Date: Sat, 7 Sep 1996 20:20:21 +0300 (EET DST) From: Petri Helenius <pete@sms.fi> To: Brian Tao <taob@io.org> Cc: FREEBSD-SECURITY-L <freebsd-security@FreeBSD.org>, BUGTRAQ@NETSPACE.ORG Subject: Panix Attack: synflooding and source routing? Message-ID: <199609071720.UAA20430@silver.sms.fi> In-Reply-To: <Pine.NEB.3.92.960907114113.240B-100000@zap.io.org> References: <Pine.NEB.3.92.960907114113.240B-100000@zap.io.org>
next in thread | previous in thread | raw e-mail | index | archive | help
Lukekaapas uusin villitys, alkaa menn{ aika rumaksi, imho... Pete > ---------- Forwarded message ---------- > >Return-Path: <Peter_Kelk@kelk.com> > >To: mcarr <mcarr@ican.net> > >From: Peter Kelk/Kelk <Peter_Kelk@kelk.com> > >Date: 7 Sep 96 9:19:38 > >Subject: Important Warning > >X-Lotus-Type: Corresp > > > >Mike, I received this from my brother in law in New York City. Thought it > >might be useful for Ican. > > > > > > W E L C O M E T O P A N I X > > > > > >Panix under attack! (alexis) Sat Sep 7 01:43:27 1996 > > > > Friday evening, starting at around 5:45, all of Panix's main mail > > hosts were attacked from a site somewhere on the internet. I have been > > trying to deal with this problem ever since, and the attack is still > > happening at this time. > > > > The attacker is forging random source addresses on his packets, so > > there is no way to find his/her location. There is also no way to screen > > out those packets with a simple router filter. > > > > This is probably the most deadly type of denial-of-service attack > > possible. There is no easy or quick way of dealing with it. If it continues > > into Saturday we will start working on kernel modifications to try to > > absorb the damage (since there's absolutely no way to avoid it). This > > however will not be an easy job and it could take days to get done (and > > get done right). > > > > For those who are IP hackers, the problem is that we're being flooded > > with SYNs from random IP addresses on our smtp ports. We are getting > > on average 150 packets per second (50 per host). > > > > We are not the only site being attacked in this way. I know of one > > other site that is being attacked in an identical manner right now, > > and I know of three others that have been attacked in the last two weeks. > > I hope that this means that the attacker is merely playing malicious > > games, and will soon tire of molesting our site. If that is the case, > > mail will come back up as soon as the attack ends. But if the attacker > > is really interested in damaging Panix specifically, the attack may > > *never* stop and service won't be restored until we can write kernel > > modifications. > > > > We fully understand how terrible this is. The really scary part is that > > *no* site on the net is immune. No site can unilaterally do *Anything* > > to protect or defend itself against this sort of attack. Only through > > cooperation between the major (and minor!) providers can this sort of > > problem be eliminated, and the large providers so far aren't showing > > any interest in the problem (we are a Sprint customer, and tonight when > > we asked for help tracing the packets back at least to their entry point > > in Sprint's net, Sprint basically told us to drop dead). > > > > In case anyone's wondering, I spoke to CERT (In particular, Jim Ellis) > > for over 90 minutes tonight. Yes, Panix and CERT have buried the hatchet. > > CERT agrees with us about the gravity of the situation. They also see > > no immediate solution to the problem. > > > > I'll try and post information about this to panix.announce, and deal with > > discussion in panix.upgrade (for want of a better place), but that > > won't happen immediately since I'm working on several things at once > > right now trying to deal with this problem. > > > >-rw-r--r-- 1 sondheim 2201 Sep 7 02:13 /net/u/6/s/sondheim/.plan > > 3:05am up 5 days, 10:36, 26 users, load average: 3.61, 2.83, 2.57 > >User tty login@ idle JCPU PCPU what > >sondheim ttyp4 3:03am 1 1 w sondheim > > > >k:8> df > >Filesystem kbytes used avail capacity Mounted on > >/dev/sd0a 10007 6891 2116 77% / > >/dev/sd0g 111447 93571 6732 93% /usr > >/dev/sd0d 102919 30624 62004 33% /var > >/dev/sd0f 1268446 994176 147426 87% /net/u/9 > >/dev/sd0h 1268446 1011007 130595 89% /net/u/10 > >/dev/sd1d 937406 784194 59472 93% /net/u/18 > >/dev/sd1e 937406 767067 76599 91% /net/u/19 > >panix.nfs100.access.net:/net/local > > 834461 706933 44082 94% /net/local > >panix.nfs100.access.net:/net/u/1 > > 2086894 1821103 57102 97% /net/u/1 > >panix.nfs100.access.net:/net/u/2 > > 2086894 1718086 160119 91% /net/u/2 > >panix.nfs100.access.net:/net/u/3 > > 1056788 899125 51985 95% /net/u/3 > >panix2.nfs100.access.net:/net/u/4 > > 1340910 1132383 74436 94% /net/u/4 > >panix2.nfs100.access.net:/net/u/5 > > 1245240 1077317 43399 96% /net/u/5 > >panix.nfs100.access.net:/net/u/7 > > 907494 772511 44234 95% /net/u/7 > >panix.nfs100.access.net:/net/u/8 > > 484607 365949 70198 84% /net/u/8 > >panix.nfs100.access.net:/net/u/11 > > 2042490 1488109 350132 81% /net/u/11 > >panix2.nfs100.access.net:/net/u/13 > > 1245240 1076936 43780 96% /net/u/13 > >panix2.nfs100.access.net:/net/u/14 > > 1245240 1052421 68295 94% /net/u/14 > >panix2.nfs100.access.net:/net/u/15 > > 1340910 1106245 100574 92% /net/u/15 > >panix2.nfs100.access.net:/net/u/16 > > 1340910 1113781 93038 92% /net/u/16 > >panix2.nfs100.access.net:/net/u/17 > > 953687 702839 155480 82% /net/u/17 > >panix.nfs100.access.net:/net/archive > > 2042490 1488109 350132 81% /net/archive > >panix.nfs100.access.net:/var > > 236383 142836 69909 67% /hosts/panix/var > >news1.nfs100.access.net:/var > > 968836 480625 439769 52% /hosts/news1/var > >news1.nfs100.access.net:/var/spool/news > > 2097151 361292 1534669 19% /var/spool/news > >news1.nfs100.access.net:/var/spool/newsdb > > 968836 551768 368626 60% /var/spool/newsdb > >news1.nfs100.access.net:/net/hlocal/news > > 970732 331460 590735 36% /hosts/news1/news > >news1.nfs100.access.net:/var/spool/news2 > > 2097151 730725 1164215 39% /var/spool/news2 > >news2.panix.com:/e 628543 40141 525548 7% /hosts/news/e > >news2.panix.com:/f 1036526 25659 907215 3% /hosts/news/f > >web6.panix.com:/usr/local/net_public/httpd/htdocs > > 2097151 324571 1577218 17% /net/w/panixdocs > >web1.panix.com:/usr/local/net_public/httpd/htdocs/corp-dirs > > 2097151 375851 1553220 19% /net/w/1 > >web6.panix.com:/usr/local/net_public/httpd/htdocs/userdirs > > 2097151 324571 1577218 17% /net/w/userdirs > >web1.panix.com:/usr/local/net_public/httpd/httpd-logs > > 380876 271361 90471 75% /net/httpd_logs/web1 > >web6.panix.com:/usr/local/net_public/httpd/httpd-logs > > 2097151 324571 1577218 17% /net/httpd_logs/web6 > >web1.panix.com:/usr/local/net_public/httpd/data > > 380876 271361 90471 75% /net/data/web1 > >web6.panix.com:/usr/local/net_public/httpd/data > > 2097151 324571 1577218 17% /net/data/web6 > >198.7.0.64:/usr/local/ftp/corp-dirs > > 380876 271361 90471 75% /net/ftp/1 > >198.7.0.65:/var/ftp/corp-dirs > > 853494 25109 785710 3% /net/ftp/2 > >198.7.0.66:/var/ftp/corp-dirs > > 844708 89718 712754 11% /net/ftp/3 > >198.7.0.70:/usr/local/ftp/corp-dirs > > 842053 80814 719136 10% /net/ftp/7 > >198.7.0.71:/var/ftp/corp-dirs > > 805037 5684 759101 1% /net/ftp/8 > >panix4.nfs100.access.net:/holding > > 609094 401462 146723 73% /mnt > >/dev/sd0e 1271134 993586 150435 87% /net/u/6 > >k:9> > > > > >
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199609071720.UAA20430>