[ISN] DDOS attack 'really, really tested' UltraDNS

From: InfoSec News (isnat_private)
Date: Wed Nov 27 2002 - 00:35:36 PST

  • Next message: InfoSec News: "[ISN] Hot Hacktivismo News - the license!"

    Forwarded from: Bob <bobat_private>
    Most folks have probably already heard of this, but might as well
    be sure.
    Bob Adams
    By ComputerWire
    Posted: 26/11/2002
    A major provider of domain name system infrastructure services was hit
    by a distributed denial of service attack last Thursday morning
    described as bigger and more sophisticated than anything else it has
    previously seen, writes Kevin Murphy.
    UltraDNS Corp, which provides DNS services for the likes of oracle.com
    and top-level domains including .info and, from January 1 2003 .org,
    was hit by a DDoS attack unprecedented in its scale.
    While no services were actually denied, the attack has got the company
    concerned enough to boost its bandwidth and infrastructure to prevent
    further attacks. UltraDNS CEO Ben Petro compared this kind of attack
    to "terrorism".
    Petro told ComputerWire that even though the company has seen DDoS
    attacks before, its network was "really, really, really tested" for
    the first time. The attack became apparent at about 9am US Pacific
    Standard Time and ended three hours later.
    UltraDNS has about 40 servers distributed around the globe, using BGP
    anycast to share the same two IP addresses. Each server saw enough
    traffic to fill up more than one T1 pipe during the attack's peak.
    "We have not seen an attack act in this fashion with this methodology
    before," said Petro. He declined to discuss many precise details, but
    said that up to two million packets per second were flooded into its
    servers and that the source IP addresses were randomly spoofed.
    Petro said UltraDNS, which offers a 100% service level agreement to
    its customers, will have "no SLA payouts" as a result of the attack.
    Ram Mohan, CTO of Afilias Ltd, the custodian of .info, which
    subcontracts its infrastructure to UltraDNS, said the company and
    internet users saw "no performance degradation".
    The attacks came about a month after a similar attack managed to
    render seven of the internet's 13 DNS root servers inaccessible for an
    hour. At that time, experts we spoke to said crackers attempting to
    cause disruption to the DNS would better serve their goal by targeting
    a TLD server such as .com.
    Now, evidently, they have. Afilias's Mohan said: "It's almost as if
    they're testing various TLDs to see where the weak link is." He added
    that it was not as big an attack as the one that hit the root servers:
    "I think the attack was unprecedented in its scale but I would not
    characterize it as massive."
    "We're trying not to link these two events, but we don't see much
    coincidence," said Petro. He said that smaller TLDs, such as those
    from countries with emerging internet economies, have infrastructures
    "not built to prevent these near-terrorist attacks."
    "We are at risk, e-commerce is at risk and to an extent the global
    economy is at risk," said Petro. "If you could take down .com, what
    would be the cost in billions of dollars?"
    US Federal law enforcement agencies have been notified. The source of
    DDoS attacks are notoriously hard to trace. Not only do attackers use
    a network of dozens, hundreds or thousands of compromized "slave"
    machines to launch the attacks, but these slaves spoof the source IP
    address on floods they send.
    However, UltraDNS's network uses a technology that may give an idea of
    roughly where most of the slaves are located. BGP anycast allows
    multiple servers to announce the same IP address to the internet, so
    users access the server closest to them. So by seeing how much traffic
    hit which server, it may give a general idea of where most slaves are
    located, once the data is compiled.
    ISN is currently hosted by Attrition.org
    To unsubscribe email majordomoat_private with 'unsubscribe isn'
    in the BODY of the mail.

    This archive was generated by hypermail 2b30 : Sat Nov 30 2002 - 12:45:43 PST