Discussion
Loading...

Post

  • About
  • Code of conduct
  • Privacy
  • Users
  • Instances
  • About Bonfire
Valerie Aurora 🇺🇦
@vaurora@mstdn.social  ·  activity timestamp 2 weeks ago

Hey Fedi! What's a short list of best practices for writing or configuring software to:

1. Not be a source of a DDoS attack
2. Be more resilient to a DDoS attack

I know basics (e.g. disable recursive DNS resolution, use as few resources as possible on incoming connections till verified as legit) but I would like a complete list and, boy howdy, all the search results are someone providing a DDoS protection service.

This is for the CRA OS standard, funded by EFTA and the EC

#CRA

  • Copy link
  • Flag this post
  • Block
John Breen
@jab01701mid@mastodon.social replied  ·  activity timestamp 2 weeks ago

@vaurora I'll take a stab at it, for what it's worth :
Generally I've adopted the "Defense in Depth" approach.

1 – Block all but the expected inbound traffic as early as possible, in each component. By port, domain, source IP, even whitelist if necessary/possible.
Think “block inbound port 22 if you don’t use it”, in your router component, and kernel packet filter/firewall (BPF/iptables), and even at user-level.
1/x

  • Copy link
  • Flag this comment
  • Block
chrysn
@chrysn@chaos.social replied  ·  activity timestamp 2 weeks ago

@vaurora Just one entry for the list: If an OS runs CoAP as a default service (which makes sense for embedded devices), keep up with the update (RFC9175, which I coauthored) as RFC7252 did mandate amplification mitigation but had limited tools for it.
Generalizing, for everything that's on-by-default, check if any layer in that does amplification mitigation in its standards (or explains why it's not needed), and whether the implementation does do it. (DNS is one instance thereof, but not alone).

  • Copy link
  • Flag this comment
  • Block
Valerie Aurora 🇺🇦
@vaurora@mstdn.social replied  ·  activity timestamp 2 weeks ago

@chrysn apparently publicly accessible memcached instances are the current best amplification source 😭

https://ripe91.ripe.net/programme/meeting-plan/sessions/52/BXAUMQ/

Talk details: Filter Your Things or No I don't want to use your NTP Server, Dave Phelan - RIPE 91

Talk details for 'Filter Your Things or No I don't want to use your NTP Server' by Dave Phelan at RIPE 91
  • Copy link
  • Flag this comment
  • Block
chrysn
@chrysn@chaos.social replied  ·  activity timestamp 2 weeks ago

@vaurora I'm conflicted between "Oh no that's big machines with good bandwith, not good for the net" and "Yay it's not us any more". (CoAP gathered a bit of bad rep for this initially).

  • Copy link
  • Flag this comment
  • Block
Valerie Aurora 🇺🇦
@vaurora@mstdn.social replied  ·  activity timestamp 2 weeks ago

Clarification: this is for things that an operating system can be configured to do in the default installation, not what you can do with network architecture or intermediate routers - though I will happily listen to your thoughts there!

  • Copy link
  • Flag this comment
  • Block
Vysogota
@petko@social.petko.me replied  ·  activity timestamp 2 weeks ago

@vaurora iirc any UDP service can be a source of reflection attacks. It is worse when said service sends lots of data like DNS with DNSSEC. Just limiting recursion is not enough in this case, you need rate limiting for regular queries as well :/

  • Copy link
  • Flag this comment
  • Block
Tony Hoyle
@tony@toot.hoyle.me.uk replied  ·  activity timestamp 2 weeks ago

@vaurora
For an end user your pipe is too small to ever withstand a ddos attack, you need an ISP prepared to put in blocks high enough upstream it can cope (good ones can help with this, your typical home ISP likely won't).

In practice for a lot of small businesses they couldn't handle it.

If you've got money you proxy through cloudflare or similar.

Note though it's a fairly unlikely thing to happen for most sites.. your typical widget seller just isn't that interesting to attackers.

  • Copy link
  • Flag this comment
  • Block
CartyBoston
@CartyBoston@mastodon.roundpond.net replied  ·  activity timestamp 2 weeks ago

@vaurora it's such a general term, it's hard to write about succinctly.

  • Copy link
  • Flag this comment
  • Block
Evey, XFS fanby
@evey@chaos.social replied  ·  activity timestamp 2 weeks ago

@vaurora https://github.com/craig/ddos-book-materials (link in there to where you can buy the book) is an exelent resource

GitHub

GitHub - craig/ddos-book-materials: Materials for my book "DDoS: Understanding Real-Life Attacks and Mitigation Strategies"

Materials for my book "DDoS: Understanding Real-Life Attacks and Mitigation Strategies" - craig/ddos-book-materials
  • Copy link
  • Flag this comment
  • Block
Log in

bonfire.cafe

A space for Bonfire maintainers and contributors to communicate

bonfire.cafe: About · Code of conduct · Privacy · Users · Instances
Bonfire social · 1.0.0 no JS en
Automatic federation enabled
  • Explore
  • About
  • Members
  • Code of Conduct
Home
Login