Re: SNMP DDoS: the vulnerability you might not know you have

2013-07-31 Thread Thomas St-Pierre
The problem isn't the people on this list leaving the public snmp
community on their devices, it's the vendors of home routers leaving it
there in their devices. Normal end users don't know or even care what snmp
is. (nor can we expect them too)

A simple scan of a large cable/dsl ISP's address space will likely net you
tens of thousands of devices which respond to the public snmp community.

Thomas



On 13-07-31 10:57 AM, Blake Dunlap iki...@gmail.com wrote:

This looks like more a security issue with the devices, not border
security
issues.

If you're seeing replies of that size, it means the devices themselves are
set up to allow public queries of their information (not secured by even
keys), which no one should be comfortable with. People should never be
leaving the public access snmp strings on devices even if they are
internal. Edge blocking just masks the real issue.


-Blake


On Tue, Jul 30, 2013 at 11:25 PM, bottiger bottige...@gmail.com wrote:

 Before you skim past this email because you already read the Prolexic
 report on it or some other article on the internet, there are 2
 disturbing properties that I haven't found anywhere else online.

 1) After sending abuse emails to many networks, we received many angry
 replies that they monitored their traffic for days without seeing
 anything (even as we were being attacked) and that their IPs were
 spoofed and would block us for spamming them.

 What we discovered was that their firewalls/routers/gateways coming
 from vendors like Cisco and SonicWall apparently didn't record SNMP
 traffic going in or out of themselves. We confirmed this multiple
 times by running a query to an IP that was claimed to be clean and
 watching the response come 10-60 seconds later because the device was
 being so heavily abused.

 2) SNMP reflection offers the largest amplification factor by far,
 even surpassing DNS, Chargen, or NTP by a wide margin. I have tested a
 68 byte query and received responses of up to 30,000 to 60,000 bytes.
 The trick is to use GetBulkRequest to start enumerating from the first
 OID and setting max repetitions to a large number. This is contrary to
 the other articles online which suggest a much smaller amplification
 factor with other queries.

 This protocol is also prevalent in many devices ranging from routers
 to printers.

 To solve this problem you should block SNMP traffic coming from
 outside your network and whitelist outside IPs that require it.






BGP instability?

2013-05-16 Thread Thomas St-Pierre
Hi,

Did anyone else see a large amount of instability between around 12:20am and 
3:10am? (UTC, May 17th) We saw around 9 million announces per hour during that 
period come in through all our upstreams (vs an average normal of around 128k 
per hour).

Just curious as to what happened, if anything.

Thanks,
Thomas


Mitigating DNS amplification attacks

2013-04-30 Thread Thomas St-Pierre
Hi!

I was wondering if anyone had any experience with dealing with open resolvers 
as a web hoster? We currently have some 40,000 ip's that respond to DNS in our 
AS, the majority of which are not open but do reply with a referral to the 
root zones. We've been sending emails to our clients but as the servers are not 
managed by us, there's not much we can do at that level.

Recently we've seen a large increase in the number and volume of DNS 
amplification DDOS's that are being reflected off of our AS. Just today we've 
seen at least 6 different attacks with between 4 and 10gbps leaving our AS each 
time. It's not really causing us issues at the moment because we have the 
capacity, but I'd hate to be on the receiving side. (and indeed, have been on 
the receiving side in the past, so I know how much it can suck)

Has anyone ever tried mitigating/rate-limiting/etc these attacks in the network 
before? (vs at the server/application level)

We have an Arbor peakflow device, but it's not really geared for this scenario 
I find. It will detect the outgoing attack via the flows, but all we can really 
do is null-route the victims ip in our AS. Ideally we would need a way to 
rate-limit DNS packets based on source ip. Maybe a linux box that handles 
dropping packets from the same source-ip over 1000/sec with some policy-based 
routing sending the DNS traffic to it? Does such a box exist already?

If anyone has any ideas or suggestions, then by all means! There must be a 
better way to do this, and I'd really like to avoid re-inventing the wheel if 
it's been invented already. :)

Thanks!
Thomas


Re: Mitigating DNS amplification attacks

2013-04-30 Thread Thomas St-Pierre
Hi!

On 13-04-30 7:57 PM, Dobbins, Roland rdobb...@arbor.net wrote:


On May 1, 2013, at 6:43 AM, Thomas St-Pierre wrote:

  We've been sending emails to our clients but as the servers are not
managed by us, there's not much we can do at that level.

Sure, there is - shut them down if they don't comply.  Most ISPs have AUP
verbiage which would apply to a situation of this type.

Unfortunately I somehow doubt management is going to look favourably on a
request to shut down so many clients. :( The large majority of the servers
being used in the attacks are not open resolvers. Just DNS servers that
are authoritative for a few domains, and the default config of the dns
application does referrals to root for anything else.

Yes there are ways of protecting against this on the server itself, but I
don't see it happening here given the complexity of many of the solutions.
I hate to say it, but if it's not next - next - next - finish, or
integrated as an option in one of the common web hosting panels (cPanel,
Plesk, etc) people won't do it. We still struggle just getting people to
close actual open resolvers, and that is easy to configure.



 Has anyone ever tried mitigating/rate-limiting/etc these attacks in the
network before? (vs at the server/application level)

QoS doesn't work, as the programmatically-generated attack traffic
'crowds out' legitimate requests.

 We have an Arbor peakflow device, but it's not really geared for this
scenario I find.

Peakflow SP is a NetFlow-based anomaly-detection system which performs
attack detection/classification/traceback.  Please feel free to ping me
offlist about additional system elements which perform attack mitigation.


Pinged off-list!

Thanks!
Thomas




Re: Mitigating DNS amplification attacks

2013-04-30 Thread Thomas St-Pierre
Hi Damian!

We offer a DNS hosted solution, most people still use their own servers though. 
(especially those with control panels such as cPanel or plesk, where it's 
built-in).

As for BCP38, I would love to stop the spoofed packets, however with them 
coming from our upstreams, (Level3, Cogent, Tata, etc) I don't see how we can.

Thanks!,
Thomas


From: Damian Menscher dam...@google.commailto:dam...@google.com
Date: Tuesday, 30 April, 2013 8:32 PM
To: Thomas St.Pierre tstpie...@iweb.commailto:tstpie...@iweb.com
Cc: Dobbins, Roland rdobb...@arbor.netmailto:rdobb...@arbor.net, NANOG 
list nanog@nanog.orgmailto:nanog@nanog.org
Subject: Re: Mitigating DNS amplification attacks

On Tue, Apr 30, 2013 at 5:28 PM, Thomas St-Pierre 
tstpie...@iweb.commailto:tstpie...@iweb.com wrote:
On 13-04-30 7:57 PM, Dobbins, Roland 
rdobb...@arbor.netmailto:rdobb...@arbor.net wrote:
On May 1, 2013, at 6:43 AM, Thomas St-Pierre wrote:

  We've been sending emails to our clients but as the servers are not
managed by us, there's not much we can do at that level.

Sure, there is - shut them down if they don't comply.  Most ISPs have AUP
verbiage which would apply to a situation of this type.

Unfortunately I somehow doubt management is going to look favourably on a
request to shut down so many clients. :( The large majority of the servers
being used in the attacks are not open resolvers. Just DNS servers that
are authoritative for a few domains, and the default config of the dns
application does referrals to root for anything else.

Offering a DNS service to your customers may allow you to provide a good 
alternative to push those customers onto.  You can then manage it properly.

But I think DNS isn't the real issue here, it's the fact you're receiving 
spoofed traffic.  I'd start by tracking the attacks backwards through your 
upstreams, as obviously someone in the path isn't enforcing BCP 38.  Stop the 
spoof capability and the attacks will stop.  It requires less effort overall 
(vs your counterparts at every hosting provider needing to solve the problem 
for their networks) and provides the best benefit to the victims.

Damian