Re: [j-nsp] DOS Attack

2010-08-04 Thread Stefan Fouant
> -Original Message-
> From: juniper-nsp-boun...@puck.nether.net [mailto:juniper-nsp-
> boun...@puck.nether.net] On Behalf Of sherif mostafa
> Sent: Wednesday, August 04, 2010 9:37 AM
> To: fwei...@bfk.de
> Cc: juniper-nsp@puck.nether.net
> Subject: Re: [j-nsp] DOS Attack
> 
> Dear Florian,
> 
> This ERX, Administration of router interface 0018.742f.b380 belongs to
> me also, but should I filter all those packet types ??

Sounds like you have a routing loop, perhaps default routes on two neighbors
pointing at each other?  This is what I would suspect when I'm seeing TTL
expirations.   In any event, this error message is just telling you that is
suspects that there is a problem, however are you actually observing poor
performance or is it causing some type of outage or other issue?  241 pps
really isn't that much - it's not what I would consider to be a normal
flooding type of attack...

Stefan Fouant, CISSP, JNCIEx2
www.shortestpathfirst.net
GPG Key ID: 0xB5E3803D

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] DOS Attack

2010-08-04 Thread sherif mostafa




 
Dear Florian,
 
This ERX, Administration of router interface 0018.742f.b380 belongs to me also, 
but should I filter all those packet types ??
 
 
 
> To: sherifmka2...@hotmail.com
> CC: juniper-nsp@puck.nether.net
> Subject: Re: [j-nsp] DOS Attack
> From: fwei...@bfk.de
> Date: Wed, 4 Aug 2010 13:27:05 +
> 
> * sherif mostafa:
> 
> > Could anyone help please as I've faced an error message "DOS" below
> > that caused high CPU usage:
> 
> > ERROR 08/02/2010 16:22:46 CAI dosProtection: Flow is suspicious:
> > GigabitEthernet11/0.410 for control protocol: IP TTL Expired source MAC
> > 0018.742f.b380 with rate 241 pps
> 
> Have you checked that you haven't got a routing loop or something like
> that? (And which platform is that, BTW?)
> 
> If this isn't the case, you need to figure out who's got the
> 0018.742f.b380 MAC address and ask them to stop sending those packets.
> 
> -- 
> Florian Weimer 
> BFK edv-consulting GmbH http://www.bfk.de/
> Kriegsstraße 100 tel: +49-721-96201-1
> D-76133 Karlsruhe fax: +49-721-96201-99
  
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] DOS Attack

2010-08-04 Thread Florian Weimer
* sherif mostafa:

> Could anyone help please as I've faced an error message "DOS" below
> that caused high CPU usage:

> ERROR 08/02/2010 16:22:46 CAI dosProtection: Flow is suspicious:
> GigabitEthernet11/0.410 for control protocol: IP TTL Expired source MAC
> 0018.742f.b380 with rate 241 pps

Have you checked that you haven't got a routing loop or something like
that?  (And which platform is that, BTW?)

If this isn't the case, you need to figure out who's got the
0018.742f.b380 MAC address and ask them to stop sending those packets.

-- 
Florian Weimer
BFK edv-consulting GmbH   http://www.bfk.de/
Kriegsstraße 100  tel: +49-721-96201-1
D-76133 Karlsruhe fax: +49-721-96201-99

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] DOS attack?

2009-05-20 Thread Matthias Gelbhardt

Hi!

I may open a JTAC case, when I understand for which problem I should  
open one.


The following has happened:

The system (J6350) is running under 9.3R2.8, so we decided to update  
to 9.4R2.8. That was a desaster, and I hope you can help also in this  
matter. After upgrading the systems, both thought they are VRRP  
master. The problem is obvious, two sstems thinking to be the same  
appliance. Was there a change in VRRP configuration?


Because this was not working, we made a rollback. Now we have the same  
memory problems again. Starting the shell, bam Low memory, show bgp  
summary, los memory. Each event has consequences: disabling a BGP  
session.


The system has 1 GB of DRAM. What are the memory intensive processes?  
The BGP sessions? We have a J6350 at the AMS-IX where are a lot more  
BGP sessions. The VRRP processes? The rpd process has a significant  
higher memory consumption than on the AMS-IX router for example.


Before opening a JTAC ticket, you may be saying "get 1 GB of memory,  
your problems will disappear".


Regards,

Matthias

Am 17.05.2009 um 14:54 schrieb Richard A Steenbergen:


On Sun, May 17, 2009 at 02:19:56AM -0700, Robert Raszuk wrote:

Hi Matthias,


I wonder now, which is the event, that triggered this behavious? The
numer of ssh-logins at that time or this zbexpected EOF?


I would with good deal of assurance conclude that the cause were
ssh-login attack which apparently starved the poor box to it's memory
limits.

When even your kernel spins a panic message on the low of memory  
due to
such attack control plane can exhibit quite unexpected behavior. In  
my

opinion end-of-frame BGP message is just a consequence of this.

The advice would be to:

* open a case with jtac to find out why subsequent ssh-logins cause a
memory leak

* reduce to very max rate-limiting for the ssh logins


It's probably more likely that the box was always getting floods of  
SSH
connection attempts (because thats what happens to anything you  
leave on

the Internet with port 22 open), and the low memory condition was
coincidental or 99% caused by something else. The openssh people would
be shitting bricks if there was actually a memory leak from multiple
connection attempts. Filter thy lo0 (*), but my money is on a leak
somewhere else (or someone running a 256mb RE :P).

(*) I always found it weird that JUNOS lacks a software filter for
access to things like SSH, like a line vty access-class on Crisco.
Obviously a proper lo0 firewall filter is "better", but there have  
been

a few occasions where this has been problematic over the years
(logical-routers pre-firewall split where the integration with policy
was tricky, EX for the first year of its life where lo0 filters didn't
work, etc). Something as simple as a prefix-list dumping to  
hosts.allow
would probably be sufficient. Also being able to change the listen  
port
to something other than 22 might help the people who for whatever  
reason

aren't able to do a strict IP based filter (simple option under system
services ssh to pass to sshd).

--
Richard A Steenbergenhttp://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1  
2CBC)


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] DOS attack?

2009-05-17 Thread Richard A Steenbergen
On Sun, May 17, 2009 at 02:19:56AM -0700, Robert Raszuk wrote:
> Hi Matthias,
> 
> > I wonder now, which is the event, that triggered this behavious? The
> > numer of ssh-logins at that time or this zbexpected EOF?
> 
> I would with good deal of assurance conclude that the cause were 
> ssh-login attack which apparently starved the poor box to it's memory 
> limits.
> 
> When even your kernel spins a panic message on the low of memory due to 
> such attack control plane can exhibit quite unexpected behavior. In my 
> opinion end-of-frame BGP message is just a consequence of this.
> 
> The advice would be to:
> 
> * open a case with jtac to find out why subsequent ssh-logins cause a 
> memory leak
> 
> * reduce to very max rate-limiting for the ssh logins

It's probably more likely that the box was always getting floods of SSH
connection attempts (because thats what happens to anything you leave on
the Internet with port 22 open), and the low memory condition was 
coincidental or 99% caused by something else. The openssh people would 
be shitting bricks if there was actually a memory leak from multiple 
connection attempts. Filter thy lo0 (*), but my money is on a leak 
somewhere else (or someone running a 256mb RE :P).

(*) I always found it weird that JUNOS lacks a software filter for
access to things like SSH, like a line vty access-class on Crisco. 
Obviously a proper lo0 firewall filter is "better", but there have been
a few occasions where this has been problematic over the years
(logical-routers pre-firewall split where the integration with policy
was tricky, EX for the first year of its life where lo0 filters didn't
work, etc). Something as simple as a prefix-list dumping to hosts.allow
would probably be sufficient. Also being able to change the listen port
to something other than 22 might help the people who for whatever reason
aren't able to do a strict IP based filter (simple option under system
services ssh to pass to sshd).

-- 
Richard A Steenbergenhttp://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] DOS attack?

2009-05-17 Thread sthaug
> The advice would be to:
> 
> * open a case with jtac to find out why subsequent ssh-logins cause a 
> memory leak
> 
> * reduce to very max rate-limiting for the ssh logins

Or even better - configure a firewall filter which limits ssh logins
to your "trusted" netblocks - typically where your management stations
etc are.

Steinar Haug, Nethelp consulting, sth...@nethelp.no
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] DOS attack?

2009-05-17 Thread Robert Raszuk

Hi Matthias,

> I wonder now, which is the event, that triggered this behavious? The
> numer of ssh-logins at that time or this zbexpected EOF?

I would with good deal of assurance conclude that the cause were 
ssh-login attack which apparently starved the poor box to it's memory 
limits.


When even your kernel spins a panic message on the low of memory due to 
such attack control plane can exhibit quite unexpected behavior. In my 
opinion end-of-frame BGP message is just a consequence of this.


The advice would be to:

* open a case with jtac to find out why subsequent ssh-logins cause a 
memory leak


* reduce to very max rate-limiting for the ssh logins

Cheers,
R.



Hi!

Last night we had a mysterious behaviour on our router. On a BGP 
connection with Cogent we received an unexpected EOF. There were also a 
great number of SSH logins (we do not have FW rules in place, but we 
have a rate limit,  Shortly after the router complained about low memory 
and a few BGP sessions drop down (oviosly the one, which are memory 
exhausting),


I wonder now, which is the event, that triggered this behavious? The 
numer of ssh-logins at that time or this zbexpected EOF?


The log of that time:


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp