Carlo Wood wrote:
> Would the same problem(s) exist if access was possible through IPv6?

Access is currently possible through IPv6!  So, yes?  Since it is now
accessible through IPv6 and the botnet is using IPv6 in the attack it
is definitely possible.

> Not suggesting that this is a practical solution, I am just wondering
> if this kind of DDOS attacks still work with IPv6.

These attacks most certainly do operate over IPv6.  However as with
the adoption rate we are all familiar with most of the botnet is
currently IPv4.  But there are IPv6 elements in it too, at a so far
insignificant volume.

> While IPv6 was developed, I shared my experience as developer of the
> (undernet) IRC protocol (enhancements) that the only way to stop this
> kind of attacks is to allow the one that is attacked to filter the
> source of the attacks at the first router that the attacker doesn't
> control.

DDOS attacks can be so powerful that it will overwhelm any single
system.  If one of the big DDOS agents wants to take a single system
offline then pointing a big DDOS at it will take any single system
offline.  I say it this way because the commercial mitigations all
focus on scaling out to multiple systems, using CDN content
distribution networks, geographically distributed systems, and
blocking the attack upstream as far as possible.

> For example, a machine a 1.1.1.1 is hacked and sends packets
> to the router of its ISP, which routes them to backbone A, which routes
> them to backbone B, which sends them to the victim at 2.2.2.2. The
> victim then sends a special packet to B saying that it wants to no
> longer receive anything from 1.1.1.1; since B is not directly connected
> to 1.1.1.1, it forwards that packet to A, which forwards it to the
> router of the ISP which implements the filter and stops forwarding any
> packets from 1.1.1.1 that are meant for 2.2.2.2. This way the internet
> (backbones A and B) are not even flooded anymore.

Such a thing may be possible among cooperating backbone vendors.  And
we have had good luck reporting malicious machines to commercial
hosting providers.  But I am not aware of such a usual path to do
this.  If you know how to do this I would love to hear more about it!

> Is the flood is a problem for the ISP's router - they are motivated
> to unplug 1.1.1.1 completely until they fixed their computer (from
> the botnet hack).  As a result, flooding never has any effect
> anymore, so that nobody has the incentive to even try it; which in
> turn means that this filtering isn't necessary and therefore won't
> take resources. It just has to be there.

This sounds great!  I have a still growing list of 2.5 million
addresses currently but I suspect we will hit 4 millsion before things
conclude.  How can I access this most wonderful functionality?

> I never heard back from the committee, and to this day I don't know if
> IPv6 did implement this "filter at the source" possibility, or if they
> f*-ed up and missed the opportunity to get rid of ddos attacks when
> IPv6 was first rolled out.

Wait...  Is this something that actually exists?  Or is this just a
proposal?  I am unaware of any such functionality.  That doesn't mean
anything as I am far from any authority on IPv6.

If you know how to do this though I would be very interested in
learning how to perform this type of blocking.

Bob

  • ... Bob Proulx
    • ... Carlo Wood via Discussion of savannah-announce and any user-oriented topic
      • ... Bob Proulx
        • ... Carlo Wood via Discussion of savannah-announce and any user-oriented topic
          • ... Bob Proulx
            • ... Bob Proulx
    • ... Ariel Machado
      • ... Bob Proulx
        • ... David Pirotte
          • ... Bob Proulx

Reply via email to