Re: [j-nsp] DOS Attack

2010-08-04 Thread Florian Weimer
* sherif mostafa:

 Could anyone help please as I've faced an error message DOS below
 that caused high CPU usage:

 ERROR 08/02/2010 16:22:46 CAI dosProtection: Flow is suspicious:
 GigabitEthernet11/0.410 for control protocol: IP TTL Expired source MAC
 0018.742f.b380 with rate 241 pps

Have you checked that you haven't got a routing loop or something like
that?  (And which platform is that, BTW?)

If this isn't the case, you need to figure out who's got the
0018.742f.b380 MAC address and ask them to stop sending those packets.

-- 
Florian Weimerfwei...@bfk.de
BFK edv-consulting GmbH   http://www.bfk.de/
Kriegsstraße 100  tel: +49-721-96201-1
D-76133 Karlsruhe fax: +49-721-96201-99

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] DOS Attack

2010-08-04 Thread sherif mostafa




 
Dear Florian,
 
This ERX, Administration of router interface 0018.742f.b380 belongs to me also, 
but should I filter all those packet types ??
 
 
 
 To: sherifmka2...@hotmail.com
 CC: juniper-nsp@puck.nether.net
 Subject: Re: [j-nsp] DOS Attack
 From: fwei...@bfk.de
 Date: Wed, 4 Aug 2010 13:27:05 +
 
 * sherif mostafa:
 
  Could anyone help please as I've faced an error message DOS below
  that caused high CPU usage:
 
  ERROR 08/02/2010 16:22:46 CAI dosProtection: Flow is suspicious:
  GigabitEthernet11/0.410 for control protocol: IP TTL Expired source MAC
  0018.742f.b380 with rate 241 pps
 
 Have you checked that you haven't got a routing loop or something like
 that? (And which platform is that, BTW?)
 
 If this isn't the case, you need to figure out who's got the
 0018.742f.b380 MAC address and ask them to stop sending those packets.
 
 -- 
 Florian Weimer fwei...@bfk.de
 BFK edv-consulting GmbH http://www.bfk.de/
 Kriegsstraße 100 tel: +49-721-96201-1
 D-76133 Karlsruhe fax: +49-721-96201-99
  
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] DOS Attack

2010-08-04 Thread Stefan Fouant
 -Original Message-
 From: juniper-nsp-boun...@puck.nether.net [mailto:juniper-nsp-
 boun...@puck.nether.net] On Behalf Of sherif mostafa
 Sent: Wednesday, August 04, 2010 9:37 AM
 To: fwei...@bfk.de
 Cc: juniper-nsp@puck.nether.net
 Subject: Re: [j-nsp] DOS Attack
 
 Dear Florian,
 
 This ERX, Administration of router interface 0018.742f.b380 belongs to
 me also, but should I filter all those packet types ??

Sounds like you have a routing loop, perhaps default routes on two neighbors
pointing at each other?  This is what I would suspect when I'm seeing TTL
expirations.   In any event, this error message is just telling you that is
suspects that there is a problem, however are you actually observing poor
performance or is it causing some type of outage or other issue?  241 pps
really isn't that much - it's not what I would consider to be a normal
flooding type of attack...

Stefan Fouant, CISSP, JNCIEx2
www.shortestpathfirst.net
GPG Key ID: 0xB5E3803D

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


[j-nsp] DOS Attack

2010-08-03 Thread sherif mostafa

Dears,
 
Could anyone help please as I've faced an error message DOS  below that 
caused high CPU usage:
 
 
ERROR 08/02/2010 16:22:46 CAI dosProtection: Flow is suspicious:
GigabitEthernet11/0.410 for control protocol: IP TTL Expired source MAC
0018.742f.b380 with rate 241 pps
ERROR 08/02/2010 16:24:11 CAI dosProtection: Flow is suspicious:
GigabitEthernet11/0.410 for control protocol: IP TTL Expired source MAC
0018.742f.b380 with rate 11 pps
ERROR 08/02/2010 16:24:38 CAI dosProtection: Flow is suspicious:
GigabitEthernet11/0.410 for control protocol: IP TTL Expired source MAC
0018.742f.b380 with rate 10 pps
ERROR 08/02/2010 16:24:59 CAI dosProtection: Flow is suspicious:
GigabitEthernet11/0.410 for control protocol: IP TTL Expired source MAC
0018.742f.b380 with rate 10 pps
ERROR 08/02/2010 16:26:57 CAI dosProtection: Flow is suspicious:
GigabitEthernet11/0.410 for control protocol: IP TTL Expired source MAC
0018.742f.b380 with rate 20 pps 


  
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] DOS attack?

2009-05-20 Thread Matthias Gelbhardt

Hi!

I may open a JTAC case, when I understand for which problem I should  
open one.


The following has happened:

The system (J6350) is running under 9.3R2.8, so we decided to update  
to 9.4R2.8. That was a desaster, and I hope you can help also in this  
matter. After upgrading the systems, both thought they are VRRP  
master. The problem is obvious, two sstems thinking to be the same  
appliance. Was there a change in VRRP configuration?


Because this was not working, we made a rollback. Now we have the same  
memory problems again. Starting the shell, bam Low memory, show bgp  
summary, los memory. Each event has consequences: disabling a BGP  
session.


The system has 1 GB of DRAM. What are the memory intensive processes?  
The BGP sessions? We have a J6350 at the AMS-IX where are a lot more  
BGP sessions. The VRRP processes? The rpd process has a significant  
higher memory consumption than on the AMS-IX router for example.


Before opening a JTAC ticket, you may be saying get 1 GB of memory,  
your problems will disappear.


Regards,

Matthias

Am 17.05.2009 um 14:54 schrieb Richard A Steenbergen:


On Sun, May 17, 2009 at 02:19:56AM -0700, Robert Raszuk wrote:

Hi Matthias,


I wonder now, which is the event, that triggered this behavious? The
numer of ssh-logins at that time or this zbexpected EOF?


I would with good deal of assurance conclude that the cause were
ssh-login attack which apparently starved the poor box to it's memory
limits.

When even your kernel spins a panic message on the low of memory  
due to
such attack control plane can exhibit quite unexpected behavior. In  
my

opinion end-of-frame BGP message is just a consequence of this.

The advice would be to:

* open a case with jtac to find out why subsequent ssh-logins cause a
memory leak

* reduce to very max rate-limiting for the ssh logins


It's probably more likely that the box was always getting floods of  
SSH
connection attempts (because thats what happens to anything you  
leave on

the Internet with port 22 open), and the low memory condition was
coincidental or 99% caused by something else. The openssh people would
be shitting bricks if there was actually a memory leak from multiple
connection attempts. Filter thy lo0 (*), but my money is on a leak
somewhere else (or someone running a 256mb RE :P).

(*) I always found it weird that JUNOS lacks a software filter for
access to things like SSH, like a line vty access-class on Crisco.
Obviously a proper lo0 firewall filter is better, but there have  
been

a few occasions where this has been problematic over the years
(logical-routers pre-firewall split where the integration with policy
was tricky, EX for the first year of its life where lo0 filters didn't
work, etc). Something as simple as a prefix-list dumping to  
hosts.allow
would probably be sufficient. Also being able to change the listen  
port
to something other than 22 might help the people who for whatever  
reason

aren't able to do a strict IP based filter (simple option under system
services ssh to pass to sshd).

--
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1  
2CBC)


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


[j-nsp] DOS attack?

2009-05-17 Thread Matthias Gelbhardt

Hi!

Last night we had a mysterious behaviour on our router. On a BGP  
connection with Cogent we received an unexpected EOF. There were also  
a great number of SSH logins (we do not have FW rules in place, but we  
have a rate limit,  Shortly after the router complained about low  
memory and a few BGP sessions drop down (oviosly the one, which are  
memory exhausting),


I wonder now, which is the event, that triggered this behavious? The  
numer of ssh-logins at that time or this zbexpected EOF?


The log of that time:

May 17 04:29:24  emsdetten1 inetd[4291]: ssh from 82.165.235.170  
exceeded counts/min (limit 10/min)

May 17 04:29:25  emsdetten1 last message repeated 7 times
May 17 04:29:36  emsdetten1 rpd[4303]: bgp_listen_accept: Connection  
attempt from unconfigured neighbor: 91.190.xxx.xxx+40432
May 17 04:29:52  emsdetten1 rpd[4303]: bgp_recv: peer 149.6.xxx.xxx  
(External AS 174): received unexpected EOF
May 17 04:30:06  emsdetten1 rpd[4303]: bgp_listen_accept: Connection  
attempt from unconfigured neighbor: 91.190.xxx.xxx+43119
May 17 04:31:00  emsdetten1 /kernel: KERNEL_MEMORY_CRITICAL: System  
low on free memory, notifying init (#2).

May 17 04:31:00  emsdetten1 cron[49326]: (root) CMD (adjkerntz -a)
May 17 04:31:01  emsdetten1 rpd[4303]: Received low-memory signal: BGP  
Write active, 422 free pages

May 17 04:31:01  emsdetten1 rpd[4303]: Processing low memory signal
May 17 04:31:14  emsdetten1 rpd[4303]: bgp_listen_accept: Connection  
attempt from unconfigured neighbor: 193.108.xxx.xxx+52139
May 17 04:31:34  emsdetten1 /kernel: KERN_ARP_ADDR_CHANGE: arp info  
overwritten for 91.190.xxx.xxx from 00:00:1a:19:c1:0f to 00:00:1a: 
19:c1:10
May 17 04:31:34  emsdetten1 sshd[49329]: Failed password for root from  
82.165.235.170 port 56403 ssh2
May 17 04:31:34  emsdetten1 inetd[4291]: /usr/sbin/sshd[49329]:  
exited, status 255
May 17 04:31:35  emsdetten1 sshd[49331]: Failed password for root from  
82.165.235.170 port 47707 ssh2
May 17 04:31:35  emsdetten1 inetd[4291]: /usr/sbin/sshd[49331]:  
exited, status 255
May 17 04:31:36  emsdetten1 sshd[49337]: Failed password for root from  
82.165.235.170 port 57612 ssh2
May 17 04:31:36  emsdetten1 inetd[4291]: /usr/sbin/sshd[49337]:  
exited, status 255
May 17 04:31:36  emsdetten1 sshd[49339]: Failed password for root from  
82.165.235.170 port 49046 ssh2
May 17 04:31:36  emsdetten1 rpd[4303]: bgp_listen_accept: Connection  
attempt from unconfigured neighbor: 91.190.xxx.xxx+47675
May 17 04:31:36  emsdetten1 inetd[4291]: /usr/sbin/sshd[49339]:  
exited, status 255
May 17 04:31:38  emsdetten1 sshd[49335]: Failed password for root from  
82.165.235.170 port 38441 ssh2
May 17 04:31:38  emsdetten1 inetd[4291]: /usr/sbin/sshd[49335]:  
exited, status 255
May 17 04:31:39  emsdetten1 sshd[49330]: Failed password for root from  
82.165.235.170 port 37700 ssh2
May 17 04:31:39  emsdetten1 inetd[4291]: /usr/sbin/sshd[49330]:  
exited, status 255
May 17 04:31:39  emsdetten1 sshd[49345]: Failed password for root from  
82.165.235.170 port 40019 ssh2
May 17 04:31:39  emsdetten1 inetd[4291]: ssh from 82.165.235.170  
exceeded counts/min (limit 10/min)
May 17 04:31:40  emsdetten1 sshd[49343]: Failed password for root from  
82.165.235.170 port 49411 ssh2
May 17 04:31:40  emsdetten1 inetd[4291]: /usr/sbin/sshd[49345]:  
exited, status 255
May 17 04:31:40  emsdetten1 inetd[4291]: ssh from 82.165.235.170  
exceeded counts/min (limit 10/min)
May 17 04:31:41  emsdetten1 sshd[49341]: Failed password for root from  
82.165.235.170 port 57987 ssh2
May 17 04:31:41  emsdetten1 inetd[4291]: /usr/sbin/sshd[49341]:  
exited, status 255
May 17 04:31:41  emsdetten1 inetd[4291]: ssh from 82.165.235.170  
exceeded counts/min (limit 10/min)
May 17 04:31:41  emsdetten1 sshd[49347]: Failed password for root from  
82.165.235.170 port 60041 ssh2
May 17 04:31:41  emsdetten1 inetd[4291]: /usr/sbin/sshd[49343]:  
exited, status 255
May 17 04:31:41  emsdetten1 inetd[4291]: /usr/sbin/sshd[49347]:  
exited, status 255
May 17 04:31:41  emsdetten1 inetd[4291]: ssh from 82.165.235.170  
exceeded counts/min (limit 10/min)

May 17 04:31:41  emsdetten1 last message repeated 6 times
May 17 04:31:43  emsdetten1 rpd[4303]: bgp_listen_accept: Connection  
attempt from unconfigured neighbor: 193.108.xxx.xxx+49573
May 17 04:31:47  emsdetten1 inetd[4291]: ssh from 82.165.235.170  
exceeded counts/min (limit 10/min)
May 17 04:31:51  emsdetten1 sshd[49349]: Failed password for root from  
218.26.118.106 port 49903 ssh2
May 17 04:31:52  emsdetten1 inetd[4291]: /usr/sbin/sshd[49349]:  
exited, status 255
May 17 04:31:52  emsdetten1 sshd[49351]: Failed password for root from  
218.26.118.106 port 49931 ssh2
May 17 04:31:52  emsdetten1 inetd[4291]: /usr/sbin/sshd[49351]:  
exited, status 255
May 17 04:31:53  emsdetten1 inetd[4291]: ssh from 82.165.235.170  
exceeded counts/min (limit 10/min)

May 17 04:31:53  emsdetten1 last message repeated 2 times
May 17 04:31:53  emsdetten1 rpd[4303]: Received 

Re: [j-nsp] DOS attack?

2009-05-17 Thread Robert Raszuk

Hi Matthias,

 I wonder now, which is the event, that triggered this behavious? The
 numer of ssh-logins at that time or this zbexpected EOF?

I would with good deal of assurance conclude that the cause were 
ssh-login attack which apparently starved the poor box to it's memory 
limits.


When even your kernel spins a panic message on the low of memory due to 
such attack control plane can exhibit quite unexpected behavior. In my 
opinion end-of-frame BGP message is just a consequence of this.


The advice would be to:

* open a case with jtac to find out why subsequent ssh-logins cause a 
memory leak


* reduce to very max rate-limiting for the ssh logins

Cheers,
R.



Hi!

Last night we had a mysterious behaviour on our router. On a BGP 
connection with Cogent we received an unexpected EOF. There were also a 
great number of SSH logins (we do not have FW rules in place, but we 
have a rate limit,  Shortly after the router complained about low memory 
and a few BGP sessions drop down (oviosly the one, which are memory 
exhausting),


I wonder now, which is the event, that triggered this behavious? The 
numer of ssh-logins at that time or this zbexpected EOF?


The log of that time:


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] DOS attack?

2009-05-17 Thread sthaug
 The advice would be to:
 
 * open a case with jtac to find out why subsequent ssh-logins cause a 
 memory leak
 
 * reduce to very max rate-limiting for the ssh logins

Or even better - configure a firewall filter which limits ssh logins
to your trusted netblocks - typically where your management stations
etc are.

Steinar Haug, Nethelp consulting, sth...@nethelp.no
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] DOS attack?

2009-05-17 Thread Richard A Steenbergen
On Sun, May 17, 2009 at 02:19:56AM -0700, Robert Raszuk wrote:
 Hi Matthias,
 
  I wonder now, which is the event, that triggered this behavious? The
  numer of ssh-logins at that time or this zbexpected EOF?
 
 I would with good deal of assurance conclude that the cause were 
 ssh-login attack which apparently starved the poor box to it's memory 
 limits.
 
 When even your kernel spins a panic message on the low of memory due to 
 such attack control plane can exhibit quite unexpected behavior. In my 
 opinion end-of-frame BGP message is just a consequence of this.
 
 The advice would be to:
 
 * open a case with jtac to find out why subsequent ssh-logins cause a 
 memory leak
 
 * reduce to very max rate-limiting for the ssh logins

It's probably more likely that the box was always getting floods of SSH
connection attempts (because thats what happens to anything you leave on
the Internet with port 22 open), and the low memory condition was 
coincidental or 99% caused by something else. The openssh people would 
be shitting bricks if there was actually a memory leak from multiple 
connection attempts. Filter thy lo0 (*), but my money is on a leak 
somewhere else (or someone running a 256mb RE :P).

(*) I always found it weird that JUNOS lacks a software filter for
access to things like SSH, like a line vty access-class on Crisco. 
Obviously a proper lo0 firewall filter is better, but there have been
a few occasions where this has been problematic over the years
(logical-routers pre-firewall split where the integration with policy
was tricky, EX for the first year of its life where lo0 filters didn't
work, etc). Something as simple as a prefix-list dumping to hosts.allow
would probably be sufficient. Also being able to change the listen port
to something other than 22 might help the people who for whatever reason
aren't able to do a strict IP based filter (simple option under system
services ssh to pass to sshd).

-- 
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp