Pushback against DDOS Attacks 159
Huusker writes "Steven Bellovin and others at ATT Research Labs and ICIR have come up with mechanism to stop DDOS attacks. The idea is called Pushback. When the routers get flooded they consult a Unix daemon (/etc/pushbackd) to determine if they are being DDOS'ed. The routers propagate the quench packets back to the sources. The policy and propagation are separate, allowing hardware vendors to concentrate on the quench protocol while the white hats invent ever more clever DDOS detection filters for /etc/pushbackd. The authors of the paper have an initial implementation
on FreeBSD."
Problem? (Score:2, Insightful)
Re:Problem? (Score:3, Interesting)
Re:Problem? (Score:1)
Re:Problem? (Score:1)
I don't think you get it (or I misread the article). The first D in DDoS stands for distributed. In a distributed denial of service attack many, many clients all attack a target at once. You can assume that the machine of the guy that directs the attack is not among the attacking machines.
A reverse DoS would only annoy some people that probably don't even know that their machine is being used in an attack. A better response (if it were possible) would be to send them instructions on securing their machines.
Re:Problem? (Score:2)
Or am I missing something (or just wrong)?
Re:Problem? (Score:1)
Not a big problem (Score:3)
Couldnt pushback be a Dos tool in itslf? (Score:5, Insightful)
Re:Couldnt pushback be a Dos tool in itslf? (Score:1)
Why?
Re:Couldnt pushback be a Dos tool in itslf? (Score:1, Informative)
and as the flood stop makes it,s way up the network to the source more and more bandwith is avalibale to the network untill hopefully even the ofending machines will ack and stop sending.
But even if the ofending machine wont the routers
in between the target and the source will.
CCNA
Re:Couldnt pushback be a Dos tool in itslf? (Score:3, Insightful)
Re:Couldnt pushback be a Dos tool in itslf? (Score:3, Interesting)
No because it means stop sending. To the network this stops the flood of packets.
Yes but if the system can be fooled into quenching legitimate requests then service has still been denied. I mean, to a user, does it matter if you can't get to the server because it's overloaded, or you can't get to the server because the routers are telling your machine to stop sending? Either way, all you know is that the blasted server is down.
Manual RegEx? (Score:1)
If a large-enough site was getting DDoS'd (Yahoo!, Microsoft, universities, etc.), wouldn't there be someone on call 24/7 who could in a matter of minutes sort out what the similarities in the DDoS are and then manually get a RegEx to sort them all out?
I don't have much knowledge of the subject, but that seems like an easy want to deal with it.
Re:Manual RegEx? (Score:3, Funny)
Re:Manual RegEx? (Score:5, Insightful)
Even if you drop 100% of the evil packets...
Your pipe is still filled...
And for the amount of traffic needed to actually DDoS a large-enough site like Yahoo (4 gbps last time around?), RegExs wouldn't be helpful
since, the sheer amount of cpu required to process *every*single*packet*that*passes*through* is wayy too much...
Re:Manual RegEx? (Score:1)
sure (Score:1, Insightful)
Of course its not, it would do much more harm to many more innocent people.
The right solution is to educate people so that their PC's doesnt get inffected with worms and the like so they dont unknowingly contribute to DDOS.
Of course, the right is almost always the hard way and most people doesnt want to care about ignorant people so... we're in a vicious cycle here, just as in anything else.
Re:sure (Score:4, Insightful)
These people think that when they install virus scan software [slashdot.org] they are safe. I recently re-installed Windows on my gf's computer. She had V-Shield on there from 1999. She had no idea that she would need to update it.
At least my roommate, my parents, and my gf know (from me) not to open attachments. But educate a WIDE group of people? That's just not going to happen and you know it.
Re:sure (Score:2)
Newer products do solve this problem without customer education. My McAfee VirusScan checks for updates daily and generally downloads new definitions once or twice a week. I don't have to take the initiative to update it or buy new software.
Re:sure (Score:1, Funny)
Re:sure (Score:5, Insightful)
The technique is about making the internet move the point of dropping the flood packets, BACK closer to the source. That is, remove the flood from the internet itself, and contain it into the localised areas.
Instead of expecting the impossible as you suggest, (which is joe-average running a secure system), finally someone is thinking about securing the internet in general from unsecured systems, which is a pragmatic approach which may well protect the internet in general from many unforeseen DDOS attacks, as well as the ones we know about.
Re:sure (Score:2, Insightful)
Re:sure (Score:4, Informative)
If every network provider ran this type of a system on their edge routers. Have all the edge routers communicate to distributed servers. Then, when you are being attacked you simply announce the offending IPs involved in the attack. That announcement gets propogated around all the servers which tell the edge devices to filter the traffic. It isn't a reverse flood. It is a way of telling the router closest to the source to start dropping packets.
Forged source IP's should be dropped at the edge already.
What we need is a protocol for sending dynamic filters to cisco routers. I would like to have input/output lists put on an interface that I can later build dynamically. I do it now with my Linux firewalls but it would be nice if I could drop the packets on the far side of my expensive link.
Re:sure (Score:1)
Re:sure (Score:2)
Amazing how many ISPs don't do this...
Re:sure (Score:4, Insightful)
It involves sending a short message back to the routers that are routing the packets to you asking them to "quench" - i.e. filter out and don't route - the offending upstream sources.
The message could propagate as far back as the individual ISPs from which the packets are originating from so that each participant in the attack is cut off.
At least that's what I'm getting from the summary of the story, I could be completely wrong.
Re:sure (Score:3, Insightful)
What happens when i spoof that you just DoSed your favorite website? You get cut off from it, and denied service.
Although as far as taking advantage of this sort of thing goes, I'd much rather be able to use an ICMP Redirect to make a DoSnet packet its owner.
Re:sure (Score:2)
Re:sure (Score:3, Insightful)
The only thing to slow this down is checking routes, but even that can be gotten around (they just have to be on your network, thats not hard for colo's, shells, and most other providers)
My take (Score:5, Interesting)
(Gotta love the Slashdot effect getting named explicitly, eh? Nice to be part of the problem for a change... hehe.)
Seems to me the tricky part here is defining the aggregates. After reading the article, it isn't *really* a way to save your site from going down due to overload, more a way to prevent others sharing your pipe/routers from going down with you.
Which is a good goal in itself. It seems like a real tough thing to determine which of the millions of hits to www.yahoo.com (for ex.) are valid users, and which are DDoS bots. So both get restricted (net result: bots win), but the guy in the cage next to yahoo stays up.
Re:My take (Score:5, Interesting)
I have to agree. They leave a lot of issues for further study. One big problem seems to be that gigabit backbone routers don't really have time to do any of this stuff. It's not much use if the back plate packet rate drops to one quarter because of having to detect and deal with flow aggregates.
Re:My take (Score:4, Informative)
Juniper routers do this sort of filtering and policing in hardware, and can also generate traffic stats efficiently. Other vendors have similar features - Cisco 7500 routers can have multiple VIP processors, distributing the work down to the interface cards.
The main constraint is that you need new software written, installed and debugged in these routers, which will take time and require an agreed standard across router vendors. In the short term, it's easier to use existing features such as NetFlow/cflowd for traffic stats, feeding into an existing DDoS analysis tool (e.g. the Arbor Networks ones), which then tells a router provisioning tool to reconfigure the routers. This would not be as slick or dynamic as the proposed scheme, but could be done today. It would also make it possible to have a human in the loop initially, reviewing suggested changes. This would work OK as long as management and routing traffic are assigned a separate queue on each router interface, guaranteeing enough bandwidth to make these changes in the face of a DDoS attack (something that the ACC approach would also need).
Re:My take (Score:2)
Pushing the filtering all the way back to the edge nodes of the source networks may also be difficult, as detecting the aggregates is probably a lot easier than detecting individual malicious sources (you would like to leave the legitimate sources unblocked). Ultimately this would be the way to go, though. Applying ingress filtering universally to combat source address spoofing would be a good start.
Re:My take (Score:2)
My suggestion for using current tools would work only in a single provider - cooperation between providers would require an IETF standard, perhaps using BGP extensions to carry requests for filtering/limiting, or perhaps using a human-checkable format for these filtering.
Whether in a single provider or not, routers are clearly less likely to melt if you can push the filtering/limiting upstream, reducing pressure on router and bandwidth resources by acting as close to the source of attack as possible.
Universal ingress filtering should be mandatory - enterprises should demand it of providers, and vice versa. There is a good RFC discussing this, 2827 - see http://www.cis.ohio-state.edu/cgi-bin/rfc/rfc2827
not all DDoS attacks.. (Score:5, Insightful)
Some examples:
SYN floods can exhaust incoming connection queues.
DNS floods (asking a recursive nameserver a million questions, or even asking an authoritative nameserver a million questions).
Too many HTTP requests to processor intensive dynamic content pages could deny service well before you are serving at your bw limit.
The paper kept referring to the aggregate detection algorithm only coming into effect when the bandwidth limit is being exceeded
Never the less, this is a promising initiative.
--Iain
Re:not all DDoS attacks.. (Score:1)
It isn't all that complicated, it is a major pain to get every network admin and small ISP to implement something.
The simple act of filtering all outbound packets to only allow your netblock would stop forged IP attacks cold.
Re:not all DDoS attacks.. (Score:2)
Wonderful. Then later we can expand the system to block at will anyone who says something we don't want to hear. We could even hook it into Microsoft Passport! It will be easy to silence people.
You're talking about DoS attacks (Score:2, Insightful)
DDoS attacks are brute force by nature, designed to take down sections of the network by saturating the links.
Re:You're talking about DoS attacks (Score:2)
Not for SYN floods or DNS floods. Both of those are usually done using spoofed source addresses. Of course, SYN floods are easy to deal with using SYN cookies [cr.yp.to].
Re:not all DDoS attacks.. (Score:2, Interesting)
Re:not all DDoS attacks.. (Score:2)
Re:not all DDoS attacks.. (Score:1)
Re:not all DDoS attacks.. (Score:1)
A webpage that I have written has suffered this problem on many of its mirrors...
(background, Its a very computationaly intensive page designed to work out the outcome of battles in an online game called planetarion)
Apart from upgrading the processor and imposing restrictions on the size of the computation thats requested, are there any other precautions I can take?
"quench" ? (Score:2, Informative)
Sounds like the name of a sports drink targeted at uh....interior decorators.
Shouldn't it be "squelch" ?
Cheers,
Re:"quench" ? (Score:2)
Re:"quench" ? (Score:2)
Re:"quench" ? (Score:1)
Question.... (Score:3, Insightful)
Re:Question.... (Score:2, Interesting)
I wonder what impact the pushback overhead will have when a server gets slashdotted, though. What if the pushback message gets dropped due to swamped routers?
This is worse (Score:4, Insightful)
How does this really help a DOS attack? The idea behind a DOS attack is to flood a server with so many packets that the server can't keep up and ends up dropping most of the packets. This paper does not provide a solution to this problem. It simply shifts where the packets are being dropped... at a router upstream instead of at the server or router at the edge of the network. The only advantage here is that other servers hanging off the router that aren't being DOSed will be unaffected.
The suggested solution also opens up a potential security hole. If you gained access to a server, it might be possible to send a packet to routers upstream and tell them to throttle bandwidth. This could be a much more effecient way of doing a DOS attack. Now instead of multiple machines on fast connections, all you really need to DOS your favorite website is a 268 and a 300 baud modem.
Re:This is worse (Score:3, Insightful)
There is no clear way to differentiate some forms of DDoS attacks from legitimate traffic or a traffic spike
The pushback idea provides a generic method for notifying/instructing upstream carriers to drop a certain aggregate traffic flow and notify the destination of what affect that limiting is having so they can determine when to resume normal operation.
In the mean time though, you have prevented a DDoS that may be targeted at a single machine from affecting the entire network.
--Iain
Re:This is worse (Score:2, Insightful)
Besides it is much harder to break into a well protected machine, than to break into a couple of thousand nearly unprotected ones.
Re:This is worse (Score:4, Interesting)
You are correct when you say it shifts the site where the packets are dropped. However, you miss the whole point. The site's router determines a pattern common to an attack, and tells the routers upstream the pattern. Those routers tell their upstream routers the pattern, etc. Alone, the site's router might be overloaded. The routers two levels upstream might all be just about overloaded, but still able to let through all non-attacking traffic. If these routers all begin throttling, the site's router will no longer be overloaded. All nonattacking packets will be let through unhindered. All attacking packets will be throttled severely. If the attack picks up and the second-level-upstream routers can't handle it, they will pushback to the third-level-upstream routers, etc.
At least, that's how I understood it.
Can this be right? (Score:4, Interesting)
Back down to earth, it's mega-wicked when good ideas are developed in FreeBSD (or Linux). Developments like these come the closest to the original intents and purposes of open sourced OSes.
Re:Can this be right? (Score:1)
Since when can you not write open and innovative software on a MS platform?
People like you give idiot-yuppie-zealots a bad name.
Tom
Relax! (Score:2)
It's Sunday morning! Don't be so serious over *everything*!
People like you give knee-jerk-reactionaries a bad name.
another idea... (Score:1)
what in the heck am i saying? lets say you get a syn with spoofed ip's (ask any ircop how much fun that is) you could then trace back through every router that spoofed ip came from. i realize this would tax machines quite a bit in logging and what not.
i dont think there will ever be a way to prevent any type of attack. i do think its important to have a proper response plan.
Re:another idea... (Score:3, Interesting)
On every edge router you simply need to put an access-list to drop all packets not coming from your netblocks.
Edge routers going to customers you drop incoming packets not coming from your customer assigned IP. Amost EVERY edge device supports this, most support dynamic filters with RADIUS resquests. If you only allow your customers to send you data from their IP address it is impossible for them to be part of a spoofed attack.
I have a simpler solution (Score:1, Insightful)
Give ISPs an incentive to detect forged packets, portscanning, and other common signs of compromised machines at the source. Get rid of zombies at the source. Then there wouldn't be the raw material for DDoS.
In short keep machines from swinging their fists, rather than try to make the recipients more resistant to being hurt.
Re:I have a simpler solution (Score:1)
blocking packets with forged return addresses (Score:5, Insightful)
I believe most DDoS attacks have the following in common:
I can't see any reason why this wouldn't be a good idea - there really isn't any reason for the type of machines mentioned to ever act as true IP routers (as opposed to NATs), and it doesn't seem like this would be either hard or burdensome for the first-line routers to do.
Employing this would mean that DDoSers would be confined to forging return addresses within the zombies' own subnet, which would make both blocking and back-tracking much easier.
It's plain that this isn't done, so there must be a good reason why people much more network savvy than I haven't implemented it - what is it?
Re:blocking packets with forged return addresses (Score:1)
Basically, I guess that this would require some sort of change to IP. One solution would be so send the "front line router" a connection packet. Then have the router send you back a public key. Then whenever the client encrypts his IP address (or some other unique peice of information(MAC?) and send this along with every outgoing message.
The router could then maintain a lookup table with IP's and encrypted message to determine which ones to drop.
You might have to double the number of front line routers to handle the overhead, but I guess this would help quite a number of security related questions.
I realize there are probably a number of problems with this as I am not a security guy, but are they any reasons this basic idea wouldn't work?
Re:blocking packets with forged return addresses (Score:5, Insightful)
I think the argument that is made for not doing this at a lot of ISPs is that with most Cisco routers its expensive as a lot of their routers can't fast switch with ACLs applied, they process switch, turning an adequate router into an inadequate packet-dropper.
It can also be a PITA to maintain -- if you put it at the very edge, like on an ISPs peering router with their upstream, it doesn't prevent in-block spoofing (eg, spoofing packets within the ISPs block). If you try to beat that on all the aggregation routers, you have a lot of ACLs to maintain; customer churn could put address blocks all over the place.
I'd argue that ISPs should make it a term of service that *their* customers ACL their edge routers; we-catch-spoofing-we-cut-you-off language.
Re:blocking packets with forged return addresses (Score:5, Informative)
As for router capacity - Junipers don't have this problem, and if the ISP manages the CPE router on the customer site they can just push it down to that device. On a Cisco, where you have symmetric routing (probably the case for most smaller customers i.e. not dual-homed), you can just set the IP reverse-path forwarding option, which is very efficient - on each packet, the router does a routing lookup on the *source* address, as if it was trying to send a packet back to its origin. If the routing table doesn't have an entry for that source address that points out via the interface the packet was received on, the source address has been forged. This is not much overhead at all - just one more routing lookup.
For dual-homed customers, the provider has to use ACLs or perhaps a managed CPE, but ideally this would be a selling point for the ISP helping to generate cash to pay for router upgrades if needed - it safeguards the customer's network from being used to generate DDoS attacks with forged source addresses, which could save the customer from a lawsuit.
Re:blocking packets with forged return addresses (Score:2)
All true, but increasingly no defence for a lazy ISP. It's jolly inconvenient for me to stop my car at red lights, but it's my duty as a good road-using citizen to do so, even if I don't think I'll get into an accident.
if you put it at the very edge, like on an ISPs peering router with their upstream, it doesn't prevent in-block spoofing
Indeed, it's an imperfect solution, but it does give a start to a beseiged site - better they (and their downstream) block a whole ISPblock or whole ISP than go down entirely. Unfortunately, there's a selfish counterargument to this - an ISP who is a good citizen and implements blocking may (if it's subsequently used for DDoS) find itself cut off from (e.g.) yahoo or ebay - one that doesn't will get a _little_ more service, until the target itself expires.
I'd argue that ISPs should make it a term of service that *their* customers ACL their edge routers; we-catch-spoofing-we-cut-you-off language.
I'd second that - on the contract line following "thou shalt not maintain an open SMTP relay".
Re:blocking packets with forged return addresses (Score:1)
Strictly, it needs only to figure out your true identity to do this blacklisting.
For ethernet connected devices (corporate and college LANs) the ethernet address serves this function.
I have no idea how this would be achieved with PPP (dialup) and PPPoE (some dsl).
For non PPPoE domestic broadband, one would imagine the DSLAM or DOCSIS-router-thingy would have the equivalent info (for DSL and cable respectively).
Old Idea (Score:5, Informative)
The basic implementation has already been done.
What is novel and new about this paper is the suggestion that upstream routers are going to allow any tom, dick and mary to tell them what packets to throttle.
Always ass-uming that the larger switches can actually do this on the scale that is hinted at in the paper.
While issue 1 is specificly a political issue between carriers and customers, one could always point to the ease of which BGP routes are exchanged as an example of how easy this would be to do. Unfortunatly, since we are now talking about something that could effectivly put a transit provider out of business, there is no way issue number 1 will be overcome, unless the router manufactures give me the same kind of filter and ruleset technology I have for BGP. This would allow me to ignore anything I want from anyone, and would have the net affect of the feature being disabled!
as for 2, I'm sure some router manufacture has been touting this type of 'feature' on thier new multi-gig-a-bit MPLS/IP-does-everything-at-once switch. Don't believe it until it's out of the lab, guys. As many times as carriers have been screwed over by these new startups and their 'awsume powerful technology', I'm supprised anyone believes thier line of crap anymore.
It's too bad DDOS attacks don't go on for weeks, then we could use something like RBL to deal with it. Since they are so transitory, blackholing on the fly, (which is basicly what this paper is advocating) would require a lot more thinking about than has been put into this work.
Perhaps, instead of trying to complicate our lives with Yet Another New Protocol, you could simply come up with and IDS concatonation system, that puts together 'lists' of known DDOS sources at the current moment, and put it into a BGP feed... What a concept! Taking 2 technolgies that are known to work, and available to ANYONE that does BGP on the internet, and making it work!
Thank You, Come Again.
Re:Old Idea (Score:1)
This kind of reminds me of DShield [dshield.org]. And I think you're right, if we could automate such an internet-wide distribute of potential DDoS participant hosts then when an attack begins, the victim could invoke "the blacklist" and hopefully cut out a big chunk of the sources.
Re:Old Idea (Score:1)
What is novel and new about this paper is the suggestion that upstream routers are going to allow any tom, dick and mary to tell them what packets to throttle.
Then, lol. Do they really think this is a good idea in any way, shape or form?
This opens up an even worse class of DOS attack than the one that it plugs. Effectively I can clamp off your traffic by accusing you of DOS'ing a bunch of servers out there somewhere (by forging requests from those servers).
Or even worse, again by forging requests from a server I can fire off pushbacks to a large number of edge routers and close down most of your traffic from those areas.
Is there no authentication in there at all?
Re:Old Idea (Score:4, Insightful)
Also, a BGP-only solution would only let you drop traffic, so it's not very useful for flash crowds, where the traffic is legitimate but excessive. It's also not useful where the port / prefix etc can't precisely identify only DDoS traffic - rate limiting allows some good traffic to get through while also limiting the DDoS. Blackholing != limiting (did you read the paper at all?)
I agree that this can be prototyped using existing technology (see my post elsewhere), but if this approach proves useful, a dedicated protocol would be helpful - though this could perhaps be piggybacked onto BGP using additional attributes to carry the filter and rate limit information.
Re:Old Idea (Score:1)
I actually had this argument with a few router vendors a few years ago, my argument was quite simple. When you get to the point where the core switch has enough power to do all of things that it would need to do in order to.
1) filter on src/dst/port/URL whatever
2) implement these filters into multiple OC-192 trunks connections without taking too much a % loss
3) making it scale to 'Internet' size.
You have spent more money buying the switch than if you had simply gone with an 'all or nothing' solution.
AND you achieve pretty much the same result. (from the 'I need to let paying customers use the bandwidth vs these DDOS hax0r l33t skript kiddies point of view)
This is the diffrence between someone who doesn't have to pay for implementation of a technicaly superior soltion, vs someone who has to worry about how little money is being made with these expensive switches, because everyone expects their multi-megabyte broadband connection to be $29.95 a month.
Did you REALLY think it was a coincedence so many IP backbones have gone out of business? Trying to keep up with the Jones doesn't help, and feature enhancment requests to high end switches like this only increase the complexity and cost of Internet, for dubious improvment.
Pushback simply moves the problem (Score:3, Interesting)
A perfect tool for doing DDoS.... (Score:2, Insightful)
Um, this isn't new. (Score:5, Interesting)
1. All the various vendors would have to implement it.
2. False positives. A new form of DoS would be to generate enough spoofed traffic to trigger this sort of thing -aimed at someone else-. Imagine your outrage when your l33t IRC buddies spoof your IP address block whilst attacking www.slashdot.com - no more imbecilic, outdated "Gee, whiz!" types of posts for you to read.
3. Oftentimes, rate-limiting via CAR, traffic shaping, or other methods consumes more CPU cycles on the routers than simply blocking the offending traffic (assuming this is possible, which depends upon the attack methodology).
The best way to combat DoS attacks generally is use strong platforms which process ACLs and other features in hardware (ensuring that your config allows those features to be processed in hardware; logging ACLs like a 'deny ip any any log' just won't cut it, these days), ensure you have the ability to 'draw off the poison' by sinkholing traffic headed for the destination by advertising a null route for it on a sinkhole router (this isn't always possible, it depends upon the target of the attck; you may not want to sinkhole all requests to your Web server, for example), ensure you have as good a traffic sniffing/IDS-type capability as possible, make use of Netflow tools like CAIDA cflowd/OSU flow-tools/Flowscan/Panoptiis/FLAVIO/Arbor Networks' Peakflow DoS, and know how to get in touch with the folks at your ISP(s) who can help with identifying the (even spoofed, via Netflow tracing) sources and blocking the offending traffic upstream of you.
If you're a commercial site, strongly consider a distributed Web site, hosted at different locations and using some sort of Global Server Load Balancing technology (GSLB; Cisco's Distributed Director and 4480 are two examples of this) to send people to different sites depending up their location, network topology-wise.
I wonder when... (Score:1)
I wonder when the LinPushbackd, GNU Pushbackd and PHPMyPushbackd projects will appear on SF.
ipv6 (Score:1)
Re:ipv6 (Score:2)
No. IPv6 improves a lot of things but it doesn't fix this. Sorry.
Forged Headers? (Score:2)
Might even reverseDOS innocent people.. id be pretty upset if that happened to me.. I might even sue if i lost revenue..
finally... a cure for Slashdotting... (Score:5, Funny)
Welcome to the Twilight Zone.
I certainly hope the filters used to detect true DDOS attacks are effective enough to prevent this scenario.
Re:finally... a cure for Slashdotting... (Score:2)
Re:finally... a cure for Slashdotting... (Score:4, Interesting)
Re:finally... a cure for Slashdotting... (Score:1)
Criticism, improvement and easy testing! (Score:2, Informative)
Criticism: By giving smaller routers the power to command the behaviour of larger routers upstream, you are dangerously opening up a loophole that could allow someone in control of a router to maliciously affect upstream behaviour (potentially a huge scope!).
Improvement: Only allow routers to pushback/command up one or two hops to limit the scope of potential reverse-DoS attacks.
Easy testing: This doesn't refer to the above issue, but still... have AT&T set up a test site running their BSD implementation and then post a story to slashdot to have us test it out :)
Good concept, won't work long? (Score:1)
I'm not sure how effective source quench is against routers in the path of a zombie host.
Heh heh (Score:2, Interesting)
More than 1 source (Score:1)
Flaws in this proposal (Score:3, Insightful)
An effective solution has to identify the source nodes causing the trouble and block them, not the target. This is hard, but not impossible. The big problem is doing it for fake source IP addresses.
It may be necessary to view routing the way we now have to view mail forwarding - open relays get blocked. If a router isn't sure of the IP addresses of its input, it shouldn't be forwarding those packets. Routers that continue to do so may find themselves blocked.
That's lame (Score:2)
In a DDoS the flood is coming from helpless slobs all over the net who didn't start it and are unaware. You're going to roundtrip that garbage traffic across the net a second time for even more congestion, and then push it at the client sending it?
If they do it right it may help a small amount in awareness, but the real answer to DDoS is that there's no good answer in the current Internet. Just like Curious Yellow, the only good answer is that OS vendors change their ways very soon and get security together, so that breakins are infrequent and require intelligent effort, as opposed to todays world of a 3-month old script off the net easily seizing 100,000 machines.
Black Ice (Score:1)
I wonder when we will start seeing automated retaliatory attacks on DDos'ers and other hacking attempts... Just think: An automated scan of the remote hostile system(s) and then sending pre-programmed attacks to those computers determined by those port scans.
If the RIAA can get away with attacking servers who are sharing copyrighted content, then couldn't a company retaliate in the same way against machines who are attacking their servers?
Could make for some interesting wars
Papers about the problem... (Score:2, Informative)
I wrote a paper in a similar vein last spring about stopping ddos attacks, it's the second section of this paper [uci.edu]. It seeks to fix the underlying problem, not create a band-aid.
try this (Score:2, Interesting)
Nah, this isn't gonna work (Score:4, Informative)
Sending quench packets back to the routers feeding you DDoS packets, and eventually back to the host in question, is a good idea in theory. Kinda like communism. But in practice it won't work. First of all, there are the CPU strain resources on the routers and hosts. With DDoS, you have thousands if not more hosts all banging on your router, and your router is going to get a cardio workout going through its tables and deciding what gets throttled. Secondly, the return addresses on DDoS zombie packets are forged a good 80% of the time, meaning that you'll probably only hit 2 or 3 routers upstream with your quench packets.
A better solution? Null routes come to mind, but there are the CPU issues again. I'd like to see some "technology" similar to this where a customer of a commercial ISP could modify firewall rules on the _ISP's_ router to control traffic coming into their netblock. Perhaps a few routers upstream too. This really appears to be the only logical "quick fix" at the network level for DDoS.
A better fix would be to keep those zombies from ever coming into play by nuking everyone's NT/XP boxes, but that'll have to wait until penguins or daemons rule the planet.
Re:Nah, this isn't gonna work (Score:2)
Re:Nah, this isn't gonna work (Score:2)
Why would routing to Null0 be more cpu intensive than to a physical interface? I guess some kind of hardware Null0 device could be emulated, if it becomes an issue.
Using this as a hacking tool (Score:1)
The script kiddy would just have to send spoofed ip packets to the server with Pushback installed with an ip address of a server they want to hack. Spread this out over a number of large number compromised zombie machines, against a large number of high-bandwidthed Pushback servers, and know that their actual target is being DDOS'd by Amazon, Yahoo, Microsoft etc. etc. etc.
Ugh (Score:2, Insightful)
I've always been a proponent of big dumb pipes and inteligent end nodes. I probably always will be. The overhead associated with supporting intelligent intermediate nodes is simply too high.
Richard
Re:hey (Score:4, Informative)
Re:hey (Score:4, Informative)
It would shut off the source of the flood, not the destination as the original poster implied...
Re:hey (Score:1)
Re:Stephen King, author, dead at 55 (Score:1, Funny)