Memcached amplification: lessons learned. Artyom Gavrichenkov

Similar documents
Memcached amplification: lessons learned. Artyom Gavrichenkov

DDoS Beasts and How to Fight Them. Artyom Gavrichenkov

DDoS Beasts and How to Fight Them. Artyom Gavrichenkov

Trends in IoT DDoSbotnets

Imma Chargin Mah Lazer

Withstanding the Infinite: DDoS Defense in the Terabit Era

Enhancing DDoS protection TAYLOR HARRIS SECURITY ENGINEER

Exit from Hell? Reducing the Impact of Amplification DDoS Attacks Marc Kührer, Thomas Hupperich, Christian Rossow, and Thorsten Holz

Introduction to DDoS Attacks

INTRODUCTION: DDOS ATTACKS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Technical White Paper June 2016

(DNS, and DNSSEC and DDOS) Geoff Huston APNIC

1000 days of UDP amplification DDoS attacks

War Stories from the Cloud: Rise of the Machines. Matt Mosher Director Security Sales Strategy

An Introduction to DDoS attacks trends and protection Alessandro Bulletti Consulting Engineer, Arbor Networks

WHITE PAPER. DDoS of Things SURVIVAL GUIDE. Proven DDoS Defense in the New Era of 1 Tbps Attacks

SOTI SUMMER [state of the internet] / security ATTACK SPOTLIGHT

Bypassing ISP and Enterprise Anti-DDoS with 90 s technology

UDP-based Amplification Attacks and its Mitigations

Routing Security DDoS and Route Hijacks. Merike Kaeo CEO, Double Shot Security

Prevent DoS using IP source address spoofing

Arbor WISR XII The Stakes Have Changed. Julio Arruda V1.0

Guide to DDoS Attacks November 2017

DDoS Protection in Backbone Networks

Threat Pragmatics. Target 6/19/ June 2018 PacNOG 22, Honiara, Solomon Islands Supported by:

Internet2 DDoS Mitigation Update

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

(Distributed) Denial-of-Service. in theory and in practice

Preventing Traffic with Spoofed Source IP Addresses in MikroTik

Practical Approaches to the DRDoS Attack Detection based on Netflow Analysis

DDoS attack patterns across the APJ cloud market. Samuel Chen CCIE#9607 Enterprise Security Architect, Manager - APJ

DDoS Protection in Backbone Networks Deployed at Trenka Informatik AG (

Internetwork Expert s CCNA Security Bootcamp. Common Security Threats

Exploring CVE , a Skeleton key in DNS. Jaime Cochran, Marek Vavrusa

CSE 565 Computer Security Fall 2018

Analisi degli attacchi DDOS e delle contromisure

( ) 2016 NSFOCUS

Securing network infrastructure

Data Plane Protection. The googles they do nothing.

Insight Guide into Securing your Connectivity

2015 DDoS Attack Trends and 2016 Outlook

State of the Internet Security Q Mihnea-Costin Grigore Security Technical Project Manager

DDoS on DNS: past, present and inevitable. Töma Gavrichenkov

Background Traffic to Quarantined Network Blocks administered by APNIC

Network Infrastructure Filtering at the border. stole slides from Fakrul Alam

Remember Extension Headers?

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

A proposal of a countermeasure method against DNS amplification attacks using distributed filtering by traffic route changing

Securing the Transition Mechanisms

Cybersecurity. Anna Chan, Marketing Director, Akamai Technologies

Cloudflare Advanced DDoS Protection

Firewalls and NAT. Firewalls. firewall isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others.

IPv6 Security (Theory vs Practice) APRICOT 14 Manila, Philippines. Merike Kaeo

Denial of Service. Serguei A. Mokhov SOEN321 - Fall 2004

Using DNS Service for Amplification Attack

Advanced Attack Response and Mitigation

Distributed Denial of Service (DDoS)

Internet Noise: a tale of two subnets

TOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS

ddos-guard.net Protecting your business DDoS-GUARD: Distributed protection against distributed attacks

Mario Arriaza - Fundador

Super Fast Packet Filtering with ebpf and XDP Helen Tabunshchyk, Systems Engineer, Cloudflare

Filtering Trends Sorting Through FUD to get Sanity

IP Spoofer Project. Observations on four-years of data. Rob Beverly, Arthur Berger, Young Hyun.

DDoS made easy. IP reflection attacks for fun and profit. Gert Döring, SpaceNet AG, München. DECIX/ECO security event,

MITIGATING DENIAL OF SERVICE ATTACKS IN OLSR PROTOCOL USING FICTITIOUS NODES

Global Information Assurance Certification Paper

TCP/IP Filtering. Main TCP/IP Filtering Dialog Box. Route Filters Button. Packet Filters Button CHAPTER

Andrisoft Wanguard. On-premise anti-ddos solution. Carrier-grade DDoS detection and mitigation software. Product Data Sheet Wanguard 6.

IPv6 Security. Pedro Lorga - WALC 2006 (Quito, Ecuador July 06)

DNSSEC: what every sysadmin should know to keep things working

SmartWall Threat Defense System - NTD1100

F5 Warsaw SOC. Kamil Woniak. Security Operations Manager, F5 Networks

Flow-based Traffic Visibility

snoc Snoc DDoS Protection Fast Secure Cost effective Introduction Snoc 3.0 Global Scrubbing Centers Web Application DNS Protection

Security+ Guide to Network Security Fundamentals, Fourth Edition. Network Attacks Denial of service Attacks

WEB DDOS PROTECTION APPLICATION PROTECTION VIA DNS FORWARDING

sottotitolo System Security Introduction Milano, XX mese 20XX A.A. 2016/17 Federico Reghenzani

Security in an IPv6 World Myth & Reality

OFF-PATH ATTACKS AGAINST PUBLIC KEY INFRASTRUCTURES. Markus Brandt, Tianxiang Dai, Elias Heftrig, Amit Klein, Haya Shulman, Michael Waidner

Analyzing Flow-based Anomaly Intrusion Detection using Replicator Neural Networks. Carlos García Cordero Sascha Hauke Max Mühlhäuser Mathias Fischer

Global Information Assurance Certification Paper

Vulnerability Management & Vulnerability Assessment. Nessus Attack Scripting Language (NASL). CVE databases, NVD database

Your First Line of Defense AGAINST DDOS ATTACKS. change the rules for inspection performance, security intelligence and

Are You Fully Prepared to Withstand DNS Attacks?

Think You re Safe from DDoS Attacks? As an AWS customer, you probably need more protection. Discover the vulnerabilities and how Neustar can help.

Chapter 7. Denial of Service Attacks

SpaceNet AG. Internet Business Produkte für den Mittelstand. Produkt- und Firmenpräsentation. DENOG6, , Darmstadt

Arbor Threat Mitigation System (TMS)

Implementing Cisco Network Security (IINS) 3.0

Hacking Smart Home Devices. Fernando Gont

Facebook API Breach. Jake Williams Rendition Infosec

Phase 4 Traceback the Attack. 2002, Cisco Systems, Inc. All rights reserved.

Current procedures, challenges and opportunities for collection and analysis of Criminal Justice statistics CERT-GH

Arbor Optima. Best Current Practices (BCPs) for DDoS Mitigation

Network Security. Network Vulnerabilities

whitepaper How to Measure, Report On, and Actually Reduce Vulnerability Risk

IPv6 IMPLEMENTATION IN VNPT

IPv6. Copyright 2017 NTT corp. All Rights Reserved. 1

Transcription:

Memcached amplification: lessons learned Artyom Gavrichenkov <ag@qrator.net>

1.7

Typical amplification attack Most servers on the Internet send more data to a client than they receive UDP-based servers generally do not verify the source IP address This allows for amplification DDoS Attacker Src: victim (spoofed) Dst: amplifier ANY? com. 1 Gbps Victim Src: amplifier Dst: victim com. NS i.gtld-... 29 Gbps

Vulnerable protocols A long list actually Mostly obsolete protocols (RIPv1 anyone?) Modern protocols as well: gaming NTP DNS SNMP SSDP ICMP NetBIOS RIPv1 PORTMAP CHARGEN QOTD Quake

Vulnerable servers As it s mostly obsolete servers, they eventually get updated or replaced or just trashed Thus, the amount of amplifiers shows steady downtrend Source: Qrator.Radar network scanner

Amp power Downtrend in terms of the amount and a downtrend in terms of available power However, once in a while, a new vulnerable protocol is discovered Source: Qrator.Radar network scanner

Mitigation Most amplification attacks are easy to track, as the source UDP port is fixed NTP DNS SNMP SSDP ICMP NetBIOS RIPv1 PORTMAP CHARGEN QOTD Quake

BGP Flow Spec solves problems?

Mitigation Most amplification attacks are easy to track, as the source UDP port is fixed Two major issues: ICMP Amplification without a fixed port NTP DNS SNMP SSDP ICMP NetBIOS RIPv1 PORTMAP CHARGEN QOTD Quake

Wordpress Pingback GET /whatever User-Agent: WordPress/3.9.2; http://example.com/; verifying pingback from 192.0.2.150 150 000 170 000 vulnerable servers at once SSL/TLS-enabled Data from Qrator monitoring engine

Wordpress Pingback SSL/TLS-enabled No port data available for filtering Also, network operators hate giving FlowSpec to anyone Data from Qrator monitoring engine

Wordpress Pingback Pingback was the first case of Web dev causing DDoS problems to ISPs (has anyone really thought it would be the last case) Data from Qrator monitoring engine

memcached A fast in-memory cache Heavily used in Web development

memcached A fast in-memory cache Heavily used in Web development Listens on all interfaces, port 11211, by default

memcached Basic ASCII protocol doesn t do authentication 2014, Wallarm, Blackhat USA: An attacker can inject arbitrary data into memory

memcached Basic ASCII protocol doesn t do authentication 2014, Wallarm, Blackhat USA: An attacker can inject arbitrary data into memory 2017, 360.cn, Power of Community: An attacker can send data from memory to a third party via spoofing victim s IP address

import memcache m = memcache.client([ reflector.example.com:11211 ]) m.set( a, value) to inject a value of an arbitrary size under key a

print \0\x01\0\0\0\x01\0\0gets a\r\n to retrieve a value

print \0\x01\0\0\0\x01\0\0gets a a a a a\r\n to retrieve a value 5 times

print \0\x01\0\0\0\x01\0\0gets a a a a a\r\n to retrieve a value 5 times. Or 10 times. Or a hundred.

Amplification factor 600 400 200 0 NTP CharGEN QotD RIPv1 Quake LDAP SSDP Source: https://www.us-cert.gov/ncas/alerts/ta14-017a

memcached Theoretical amplification factor is millions

memcached Theoretical amplification factor is millions Fortunately, all the packets aren t sent at once In practice, the amplification factor is 9000-10000 Still 20 times the NTP Amplification does.

memcached Fortunately, all the packets aren t sent at once In practice, the amplification factor is 9000-10000 Still 20 times the NTP Amplification does. Seeing 200-500 Gbps, we projected up to 1,5 Tbps during APNIC 45 in February 1.7 Tbps happened

Mitigation Again, BCP 38. Make sure you don t have open memcached port 11211/udp on your network Use firewalls or FlowSpec to filter 11211/udp

ipv4 access-list exploitable-ports permit udp any eq 11211 any! ipv6 access-list exploitable-ports-v6 permit udp any eq 11211 any! class-map match-any exploitable-ports match access-group ipv4 exploitable-ports end-class-map! policy-map ntt-external-in class exploitable-ports police rate percent 1 conform-action transmit exceed-action drop! set precedence 0 set mpls experimental topmost 0!... Source: http://mailman.nlnog.net/pipermail/nlnog/2018-march/002697.html

... class class-default set mpls experimental imposition 0 set precedence 0! end-policy-map! interface Bundle-Ether19 description Customer: the best customer service-policy input ntt-external-in ipv4 address xxx/x ipv6 address yyy/y...! interface Bundle-Ether20 service-policy input ntt-external-in...... etc... Source: http://mailman.nlnog.net/pipermail/nlnog/2018-march/002697.html

What s next? Web dev won t stop here And gaming industry won t This will happen again. Time to discuss possible threats with upstream providers

What s next? In 2016, we ve almost seen the Internet on fire due to an Internet of Things botnet Numerous working groups and nonprofits were launched to address the IoT problem

What s next? In 2016, we ve almost seen the Internet on fire due to an Internet of Things botnet Numerous working groups and nonprofits were launched to address the IoT problem memcached is not IoT What should we expect then, a memcache WG? ;-)

What s next? memcached: Disclosure in November 2017 In the wild: February 2018 Three months are an overly short interval With Cisco Smart Install, it was even shorter Meltdown/Spectre show: the embargo approach doesn t work well for a community large enough

What s next? Maybe our focus is wrong? Collaboration Proper and timely reaction RFC 2350: CERT/CSIRT for network operators?

Q&A mailto: Artyom Gavrichenkov <ag@qrator.net>