DOS attack grief!
The IP in question that was under attack had NO dns records or any services linked to it other than an old test installation of Shoutcast (which I think I disabled, but until I can reach my server again I can't say for sure). It appears to be a totally random act as I am only running the most innocuous of websites (no IRC or anything like that) but now my clients are MAJORLY PISSED that their websites will be out of commission for the next 24 hours. And are demanding that I move them to another more reliable service.
My question is twofold:
1. What did I do to cause this? Is my configuration somehow messed up that I set myself up for this? I have been running servers for 15 years, and this is the first time anything like this has ever happened to me.
2. Is it reasonable to ask Linode to activate the other (un-targeted IP) so I can get my servers up and running?
18 Replies
@myriad:
but now my clients are MAJORLY PISSED that their websites will be out of commission for the next 24 hours.
And how much are these "clients" willing to pay for a 100% guaranteed uptime hosting service?
Use this experience to double check the wording on your service level agreement that you have with your clients and make sure that acts of God and/or the Internet are not covered.
I am going to try to set up another Linode for auto-failover and that is going to be (another) learning curve as I have never set one up before. Off to the forums for some tips….
There are hosts out there that specialize in DDoS mitigation. Linode is not one of them. These hosts try to survive DDoS attacks by throwing massive amounts of bandwidth and hardware at the problem, but even they aren't invincible.
The best you can try to do is limit the damage that they're likely to cause, not the damage that they could cause.
That said, look further into why you were being attacked. What types of sites do your clients run? What software do they run if they allowed to on the box? (IRC eggdrop bots used to be a common target for example.)
Very rarely do DOS's happen for no reason. Something was done to piss someone off. I've seen it as simple as someone dislikes your site and wants it offline. Or someone banned a player from their minecraft server, etc.
But as he said, if someone wants your server down… he will take it down. There are things you can do to prevent it, but if it was enough traffic to take down the host, it's completely out of your hands.
As long as they are using a few IPs you're okay.
But if they are running a distributed attack even ddos deflate won't help.
details here:
@linodeTail:
But if they are running a distributed attack even ddos deflate won't help.
so, basically, ddos deflate isn't named properly? (the first d is for distributed…)
@glg:
so, basically, ddos deflate isn't named properly? (the first d is for distributed…)
It's named properly. It only deflates (reduces the severity of) the attack. It doesn't stop it, especially if the attack is too big to deflate.
@vonskippy:
acts of God and/or the Internet
I worship thee, almighty Internet! Thou knowst everything, thou art everywhere…:roll:
@jebblue:
Would iptables rate limiting mitigate a DOS or DDOS attack?
It will mitigate a small attack by limiting the use of resources on your server. Once the attack is big enough to flood the connection to your box, you're dead in the water.
@jebblue:
Would iptables rate limiting mitigate a DOS or DDOS attack?
Yes, but you're also limiting traffic on that port as well. So if say they are hitting port 80, you'll be limiting legit traffic as well as dos traffic. If however, they are hitting port say, 25, and you want your website to still work you can rate limit or even block traffic to port 25 and it may help.
However, remember the reason most attacks work if you filter them locally is because theyre either tying up system resources or the return traffic of your client communicating back is enough to kill the connection/system. If the incoming rate of data is > your pipe size, no matter what, local firewall running or not, you'll be down.
@jebblue:
Interesting points pclissold and berzerke, it sounds like there needs to be a way for the ISP of a targeted site to send a warning signal to the ISPs of the source sites to tell them to shut down those DDOS people at the source.
Thats what the