Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Caldera Security

SCO Not Lying About DoS Attack 615

Licensed2Hack writes "The Cooperative Association for Internet Data Analysis (CAIDA), part of the San Diego Supercomputer Center at the University of California, San Diego has an analysis of the recent DDOS on SCO.com. Netcraft also has more information in their article and analysis graphs. Seems SCO was hit with a 50,000 packet-per-second SYN flood peak, which yields approximately 20 Mb/s each way, or about the capacity of a DS3 line."
This discussion has been archived. No new comments can be posted.

SCO Not Lying About DoS Attack

Comments Filter:
  • awwww... (Score:5, Funny)

    by Anonymous Coward on Friday December 12, 2003 @07:13PM (#7706728)
    poor little darl..... :)
  • Oh come on (Score:5, Funny)

    by puppetluva ( 46903 ) on Friday December 12, 2003 @07:13PM (#7706733)
    . . . that's just the slashdot effect. . .
    • Shoes (Score:5, Insightful)

      by Overly Critical Guy ( 663429 ) on Friday December 12, 2003 @07:44PM (#7707040)
      Man, this whole thing sure is a lot of shoes in a lot of Slashdotters' mouths.
      • Re:Shoes (Score:5, Insightful)

        by A Binary Rebel ( 720477 ) on Friday December 12, 2003 @08:08PM (#7707236)
        This is probally going to get me labled as anti-linux forever on /. but why is this modded troll? Its true.

        I am as anti-sco pro-linux anti-ms as anyother /. junkie. But I also learned a long time ago to never point fingers and to never speak to soon.

        This should be modded up to at least neutrel.
      • Re:Shoes (Score:5, Interesting)

        by Trepalium ( 109107 ) on Friday December 12, 2003 @08:26PM (#7707386)
        Okay, I'm willing to accept they were DDoSed. An upstream provider blocking it at the router level makes sense too. But I'm still not willing to accept that SCO isn't lying. What about their Intranet being brought down by this? What about the customer support services being brought down? This could be caused by gross incompetence, an inside job, or complete and utter lies. Choose one, none are flattering to any company, especially one that claims to sell an 'enterprise class' operating system.
        • by gilesjuk ( 604902 ) <<giles.jones> <at> <zen.co.uk>> on Friday December 12, 2003 @11:50PM (#7708437)
          Even though DDOS attacks are misuse of an Internet service and illegal, some of the tactics SCO have used in this case are very dubious too. Claiming ownership of chunks of a kernel without showing any proof and not waiting for the outcome of a court case.

          The damage they have caused companies involved in Linux far outweight a bit of network outage, unless they suffer a major loss since statistics say 80% of businesses that suffer a major outage go out of business within two years. We can always hope :)

          Link to 80% statistic [zdnetindia.com]
    • SCO MIRROR (Score:5, Funny)

      by segment ( 695309 ) <sil&politrix,org> on Friday December 12, 2003 @08:16PM (#7707311) Homepage Journal

      Oh never fear I have a mirror up [scumgroup.com] whats the big deal
    • by spitzak ( 4019 ) on Friday December 12, 2003 @10:10PM (#7707993) Homepage
      The "attack" did not come from any open-source symphasizers.

      After 24 hours the main argument that SCO was faking this was that their ftp server was up. It was very common knowledge and you can be absolutlely certain the hacker was reading the news about the hack. What happened then? Suddenly the attack slowed to the main server and it started up with double intensity to the ftp server! Look at the damn graph and see what other conclusion you can think of.

      Any Leet SCO-hating fanatic would have doubled the attacks on the main server, or perhaps attacked every machine *except* the ftp site. That would have been the most clear "I hate you SCO and I'm going to mess with you as much as possible" attack. If they hated SCO they would want their attack to match the insults being directed at SCO as much as possible.

      Instead the attack suddenly switched to be as exactly as possible a refutation of the publicity about the attack.

      There is no question what the motives of the "attacker" are. And it is absolutly disgusting that SCO can get positive publicity for this nasty little stunt.
  • by kpharmer ( 452893 ) * on Friday December 12, 2003 @07:14PM (#7706744)
    Great! now they get headlines simply by *not* lying
    • by DaveAtFraud ( 460127 ) on Friday December 12, 2003 @07:19PM (#7706823) Homepage Journal
      Well, for SCO that is remarkable and worthy of a headline.
    • by Andy Smith ( 55346 ) on Friday December 12, 2003 @07:24PM (#7706872)
      Great! now they get headlines simply by *not* lying
      No, they get headlines when people accuse them of lying and it turns out (apparently) that they weren't.
    • by Aardpig ( 622459 ) on Saturday December 13, 2003 @02:06AM (#7708956)

      Correct, execept for the fact that the "R t" bit is superfluous. Apart from that, you've got Darl to a tee, my son...

  • by Jaysyn ( 203771 ) on Friday December 12, 2003 @07:14PM (#7706750) Homepage Journal
    .... where did the synflood come from?

    Jaysyn
    • by jqh1 ( 212455 ) on Friday December 12, 2003 @07:24PM (#7706871) Homepage
      it's said to be a D[istributed]DOS attack -- that means it came from all over, no?
      • by klasikahl ( 627381 ) <klasikahl@gmai l . com> on Friday December 12, 2003 @07:58PM (#7707148) Journal
        In fact... a lot of SYN attacks don't use comprimised hosts at all! They actually send the request to a bunch of computers that are just running webservers, that's all. They spoof the destination IP and change it to the IP of the target to be attacked and all those webservers (usually ~40,000) respond at once to the host, essentially knocking it offline. It's happened to me before. :P

        So you can use even a secure (but not 100% properly configured) server to launch an attack with... Intersting stuff.
        • by anthony_dipierro ( 543308 ) on Friday December 12, 2003 @10:19PM (#7708031) Journal

          They spoof the destination IP and change it to the IP of the target to be attacked and all those webservers (usually ~40,000) respond at once to the host, essentially knocking it offline.

          That wouldn't really be a SYN attack, as the response packets would have SYN and ACK set. It would also be much easier to protect against, as these bogus SYN/ACK packets could be dropped. But most importantly, there wouldn't be any backscatter, and certainly not the backscatter that CAIDA was seeing.

          So you can use even a secure (but not 100% properly configured) server to launch an attack with...

          Improperly configured so as to be able to launch an attack isn't secure. But, I'm really not sure how you could configure a machine not to respond to HTTP requests, anyway. Fortunately, as I mentioned above, this type of attack is much easier to ignore than a true SYN attack.

    • by hypnagogue ( 700024 ) on Friday December 12, 2003 @07:46PM (#7707063)

      .... where did the synflood come from?
      Maybe nowhere. The analysis methodology used could be spoofed by SCO by them running a program on their respective servers that sends out SYN-ACK and SYN-RST to random IP addresses.

      CAIDA would just assume it's a real DDOS attack. Remember "backscatter analysis" analyzes the response from the "target" site. They don't see and cannot prove the existance of the actual SYN flood.
  • by xenoweeno ( 246136 ) on Friday December 12, 2003 @07:14PM (#7706753)
    Ha-ha! [jahozafat.com]
  • by bc90021 ( 43730 ) <`bc90021' `at' `bc90021.net'> on Friday December 12, 2003 @07:14PM (#7706756) Homepage
    Quick! Someone start knitting Satan a sweater!
  • by Infernon ( 460398 ) * <(infernon) (at) (gmail.com)> on Friday December 12, 2003 @07:15PM (#7706763)
    whether they're inept enough to leave themselves open to this sort of thing or if they're welcoming DDOS attacks with open arms for one reason or another...
    • Bandwidth (Score:5, Interesting)

      by phorm ( 591458 ) on Friday December 12, 2003 @07:26PM (#7706897) Journal
      eems SCO was hit with a 50,000 packet-per-second SYN flood peak, which yields approximately 20 Mb/s each way, or about the capacity of a DS3 line."

      And how, exactly, would you prepare for this? Ignoring syn-floods is very simple when it comes to keeping your server alive, but how do you deal with the bandwidth saturation?

      The "each way" would indicate the syns were being replied to (dumb), but they still would have clogged the pipe.

      My question is how this is possible without killing the bandwidth other servers on the subnet, namely ftp.sco.com and others? That was the original reason for the conclusion that SCO was lying, and I've yet to see something that refutes it

      The other question, of course, if it was a DDOS, who did it? A group, or one person slaving many connections? Maybe somebody with a DS3 or two available to spare?
      With the last two, one would think that the outgoing results of such an attack would be noticed?

      Also, again with the main arguement that the ftp was online whilst the www was offline... why does the article say the FTP was down (and first to be attacked)??
      • Re:Bandwidth (Score:5, Interesting)

        by Avihson ( 689950 ) on Friday December 12, 2003 @10:33PM (#7708101)
        My point exactly on ftp.sco.com, I check them during the incident, and response time seemed normal.

        What bothers me avout the whole incident is that we just have one confirmation that there was a 32 hour attack on SCO.
        Just where are all the zombies? What OS where they running? What vulnerability on the zombies was exploited? Where are the rest of the confirmations that this was a DDOS?

        Answers to the above questions were flying all over the 'net when Microsoft was DDOSed, where are they now? I know more people hate Microsoft than SCO, but the people with the tools to detect the DDoS attacks are vendor neutral.

        An interesting quote from CAIDA:
        "Around 2:50 AM PST Thursday morning, December 11, the attacker(s) began to attack SCO's ftp (file transfer protocol) servers in addition to continuing the web server attack. Together www.sco.com and ftp.sco.com experienced a SYN flood of over 50,000 packet-per-second early Thursday morning. By mid-morning Thursday (9 AM PST), the attack rate had reduced considerably to around 3,700 packets per second. Throughout Thursday morning, the ftp server received the brunt of the attack, although the high-intensity attack on the ftp server lasted for a considerably shorter duration than the web server attack. At 10:40 AM PST, SCO removed their web servers from the Internet and stopped responding to the incoming attack traffic. Their Internet Service Provider (ISP) appears to have filtered all traffic destined for the web and ftp servers until they came back online at 5 PM PST."

        So not only did the ISP filter the traffic for the ftp servers, it seems to have mirrored the ftp server, since I was able to explore the ftp site and also download download an ISO: SCOX Dev CD [sco.com]

        So the Bandwidth to the DDoSed ftp server either was not saturated, or the ftp server was not DDoSed, or maybe, just maybe, it was an inside job!
      • by ajc314159 ( 731675 ) on Friday December 12, 2003 @11:01PM (#7708240)
        Pardon my ignorance, but if they took the web server offline at 10-something am, then what was producing the backscatter of ack packets? Was the ISP doing this for them? Why on earth would they bother? And if there was no machine there to respond to the syn flood for hours, then where was the backscatter coming from?

        Also, I thought most zombie machines were compromised MS boxes. Are there networks of thousands of 0wned linux boxes out there that script kiddies are nuking each other with?

        Wating for enlightnement...
  • Oops. (Score:3, Funny)

    by Anonymous Coward on Friday December 12, 2003 @07:15PM (#7706765)
    Oops, oh well. SCO still sucks.
  • by civilengineer ( 669209 ) on Friday December 12, 2003 @07:15PM (#7706768) Homepage Journal
    The only result of this kind of attack will be tarnishing of the image of Open source developers. But, there is nothing much anyone can do about it.
    • by kirun ( 658684 ) on Friday December 12, 2003 @07:25PM (#7706892) Homepage Journal
      Well, we can tell people we didn't want it.

      You don't win arguments by silencing your opponent (which is what DDoS is), you win them by being right. All evidence so far is the OSS community is right.

      Whoever launched these attacks has made everybody look bad. Annoying SCO isn't going to make them say "Hey! Let's be nice now!". Their business model is now suing people. It's not as if their software was selling much.

      If you're reading this DDoS dude, don't do it again, mmkay?
    • by aheath ( 628369 ) * <adam,heath&comcast,net> on Friday December 12, 2003 @07:26PM (#7706899)
      "The only result of this kind of attack will be tarnishing of the image of Open source developers."

      Are you making an assumption that an open source developer is responsible for the DOS attack against SCO? Should the open source community be viewed as guilty until proven innocent?

      Hopefully no one in the open source community is involved in the most recent DOS attack against SCO or any other attacks against SCO's network infrastructure. Let's think of the open source community as innocent until proven guilty beyond a resonable doubt.

    • by Greedo ( 304385 )
      Why is it bad for OS developers?

      Did OS developers launch it? Possibly, but my guess is no.

      Maybe IBM zealots did. Maybe a bunch of l33t kiddi3z who are following the SCO proceeding thought it would be k3wl to do it. Maybe a Fortune 500 company who doesn't want to pay the licensing fees did it.

      Maybe they are just inept enough to leave themselves open to this, so anyone could've done it.
    • Why? (Score:5, Insightful)

      by etymxris ( 121288 ) on Friday December 12, 2003 @09:00PM (#7707592)
      Is every Christian responsible for the bombing of abortion clinics? Is every Muslim responsible for honor killings? Is every Linux user responsible for these attacks?

      I have little doubt that they were attacked. What seems strange to me though is that they were entirely giddy over the affair. They even went as far as issuing press releases about it. I haven't heard of any company that jumps to release PR about DDOS attacks so quickly. When forced to explain reports of DDOS attacks, a company may release a statement that clears the issues. But the first reports of these attacks came from SCO themselves. This is what raised suspicion, justifiably.

      But people shouldn't jump to conspiracy theories so quickly. Doubt of their veracity, sure? Conviction that they are lying--not justified.
  • Who cares? (Score:5, Insightful)

    by Dragonshed ( 206590 ) on Friday December 12, 2003 @07:15PM (#7706772)
    SCO's like the boy who cried wolf too much. Why should people care when he actually gets bitten?
  • by gizmonic ( 302697 ) * on Friday December 12, 2003 @07:16PM (#7706781) Homepage
    If any authorities look into this, I am gonna be pissed. I mean, if they can't bother to do anything when the anti-spam sites [slashdot.org] get [slashdot.org] attacked [slashdot.org], then they better damn well not do anything now.

    Of course, I am of the paranoid type who assumes that SCO would stage a DDoS against themselves just for the publicity, so what the hell do I know?
  • by gnuadam ( 612852 ) on Friday December 12, 2003 @07:16PM (#7706784) Journal
    Well I guess the lying or incompetent question has been settled.
  • by IamGarageGuy 2 ( 687655 ) on Friday December 12, 2003 @07:17PM (#7706786) Journal
    It's hard to have much sympathy, even though this is a dirty trick played by some h@xtor D00d that has nothing better to do with his time. The only way to beat a scurrilous bunch of deadbeats like SCO is to show to the public the kind of people they really are. Attacking them in this way only makes the Open-Source people look like a bunch of teenage kids that want to take on "The Man".
    • by i_r_sensitive ( 697893 ) on Friday December 12, 2003 @07:47PM (#7707067)
      The problem is that some Open Source people are teenage kids that want to take on "The Man".

      For proof, look around /., they aren't that hard to find.

      Responsible FOSS people are not responsible because they support FOSS, that was very likely a pre-existing condition.

      And FOSS does have allure to children, or the child-like. The underdog, oppressed group, challenging traditional and accepted practice.

      If they are not sophisticated enough to understand the reasons behind FOSS, why should we be surprised if they are unsophisicated enough to engage in irresponsible behaviour.

      Too often the FOSS movement seems to highlight those aspects of itself which attract this element. We too rarely emphasize the responsibility inherent in FOSS. The responsibility to contribute, the responsibility to report bugs, the responsibility to respect other's choices as we wish them to respect ours.

      Do we really want these people identifying themslves with our movement? I suspect not, but until we stop accentuating the us against big corporations et. al., and start accentuating some of the more mature aspects of what we stand for (which are at least as compelling as the other reasons...) we will continue to attract these people, and they will continue to make us look like children.

      I don't know any more about this specific incident than any of you, and I hope none of you reading this know any more than I do... There is no reason to believe that some FOSS advocate perpetrated this, but it is apparent from some of the sentiments expressed that people are considering the possibility and lamenting it, if it turns out to be true. If it does, we need to consider what we can do to make our movement less appealing to the irresponsible.

  • by JonMartin ( 123209 ) on Friday December 12, 2003 @07:17PM (#7706790) Homepage
    So have they just admitted that they don't bother protecting themselves from what is, in my understanding, a old and mitigatable form of attack?

    Or to put it another way, they weren't lying, they're just stupid?

  • In other news... (Score:5, Informative)

    by kirun ( 658684 ) on Friday December 12, 2003 @07:17PM (#7706792) Homepage Journal
  • SCO What.. (Score:5, Insightful)

    by cybrthng ( 22291 ) on Friday December 12, 2003 @07:18PM (#7706798) Homepage Journal
    Everyone gets DoS'd, they should be happy it stopped.

    With SCO there is just no telling if this was a PR stunt, if they set this up or if they really got attacked.

    At this juncter, i don't think it really matters because of the simple fact we don't know what SCO is up to and with everything going on we have lost faith in SCO.

    Attack or No attack is a trivial question compared to what we really know about SCO and there business practices.

    SCO freaking what!
  • by fiannaFailMan ( 702447 ) on Friday December 12, 2003 @07:18PM (#7706811) Journal
    SCO Not Lying
    Now that is news.
  • by Rev Snow ( 21340 ) on Friday December 12, 2003 @07:18PM (#7706813)
    ...when
    They're not lying
    is considered a news story.
  • Correct URL (Score:5, Informative)

    by DavidMoore ( 732023 ) on Friday December 12, 2003 @07:19PM (#7706821)
    CAIDA Analysis of SCO DoS [caida.org] Please use this link, the other one goes to a slow XML server.
  • by xsecrets ( 560261 ) on Friday December 12, 2003 @07:20PM (#7706829)
    Why on earth did SCO respond to 700 million syn packets? if there was even a moderate level of syn protection turned on they would have just droped the majority of those packets. and the bandwith usage would be half.

    • Maybe there wasn't actually any syn packets... how hard would it be to make 700 Million ACKs with random destinations and sequence numbers? Doing so would only claim half their bandwidth, leaving them still up but able to cry loudly about being knocked offline by a SYN flood.

    • SCO responded with (if I read the report correctly) 700 million packets, but there have been no numbers released about the number of packets they received.

      The actual number of packets they were receiving could have been much higher.

      Pierre
  • by burgburgburg ( 574866 ) <splisken06NO@SPAMemail.com> on Friday December 12, 2003 @07:20PM (#7706831)
    which is an extraordinarily large leap of faith considering that lying for Darl, David et. al. is like breathing for you and I, then it means that the nicest thing one could say is that they have incredibly bad sysadmins. As Groklaw pointed out, there are lots of tools out there to protect against Syn flood attacks.

    The cause that fits much better with their general operating pattern is that they purposely left themselves open to this attack to present themselves as the poor, innocent victims of the evil, Constitution-burning, enemy combatant, Open Source villans.

    I'd buy that one.

  • ftp? (Score:3, Informative)

    by Unordained ( 262962 ) <unordained_slashdotNOSPAM@csmaster.org> on Friday December 12, 2003 @07:21PM (#7706833)
    so, all of that speculation about an attack -necessarily- also taking out the ftp server at the same time ... what was up with that? 20mbps isn't enough to fill up a simple 100mbps local network. if the ds3 was their entire pipe, and the ftp server was in there too, you shouldn't have been able to get to the ftp server.

    there's some pipe sizes i wouldn't mind having explained. nice diagram of how one side filled up and the other didn't? completely separate, and people are just dolts?

    it's an honest question, i swear.
    • Re:ftp? (Score:5, Interesting)

      by NecroPuppy ( 222648 ) on Friday December 12, 2003 @07:35PM (#7706979) Homepage
      It also doesn't explain why the NetCraft stats show their connection going dead like a switch was flipped.

      Even with a SYN flood, there should have been a ramp up period of increasing latency, not an "on/off" situation.
      • Re:ftp? (Score:4, Informative)

        by Mentorix ( 620009 ) <slashdot@benben.com> on Friday December 12, 2003 @09:19PM (#7707698)
        This claim from netcraft bugged me since the first time I read it when it was linked to the last sco story. Let's spend some time debunking it.

        Let us assume that the resolution of netcrafts measurements has a resolution of 1 minute, hell, make it 10 seconds. How long do you think it takes for an average zombie machine to start churning out syn packets at full speed? I'd say after maybe a second or two, and I'm being generous. There's a >90% chance the zombies are all recieving commands through IRC or a similar set-up, this adds maybe 2 to 3 seconds to the response time. All in all it's fair to assume that within 5 seconds of the attackers push of the button all zombies will be spewing syn packets at their maximum rate.

        So in conclusion; Any attacker with a sufficient amount of zombies can push an amount of traffic into any network enough to saturate its bandwidth contraints within a mere *5* seconds. There is no reason *at all* why an attack like this should always look like a slow (1 - 10 minute) degradation of network performance, it can be done close to instantanious.

        Of course depending on your relation with your backbone provider you can always try to block it higher-up. Although, don't be surprised when some attackers actually saturate gigabit links...

        -- Witty saying #52; 404: file not found
  • by Rosco P. Coltrane ( 209368 ) on Friday December 12, 2003 @07:22PM (#7706852)
    SCO was hit with a 50,000 packet-per-second SYN flood peak

    If their servers died from a synflood attack, there are 3 possible reasons:

    - The IT guy is a monkey (likely, but still, he would have to be a really daft monkey)

    - The IT guy has time-travelled from the mid-nineties and didn't know about synfloods

    - The IT guy was told to compile a kernel without the synflood protection, so that Caldera/SCO would look like the poor company hit by naughty hackers.

    Also, I might add, there are another aspect to consider : whoever hit SCO with a synflood attack has either:

    - the brain of a monkey

    - time-travelled from the end of the nineties and attacked SCO with what he thought was a really cool unbeatable DoS

    - been told to attack SCO so that SCO looks like the poor company hit by naughty hackers.

    Conclusion: The cause of this DoS was either:

    - 2 particularly stupid monkeys
    - 2 time-travellers
    - 2 suckers paid by SCO

    Dunno for you, but I know where my money would go if I had to bet ...
    • by Anonymous Coward on Friday December 12, 2003 @07:28PM (#7706910)
      Monkeys! Always bet on the monkeys!
    • by tb3 ( 313150 ) on Friday December 12, 2003 @07:35PM (#7706982) Homepage
      I don't see anything in your logic that says it couldn't be a combination of one from column 'A' and one from column 'B'.
      I would personally go with 1 particularly stupid monkey and 1 sucker paid by SCO.
    • by gl4ss ( 559668 ) on Friday December 12, 2003 @07:43PM (#7707037) Homepage Journal
      you forgot one:

      -the it guys had left the building few months ago.

      ---
    • by Silvers ( 196372 ) on Friday December 12, 2003 @08:08PM (#7707242)
      While a single source DoS stream is 'really stupid', a DDoS using hacked machines is notoriously hard to stop and trace.

      Anyway, this is my analysis. When only the WWW server was targetted, the flow was not enough to saturate the link, but there was no syn protection in front of the www server. (or poorly configured, or something along those lines) Mainly because the FTP site was still up and running on the same subnet. But from the report, later on the FTP server was also attacked, bringing up total bandwidth up even higher, possibly killing the link.

      So quite obviously the www server was not protected from syn's nor was the link fully eaten up by these packets. Since the ftp server was responsive until it became a target, as well as the fact that these reports mention that the amount of traffic significantly increased when the ftp attack was launched.

      There's very little to be done about a DDoS if it can saturate your link, but in this case it wasn't completely utilized (atleast until the ftp attack started), and the www server just wasn't getting adequate protection (many firewalls have syn attack thresholds where they will age out syn connections extremely fast and only pass on ones that complete to the server)

      Anyway, just the analysis of a college kid.
    • by Xenographic ( 557057 ) on Friday December 12, 2003 @08:33PM (#7707427) Journal
      Pity SCO never bothered to use TCP cookies, which are old news. Live and learn.

      What no one else has mentioned, however, is how SCO came up with those fake signs when the protesters came--you know, the ones assosciating Linux and communism, which you can find photos of on Groklaw--I mean, I have no proof of anything, nor do I accuse them without proof, but I cannot put self-sabotage beyond them any more. It's not like they haven't done things of this nature before.

      Their willingness to use it as PR is also troubling. How ironic, though, that we'd criticize someone for coming clean about an attack when so many who study security wish that companies were more forthcoming about them. On the other hand, this is a DoS attack--no confidential information is at stake--so this is just the sort of attack they probably need not mention...

      My guess is that they plan to use this to (attempt) to discredit IBM in the courtroom. First, presume that someone in the OS community did it (proof not required?), associate IBM and OS, then claim that IBM is part of a conspiracy against them (they already have, actually, in their breifs--I could be mistaken, but I thought that it was one IBM moved to strike since they didn't even state it with particularity [e.g. didn't say who IBM had conspired with])

      Even so, I'm reasonably sure that SCO cannot prevail in the courtroom, especially given how McBride claimed to be expecting the outcome of the last hearing over discovery. So we're pretty sure that SCO won't prevail in the lawsuit--indeed, the counterclaims from IBM may well be the end of them--and we can be pretty sure that IBM won't just buy them out (bad precident). It could be a Pump & Dump--I've seen others who think that someone is painting the tape (trying to keep SCOX share prices up)--but the SEC, at least so far, doesn't appear to think so.

      I just wonder if there's some other "win" scenario wherein SCO doesn't actually win the lawsuit or much of anything else.

      Here's a thought--albeit one terrible, completely, utterly and totally speculative unsupported by any solid evidence--what if SCO's entire purpose here is to discredit Open Source? In that scenario, they don't have to "win" anything--just make sure that we suffer as much as possible while they go down...

      Oh well, I'm not sure how much Darl can hold on. They postponed the earnings report, which the Motley Fool lists as a textbook showing of internal strife. The lawyers and the banks are jockeying for position over the remains of SCO should it lose, according to their agreements which you can find on Groklaw. The court has gone soundly against them thus far in the discovery hearing. It's practically game over if the share price drops low enough, for any reason, according to more agreements with RBC.

      I wonder if Darl can keep it together long enough that SCO even exists for the remainder of the lawsuit, given that it'll take some time?

      Only time will tell.
  • DS3 Line stats (Score:5, Informative)

    by Lipongo ( 704267 ) on Friday December 12, 2003 @07:22PM (#7706859) Homepage
    The attack was just short of half a DS3 Line.

    DS3 Line = 44.736Mbps for those of you who need a definition

  • Then please explain (Score:3, Interesting)

    by Jesrad ( 716567 ) on Friday December 12, 2003 @07:23PM (#7706867) Journal
    Then please kindly explain why the website was still available at http://216.250.128.20/ ?
    • by Zocalo ( 252965 ) on Friday December 12, 2003 @07:32PM (#7706955) Homepage
      Because only in el cheapo hosting can you make the assumption that two adjacent IPs are on the same switch. It's quite common for high capacity corporate sites to have a load balancer of some kind in front of them that redirects to other IPs that you never see. Some of the more sophisticated devices even fiddle the TTL and other settings so they are totally invisible and what appears to be a single IP could easily be a distributed cluster of servers in every continent of the globe.

      Provided that the bandwidth to the load balancer did not get saturated in the DDoS, and the attack was targetted at a specific IP then it is perfectly possible for adjacent IPs to be fine. I and several others pointed this out as a possibility out in the original story and either got modded to oblivion or called idiots for it. C'est la vie.

      • by Jesrad ( 716567 ) on Friday December 12, 2003 @07:39PM (#7707011) Journal
        But if the website traffic is load-balanced across those multiple servers, wouldn't the server at 216.250.128.20 have been hit by the very same attack ? From the traceroute and DNS queries, it seemed to me that they had just changed their webserver's IP from 216.250.128.12 to 216.250.128.20, and messed up the DNS update and transition.
        • by Zocalo ( 252965 ) on Friday December 12, 2003 @08:06PM (#7707215) Homepage
          Possibly. Possibly not. Without detailed knowledge of the precise SCO setup, it's difficult to say for sure, all you can do is take observed data and claims and speculate. Also, keep in mind that there could be multiple load balancers in the mix, the DDoS could have been targetted at an IP address rather than a hostname and so on. It's also possible that they just changed their DNS and stuffed it up. ;)

          But to give you a more specific reply, rather than the general one. Assume that SCO has two load balancers, one on 216.250.128.12 and the other on 216.250.128.12. Behind one IP is a cluster of web servers on 10.1.0.x and behind the other a second cluster on 10.1.1.x. Each cluster is in a different data center for resiliance. This is a fairly typical setup (my employer uses this on its Intranet, only we have three sites). Now someone launches a DDoS SYN attack against 216.250.128.12, but while the total traffic does not flood the network connection, the amount of SYNs arriving is either enough to down the load balancer, or takes out the webservers behind. You will see precisely the effects we got with SCO; adjacent IPs up, the web server down and SCO screaming blue murder.

          Of course, as I said before, that's just supposition based on what's being said and how things can work. It's still entirely possible a significant part of SCOs claims are not exactly what happened of course.

  • Silver Lining? (Score:5, Interesting)

    by KnightNavro ( 585943 ) on Friday December 12, 2003 @07:30PM (#7706938)
    They may have actually been attacked, but at least they still look like the news grubbing idiots they are. As the Cadia article points out, it was a SYN attack. From earlier today [groklaw.net], SYN attacks are very easy to defend with even the most basic systems.

    Again, even when SCO shows a shred of the truth, it only reveals they're either incompetent or unethical.

  • by fanatic ( 86657 ) on Friday December 12, 2003 @07:50PM (#7707089)
    It was bound to happen eventually, if only by random chance - as much as they talk, sooner or later they were bound to say something true.
  • by fw3 ( 523647 ) on Friday December 12, 2003 @07:55PM (#7707127) Homepage Journal
    First, by all means mod me down it's only /.

    Yes, SCO are pretty low on the karma totem, however the 'experts' quoted on groklaw, as well as the far more numerous 'experts' who replied that yes they must be faking it .... were drawing their speculations on very little data.

    If you cared to measure you sure didn't need to be CAIDA, many snort, pf and netfilter logs are showing the backscatter of this attack.

    And to all the experts who've been holding that a large synflood is easy to fix by blocking the attacker IPs: get a fscking clue.

    Both syn and bandwidth attacks use forged addresses children (which is why there is backscatter), each incoming syn is from a random IP, the ack goes to the forged addr, not the originator.

    The best way I've seen to handle this involves sensors at enough upstream locations to measure the packet count ratio skewing which results. This isn't generally deployed

    Now technically SCO could probably manage to forge that kind of data (just send out all the expected response traffic) but again there are enough sensor platforms out there now that such a deception would certainly be unmasked eventually.

  • by strobert ( 79836 ) on Friday December 12, 2003 @08:18PM (#7707336) Homepage
    DS3 is ~45Mbit/sec bi-directional
    (so 20 is about 44% utilized)
  • Cry Wolf (Score:5, Interesting)

    by LuYu ( 519260 ) on Friday December 12, 2003 @09:01PM (#7707601) Homepage Journal

    That [groklaw.net] is [slashdot.org] what [theregister.co.uk] one [cbronline.com] gets [forbes.com] when [groklaw.net] one [groklaw.net] keeps [groklaw.net] crying [groklaw.net] wolf [sco.com]!

    Unfortunately, the number of words in that sentence did not exhaust the immense volume of even the big lies told by SCO.

    I hope the wolf is IBM.

  • by WolfTattoo ( 732427 ) on Friday December 12, 2003 @09:01PM (#7707607)
    I have no idea if SCO is using Cisco routers on their permiter, but I guess its not too unreasonable to assume this is a possibility. With a Cisco on the permiter, preventing a SYN attack requires all of 3 additional lines to the configuration. I'm guessing it also doesn't take too much more than this on any enterprise-class router.

    Configuring a Cisco perimeter router to prevent SYN flood attack against web server:
    (config)#access-list 151 permit tcp any host
    (config)#ip tcp intercept list 151
    (config)#ip tcp intercept mode intercept

    With Intercept mode enabled, all incoming SYN are held by router which proxy-answers w/syn-ack. Won't forward to server if Ack not recieved.

    http://www.cisco.com/en/US/products/sw/secursw/p s2 120/products_configuration_guide_chapter09186a0080 0b6f0e.html
  • That both sites have published this retraction, after having previously published the original stories about the DDOS being a fabrication. Many, more "mainstream" and "credible", news sites probably would not have done so, or would have published the retraction loaded with "spin."

    Worse, many other sites would have tried to cover up the truth, rather than risk suffering a little "egg on the face."

    To the credit of both Groklaw and Slashdot, both have said "Oops, we were wrong," and handled things in a very mature fashion.

    Good job, guys.
  • by BCW2 ( 168187 ) on Friday December 12, 2003 @09:51PM (#7707885) Journal
    That it wasn't customers rushing to pay their linux liscense fees because the court case is going so well?

    and Daryl wouldn't lie either.
  • by CAIMLAS ( 41445 ) on Friday December 12, 2003 @10:47PM (#7708167)
    This is so obvious it's not even funny.

    In nearly every scenario, you can trace the cause of something to its origin by determining who benefits the most from it. In this case,

    Does linux benefit from this DDoS? No.
    Does IBM's case benefit? No.
    Does the linux community? No.
    Do 1337 kiddies? No. (They don't get the credit - "linux hippies" get the "credit")
    Does SCO? Yes. They'll likely try to get an extension on their court order, just as earlier predicted here on slashdot.

    If I were in the FBI and looking into this scenario, I'd first look at SCO's accounting very, very carefully. My guess is that there's a debit of several dozen (hundred?) thousand for something like "Consulting Services" made within the last couple weeks.
  • by borgheron ( 172546 ) on Friday December 12, 2003 @11:31PM (#7708363) Homepage Journal
    Sites get attacked every day. Yahoo.com had it's share of attacks back in the day and so did any number of sites.

    The fact is that improperly maintained or administered sites *will* be hacked or DoS attacked by evil-hackers simply to prove that they can do it. SCO is simply a convenient target for some adolescent idiots like so many other sites.

    There is no evidence that these attacks are in any way connected to the recent Linux spat and are not some independent idiot who doesn't care one way or the other.

    Also, as a community we should discouraget this kind of behavior, but it is also a mistake for any individual, company or judge to believe that the actions of a few wayward individuals reflects the sentiment of the entire community.

    I mean, just because someone uses Windows and hacks Linux sites, does this mean that *all* Windows users hate Linux?? No, I know some people who use both and they love Linux, but use Windows for work and they like it too. Contrary to popular belief Windows users are as rabid and often are *more* rabid and fanatical than Linux users. I personally have spoken to people who believe that Microsoft deserves to overcharge the workd for everthing because, in his mind, they have "won" and that is thier "reward".

    So you see... I believe that, while it's unfortunate the SCO is being attacked, it's not necessarily connected with Linux.

    Perhaps SCO should secure thier site better.

    GJC
  • maybe? (Score:5, Funny)

    by di0s ( 582680 ) <cabbot917@gm3.14159ail.com minus pi> on Saturday December 13, 2003 @12:51AM (#7708660) Homepage Journal
    Maybe what it really means is Denial of Settlement.

"Experience has proved that some people indeed know everything." -- Russell Baker

Working...