Date: Sat, 7 Sep 1996 20:20:21 +0300 (EET DST) From: Petri Helenius <pete@sms.fi> To: Brian Tao <taob@io.org> Cc: FREEBSD-SECURITY-L <freebsd-security@FreeBSD.org>, BUGTRAQ@NETSPACE.ORG Subject: Panix Attack: synflooding and source routing? Message-ID: <199609071720.UAA20430@silver.sms.fi> In-Reply-To: <Pine.NEB.3.92.960907114113.240B-100000@zap.io.org> References: <Pine.NEB.3.92.960907114113.240B-100000@zap.io.org>
next in thread | previous in thread | raw e-mail | index | archive | help
Lukekaapas uusin villitys, alkaa menn{ aika rumaksi, imho...
Pete
> ---------- Forwarded message ----------
> >Return-Path: <Peter_Kelk@kelk.com>
> >To: mcarr <mcarr@ican.net>
> >From: Peter Kelk/Kelk <Peter_Kelk@kelk.com>
> >Date: 7 Sep 96 9:19:38
> >Subject: Important Warning
> >X-Lotus-Type: Corresp
> >
> >Mike, I received this from my brother in law in New York City. Thought it
> >might be useful for Ican.
> >
> >
> > W E L C O M E T O P A N I X
> >
> >
> >Panix under attack! (alexis) Sat Sep 7 01:43:27 1996
> >
> > Friday evening, starting at around 5:45, all of Panix's main mail
> > hosts were attacked from a site somewhere on the internet. I have been
> > trying to deal with this problem ever since, and the attack is still
> > happening at this time.
> >
> > The attacker is forging random source addresses on his packets, so
> > there is no way to find his/her location. There is also no way to screen
> > out those packets with a simple router filter.
> >
> > This is probably the most deadly type of denial-of-service attack
> > possible. There is no easy or quick way of dealing with it. If it continues
> > into Saturday we will start working on kernel modifications to try to
> > absorb the damage (since there's absolutely no way to avoid it). This
> > however will not be an easy job and it could take days to get done (and
> > get done right).
> >
> > For those who are IP hackers, the problem is that we're being flooded
> > with SYNs from random IP addresses on our smtp ports. We are getting
> > on average 150 packets per second (50 per host).
> >
> > We are not the only site being attacked in this way. I know of one
> > other site that is being attacked in an identical manner right now,
> > and I know of three others that have been attacked in the last two weeks.
> > I hope that this means that the attacker is merely playing malicious
> > games, and will soon tire of molesting our site. If that is the case,
> > mail will come back up as soon as the attack ends. But if the attacker
> > is really interested in damaging Panix specifically, the attack may
> > *never* stop and service won't be restored until we can write kernel
> > modifications.
> >
> > We fully understand how terrible this is. The really scary part is that
> > *no* site on the net is immune. No site can unilaterally do *Anything*
> > to protect or defend itself against this sort of attack. Only through
> > cooperation between the major (and minor!) providers can this sort of
> > problem be eliminated, and the large providers so far aren't showing
> > any interest in the problem (we are a Sprint customer, and tonight when
> > we asked for help tracing the packets back at least to their entry point
> > in Sprint's net, Sprint basically told us to drop dead).
> >
> > In case anyone's wondering, I spoke to CERT (In particular, Jim Ellis)
> > for over 90 minutes tonight. Yes, Panix and CERT have buried the hatchet.
> > CERT agrees with us about the gravity of the situation. They also see
> > no immediate solution to the problem.
> >
> > I'll try and post information about this to panix.announce, and deal with
> > discussion in panix.upgrade (for want of a better place), but that
> > won't happen immediately since I'm working on several things at once
> > right now trying to deal with this problem.
> >
> >-rw-r--r-- 1 sondheim 2201 Sep 7 02:13 /net/u/6/s/sondheim/.plan
> > 3:05am up 5 days, 10:36, 26 users, load average: 3.61, 2.83, 2.57
> >User tty login@ idle JCPU PCPU what
> >sondheim ttyp4 3:03am 1 1 w sondheim
> >
> >k:8> df
> >Filesystem kbytes used avail capacity Mounted on
> >/dev/sd0a 10007 6891 2116 77% /
> >/dev/sd0g 111447 93571 6732 93% /usr
> >/dev/sd0d 102919 30624 62004 33% /var
> >/dev/sd0f 1268446 994176 147426 87% /net/u/9
> >/dev/sd0h 1268446 1011007 130595 89% /net/u/10
> >/dev/sd1d 937406 784194 59472 93% /net/u/18
> >/dev/sd1e 937406 767067 76599 91% /net/u/19
> >panix.nfs100.access.net:/net/local
> > 834461 706933 44082 94% /net/local
> >panix.nfs100.access.net:/net/u/1
> > 2086894 1821103 57102 97% /net/u/1
> >panix.nfs100.access.net:/net/u/2
> > 2086894 1718086 160119 91% /net/u/2
> >panix.nfs100.access.net:/net/u/3
> > 1056788 899125 51985 95% /net/u/3
> >panix2.nfs100.access.net:/net/u/4
> > 1340910 1132383 74436 94% /net/u/4
> >panix2.nfs100.access.net:/net/u/5
> > 1245240 1077317 43399 96% /net/u/5
> >panix.nfs100.access.net:/net/u/7
> > 907494 772511 44234 95% /net/u/7
> >panix.nfs100.access.net:/net/u/8
> > 484607 365949 70198 84% /net/u/8
> >panix.nfs100.access.net:/net/u/11
> > 2042490 1488109 350132 81% /net/u/11
> >panix2.nfs100.access.net:/net/u/13
> > 1245240 1076936 43780 96% /net/u/13
> >panix2.nfs100.access.net:/net/u/14
> > 1245240 1052421 68295 94% /net/u/14
> >panix2.nfs100.access.net:/net/u/15
> > 1340910 1106245 100574 92% /net/u/15
> >panix2.nfs100.access.net:/net/u/16
> > 1340910 1113781 93038 92% /net/u/16
> >panix2.nfs100.access.net:/net/u/17
> > 953687 702839 155480 82% /net/u/17
> >panix.nfs100.access.net:/net/archive
> > 2042490 1488109 350132 81% /net/archive
> >panix.nfs100.access.net:/var
> > 236383 142836 69909 67% /hosts/panix/var
> >news1.nfs100.access.net:/var
> > 968836 480625 439769 52% /hosts/news1/var
> >news1.nfs100.access.net:/var/spool/news
> > 2097151 361292 1534669 19% /var/spool/news
> >news1.nfs100.access.net:/var/spool/newsdb
> > 968836 551768 368626 60% /var/spool/newsdb
> >news1.nfs100.access.net:/net/hlocal/news
> > 970732 331460 590735 36% /hosts/news1/news
> >news1.nfs100.access.net:/var/spool/news2
> > 2097151 730725 1164215 39% /var/spool/news2
> >news2.panix.com:/e 628543 40141 525548 7% /hosts/news/e
> >news2.panix.com:/f 1036526 25659 907215 3% /hosts/news/f
> >web6.panix.com:/usr/local/net_public/httpd/htdocs
> > 2097151 324571 1577218 17% /net/w/panixdocs
> >web1.panix.com:/usr/local/net_public/httpd/htdocs/corp-dirs
> > 2097151 375851 1553220 19% /net/w/1
> >web6.panix.com:/usr/local/net_public/httpd/htdocs/userdirs
> > 2097151 324571 1577218 17% /net/w/userdirs
> >web1.panix.com:/usr/local/net_public/httpd/httpd-logs
> > 380876 271361 90471 75% /net/httpd_logs/web1
> >web6.panix.com:/usr/local/net_public/httpd/httpd-logs
> > 2097151 324571 1577218 17% /net/httpd_logs/web6
> >web1.panix.com:/usr/local/net_public/httpd/data
> > 380876 271361 90471 75% /net/data/web1
> >web6.panix.com:/usr/local/net_public/httpd/data
> > 2097151 324571 1577218 17% /net/data/web6
> >198.7.0.64:/usr/local/ftp/corp-dirs
> > 380876 271361 90471 75% /net/ftp/1
> >198.7.0.65:/var/ftp/corp-dirs
> > 853494 25109 785710 3% /net/ftp/2
> >198.7.0.66:/var/ftp/corp-dirs
> > 844708 89718 712754 11% /net/ftp/3
> >198.7.0.70:/usr/local/ftp/corp-dirs
> > 842053 80814 719136 10% /net/ftp/7
> >198.7.0.71:/var/ftp/corp-dirs
> > 805037 5684 759101 1% /net/ftp/8
> >panix4.nfs100.access.net:/holding
> > 609094 401462 146723 73% /mnt
> >/dev/sd0e 1271134 993586 150435 87% /net/u/6
> >k:9>
> >
> >
>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199609071720.UAA20430>
