home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   ANTI_VIRUS      Anti-Virus Discussion & News      523 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 276 of 523   
   Ben Ritchey to All   
   US-CERT alert   
   20 Aug 15 18:11:07   
   
   NCCIC / US-CERT   
      
   National Cyber Awareness System:   
      
   Alert (TA14-017A) UDP-Based Amplification Attacks   
      
   Original release date: January 17, 2014 | Last revised: August 19, 2015   
   Systems Affected   
   Certain UDP protocols have been identified as potential attack vectors:   
      
   DNS   
   NTP   
   SNMPv2   
   NetBIOS   
   SSDP   
   CharGEN   
   QOTD   
   BitTorrent   
   Kad   
   Quake Network Protocol   
   Steam Protocol   
   RIPv1   
   Multicast DNS (mDNS)   
   Portmap   
   Overview   
   A Distributed Reflective Denial of Service (DRDoS) attack is a form of   
   Distributed Denial of Service (DDoS) that relies on the use of publicly   
   accessible UDP servers, as well as bandwidth amplification factors, to   
   overwhelm a victim system with UDP traffic.   
      
   Description   
   UDP, by design, is a connection-less protocol that does not validate source IP   
   addresses. Unless the application-layer protocol uses countermeasures such as   
   session initiation, it is very easy to forge the IP packet datagram to include   
   an arbitrary source IP address [1]. When many UDP packets have their source IP   
   address forged to a single address, the server responds to that victim,   
   creating a reflected Denial of Service (DoS) Attack.   
      
   Recently, certain UDP protocols have been found to have particular responses   
   to certain commands that are much larger than the initial request. Previously,   
   attackers were limited linearly by the number of packets directly sent to the   
   target to conduct a DoS attack; now a single packet can generate tens or   
   hundreds of times the bandwidth in its response. This is called an   
   amplification attack, and when combined with a reflective DoS attack on a   
   large scale, DDoS attacks can be conducted with relative ease.   
      
   To measure the potential effect of an amplification attack, a metric called   
   the bandwidth amplification factor (BAF) is used. BAF can be calculated as the   
   number of UDP payload bytes that an amplifier sends to answer a request,   
   compared to the number of UDP payload bytes of the request [2] [3].   
      
   The list of known protocols—and their associated bandwidth amplification   
   factors—are listed below. US-CERT offers thanks to Christian Rossow for   
   providing this information. For more information on bandwith amplificatication   
   factors, please see Christian's blog and associated research paper.   
      
   Protocol Bandwidth Amplification Factor Vulnerable Command   
   DNS 28 to 54 see: TA13-088A [4]   
   NTP 556.9 see: TA14-013A [5]   
   SNMPv2 6.3 GetBulk request   
   NetBIOS 3.8 Name resolution   
   SSDP 30.8 SEARCH request   
   CharGEN 358.8 Character generation request   
   QOTD 140.3 Quote request   
   BitTorrent 3.8 File search   
   Kad 16.3 Peer list exchange   
   Quake Network Protocol 63.9 Server info exchange   
   Steam Protocol 5.5 Server info exchange   
   Multicast DNS (mDNS) 2 to 10 Unicast query   
   RIPv1 131.24 Malformed request   
   Portmap (RPCbind) 7 to 28 Malformed request   
      
   In March 2015, Software Engineering Institute CERT issued Vulnerabilty Note   
   (VU#550620) describing the use of mDNS in DRDoS attacks. Attackers can   
   leverage mDNS by sending more information than can be handled by the device,   
   thereby causing a DoS. [6]   
      
   In July 2015, Akamai Technologies' Prolexic Security Engineering and Research   
   Team (PLXsert) issued a threat advisory describing a surge in DRDoS attacks   
   using the Routing Information Protocol version one (RIPv1). Malicious actors   
   are leveraging the behavior of RIPv1 for DDoS reflection through specially   
   crafted request queries [7].   
      
   In August 2015, Level 3 Threat Research Labs reported a new form of DRDoS   
   attack that uses portmap. Attackers leverage the behavior of the portmap   
   service through spoofed requests and flood a victim’s network with UDP   
   traffic. [8]   
      
   Impact   
   Attackers can utilize the bandwidth and relative trust of large servers that   
   provide the above UDP protocols to flood victims with unwanted traffic, a DDoS   
   attack.   
      
   Solution   
   DETECTION   
   Detection of DRDoS attacks is not easy because of their use of large, trusted   
   servers that provide UDP services. Network operators of these exploitable   
   services may apply traditional DoS mitigation techniques. In addition, watch   
   out for abnormally large responses to a particular IP address, which may   
   indicate that an attacker is using the service to conduct a DRDoS attack.   
      
   MITIGATION   
   Source IP Verification   
      
   Because the UDP requests being sent by the attacker-controlled clients must   
   have a source IP address spoofed to appear as the victim’s IP, the first step   
   to reducing the effectiveness of UDP amplification is for Internet service   
   providers (ISPs) to reject any UDP traffic with spoofed addresses. The Network   
   Working Group of the Internet Engineering Task Force (IETF) released Best   
   Current Practice 38 in May 2000 and Best Current Practice 84 in March 2004.   
   These documents describe how an ISP can filter network traffic on their   
   network to reject packets with source addresses not reachable via the actual   
   packet’s path [9] [10]. Recommended changes would cause a routing device to   
   evaluate whether it is possible to reach the source IP address of the packet   
   via the interface that transmitted the packet. If it is not possible, then the   
   packet most likely has a spoofed source IP address. This configuration change   
   would substantially reduce the potential for many popular types of DDoS   
   attacks. As such, we highly recommend that all network operators perform   
   network ingress filtering if possible. Note that such filtering will not   
   explicitly protect a UDP service provider from being exploited in a DRDoS   
   because all network providers must use ingress filtering to eliminate the   
   threat completely.   
      
   To verify your network has implemented ingress filtering, download the open   
   source tools from the Spoofer Project [11].   
      
   Traffic Shaping   
      
   Limiting responses to UDP requests is another potential mitigation to this   
   issue. This may require testing to discover the optimal limit that does not   
   interfere with legitimate traffic. The IETF released Request for Comment 2475   
   and Request for Comment 3260 that describe some methods to shape and control   
   traffic [12] [13]. Most network devices today provide these functions in their   
   software.   
      
   References   
   [1] SIP: Session Initiation Protocol   
   [2] Amplification Hell: Abusing Network Protocols for DDoS (link is external)   
   [3] Ampli?cation Hell: Revisiting Network Protocols for DDoS Abuse (link is   
   external)   
   [4] DNS Amplification Attacks   
   [5] NTP Amplification Attacks Using CVE-2013-5211   
   [6] VU#550620: Multicast DNS (mDNS) implementations may respond to unicast   
   queries originating outside the local link   
   [7] RIPv1 Reflection DDoS [Medium Risk] (link is external)   
   [8] A New New DDoS Reflection Attack: Portmapper; An Early Warning to the   
   Industry (link is external)   
   [9] Network Ingress Filtering: Defeating Denial of Service Attacks Which   
   Employ IP Source Address Spoofing   
   [10] Ingress Filtering for Multihomed Networks   
   [11] The Spoofer Project   
   [12] An Architecture for Differentiated Services   
   [13] New Terminology and Clarifications for Diffserv   
   Revisions   
   February 09, 2014 – Initial Release   
   March 07, 2014 – Updated page to include research links   
   July 13, 2015 – Added RIPv1 as an attack vector   
   August 19, 2015 - Added Multicast DNS (mDNS) and Portmap (RPCbind) as attack   
   vectors   
      
   ----------------------------------------------------------------   
   -------------- -   
   OTHER RESOURCES:   
   Contact Us | Security Publications | Alerts and Tips | Related Resources   
   STAY CONNECTED:   
   Sign up for email updates   
      
   SUBSCRIBER SERVICES:   
   Manage Preferences  |  Unsubscribe  |  Help   
      
      
   ----------------------------------------------------------------   
   -------------- -   
   This email was sent to Fido4cmech@lusfiber.net using GovDelivery, on behalf   
   of: United States Computer Emergency Readiness Team (US-CERT) · 245 Murray   
   Lane SW Bldg 410 · Washington, DC 20598 · (888) 282-0870 Powered by GovDelivery   
      
   === Cut ===   
      
      
   --   
   Guardien Fide   :^)   
      
      Ben  aka cMech  Web: http://cmech.dynip.com   
                    Email: fido4cmech(at)lusfiber.net   
                 Home page: http://cmech.dynip.com/homepage/   
              WildCat! Board 24/7  +1-337-984-4794  any BAUD 8,N,1   
      
   --- GoldED+/W32-MSVC   
    * Origin: FIDONet - The Positronium Repository (1:393/68)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca