Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-30 Thread Jean | ddostest.me via NANOG
I'm a bit confused as I thought it was the other way around. No big deal though. So these SYN don't have options which is not normal today. It was in the previous millenium. You should see more options. What you can do is filter SYN based on packet length. 54 bytes is your signature here. The

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-29 Thread xanonyws
Not blocking them will drain my outgoing bandwidth. On Wed, 29 Jan 2020 01:18:32 +0100 dam...@google.com wrote I recommend you *not* block the outgoing RST packets, as blocking them will only make matters worse:   - it leaves the webservers being abused for reflection in the half-o

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-28 Thread Damian Menscher via NANOG
I recommend you *not* block the outgoing RST packets, as blocking them will only make matters worse: - it leaves the webservers being abused for reflection in the half-open SYN_RECV state, which may attract more attention (and blacklisting) - retries from those servers will increase the load to

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-28 Thread Octolus Development
Yes, my server would then respond with RST. Screenshot: https://i.imgur.com/ZVti2yY.png We've blocked outgoing RST, 136.244.67.19 was our test server. But even if the ip is not even exposed to the internet, services will blacklist us. Even if we don't respond, and block every request from the i

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-28 Thread Jean | ddostest.me via NANOG
But you do receive the SYN/ACK? The way to open a TCP socket is the 3 way handshake. Sorry to write that here... I feel it's useless. 1. SYN 2. SYN/ACK 3. ACK Step 1: So hackers spoof the original SYN with your source IP of your network. Step 2: You should then receive those SYN/ACK pack

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-28 Thread Octolus Development
I have tried numerous of times to reach out to Imperva. Imperva said Sony have to contact them & said they cannot help me because I am not a customer of theirs. Something Sony will not do. Sony simply stopped responding my emails after some time. But yes you are right. My IP's are being spoofe

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-28 Thread Tom Beecher
Trying to summarize here, this convo has been a bit disjointed. Is this an accurate summary? - The malicious traffic with spoofed sources is targeting multiple different destinations. - The aggregate of all those flows is causing Impervia to flag your IP range as a bad actor. - Sony uses Impervia

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-28 Thread Jean | ddostest.me via NANOG
Maybe we're looking at the wrong place when dealing with TCP amp. I believe there is a much easier way to solve this. @OP: can you post the tcp flags of the SYN/CK you are receiving from Sony? Thanks Jean On 2020-01-27 20:49, Damian Menscher via NANOG wrote: On Mon, Jan 27, 2020 at 5:43 PM Tö

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-28 Thread Dobbins, Roland
On 28 Jan 2020, at 18:15, Octolus Development wrote: > The problem is that they are spoofing our IP, to millions of IP's > running port 80. So that does in fact sound like a TCP reflection/amplification attack. If you have the relevant information, as it seems that you do, you can ask operat

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-28 Thread Octolus Development
The problem is that they are spoofing our IP, to millions of IP's running port 80. Making upstream providers filter it is quite difficult, i don't know all the upstream providers are used.  The main problem is honestly services that reports SYN_RECV as Port Flood, but there isn't much one can d

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-27 Thread Dobbins, Roland
On Jan 28, 2020, at 11:40, Dobbins, Roland wrote: And even if his network weren't on the receiving end of a reflection/amplification attack, OP could still see backscatter, as Jared indicated. In point of fact, if the traffic was low-volume, this might in fact be what he was seeing. -

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-27 Thread Dobbins, Roland
On Jan 28, 2020, at 07:39, Mike Hammett wrote: If someone is being spoofed, they aren't receiving the spoofed packets. How are they supposed to collect anything on the attack? OP stated that *his own network* was being packeted with a TCP reflection/amplification attack. This means that if h

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-27 Thread Töma Gavrichenkov
Peace, On Tue, Jan 28, 2020, 4:49 AM Damian Menscher wrote: > They don't need to filter by destination. Once a problem customer has > been identified, they can apply an ACL restricting them to only originate > IPs they own. > > [..] > there are ways around that, including public shaming (here)

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-27 Thread Damian Menscher via NANOG
On Mon, Jan 27, 2020 at 5:43 PM Töma Gavrichenkov wrote: > On Tue, Jan 28, 2020, 4:32 AM Damian Menscher wrote: > >> On Mon, Jan 27, 2020 at 5:10 PM Töma Gavrichenkov >> wrote: >> >>> If this endpoint doesn't connect to anything outside of their network, >>> then yes. >>> If it does though, the

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-27 Thread Töma Gavrichenkov
Peace, On Tue, Jan 28, 2020, 4:42 AM Töma Gavrichenkov wrote: > As for the detection of the real source, everything is technically > possible but you need certain bargaining power which a medium-sized (at > best) VPN service probably doesn't have. > ...because if they *did* have some, they coul

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-27 Thread Jared Mauch
-> Sony -> Real Octolus. > > > > > - > Mike Hammett > Intelligent Computing Solutions > http://www.ics-il.com > > Midwest-IX > http://www.midwest-ix.com > > From: "Roland Dobbins" > To: "Octolus Development" > Cc:

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-27 Thread Töma Gavrichenkov
Peace, On Tue, Jan 28, 2020, 4:32 AM Damian Menscher wrote: > On Mon, Jan 27, 2020 at 5:10 PM Töma Gavrichenkov > wrote: > >> If this endpoint doesn't connect to anything outside of their network, >> then yes. >> If it does though, the design of the filter might become more complicated. >> > >

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-27 Thread Damian Menscher via NANOG
On Mon, Jan 27, 2020 at 5:10 PM Töma Gavrichenkov wrote: > On Tue, Jan 28, 2020, 4:02 AM Damian Menscher via NANOG > wrote: > >> The victim already posted the signature to this thread: >> - source IP: 51.81.119.7 >> - protocol: 6 (tcp) >> - tcp_flags: 2 (syn) >> >> That alone is sufficient

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-27 Thread Töma Gavrichenkov
Peace, On Tue, Jan 28, 2020, 4:02 AM Damian Menscher via NANOG wrote: > The victim already posted the signature to this thread: > - source IP: 51.81.119.7 > - protocol: 6 (tcp) > - tcp_flags: 2 (syn) > > That alone is sufficient for Level3/CenturyLink/etc to identify the source > of this a

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-27 Thread Töma Gavrichenkov
Peace, On Tue, Jan 28, 2020, 3:43 AM Ben Cannon wrote: > Transit carriers could work the flows backwards. > And if the stars align, some of them might even do that for you once even though you are not their direct customer. Next you're going to convince them to talk to the (probably abuse resi

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-27 Thread Damian Menscher via NANOG
uot;Roland Dobbins" , "NANOG Operators' > Group" > *Sent: *Monday, January 27, 2020 6:40:25 PM > *Subject: *Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC > > Transit carriers could work the flows backwards. > > -Ben Cannon > CEO 6x7 Networ

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-27 Thread Mike Hammett
tt" Cc: "Roland Dobbins" , "NANOG Operators' Group" Sent: Monday, January 27, 2020 6:40:25 PM Subject: Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC Transit carriers could work the flows backwards. -Ben Cannon CEO 6x7 Networks & 6x7 Tele

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-27 Thread Ben Cannon
gt; > Midwest-IX > http://www.midwest-ix.com <http://www.midwest-ix.com/> > > From: "Roland Dobbins" <mailto:roland.dobb...@netscout.com>> > To: "Octolus Development" mailto:ad...@octolus.net>> > Cc: "Heather Schiller via NANOG" m

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-27 Thread Mike Hammett
st-IX http://www.midwest-ix.com - Original Message - From: "Roland Dobbins" To: "Octolus Development" Cc: "Heather Schiller via NANOG" Sent: Monday, January 27, 2020 6:29:16 PM Subject: Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-27 Thread Dobbins, Roland
On Jan 28, 2020, at 04:12, Octolus Development wrote: I don't have an exact timestamp, because the attacks are really difficult to see as well. If you implement an open-source flow telemetry collection system & export flow telemetry from your edge routers to it, this becomes trivial. See th

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-27 Thread Dobbins, Roland
On Jan 28, 2020, at 04:12, Octolus Development wrote: It is impossible to find the true origin of where the spoofed attacks are coming from. This is demonstrably untrue. If you provide the requisite information to operators, they can look through their flow telemetry collection/analysis sys

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-27 Thread Octolus Development
It is impossible to find the true origin of where the spoofed attacks are coming from. I don't have an exact timestamp, because the attacks are really difficult to see as well. As I said, you can block the IP from accessing internet completely. Yet, some services will flag our IP as "port flood

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-27 Thread Damian Menscher via NANOG
One approach would be to trace the true origin of the spoofed packets, and get it filtered by their upstream. To that end, can you share some details of a recent tcp-amp attack? Eg, the victim IP and a timestamp? Damian On Mon, Jan 27, 2020 at 12:06 PM Octolus Development wrote: > Hey everyon

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-27 Thread Octolus Development
Hey everyone, decided to do a small update for those who are interested. - Sony reached out to me, they whitelisted our IP's temporarily but then removed them. We have not heard from them since (10th January) - We tracked down the cause of the blacklist, it is happening because we are a victim o

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-10 Thread Octolus Development
It's not about that this thread is about, nor why it is blacklisted. There is an exploit (DDoS) that will ban even home connections from their networks. On 10.01.2020 19:51:10, Mark Milhollan wrote: On Fri, 10 Jan 2020, Octolus Development wrote: >I run a VPN Business dedicated to protecting cli

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-10 Thread Mark Milhollan
On Fri, 10 Jan 2020, Octolus Development wrote: I run a VPN Business dedicated to protecting clients from DDoS Attacks that happens "all day long" on PlayStation Network. We need our VPN to work on PSN, all our customers uses their service. They are still investigating the problem, let's see

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-10 Thread Octolus Development
Exactly that. I run a VPN Business dedicated to protecting clients from DDoS Attacks that happens "all day long" on PlayStation Network. We need our VPN to work on PSN, all our customers uses their service. They are still investigating the problem, let's see what the results will be. On 10.01.2

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-10 Thread Radu-Adrian Feurdean
On Thu, Jan 9, 2020, at 00:05, Keith Medcalf wrote: > > On Wednesday, 8 January, 2020 14:35. Octolus Development > wrote: > > Stop doing business with Criminal Organizations (SONY). Problem solved. You (as a provider) may not do any business with them, but your customers may, and will yel

RE: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-08 Thread Keith Medcalf
On Wednesday, 8 January, 2020 14:35. Octolus Development wrote: >Sony are currently "looking into it" but they do not seem to care much. I >am a customer of Sony, I own PlayStation consoles and I am not able to >access their service. They tell me to change my IP instead of solving the >actual

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-08 Thread Octolus Development
No, that is not why.  We deployed a brand new IP, and it was banned 24-48 hours after the DDoS Attack was hit. The other IP that was never attacked, never got banned. We've tracked down the issue and confirmed it is the DDoS Attack coming from Akamai and Imperva's IP's that are banning us from

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-08 Thread Töma Gavrichenkov
Peace, Hey, your website says you're the developer of OctoVPN which is a VPN solution. *This* might be effectively the reason of blocking, not a DDoS. Gaming and streaming services typically discourage VPN traffic because a) VPNs help to circumvent regional restrictions, b) miscreants use VPNs t

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-08 Thread Hugo Slabbert
You're getting hit with something reported as "TCP-AMP" (I'm assuming TCP amplification; not sure what's classifying this for you) on your IP address, and then shortly thereafter that IP address is blocked from Imperva's services? Are the source IP addresses in those "TCP-AMP" attacks Sony IP addr

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-08 Thread Octolus Development
The thing is. I can buy a brand new IP. It works fine on the websites. The moment it's hit by a DDoS Attack (TCP-AMP) .. Only 24-48 hours later, it's banned from all Inculpsa's aka Imperva's websites :) so something is horrible done wrong on their end and they're not interested in helping.. nei

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-08 Thread Lukas Tribus
Hello, On Wed, 8 Jan 2020 at 18:26, Octolus Development wrote: > > The error it displays on both Sony, and Imperva (and whatever websites who > uses their protection). So this problem is not with Sony, but rather Imperva > blocking IP's wildly. > > The IP's are not blocks, it's a single IP and

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-08 Thread Octolus Development
The error it displays on both Sony, and Imperva (and whatever websites who uses their protection). So this problem is not with Sony, but rather Imperva blocking IP's wildly. The IP's are not blocks, it's a single IP and the block/blacklist lifts after 7 days.  Error that appears on those webs

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-08 Thread Lukas Tribus
Hello, On Wed, 8 Jan 2020 at 16:53, Octolus Development wrote: > But here's the funny part, when connecting to their own website imperva.com > from those IP's -- we are getting the exactly same error code that Sony are > returning. And what error code / full error is that *exactly*? I assumed

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-08 Thread Octolus Development
Tracked it down. Sony are using "Imperva" which is former Incapsula. The IP's that was attacked by this DDoS Attack, have been added to their threatradar, their phone support (Imperva) literally hangs up the call when you try to question if they can provide more information about why the IP's a

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-07 Thread Hugo Slabbert
> > Well, in almost any* case blacklisting reflection vectors by IP is an > insanely bad practice. > * — I can *think* of a use case when this could be an appropriate solution > (I recall Netscout/Arbor once had such a use case), but in the overwhelming > majority of incidents it is absolutely not,

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-07 Thread Töma Gavrichenkov
Peace, On Tue, Jan 7, 2020 at 9:10 PM Hugo Slabbert wrote: > And you're sure that you are the reflection target not the reflection vector? NB: I have just checked the IP addresses the OP has provided me with (offlist) against our database of known reflection sources, and I confirm that none of t

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-07 Thread Octolus Development
No, that's only for "Account Takeover".. And those problems we've solved. That was false reports, and we got whitelisted. However with this issue? They decide to completely ignore the emails, it seems like we're being either spoofed or people are attacking us with Sony's IP space. What happens,

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-07 Thread Töma Gavrichenkov
Peace, On Tue, Jan 7, 2020, 9:10 PM Hugo Slabbert wrote: > And you're sure that you are the reflection target not the reflection > vector? > Well, in almost any* case blacklisting reflection vectors by IP is an insanely bad practice. * — I can *think* of a use case when this could be an approp

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-07 Thread Josh Luthman
To be fair they do contact you. It's an automated process that's done daily and it has a light amount of information. The rest is totally accurate - the Playstation network stuff is an absolute joke (think back to how they were down for MONTHS). Josh Luthman Office: 937-552-2340 Direct: 937-552-

RE: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-07 Thread Tony Wicks
Good luck! I’ve dealt with such PSN IP blocking issues for several years and have found that Sony is the absolute worst possible gaming/content provider I’ve ever dealt with. One company I worked at had to threaten legal action as PSN would block CGN IPv4 addresses on their network and then tell

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-07 Thread Hugo Slabbert
And you're sure that you are the reflection target not the reflection vector? As in it's definitely the case that you are the *target* here (your IP addresses are being spoofed, and the reflection attack is hitting you) rather than that someone is abusing endpoints in your network, i.e. reflecting

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-07 Thread Töma Gavrichenkov
Peace, On Mon, Jan 6, 2020, 9:27 PM Octolus Development wrote: > We're facing some reflected DDoS attacks, where the source address is > spoofed to appear to be our IPs, and as a result getting blacklisted. > Sony's support has told us to "change IPs" > Wait, are they blacklisting spoofed IP(v4

Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-07 Thread Josh Luthman
Went through this last year. They simply didn't do anything productive. You have to change IPs if you want a quick resolution. They should email the POC for the IP (I think towards the end of the day) as to what happened and I believe a time frame when it will get resolved. Hopefully someone wit

Reaching out to Sony NOC, resolving DDoS Issues - Need POC

2020-01-06 Thread Octolus Development
Hi all, We've been trying to get in contact with Sony and/or Akamai to resolve an IP blacklisting issue. Support is not useful, and our customers are complaining.  If anyone has a POC for somebody over at Sony or PSN who can help us resolve these issues, it would be much appreciated! We're fa