One of our clients has been suffering from a DDoS for the last 2-3
weeks, it gets occasionally worse and then drops down to more manageable
levels ...
Last Sunday, then Yesterday (Sunday again) and then again today at 18:00
we saw massive spikes which are flooding all of our external
connectivity (6 x GE ports) bringing massive packet loss / etc
If we turn the customer's IP address off, traffic subsides .... no need
to even black hole the route ..
This is a small snapshot of what we're seeing on the web server
19:06:02.150681 00:19:56:65:3f:46 > 00:25:90:33:02:5c, ethertype IPv4
(0x0800), length 1514: (tos 0x0, ttl 52, id 56948, offset 0, flags [+],
proto: UDP (17), length: 1500) 208.74.148.200.52004 >
93.188.179.122.733: UDP, length 8192
19:06:02.150803 00:19:56:65:3f:46 > 00:25:90:33:02:5c, ethertype IPv4
(0x0800), length 1514: (tos 0x0, ttl 123, id 7894, offset 1480, flags
[+], proto: UDP (17), length: 1500) 89.151.91.15 > 93.188.179.122: udp
19:06:02.150928 00:19:56:65:3f:46 > 00:25:90:33:02:5c, ethertype IPv4
(0x0800), length 1514: (tos 0x0, ttl 48, id 3381, offset 5920, flags
[+], proto: UDP (17), length: 1500) 64.191.106.72 > 93.188.179.122: udp
19:06:02.151171 00:19:56:65:3f:46 > 00:25:90:33:02:5c, ethertype IPv4
(0x0800), length 1514: (tos 0x0, ttl 50, id 29202, offset 4440, flags
[+], proto: UDP (17), length: 1500) 70.39.109.34 > 93.188.179.122: udp
19:06:02.151174 00:19:56:65:3f:46 > 00:25:90:33:02:5c, ethertype IPv4
(0x0800), length 1514: (tos 0x0, ttl 123, id 7894, offset 5920, flags
[+], proto: UDP (17), length: 1500) 89.151.91.15 > 93.188.179.122: udp
but we're seeing a _lot_ of this traffic
apart from a) giving in and turning the customer off, or b) paying
Prolexic more than the site grosses in a year .. any ideas?
Its all UDP so I can't see how a tarpit would help ...
I have a flow setup on our Junipers (BGP speakers at the borders) which
is set to discard the traffic, but that isn't helping much either .. as
soon as I ifup the interface alias on their server we start to see Gbps
of traffic flooding our external links again :(
Filter: __flowspec_default_inet__
Counters:
Name Bytes
Packets
93.188.179.112/28,*,proto=17,port=17
3675692 2487
jon@hex-gw1> show configuration routing-options flow
route client-attack {
match {
destination 93.188.179.112/28;
protocol udp;
port 17;
}
then discard;
}
Anyone have any ideas? I'm about ready to tell the client to go
elsewhere .. but would really rather not, and how do we address this the
next time it happens (give all of our customers away ??)
Jon