Date: Fri, 21 Jan 2000 15:49:49 -0800 (PST) From: Matthew Dillon <dillon@apollo.backplane.com> To: Brad Guillory <round@baileylink.net> Cc: freebsd-security@FreeBSD.ORG Subject: Re: Some observations on stream.c and streamnt.c Message-ID: <200001212349.PAA64869@apollo.backplane.com> References: <Pine.BSF.4.10.10001211649440.4460-100000@tetron02.tetronsoftware.com> <200001212258.OAA64329@apollo.backplane.com> <20000121171759.D56672@baileylink.net>
next in thread | previous in thread | raw e-mail | index | archive | help
:> a single incoming T3 never had much of an effect, it was only those :> attacks that came over multiple T3's (generally ping-broadcast attacks) :> that we worried about. :> :> -Matt : :I don't understand how a "script kiddie" is going to garner the bandwidth :to run an attack into the multi-megabit range. This is not a leveraged :attack (right?). What kind of packet rate are we talking about to reboot :a system, I understand that this will depend on the equipment, but I am :interested in any numbers that would allow me to evaluate the real impact :that this DOS will have. Most people that have enough bandwidth to launch :a multi-megabit attack have better things to do than (or is it then) to pick :on me. Thanx all, BMG Ah, welcome to the shady world of the IRC hacker. While I was still at BEST IRC weenies were able to mount 80+ MBit attacks on us fairly easily. We recorded a number of 100 MBit+ attacks as well. In fact, in the last two years I was there the high-bandwidth attacks became much more prevalent as more and more rootable internet sites became better connected. There are several ways to do it: * First, ping-broadcast-response attacks. In this attack the IRC weenie finds networks which have machines on them which accept broadcast pings. All the machines on the network in question then respond to the ping. So one spoofed packet can cause several dozen, even a hundred or more packets to be directed to the victim. * Second, compromised accounts. There are thousands of machines on the net and hundreds of thousands of compromised accounts, and there are also a lot of machines for which root has been broken. Script kiddies pass around account logins and passwords and are generally able to mount attacks from several well-connected machines simultaniously, both spoofed attacks and non-spoofed attacks. Universities and ISPs generally have rampant compromised machines and some of these, such as MIT, have hundreds of megabits of bandwidth to the internet. These are often the source of high-bandwidth attacks (not perpetrated by students so much as perpetrated by IRC weenies who have compromised the machines). Accounts are compromised in any number of ways. The #1 problem is that a user will telnet into a machine from another machine or network that has been compromised, thus compromising his ISP account. For example, from a public library. The #2 problem is that comrpomised accounts are used to obtain encrypted password files, which are then decrypted. There are any number of holes that allow script kiddies to get ahold of encrypted passwords without necessarily breaking root. The #3 problem is that an ISP's machine will wind up having its root compromised. Every time a new hole is found, ISPs have to run to get it closed. The most recent example is the bind/named hole. Even though I don't work at BEST any more I still have friends there that do, and they covered that hole pretty damn quick. But other ISPs and universities have probably not been so fortunate. Each hole generally results in at least several hundred machines across the U.S. (and the world) being broken into. Probably more. But an even greater number of installations don't even bother keeping their machines up to date. So there are always plenty of machines for IRC weenies to break into. -Matt Matthew Dillon <dillon@backplane.com> To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200001212349.PAA64869>