The Cloud Is a Fickle Mistress: DDoS&M…
It’s interesting to see how people react when they are reminded that the “Cloud” still depends upon much of the same infrastructure and underlying protocols that we have been using for years.
BGP, DNS, VPNs, routers, swtiches, firewalls…
While it’s fun to talk about new attack vectors and sexy exploits, it’s the oldies and goodies that will come back to haunt us:
Building more and more of our business’ ability to remain an on-going concern on infrastructure that was never designed to support it is a scary proposition. We’re certainly being afforded more opportunity to fix some of these problems as the technology improves, but it’s a patching solution to an endemic problem, I’m afraid. We’ve got two ways to look at Cloud:
- Skipping over the problems we have and “fixing” crappy infrastructure and applications by simply adding mobility and orchestration to move around an issue, or
- Actually starting to use Cloud as a forcing function to fundamentally change the way we think about, architect, deploy and manage our computing capabilities in a more resilient, reliable and secure fashion
If I were a betting man…
Remember that just because it’s in the “Cloud” doesn’t mean someone’s sprinkled magic invincibility dust on your AppStack…
That web service still has IP addresses, open sockets. It still gets transported over MANY levels of shared infrastructure, from the telcos to the DNS infrastructure…you’re always at someone elses’ mercy.
ONGOING DDoS ATTACK
Our network is currently the target of a large, distributed DDoS attack that began on Monday afternoon. We took action all day yesterday to mitigate the impact of the attack, and its targets, so that we could restore service to GoGrid customers. Things were stabilized by 4 PM PDT and most customer servers were back online, although some of you continued to experience intermittent loss in network connectivity.
I think you probably meant "withstand an attack," rather than "sustain an attack" …
You don't have to spend a lot of money on Anti-DDoS gear to ensure survivability. Hire 2 BGP engineers and 2 DNS admins. Get 2 prefixes (preferably provider-independent, but good luck with that these days), 2 routers, and 2 IP transit relationships. Make sure that the IP transit providers support RFC 1997 prefix blackholing. Tag your own IP space (by prefix or IP) when it's targeted by DoS/DDoS with a community and send it to your transit providers. Move DNS names to the other prefix if you have to. DDoSer moves his/her traffic to the new IP/prefix? Great — play cat and mouse. They'll get bored before your paid engineers do.
Ok maybe that is expensive, but you'd think that somebody would provide a service like this by now. I blame "too many analysts and not enough engineers".
@MadKat97
No I actually meant their ability to sustain (operations)…but I'll change it to clarify.
Thanks,
/Hoff
@Andre Gironda
Right – until they start to DoS you by ip address rather than FQDN. Nice try, but the bad guys understand DNS too.
Good post. I agree that just because a server is virtual and in the cloud doesn't mean it isn't susceptible to many of the threats faced by a plain vanilla internet-facing web server. By the same token it looks like some of the same techniques we use to protect physical servers should work for virtual servers.
What would be really helpful is a table showing threats in the fist column and our typical response in the physical world in the second column. The third column would be our response in the virtual world of the Cloud. My assumption is that there would be a lot of over lap and that the table would highlight those areas that really are different and should be the focus of attention and research.
I guess what I am suggesting is something similar to the way that you exploded the SPI stack. What do you think?
<blockquote cite="#commentbody-2185">
da’dos :
@Andre Gironda
Right – until they start to DoS you by ip address rather than FQDN. Nice try, but the bad guys understand DNS too.
The BGP blackhole is blocking by IP. I don't think you know what you're talking about. The bad guys don't know what they can't see. Unannounced prefixes and BGP triggered blackhole routes put tools in the hands of defenders. No DNS necessary.
If you really had an argument, you'd say the OPPOSITE of what you said. If adversaries DDoS'd a target by roaming FQDN instead of by IP. But that would require re-writing a specialized DNS client library that worked along with the BGP routing table churn.