UDP fragments have been a problem for years.

mitigations historically have been to turn off spare codecs.  On snom phones, turn off fancy features.

Tbh, the only really modern mitigation is just to use SIP over TLS and taking UDP out of the mix for everything except media.


Tim

On 07/10/2021 23:34, Jared Geiger wrote:
Cloudflare made another blog post about what kinds of traffic they are seeing. https://blog.cloudflare.com/update-on-voip-attacks/ <https://blog.cloudflare.com/update-on-voip-attacks/>

One problem is if Cloudflare drops UDP fragments, that could cause some calls to fail and others not to. Especially now with SHAKEN/STIR certs in the headers and people putting every codec known to man on the INVITEs. Verizon specifically mentioned UDP fragments in the email notice before they put S/S on TF Inbound. So cloudflare magic transit isn't necessarily the easy button for protecting VoIP traffic but it would definitely help keep a network alive and processing calls during an attack.

On Mon, Oct 4, 2021 at 6:24 AM Mike Hammett <voice...@ics-il.net <mailto:voice...@ics-il.net>> wrote:

    For those that don't know what BGPlay is...


    
https://stat.ripe.net/widget/bgplay#w.ignoreReannouncements=false&w.resource=67.231.4.88&w.starttime=1632921600&w.endtime=1632960000&w.rrcs=0,1,2,5,6,7,10,11,13,14,15,16,18,20&w.instant=null&w.type=bgp
    
<https://stat.ripe.net/widget/bgplay#w.ignoreReannouncements=false&w.resource=67.231.4.88&w.starttime=1632921600&w.endtime=1632960000&w.rrcs=0,1,2,5,6,7,10,11,13,14,15,16,18,20&w.instant=null&w.type=bgp>



    -----
    Mike Hammett
    Intelligent Computing Solutions
    http://www.ics-il.com <http://www.ics-il.com>



    Midwest Internet Exchange
    http://www.midwest-ix.com <http://www.midwest-ix.com>



    ------------------------------------------------------------------------
    *From: *"Joseph Jackson" <jjack...@aninetworks.net
    <mailto:jjack...@aninetworks.net>>
    *To: *"Mike Hammett" <voice...@ics-il.net
    <mailto:voice...@ics-il.net>>
    *Cc: *"Tim Bray" <t...@kooky.org <mailto:t...@kooky.org>>,
    voiceops@voiceops.org <mailto:voiceops@voiceops.org>
    *Sent: *Saturday, October 2, 2021 11:20:26 AM
    *Subject: *RE: [VoiceOps] VoIP Provider DDoSes

    Is now.  If you look at their BGP announcements over the last week
    using something like bgplay you can see them move all their
    prefixes behind cloudflare.

    *From:*Mike Hammett [mailto:voice...@ics-il.net
    <mailto:voice...@ics-il.net>]
    *Sent:* Saturday, October 02, 2021 10:30 AM
    *To:* Joseph Jackson
    *Cc:* Tim Bray; voiceops@voiceops.org <mailto:voiceops@voiceops.org>
    *Subject:* Re: [VoiceOps] VoIP Provider DDoSes

    Has been or is now?



    -----
    Mike Hammett
    Intelligent Computing Solutions
    http://www.ics-il.com <http://www.ics-il.com>



    Midwest Internet Exchange
    http://www.midwest-ix.com <http://www.midwest-ix.com>


    ------------------------------------------------------------------------

    *From: *"Joseph Jackson" <jjack...@aninetworks.net
    <mailto:jjack...@aninetworks.net>>
    *To: *"Tim Bray" <t...@kooky.org <mailto:t...@kooky.org>>,
    voiceops@voiceops.org <mailto:voiceops@voiceops.org>
    *Sent: *Saturday, October 2, 2021 9:43:23 AM
    *Subject: *Re: [VoiceOps] VoIP Provider DDoSes

    Bandwidth.com is using cloudflares magic transit for DDOS
    protection.  Seems to be working ok.  CF says it doesn’t matter
    the protocol they can scrub the traffic.

    *From:*VoiceOps [mailto:voiceops-boun...@voiceops.org
    <mailto:voiceops-boun...@voiceops.org>] *On Behalf Of *Tim Bray
    via VoiceOps
    *Sent:* Friday, October 01, 2021 9:34 AM
    *To:* voiceops@voiceops.org <mailto:voiceops@voiceops.org>
    *Subject:* Re: [VoiceOps] VoIP Provider DDoSes

    On 26/09/2021 21:54, Mike Hammett wrote:

        Are your garden variety DDoS mitigation platforms or services
        equipped to handle DDoSes of VoIP services? What nuances does
        one have to be cognizant of? A WAF doesn't mean much to SIP,
        IAX2, RTP, etc.

    Without saying too much:

    Seems to be a spate of DDOS against UK based voip providers at the
    moment.   For ransom.  Don't pay.

    One provider said that traditional approaches did not work. They
    tried Voxility but just got false positives.    There are
    providers that do work.

    But in the UK a lot of traffic goes over peers through internet
    exchanges.  So just swapping transit only half the problem.


    Prep wise:

    So practice altering your IP advertisements, dropping and bringing
    up peers.  If you connect to route servers, practice doing
    selective announcements.  Try to get private interconnects to your
    upstream telco providers.    Get your network teams warmed up for
    when it does happen.    If you host with a cloud provider, have a
    backup because if DDOS is coming from the same cloud .....

    Tim


    _______________________________________________
    VoiceOps mailing list
    VoiceOps@voiceops.org <mailto:VoiceOps@voiceops.org>
    https://puck.nether.net/mailman/listinfo/voiceops
    <https://puck.nether.net/mailman/listinfo/voiceops>


    _______________________________________________
    VoiceOps mailing list
    VoiceOps@voiceops.org <mailto:VoiceOps@voiceops.org>
    https://puck.nether.net/mailman/listinfo/voiceops
    <https://puck.nether.net/mailman/listinfo/voiceops>


_______________________________________________
VoiceOps mailing list
VoiceOps@voiceops.org
https://puck.nether.net/mailman/listinfo/voiceops
_______________________________________________
VoiceOps mailing list
VoiceOps@voiceops.org
https://puck.nether.net/mailman/listinfo/voiceops

Reply via email to