Title: 1 of 54
1An Overview of Denial-of-Service attacks on the
Internet
- Bill Cheswick
- Lumeta Corporation
- ches_at_lumeta.com or
- ches_at_cheswick.com
2Any public service can be abused by the public
3A denial-of-service attack seeks to disrupt
normal operations by flooding a target with an
unmanageable number of packets or queries.
4DOS attacks do not seek to obtain data
- Therefore, a return packet flow is not needed
- Therefore, packets can come from sources hidden
by spoofed return addresses in the packets. - This complicates traceback operations.
- How do you hunt down the source of anonymous
packets? (Well get to that.) - Is it worth tracing them back?
5DOS attacks other properties
- One need not fashion clever packets
- sheer volume can swamp the processors, or even
the incoming links - This means that ISPs are involved in handling
these attacks. - It can be hard to tell if an attack is underway
- Heavy use Vs. attack
- being slash-dotted
6DOS attacks
- An attack can go on indefinitely.
- There are no theoretical solutions, just
mitigations - The ultimate solution is to throw more iron at
the problem - It is hard to marshal enough resources to swamp a
monster site
7Properties of DOS attacks
- Can be hard to determine if malice is afoot
- being slash-dotted
- heavy volume to a newspaper web site on election
night normal traffic, or evil - no technical solutions, just mitigations
- DOS attacks are here to stay, even if we fix all
the software problems on the Internet
8Types of DOS attacks
- Lethal packets
- ping-o-death
- High impact packets
- SYN attacks
- Public key and other expensive processing
- Simple flooding
- Amplified flooding
- Distributed attacks
9Lethal packets
10Lethal attacks
- Directed at bugs in the kernel or TCP/IP stack
- TCP/IP stack is often gtgt25,000 lines of code, in
the kernel - Hard to debug
- Protocol testing is hard to do
- e.g. ping-o-death
- More likely on immature TCP/IP implementations
11High impact packets
12High impact attacks
- High processing costs in the target
- Crypto processing can be target of such an attack
- I.e. SYN packet attacks
13SYN attacks TCP connections
- TCP servers are optimized for many connections
- The half-open case was not well handled
14Normal TCP open
Client
Server
SYN,SEQ0
SYN,ACK, SEQ01,SEQ0
ACK, SEQ01,SEQ01
15Normal TCP open
Client
half-open lt300ms
16SYN Attacks
- First seen at Panix.com in fall 1996
- A sea of SYN packets, with varying return packets
- Half-open processing was implemented poorly
- Quadratic behavior
- Wasnt much call for improving it
- Wed been expecting it
- The only thing we left out of our firewalls book
removed at the last minute - We knew of no good solution
- We are sorry we left it out
17SYN attack the arms race
- Filter on source address (West Point)
- Filter on IP ID field
- Filter on sequence number
- anticipate random number generator
- We helped them debug their software!
- But we could have watched them watching
- spread spectrum frequency hopping defense?
18SYN attacks - solutions
- Fix the kernel
- Most implementations are probably resistant now
- Malicious attacks on algorithm performance!
- Can be hard to tell when it is happening.
19Attacks on TCP/IP stacks
- There will be more attacks on TCP/IP
implementations - lots of code involved
- hard to test code in a kernel
20Simple flooding
21Simple flooding
- Start a program and leave
- Needs a collection of compromised hosts (see
below)
22Amplified flooding
23Amplified attacks
- Stimulated emission of packets
- Spoofed stimulation packet directs response
toward target - Amplification methods
- directed broadcasts
- services that amplify packet size or numbers
- social engineering
- ping, UDP chargen, DNS, multicast!
- I.e. smurf attacks
24Identify ping generatornetworks
G
G
target
G
G
G
G
25Trigger packets withspoofed return address
G
G
target
G
G
G
G
packet cannon
26Generators flood the targetwith packets
G
G
target
G
G
G
G
packet cannon
27Directed broadcasts
- External request to send a packet to all hosts on
an Ethernet - These should be (and usually are) blocked from
the Internet - Many services should ignore these queries, but
some dont
28Amplification factors
- Standard UDP chargen amplifies roughly 2.5 times,
but - NT implementation returns up to 5K packet for a
simple 42 byte stimulation packet - Directed broadcast amplifications can easily be
hundreds - One net in Lucent (directed broadcast plus
broadcast storm) returned 977,000 packets for a
single probe packet.
29Defenses
- Directed broadcast requests and pings can be
filtered - Packets to the target are not spoofed, so they
can be filtered - But
- DNS can be used, especially with zone transfers
- DNS cant be blocked
30Distributed Denial-of-Service Attacks
31DDOS
- Similar to smurf attacks, but we install agents
(zombies) on donor networks - Master programs direct the actions of zombies
- who to attack, and how
- zombie software updates!
- Master commands may be encrypted, and with
spoofed return addresses - Zombies may be spoofed if privs. allow
32DDOS
- Installation of zombies allows a slow buildup of
massive force - Double link to attacker makes attacker harder to
locate - Zombies installed by
- hand
- automated attacks
- travelling programs...
33Another problem with strange programs
34DDOS attacks
- Made the news in 1999
- tfn, trinoo, stacheldraht (barbed wire), others
- Has taken down major sites
- Attacks continue
35Recent attacks MSFT last week
- Originally, a software problem
- Servers robust against these attacks
- DDOS attacks on their DNS servers, which were all
on one net, I am told.
36DDOS attacks on the Internet
- Root DNS servers already attacked
- Get enough of them, long enough, and the Internet
will grind to a halt - Routing infrastructure is another potential
target of a number of attacks, including DDOS.
37Defenses more iron
- Add more processing and network capacity
38Defenses robust software
- Can resist high-impact attacks
- Older kernels tend to be more robust
- Berkeley Unix Vs. MSFT or Linux
- Keep up with patches, but
- can you trust the source of the patch?
39Defenses packet filtering
- Block the bad packets, keep the good
- Look for idiosyncrasies in the attacking packets
- Only allow packets from sites youve done
business with for the past few weeks - Filter far enough out to resist flooding the line
40Defenses moving target
- Change the IP address of your targets frequently
- Look for consistent DNS lookups to find out who
cares - Doesnt scale to monster sites
- Doesnt work if the network link is flooded
- Diversify server locations (a la akamai)
41Defenses egress filtering
- ISPs should not accept spoofed packets
- Easy to do at most edges
- Needs hardware assist for major links
- Assymetric routing frustrates this
- What cant we all just be friends?
42Packet traceback
43Traceback how can we do this
- Anonymous packets mean that we have to trace back
one hop at a time, usually - ISPs need to be involved, usually
- We havent seen whack-a-mole attacks yet
44Traceback an early experiment
- Packet streams are constant
- If we interrupt the stream, we can prune the tree
- Interrupt with dont-feed-me packet?
- DOS is possible
- requires infrastructure changes
- selective DOS attack on links can perturb packet
stream - tested on an intranet
45Internet maps may help
46Aside another DOS attack
47(No Transcript)
48(No Transcript)
49Traceback query routers
- Ask router for statistics
- DEBUG crashes many routers
- Routers are too busy
- Requires privileged access to the router
- How do we trace from alien ISPs?
50Traceback itrace
- Internet draft proposal
- router issues routing information packet once per
20,000 packets - contains tracing information about that packet
- lt0.1 of network traffic
- Packets ignored by most hosts
- Data is there if you need it
51Defenses itrace
- Requires changes to the infrastructure
- routers dont have much time for this nonsense!
- ISPs involvement means they may be more willing
to pay for router improvements - How do small sites respond to such an attack?
52Traceback infrastructure
- Has privacy concerns
- Law enforcement wants this ability
- CALEA for routers?
53Conclusions
- Denial-of-service attacks are not going away
- You have to be very determined or lucky to catch
the bad guys - We are going to need a new infrastructure, both
technical and legal, to deal with this
54An Overview of Denial-of-Service attacks on the
Internet
- Bill Cheswick
- Lumeta Corporation
- ches_at_lumeta.com or
- ches_at_cheswick.com