US internet users suffering under DDoS attacks on key DNS provider

2»

Comments

  • Reply 21 of 31
    Spotify wasn't working for me in Uruguay at the time of the attacks 
  • Reply 22 of 31
    boredumbboredumb Posts: 1,418member
    My God!  The 'raptors are testing the fences...!
  • Reply 23 of 31
    evilutionevilution Posts: 1,399member
    Script kiddies who think they are Mr Robot.
  • Reply 24 of 31
    And to think the original design of the internet was to ensure that connectivity could be routed away from a bomb blasted section, inherent resiliency in design needs to be a core design consideration into the future.  
    It was and still is. That's why there isn't a single, centralized name server. There are thirteen and they're spread across the globe. And thousands of next-level servers underneath them. And thousands more another layer down.

    DNS does have a lot of resiliency, which is why it's still working despite the attacks. 
    edited October 2016
  • Reply 25 of 31
    I think these so called hackers need to go out and talk to some women instead of hiding behind their screens like nerds. 
  • Reply 26 of 31
    MacProMacPro Posts: 19,728member
    volcan said:
    ... the U.S. Department of Homeland Security is "monitoring the situation" and the is "investigating all potential causes" of the outages.
    The DNS system is rigged by the corrupt liberal media. 
    Haha good one.
  • Reply 27 of 31
    MacProMacPro Posts: 19,728member
    flaneur said:
    The attacks must be directed by Obama or Clinton to prevent the widespread dissemination of stuff like this:

    Hacked emails show Clinton pushed for charity meeting in Morocco
    “She created this mess and she knows it.” —Huma Abedin

    http://www.cbsnews.com/news/hacked-emails-show-clinton-pushed-for-charity-meeting-in-morocco/
    More likely Trump campaign operatives (Bossie, Stone, O'Keefe, etc.) who will try to connect it to the Clinton campaign.
    No way anyone connected to Trump, this is the work of smart, if misguided people.
    singularity
  • Reply 28 of 31
    christophbchristophb Posts: 1,482member
    I'm fairly certain it was malware installed on Samsung Internet connected refrigerators launching a coordinated, distributed attack to take down appleinsider.com.  The other minor players were just collateral damage.   Notify the BBB and ....  Is there a Federal Agency overseeing home appliances?  There should be regulation!  The conversation has begun.
    edited October 2016 cornchip
  • Reply 29 of 31
    MarvinMarvin Posts: 15,326moderator
    Is there a Federal Agency overseeing home appliances?  There should be regulation!  The conversation has begun.
    I think there needs to be a new IP naming scheme. Right now, managing a firewall is really difficult because all you see are numbers:



    Region locations are only defined by ranges and no direct platform info. You'd have to analyse every packet for identifying info but a flood of data would overload the system. It could be formatted region string:identifier string:IP:platform class string and the regulations would cover the string identifiers like an FQDN. This allows countries to control their own IP allocation. Companies can register their company name as the identifier. When it comes to DNS, there would be a predefined range of company server addresses. When looking up twitter.com, the hardware can directly translate this to *:twitter:0.0.0.0-0.0.0.255:* so no need for a central 3rd party DNS translation (which improves privacy) because the hardware would all know where that address was.

    The way it knows where these addresses are is due to the central internet authorities:

    http://www.cisco.com/c/en/us/about/press/internet-protocol-journal/back-issues/table-contents-43/121-resource.html



    Instead of having preallocated IP numbers sent downwards through the chain, strings would be requested upwards. The central root authority only has to assign region codes and then every country has authority over their own internet space. Each country would have identifier strings and have their own authority. I would expect this authority to deal with organization strings so companies and ISPs.

    In consumer equipment, the network hardware would define part of the platform string based on the regulations. This can include a device class code. A home IP might then look like:

    US:AT&T:88.83.23.33:IOT

    Localhost IPs would allow user defined strings on the end and they can optionally be attached to the external IP. If someone was using proxy servers, the identifier code might show up as 'server'. This allows firewalls to much more easily block incoming data quickly. If they suddenly get a whole load of traffic from IOT class devices, they just put *:*:*:IOT in the firewall and route everything through a separate filter. The regulation for the latter part could also include more specific product identifiers so that product manufacturers can be notified of a vulnerability.

    In order to lookup the location of twitter.com from a computer using this scheme, the network would do what it does now. If you open a command-line and type traceroute apple.com, it shows the path that the network checks in order to reach the destination (Apple owns all the 17.x.x.x space) hopping through your own local router first to your ISP to national/international servers down to data centers down to the location. Every one of those hops checks the request to see where to go next, so it can do the exact same thing using string identifiers. International companies would register their company name with every country's central organizational authority.

    A request for twitter.com would go out to some external server. This would still be a DNS server but not a central one. It can lookup organizations so by default *:twitter:0.0.0.0-0.0.0.255:*. It would find twitter to be a valid organization name and proceed through the routing to the destination. There wouldn't need to be large global routing tables:

    https://en.wikipedia.org/wiki/Internet_backbone
    http://blogs.cisco.com/sp/global-internet-routing-table-reaches-512k-milestone

    The major routing tables (multiple routers updated from central authority) would only deal with organizations and those organizations would have to deal with routing down the IPs. If someone took out a DNS service, it wouldn't matter because routers can go directly to twitter's data center to a default IP range 0.0.0.0-0.0.0.254 and those machines can determine which servers to use. Domain names can be mapped to organizations rather than IPs and they determine what to do when someone reaches them using that domain. If you had a small company, your domain would be mapped to a domain service or your hosting provider and every router outside of the provider only has to remember where to reach the organization, not your server, that's up to the provider to figure out.

    Also protocol-level packet encryption would be enabled by default and SSL would be reduced to an authority checking the encryption quality and company validity.
    gatorguycornchip
  • Reply 30 of 31
    volcanvolcan Posts: 1,799member
    Marvin said:

    Also protocol-level packet encryption would be enabled by default and SSL would be reduced to an authority checking the encryption quality and company validity.
    Interesting comments but mostly irrelevant. In the case of DNS flood attacks it is not resolution of IP addresses that is the issue,  it is malformed packets that the server tries to parse but can't because they are bogus.The server spends all its resources trying to comply with a fake request until the cache fills up and it crashes. IP address naming schemes has nothing to do with it. Remember that 90% of current network traffic is either to or from an unnamed, un-routable. proxy IP addresses such as 10. , 172. or 192. that still need to go through a firewall. All of your speculation based on identifying strings would be a huge mess especially since everything related to IoT is going to be IPV6.
    edited October 2016
  • Reply 31 of 31
    MarvinMarvin Posts: 15,326moderator
    volcan said:
    Marvin said:

    Also protocol-level packet encryption would be enabled by default and SSL would be reduced to an authority checking the encryption quality and company validity.
    Interesting comments but mostly irrelevant. In the case of DNS flood attacks it is not resolution of IP addresses that is the issue,  it is malformed packets that the server tries to parse but can't because they are bogus.The server spends all its resources trying to comply with a fake request until the cache fills up and it crashes. IP address naming schemes has nothing to do with it. Remember that 90% of current network traffic is either to or from an unnamed, un-routable. proxy IP addresses such as 10. , 172. or 192. that still need to go through a firewall. All of your speculation based on identifying strings would be a huge mess especially since everything related to IoT is going to be IPV6.
    The recent attack used an HTTP Flood:

    https://www.incapsula.com/blog/malware-analysis-mirai-ddos-botnet.html
    https://www.incapsula.com/ddos/ddos-attacks/

    "In HTTP flood DDoS attack the attacker exploits seemingly-legitimate HTTP GET or POST requests to attack a web server or application. HTTP floods do not use malformed packets, spoofing or reflection techniques"

    It's just a high volume of packets that causes the problem. If the network hardware that generated them was better regulated then they'd be more easily identified in the packet headers to separate legitimate traffic from malicious. Filters would be able to quickly identify region, network and device class, this scheme has to replace IPv6. The packets have to pass through other hardware but the regulations would require network hardware to maintain important information. Then firewalls at the target can filter packets very quickly, they'd use the information to filter/drop suspicious packets instead of trying to do anything with them. Things like proxy/VPN would identify as Server so would hide the source but servers can be considered suspicious traffic and malicious traffic wouldn't funnel through a proxy or it would defeat the purpose of the DDOS attack.

    Something will have to be changed, these attacks are just going to get larger and more frequent the more networked devices there are. This Mirai attack was from tens of millions of devices. It could come from smartwatches, fitness trackers, smart TVs, set-top boxes, Echo-like devices, thermostats... The number of these combined will reach the billions eventually. It shouldn't just be up to the targets to do the filtering either, routers across the internet are forwarding the packets to the target repeatedly and they should be able to slow this down to make the attack ineffective.
Sign In or Register to comment.