Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 7 Sep 1996 11:44:18 -0400 (EDT)
From:      Brian Tao <taob@io.org>
To:        FREEBSD-SECURITY-L <freebsd-security@freebsd.org>, BUGTRAQ@NETSPACE.ORG
Subject:   Panix Attack: synflooding and source routing?
Message-ID:  <Pine.NEB.3.92.960907114113.240B-100000@zap.io.org>

next in thread | raw e-mail | index | archive | help
    Wouldn't turning off source-routing on your border router
alleviate most of this problem?  It won't help if you have someone
synflooding a port from within your network, but at least it would
prevent outside attacks.  Or is this a "one-way" attack (i.e., a
return route to host is not needed)?
--
Brian Tao (BT300, taob@io.org, taob@ican.net)
Senior Systems and Network Administrator, Internet Canada Corp.
"Though this be madness, yet there is method in't"

---------- Forwarded message ----------
>Return-Path: <Peter_Kelk@kelk.com>
>To: mcarr <mcarr@ican.net>
>From: Peter Kelk/Kelk <Peter_Kelk@kelk.com>
>Date:  7 Sep 96  9:19:38
>Subject: Important Warning
>X-Lotus-Type: Corresp
>
>Mike, I received this from my brother in law in New York City.  Thought it
>might be useful for Ican.
>
>
>                        W E L C O M E   T O   P A N I X
>
>
>Panix under attack! (alexis) Sat Sep  7 01:43:27 1996
>
>   Friday evening, starting at around 5:45, all of Panix's main mail
>   hosts were attacked from a site somewhere on the internet. I have been
>   trying to deal with this problem ever since, and the attack is still
>   happening at this time.
>
>   The attacker is forging random source addresses on his packets, so
>   there is no way to find his/her location. There is also no way to screen
>   out those packets with a simple router filter.
>
>   This is probably the most deadly type of denial-of-service attack
>   possible. There is no easy or quick way of dealing with it. If it continues
>   into Saturday we will start working on kernel modifications to try to
>   absorb the damage (since there's absolutely no way to avoid it). This
>   however will not be an easy job and it could take days to get done (and
>   get done right).
>
>   For those who are IP hackers, the problem is that we're being flooded
>   with SYNs from random IP addresses on our smtp ports. We are getting
>   on average 150 packets per second (50 per host).
>
>   We are not the only site being attacked in this way. I know of one
>   other site that is being attacked in an identical manner right now,
>   and I know of three others that have been attacked in the last two weeks.
>   I hope that this means that the attacker is merely playing malicious
>   games, and will soon tire of molesting our site. If that is the case,
>   mail will come back up as soon as the attack ends. But if the attacker
>   is really interested in damaging Panix specifically, the attack may
>   *never* stop and service won't be restored until we can write kernel
>   modifications.
>
>   We fully understand how terrible this is. The really scary part is that
>   *no* site on the net is immune. No site can unilaterally do *Anything*
>   to protect or defend itself against this sort of attack. Only through
>   cooperation between the major (and minor!) providers can this sort of
>   problem be eliminated, and the large providers so far aren't showing
>   any interest in the problem (we are a Sprint customer, and tonight when
>   we asked for help tracing the packets back at least to their entry point
>   in Sprint's net, Sprint basically told us to drop dead).
>
>   In case anyone's wondering, I spoke to CERT (In particular, Jim Ellis)
>   for over 90 minutes tonight. Yes, Panix and CERT have buried the hatchet.
>   CERT agrees with us about the gravity of the situation. They also see
>   no immediate solution to the problem.
>
>   I'll try and post information about this to panix.announce, and deal with
>   discussion in panix.upgrade (for want of a better place), but that
>   won't happen immediately since I'm working on several things at once
>   right now trying to deal with this problem.
>
>-rw-r--r--  1 sondheim     2201 Sep  7 02:13 /net/u/6/s/sondheim/.plan
>  3:05am  up 5 days, 10:36,  26 users,  load average: 3.61, 2.83, 2.57
>User     tty       login@  idle   JCPU   PCPU  what
>sondheim ttyp4     3:03am     1      1         w sondheim
>
>k:8> df
>Filesystem            kbytes    used   avail capacity  Mounted on
>/dev/sd0a              10007    6891    2116    77%    /
>/dev/sd0g             111447   93571    6732    93%    /usr
>/dev/sd0d             102919   30624   62004    33%    /var
>/dev/sd0f            1268446  994176  147426    87%    /net/u/9
>/dev/sd0h            1268446 1011007  130595    89%    /net/u/10
>/dev/sd1d             937406  784194   59472    93%    /net/u/18
>/dev/sd1e             937406  767067   76599    91%    /net/u/19
>panix.nfs100.access.net:/net/local
>                      834461  706933   44082    94%    /net/local
>panix.nfs100.access.net:/net/u/1
>                     2086894 1821103   57102    97%    /net/u/1
>panix.nfs100.access.net:/net/u/2
>                     2086894 1718086  160119    91%    /net/u/2
>panix.nfs100.access.net:/net/u/3
>                     1056788  899125   51985    95%    /net/u/3
>panix2.nfs100.access.net:/net/u/4
>                     1340910 1132383   74436    94%    /net/u/4
>panix2.nfs100.access.net:/net/u/5
>                     1245240 1077317   43399    96%    /net/u/5
>panix.nfs100.access.net:/net/u/7
>                      907494  772511   44234    95%    /net/u/7
>panix.nfs100.access.net:/net/u/8
>                      484607  365949   70198    84%    /net/u/8
>panix.nfs100.access.net:/net/u/11
>                     2042490 1488109  350132    81%    /net/u/11
>panix2.nfs100.access.net:/net/u/13
>                     1245240 1076936   43780    96%    /net/u/13
>panix2.nfs100.access.net:/net/u/14
>                     1245240 1052421   68295    94%    /net/u/14
>panix2.nfs100.access.net:/net/u/15
>                     1340910 1106245  100574    92%    /net/u/15
>panix2.nfs100.access.net:/net/u/16
>                     1340910 1113781   93038    92%    /net/u/16
>panix2.nfs100.access.net:/net/u/17
>                      953687  702839  155480    82%    /net/u/17
>panix.nfs100.access.net:/net/archive
>                     2042490 1488109  350132    81%    /net/archive
>panix.nfs100.access.net:/var
>                      236383  142836   69909    67%    /hosts/panix/var
>news1.nfs100.access.net:/var
>                      968836  480625  439769    52%    /hosts/news1/var
>news1.nfs100.access.net:/var/spool/news
>                     2097151  361292 1534669    19%    /var/spool/news
>news1.nfs100.access.net:/var/spool/newsdb
>                      968836  551768  368626    60%    /var/spool/newsdb
>news1.nfs100.access.net:/net/hlocal/news
>                      970732  331460  590735    36%    /hosts/news1/news
>news1.nfs100.access.net:/var/spool/news2
>                     2097151  730725 1164215    39%    /var/spool/news2
>news2.panix.com:/e    628543   40141  525548     7%    /hosts/news/e
>news2.panix.com:/f   1036526   25659  907215     3%    /hosts/news/f
>web6.panix.com:/usr/local/net_public/httpd/htdocs
>                     2097151  324571 1577218    17%    /net/w/panixdocs
>web1.panix.com:/usr/local/net_public/httpd/htdocs/corp-dirs
>                     2097151  375851 1553220    19%    /net/w/1
>web6.panix.com:/usr/local/net_public/httpd/htdocs/userdirs
>                     2097151  324571 1577218    17%    /net/w/userdirs
>web1.panix.com:/usr/local/net_public/httpd/httpd-logs
>                      380876  271361   90471    75%    /net/httpd_logs/web1
>web6.panix.com:/usr/local/net_public/httpd/httpd-logs
>                     2097151  324571 1577218    17%    /net/httpd_logs/web6
>web1.panix.com:/usr/local/net_public/httpd/data
>                      380876  271361   90471    75%    /net/data/web1
>web6.panix.com:/usr/local/net_public/httpd/data
>                     2097151  324571 1577218    17%    /net/data/web6
>198.7.0.64:/usr/local/ftp/corp-dirs
>                      380876  271361   90471    75%    /net/ftp/1
>198.7.0.65:/var/ftp/corp-dirs
>                      853494   25109  785710     3%    /net/ftp/2
>198.7.0.66:/var/ftp/corp-dirs
>                      844708   89718  712754    11%    /net/ftp/3
>198.7.0.70:/usr/local/ftp/corp-dirs
>                      842053   80814  719136    10%    /net/ftp/7
>198.7.0.71:/var/ftp/corp-dirs
>                      805037    5684  759101     1%    /net/ftp/8
>panix4.nfs100.access.net:/holding
>                      609094  401462  146723    73%    /mnt
>/dev/sd0e            1271134  993586  150435    87%    /net/u/6
>k:9>
>
>




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.NEB.3.92.960907114113.240B-100000>