The Internet version of an old prank
Back in the 19th century in London, a prankster named Theodore Hook "DDoS'ed" a large part of London in what became known as the Berners Street hoax. Hook played a prank on the residents of 54 Berners Street by sending out letters requesting various random people to all arrive at 54 Berners Street on the exact same day at around the exact same time. Apparently first to arrive were chimney sweeps, followed by people delivering coal, and it eventually culminated to doctors, dignitaries, and delivery men carrying pianos and organs all arriving at around the same time to the same house. This brought traffic to a halt in a large part of London, effectively DDoS-ing the city.
In the Internet age, Hook's Berners Street hoax idea has taken a new identity in the form of a DDoS attack called the Distributive Reflective Denial of Service (DRDoS). The idea is simple: Sometimes when you send a packet requesting a response to a server, it will respond with a bunch of packets back to you. You can think of it as the modern analog to Hook's letters in the Berners Street hoax: Sending 1 letter to an organ company results in 6 men carrying a large pipe organ coming back to you. In a DRDOS attack, the attacker just sends, say, n MB of packets to a server using a spoofed IP address that is the IP of victim. The server responds with N MB of packets directly to the victim's IP. Now, every Mbps of bandwidth the attacker spends is received with a N/n multiplier by the victim. The N/n multiplier here is what is called the Bandwidth Amplification Factor (BAF). While we don't see bandwidth amplification factors as large as Hook's N/n = (6 dudes + 1 pipe organ)/(1 letter), attackers can still reach bandwidth amplification facts of >500 for NTP and in some cases up to the mid 4,000's!
Currently the largest DRDoS attacks have been done using UDP-based protocols such as NTP. This is because UDP does not require handshaking like TCP does. TCP-based protocols seem to be safe against becoming vectors for DRDoS attack because if you attempt to send a establish a TCP connection starting with a SYN packet that has a spoofed IP, you will not be able to complete the handshake as you'll never receive the SYN-ACK from the server. However, there has been literature that seems to show that TCP-based protocols might actually be vulnerable as well, which I may cover in a future blog post. For a sneak preview, check out this interesting paper by Kuhrer, Hupperich, Rossow, and Holz: Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks!
Comments
Post a Comment