Stories
Slash Boxes
Comments

SoylentNews is people

posted by martyb on Friday March 02 2018, @12:46PM   Printer-friendly
from the quick-reaction dept.

GitHub has been hit with the largest-ever DDoS attack, and it was only down for a few minutes:

On Wednesday, February 28, 2018 GitHub.com was unavailable from 17:21 to 17:26 UTC and intermittently unavailable from 17:26 to 17:30 UTC due to a distributed denial-of-service (DDoS) attack.

[...] Cloudflare described an amplification vector using memcached over UDP in their blog post this week, "Memcrashed - Major amplification attacks from UDP port 11211". The attack works by abusing memcached instances that are inadvertently accessible on the public internet with UDP support enabled. Spoofing of IP addresses allows memcached's responses to be targeted against another address, like ones used to serve GitHub.com, and send more data toward the target than needs to be sent by the unspoofed source. The vulnerability via misconfiguration described in the post is somewhat unique amongst that class of attacks because the amplification factor is up to 51,000, meaning that for each byte sent by the attacker, up to 51KB is sent toward the target.

[...] Between 17:21 and 17:30 UTC on February 28th we identified and mitigated a significant volumetric DDoS attack. The attack originated from over a thousand different autonomous systems (ASNs) across tens of thousands of unique endpoints. It was an amplification attack using the memcached-based approach described above that peaked at 1.35Tbps via 126.9 million packets per second.

Also at Wired and The Register.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 3, Interesting) by BsAtHome on Friday March 02 2018, @02:29PM (9 children)

    by BsAtHome (889) on Friday March 02 2018, @02:29PM (#646369)

    You do not do RPF in the backbone because you have multiple routes for transit to consider. The (outer-) edge is entirely different and is not involved in generic routing transit traffic. Your tiny little server or home PC is not part of the transit-network and there is generally no need for it to send with a different source-address than its own.

    Starting Score:    1  point
    Moderation   +1  
       Interesting=1, Total=1
    Extra 'Interesting' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   3  
  • (Score: 2) by c0lo on Friday March 02 2018, @02:40PM (8 children)

    by c0lo (156) Subscriber Badge on Friday March 02 2018, @02:40PM (#646378) Journal

    Your tiny little server or home PC is not part of the transit-network and there is generally no need for it to send with a different source-address than its own.

    Who exactly are you speaking of?
    The guys who left their memcached accessible? If true, how RPF would have helped?
    The hackers running the reflection/amplification attack? They do know enough to disable it even if enabled.

    --
    https://www.youtube.com/watch?v=aoFiw2jMy-0 https://soylentnews.org/~MichaelDavidCrawford
    • (Score: 2) by BsAtHome on Friday March 02 2018, @03:28PM (7 children)

      by BsAtHome (889) on Friday March 02 2018, @03:28PM (#646415)

      The memcached servers accepted packets with a forged source-address and replied to that address. They only amplified the problem (and were badly configured to allow access in the first place). The originator (original and actual source) packets to the memcached servers should have been filtered at the *source-network* because they are *easily*detectable* forged packets.

      This is no rocket science and has been best practice network 101 for a very long time. There are only /very/ rare occasions and server-setups where RPF can be problematic. Your standard "we host a website" junk-machine or your home-PC has no business sending out packets that have the wrong source-address. If your machine sends packets with foreign source-addresses, then it is most likely compromised in one or another way.

      • (Score: 2) by c0lo on Friday March 02 2018, @03:40PM (5 children)

        by c0lo (156) Subscriber Badge on Friday March 02 2018, @03:40PM (#646425) Journal

        The originator (original and actual source) packets to the memcached servers should have been filtered at the *source-network* because they are *easily*detectable* forged packets.

        Since at the origin there be haxors, possibly state-sponsored haxors, why would they filter out those packets they so carefully nurtured?
        Is this some sort of a RFC 3514 joke?

        --
        https://www.youtube.com/watch?v=aoFiw2jMy-0 https://soylentnews.org/~MichaelDavidCrawford
        • (Score: 2) by BsAtHome on Friday March 02 2018, @03:50PM (4 children)

          by BsAtHome (889) on Friday March 02 2018, @03:50PM (#646434)

          The situation is so problematic not because of the state-sponsored attacks. Those state-sponsored attacks use *other* badly configured networks to cover their tracks!

          So, lets get rid of those other badly configured networks first. Then we can _see_ where the original attack came from and point a finger at them!

          • (Score: 2) by vux984 on Friday March 02 2018, @06:13PM (3 children)

            by vux984 (5045) on Friday March 02 2018, @06:13PM (#646512)

            I think I follow your argument. I think you are right.

            The final leg of the attack is packets arrive at vulnerable memcached, spoofed to appear to come from github. The vulnerable memcached then hits gitshub with a bunch of garbage.
            If the packet with the spoofed origin came directly from china, there's probably nothing that can be done to stop it. (at least not with RPF) given China is going out of its way to allow the spoofed packets to exit their networks, and once they're out onto the backbone there's no easy way to know they didn't come from where they claim to have come from.

            However, more often than not, the packet with spoofed github origin will not be coming from China, but rather from a compromised security camera at Jane Q Public's house in Montana or Jorge's Corner store in Mexico, etc. These are not hostile state actors, and the ISPs in these locations there can should be filtering packets originating at their customer endpoints to prevent them from participating in such amplification attacks. It doesn't solve the problem, but it would dramatically dilute the scale.

            • (Score: 1, Interesting) by Anonymous Coward on Saturday March 03 2018, @05:52AM

              by Anonymous Coward on Saturday March 03 2018, @05:52AM (#646881)

              I asked a friend of my brother's who is a network admin at my ISP about that once at a family function. Our exchange went roughly as so:

              Me: I was reading that an good way to help prevent web attacks is if ISPs filter packets with a source address that didn't originate in their network.

              Him: I suppose it would but we don't have the resources to analyze every packet that goes across our network.

              Me: But don't you already analyze every packet? I mean, you already do to filter all the incoming packets directed at certain ports (80, 443, 137-139, and some others), all outgoing packets based on what their destination is, and every packet in both directions for size in order to charge them against my data cap.

              Him: Yeah, but this is different because... uh... common carrier? If we messed with traffic? ... and... uh... Say is that your mother? (walks away)

            • (Score: 2) by maxwell demon on Saturday March 03 2018, @02:03PM (1 child)

              by maxwell demon (1608) on Saturday March 03 2018, @02:03PM (#647043) Journal

              But wouldn't Jane's security camera send the packet through Jane's home router, whose NAT would replace the origin IP with the IP given to her by her ISP anyway?

              --
              The Tao of math: The numbers you can count are not the real numbers.
      • (Score: 2) by FatPhil on Saturday March 03 2018, @09:26AM

        by FatPhil (863) <{pc-soylent} {at} {asdf.fi}> on Saturday March 03 2018, @09:26AM (#646967) Homepage
        > This is no rocket science

        Yes, but *not* doing it is absolutely zero cost, unless you're the victim of one, in which case someone else is to blame. If you don't benefit from doing things the right way, then why would you bother?

        It should be a default, to be honest. Every device that knows that it bridges between a small subnet (because it serves DHCP to them, for example, and has a routing table to match) and the wider internet should just do the obvious.
        --
        Great minds discuss ideas; average minds discuss events; small minds discuss people; the smallest discuss themselves