Re: DoS/DDoS Attack

From: Peter Van Epp (vanepp@sfu.ca)
Date: Fri Jan 14 2005 - 11:40:09 EST


On Fri, Jan 14, 2005 at 11:06:25AM +0500, Faisal Khan wrote:
>
>
> Folks,
>
> Two quick questions.
>
> When IP (Source) addresses are spoofed, is there no way of determining (a)
> that the IP Source Addresses is spoofed and not the genuine one

        Without more information than just the packet, no. If you are at the
origin of the packet (which generally you won't be) then it would be possible
to tell, but practically the answer is no (see the more complete explaination
below)..

> (b) to be
> able to determine the actual IP address that is sending DoS packets?
>
> Somehow I get the feeling I'm SOL when trying to find out the
> "genuine/actual" source IP address.

        Again in practical terms yes. It is possible in theory (but having
tried it in practice, I'll stand by my original answer :-)), but to track it
back to the source you need to trace the MAC address back up the path from
router to router until you come to the interface where the packets are
originating. Then you can either identify the machine by its MAC address
(assuming that isn't being spoofed too) or track the traffic to a physical
port and from there to a machine (if by no other method than unplugging cables
one at a time til the trafffic stops). This of course requires you to be able
to convince your upstream provider(s) to track a MAC through their routers and
in practice that usually isn't going to happen.

>
> If this is the case, then pretty much we all are helpless with DoS/DDoS
> attacks - considering one can write a script/program to keep incrementing
> or randomly assigning spoofed source addresses in the DoS packets being
> sent out.

        By and large yes. If the spoofing is only a single source address
you may be able to get your upline provider to filter it (and you may not,
because they then end up paying for the traffic that they can't bill you for
because they didn't deliver it :-)), but stopping an attack from a wide
network of zombied machines is pretty much impossible. All you could do would
be to have enough capacity to be able to absorb the DDOS traffic and still
survive (but that may well be too costly in bandwith charges).

Peter Van Epp / Operations and Technical Support
Simon Fraser University, Burnaby, B.C. Canada

>
> Faisal
>
>
>
>
>
> Faisal Khan, CEO
> Net Access Communication
> Systems (Private) Limited
> ________________________________
>
> Network Security - Secure Web Hosting
> Managed Internet Services - Secure Email
> Dedicated Servers - Reseller Hosting
>
> Visit www.netxs.com.pk for more information.
>



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:13 EDT