Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Denial of Service Attack at Internet Root Servers
AP ^ | 22 OCT 2002 | TED BRIDIS

Posted on 10/22/2002 4:54:09 PM PDT by j_tull

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-67 next last
To: FreeTheHostages
Thanks Free..., I guess was hoping for something more along the lines of Howlin's lightning button or some super secret "go f*ck yourself" command that only THE root could originate.
41 posted on 10/22/2002 7:41:42 PM PDT by j_tull
[ Post Reply | Private Reply | To 37 | View Replies]

To: j_tull
the root can do a lot. root operators are very powerful. but they work together and coordinate and share intelligence for maximum effect. they have their own internet version of norad -- where they have tactical stuff ready to go if something devastating is launched.
42 posted on 10/22/2002 7:42:50 PM PDT by FreeTheHostages
[ Post Reply | Private Reply | To 41 | View Replies]

To: FreeTheHostages
Nice to know, but I was so pissed at my computer I almost reformatted. Sheesh!
43 posted on 10/22/2002 7:46:26 PM PDT by Cold Heat
[ Post Reply | Private Reply | To 42 | View Replies]

To: All; Fred Mertz; swarthyguy; clamboat
Is there any relation between the President's Critical Infrastructure Protection Board and the National Infrastructure Protection Center at which Linda Franklin (the victim of the Home Depot murder) worked and "studied terror threats"?
44 posted on 10/22/2002 7:49:09 PM PDT by aristeides
[ Post Reply | Private Reply | To 21 | View Replies]

To: j_tull
The reason Microsoft stuff should never be put on internet servers. I wouldn't lay bets on what's running those backbone servers; but, can anyone who runs MS at work or home imagine the damage that could occur by using an MS based web server knowing it's not only junkware but also the prime target for virii(misery loves company btw)?
45 posted on 10/22/2002 7:54:41 PM PDT by Havoc
[ Post Reply | Private Reply | To 1 | View Replies]

To: unixfox
was in Cozumel, Mexico when it happened.

Lucky you!! The last time I was there, a local kid sneezed in my face and I was sick for a week!!

46 posted on 10/22/2002 7:54:52 PM PDT by potlatch
[ Post Reply | Private Reply | To 32 | View Replies]

To: Havoc
I wouldn't lay bets on what's running those backbone servers; Remember Sun's "we're the 'dot' in 'dot com'?" They subsequently lost that contract.
47 posted on 10/22/2002 7:59:30 PM PDT by j_tull
[ Post Reply | Private Reply | To 45 | View Replies]

To: calenel
CHINA...yes, China

-----

http://www.infowar.com/mil_c4i/00/mil_c4i_101100b_j.shtml

10/11/00
China Threatens 'Electronic Pearl Harbor' Attack on U.S.

NewsMax.com
Wednesday, Oct. 11, 2000

Nations lacking military muscle could create an "electronic Pearl Harbor" that could defeat the U.S. by using electronic warfare to cripple America’s high-tech-dependent armed forces, an official Chinese report claims.

In the report, "The U.S. Military's Soft Ribs and Strategic Weaknesses," which analyzed America’s military doctrines, the strategies and tactics that Beijing could use against the U.S. were revealed by the official Chinese Xinhua news agency.

According to the authoritative American Foreign Policy Council (AFPC), the Beijing document explained how China or any other country could use electronic warfare against the U.S.:
****** more ... see link above

48 posted on 10/22/2002 8:03:27 PM PDT by edwin hubble
[ Post Reply | Private Reply | To 20 | View Replies]

To: j_tull
Gotta be better on the network than MS though. LOL. I speak from experience (don't pitty me, I get paid for it too) LOL
49 posted on 10/22/2002 8:05:11 PM PDT by Havoc
[ Post Reply | Private Reply | To 47 | View Replies]

To: j_tull
j_tull... I meant to send reply #48 to you...
50 posted on 10/22/2002 8:05:33 PM PDT by edwin hubble
[ Post Reply | Private Reply | To 1 | View Replies]

To: justlurking
The SYN/ACK DDoS attack I referred to works no matter what's running on the victim--it's targeted at the victim's resources--not any particular server. The attacker sends SYN packets at each host he wants to send traffic to the victim, with the victim's IP in the source address. The server SYN/ACKS to the victim, whose stack doesn't have a clue what to do with the packet. Gibson has a write-up on this attack somewhere on grc.com, if I remember correctly.
51 posted on 10/22/2002 9:01:08 PM PDT by dwollmann
[ Post Reply | Private Reply | To 38 | View Replies]

To: j_tull
Here's my personal, gut feeling (and I'm in the computer security industry). This was a test. The real thing is going down on 26 October - the date selected for nationwide anti-war rallies.

Mind you, I've been wrong before and this is purely a gut feeling. But the hacker community seems to be in lockstep against "Dubya's war for oil to avenge his daddy" and they've been itching to find an excuse to use their Distributed Denial of Service (DDOS) zombie farms for a common hacktivist cause. 26 October marks the biggest anti-war event yet.

52 posted on 10/22/2002 9:10:45 PM PDT by Spiff
[ Post Reply | Private Reply | To 1 | View Replies]

To: Arkinsaw
No idea where it came from. How is that?

That's my theory, and I'm sticking to it.

53 posted on 10/22/2002 9:17:15 PM PDT by Frances_Marion
[ Post Reply | Private Reply | To 4 | View Replies]

To: j_tull
The article said this was on Monday. It was also happening Sunday evening for a period of time.
54 posted on 10/22/2002 9:20:24 PM PDT by isthisnickcool
[ Post Reply | Private Reply | To 1 | View Replies]

To: j_tull; Havoc
Remember Sun's "we're the 'dot' in 'dot com'?" They subsequently lost that contract.

The trial run of the slogan went: "Sun. We're the invisible dot at the end of dot com. Really. No, really, there's an invisible dot at the end. That's us."

55 posted on 10/22/2002 9:32:35 PM PDT by toenail
[ Post Reply | Private Reply | To 47 | View Replies]

To: j_tull
"As best we can tell, no user noticed and the attack was dealt with and life goes on," said Louis Touton, vice president for the Internet Corporation for Assigned Names and Numbers, the Internet's key governing body.

I noticed severe slowdowns both yesterday and today, no idea if the problems are related to this reported attack, but many sites were terribly slow.

56 posted on 10/22/2002 9:39:39 PM PDT by UnBlinkingEye
[ Post Reply | Private Reply | To 1 | View Replies]

To: dwollmann
SYN/ACK is only a vulnerability if the server accepts TCP connections. Since DNS is nominally a UDP protocol, it's connectionless. There is no SYN/ACK handshake to create a connection: a request comes in, a reply goes out. If the server doesn't reply to the request for any reason, it's the responsibility of the application to retry or take other action. That's what the U in UDP means: Unreliable.

The DNS protocol does provide a TCP port for name service, but convention discourages its use. I wouldn't be surprised if the root servers don't support it, due to the resources that would be required to support a large number of users.

However, zone transfers (which update DNS servers) use TCP in order to preserve data integrity. There are presumably some security measures in place to protect against a SYN flood.

It turns out that this was indeed a DDoS attack, but it was a flood of ICMP echo requests. That made it very easy to filter with a firewall, although the attack apparently ended very quickly. See this posting for details.

57 posted on 10/22/2002 9:54:24 PM PDT by justlurking
[ Post Reply | Private Reply | To 51 | View Replies]

Comment #58 Removed by Moderator

Comment #59 Removed by Moderator

To: justlurking
It turns out that this was indeed a DDoS attack, but it was a flood of ICMP echo requests. That made it very easy to filter with a firewall, although the attack apparently ended very quickly. See this posting for details.

Hmm... I would have imagined that the maintainers of the roots would have LONG ago turned if ICMP at the routers. That doesn't stop ICMP requests from flooding the routers, but then you realize that the routers feeding these boxes have some decent load balancing going on, so you'd have to REALLY do a massive PoD (ping of death) to swamp it, and even then you're just pegging the router, not the actual DNS server.

Oh well... I figured that just doing a flood of dns lookups might have been sufficient to peg these machines. Nothing more complicated than a bunch of machines doing tons of UDP requests to port 51 and then not even bothering to listen for a response before sending thousands more.

To answer other questions, I could be entirely off my rocker, but I'm fairly certain the roots run just customized *nix of some form, with only DNS doing anything on the machine. Nothing too fancy besides some nice hardware, stable OS, plenty of redundant bandwidth. DNS requests aren't exactly high bandwidth anyway, so it takes surprisingly little to be able to manage a lot of requests.

60 posted on 10/22/2002 10:12:26 PM PDT by MPB
[ Post Reply | Private Reply | To 57 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-67 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson