom)
218.247.37 (china network connect)
61.48.80 (china network communications group)
62.231.65 (romania data systems)

Actually, looking at those sources, I'm betting they're not spoofed. :slight_smile:

Thanks,

Charles

My IRC server is at irc.citynetwireless.net. It runs dancer-ircd 1.0.35
along with its own services (Nick/ChanServ/etc) and stays up as long as
my DS3 does :).

i thought there was nanog @efnet with a lot of these people on it...
i'm sure there are plenty of chat networks out tehre without having to
start a new one.

Well if people use this IRC server, there's definately going to be more
control over the channel and server itself. And if needed, other members
could gain more control server-wide. Let me know if you have any
questions.

) Well if people use this IRC server, there's definately going to be more
) control over the channel and server itself. And if needed, other members
) could gain more control server-wide. Let me know if you have any
) questions.

You may find that an IRC server used for the purposes of discussing DoS
attacks, to the point of being used for real time mitigation of same, will
ultimately be targeted as part of those attacks.

A dedicated DS3 probably does not provide enough bandwidth to run a modern
DoS-resistent IRC server. As a point of reference, during an attack, some
EFnet IRC servers may take in multiple hundreds of Mb/s before upstream
action is initiated.

Why a NANOG IRC server would be targeted, I have no clue. But if that's
the case, count me out.

If need be, if someone were to actually provide a shell or something
that did have enough bandwidth, I could setup the IRC server there and it
would be fine.