[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[infowar.de] große DDOS Attacke gegen UltraDNS am letzten Donnerstag
Infowar.de, http://userpage.fu-berlin.de/~bendrath/liste.html
-------------------------------------------------------------
Gut zu hören, dass sowohl diese als auch die Attacke auf die
DNS-Rootserver vor ein paar Wochen aufgefangen werden konnten. Die
Endbenutzer haben jedenfalls nach Angaben der Firma UltraDNS nichts
bemerkt.
RB
http://www.theregister.co.uk/content/55/28291.html
DDOS attack 'really, really tested' UltraDNS
By ComputerWire
Posted: 26/11/2002
A major provider of domain name system infrastructure services was hit
by a distributed denial of service attack last Thursday morning
described as bigger and more sophisticated than anything else it has
previously seen, writes Kevin Murphy.
UltraDNS Corp, which provides DNS services for the likes of oracle.com
and top-level domains including .info and, from January 1 2003 .org,
was hit by a DDoS attack unprecedented in its scale.
While no services were actually denied, the attack has got the company
concerned enough to boost its bandwidth and infrastructure to prevent
further attacks. UltraDNS CEO Ben Petro compared this kind of attack
to "terrorism".
Petro told ComputerWire that even though the company has seen DDoS
attacks before, its network was "really, really, really tested" for
the first time. The attack became apparent at about 9am US Pacific
Standard Time and ended three hours later.
UltraDNS has about 40 servers distributed around the globe, using BGP
anycast to share the same two IP addresses. Each server saw enough
traffic to fill up more than one T1 pipe during the attack's peak.
"We have not seen an attack act in this fashion with this methodology
before," said Petro. He declined to discuss many precise details, but
said that up to two million packets per second were flooded into its
servers and that the source IP addresses were randomly spoofed.
Petro said UltraDNS, which offers a 100% service level agreement to
its customers, will have "no SLA payouts" as a result of the attack.
Ram Mohan, CTO of Afilias Ltd, the custodian of .info, which
subcontracts its infrastructure to UltraDNS, said the company and
internet users saw "no performance degradation".
The attacks came about a month after a similar attack managed to
render seven of the internet's 13 DNS root servers inaccessible for an
hour. At that time, experts we spoke to said crackers attempting to
cause disruption to the DNS would better serve their goal by targeting
a TLD server such as .com.
Now, evidently, they have. Afilias's Mohan said: "It's almost as if
they're testing various TLDs to see where the weak link is." He added
that it was not as big an attack as the one that hit the root servers:
"I think the attack was unprecedented in its scale but I would not
characterize it as massive."
"We're trying not to link these two events, but we don't see much
coincidence," said Petro. He said that smaller TLDs, such as those
from countries with emerging internet economies, have infrastructures
"not built to prevent these near-terrorist attacks."
"We are at risk, e-commerce is at risk and to an extent the global
economy is at risk," said Petro. "If you could take down .com, what
would be the cost in billions of dollars?"
US Federal law enforcement agencies have been notified. The source of
DDoS attacks are notoriously hard to trace. Not only do attackers use
a network of dozens, hundreds or thousands of compromized "slave"
machines to launch the attacks, but these slaves spoof the source IP
address on floods they send.
However, UltraDNS's network uses a technology that may give an idea of
roughly where most of the slaves are located. BGP anycast allows
multiple servers to announce the same IP address to the internet, so
users access the server closest to them. So by seeing how much traffic
hit which server, it may give a general idea of where most slaves are
located, once the data is compiled.
---------------------------------------------------------------
Liste verlassen:
Mail an infowar -
de-request -!
- infopeace -
de mit "unsubscribe" im Text.