[lug] DOS ssh attacks

Nate Duehr nate at natetech.com
Sun Jan 11 01:51:49 MST 2009


On Jan 10, 2009, at 4:27 PM, karl horlen wrote:

> i guess this kind of gets back to the original question.  depending  
> on how big the pipeline is at any given entry / router point to and  
> within your ISP, i would imagine a DOS attack on only one server  
> behind an ISP firewall can potentially impact every server / site  
> behind any one of the firewalls in the path that leads to the ISP.
>
> not even sure how an ISP fixes that?

The answer in the absolute worst cases is literally just what you  
say:  More bandwidth.

There are companies (I think one's mentioned in the article below, and  
there's another article floating around about a similar company that  
was "protecting" offshore gambling "casinos"/sites -- that story was  
even hairier/weirder since there was virtually no law enforcement  
available in these off-shore locations, and the owners would literally  
hire mercenaries/militia to protect their data centers, families,  
themselves... employees if they were really nice (hah... just only  
KINDA kidding there), etc... from the bad guys who were extorting them  
for millions of dollars a month.

Often the companies that do this sort of "protection" take on the job  
of being your primary route, they have enormous bandwidth, and they're  
not cheap.  They route your normal traffic in through their load- 
balancers, server farms, etc... strip off the "bad" stuff, and send on  
a back-end (again, expensive) point-to-point pipe to your now much  
quieter, datacenter where the "real" servers live.

Larger U.S. corporations just scatter their servers and build out in  
multiple huge data centers with massive pipes into them, to make the  
likelihood they can be knocked off-line, lower.  But they don't often  
have to avail themselves of the services of the "protection" companies.

>> Your question reminds me of an article I read a while back.
>> I think this is it (or it contains enough of the same
>> info): http://www.press.umich.edu/pdf/9780472031955-ch24.pdf
>
> thanks for the link and info.  i'll give it a look.

That's a pretty good one.  There are others out there too.

The whole thing gives rise to the joke:  "He who dies with the most  
bandwidth, wins.", of course.

Or as I've stolen and rephrased it into telco terminology for years,  
after hearing a friend coin the phrase one day:  "He who dies with the  
most erlangs, wins."  (Which is a far more interesting way to say it,  
for telco geeks.  And getting more accurate all the time, since the  
big pipes getting overstuffed also commonly blocks VoIP traffic these  
days, too... ahh the joys of mixed packet networks!)

DDoS attacks from a botnet aren't something most people really want to:
a) Know they even happen...
b) Have to deal with...
c) Be involved with the serious law enforcement and dangerous behavior  
of the criminals involved, in many cases.

Think about it this way -- if spamming is profitable in the general  
"lawlessness" of the Internet, how much more profitable is taking down  
any large corporation's website that does commerce mainly via the  
web?  (Extortion.)  It's big business.  Non-distributed DoS attacks  
are magnitudes easier to deal with, block some IP ranges, and you're  
done.  Distributed DoS attacks utilizing zombie/botnet networks --  
much harder to deal with.

--
Nate Duehr
nate at natetech.com



More information about the LUG mailing list