5934494 2001-01-09 08:07 -0800 /67 rader/ nealk <nealk@VERINET.COM> Sänt av: joel@lysator.liu.se Importerad: 2001-01-09 17:20 av Brevbäraren (som är implementerad i) Python Extern mottagare: BUGTRAQ@SECURITYFOCUS.COM Externa svar till: nealk@verinet.com Mottagare: Bugtraq (import) <14661> Ärende: New DDoS? ------------------------------------------------------------ From: nealk <nealk@VERINET.COM> To: BUGTRAQ@SECURITYFOCUS.COM Message-ID: <200101090140.f091e4d37756@deimos.frii.com> I think I have stumbled across a new category of distributed denial of service (DDoS). (If this is old news, I'm sure I'll be corrected; it's new to me.) Traditional DDoS have the follow flow: - A host (or few hosts) controls a large number of clients. - The clients are directed by the host to attack a single site/server. The attack can either be network or service oriented. Alternate (New) DDoS model: - Server 'A' directly prevents all clients from accessing server 'B'. Here's an example of how it could work: I recently posted about a Flash plugin risk that can crash or hang a browser. Let's say that someone placed a corrupt Flash (SWF) file on a web server. All clients that access the web server and that view the Flash file (about 90% of all browsers can, so this is a good assumption) will have their browsers crash or hang. This is a DoS against the site, but it attacks the clients rather than the server. Now, let's take it one step further. Doubleclick, adtegrity.spinbox.net, and Akamai are linked by most large web sites. (Amazon, eBay, AltaVista, etc.) I have observed these sites returning banner ads written as jpeg, gif, and SWF. Let's say that one of the SWF files is corrupted. The single ad site can effectively deny all client access to the host site by crashing/hanging all client browsers. Server 'A' (the ad site) can directly prevent all clients from accessing server 'B' (the host web site). What's worse: This is more difficult to identify since local testing on the local server may not identify why the clients are crashing. The local server does not know what information was sent to the clients by the ad sites. In this example, I used ad sites and SWF files. It can be done with any third-party site (remember all the Web Bugs discussions?). Although SWF can do it today, I'm sure there will be more technologies that can do it tomorrow. Question: How can sites protect themselves from this? (I mean: Aside from the obvious, "don't link to ad sites.") Finally, I'm sure there are some script kiddies just dying to be "the first one to pull this off". Please don't. Accidents happen all by themselves and it's only a matter of time before this is seen in the wild and by accident. Why bother implementing something this trivial? Thoughts? -Neal (5934494) --------------------------------(Ombruten) 5935627 2001-01-09 17:52 +0100 /110 rader/ Szilveszter Adam <sziszi@PETRA.HOS.U-SZEGED.HU> Sänt av: joel@lysator.liu.se Importerad: 2001-01-10 00:01 av Brevbäraren (som är implementerad i) Python Extern mottagare: BUGTRAQ@SECURITYFOCUS.COM Externa svar till: sziszi@PETRA.HOS.U-SZEGED.HU Mottagare: Bugtraq (import) <14682> Kommentar till text 5934494 av nealk <nealk@VERINET.COM> Ärende: Re: New DDoS? ------------------------------------------------------------ From: Szilveszter Adam <sziszi@PETRA.HOS.U-SZEGED.HU> To: BUGTRAQ@SECURITYFOCUS.COM Message-ID: <20010109175235.D12630@petra.hos.u-szeged.hu> Hello and Happy New Year everybody, On Tue, Jan 09, 2001 at 08:07:37AM -0800, nealk wrote: > Traditional DDoS have the follow flow: > - A host (or few hosts) controls a large number of clients. > - The clients are directed by the host to attack a single site/server. > The attack can either be network or service oriented. > > > Alternate (New) DDoS model: > - Server 'A' directly prevents all clients from accessing server 'B'. Well, I do not think that this qualifies as a DoS. Denial of Service is when the site denies service to the clients contacting it. Here, the clients are attacked, but similar attacks have been around for a long time. I think of eg DNS poisoning, which will prevent users from accessing the site they want (although they get something else) or a whole class of Man-in-the-middle-Attacks. Yet, these all count as themselves and not as DoS when making categories. But this may well be an unimportant semantics thing. (On a very important side-note, although users will not get to the service, this kind of attack does not incur huge load on the server and the network nodes and does not cause marginal conditions, much less will it be able to bring down a server. So you can react to it can be a much more relaxed manner, and also at least the perpetrators are not endangering the whole Internet infrastructure with their deeds, but rather just one particular service. This, of course may be no cause for joy to the service concerned, but as soon as you discover what's wrong, you can take quick decisive action and restore access to the service *without any performance loss* visible to the customer. There is no rate-limiting problem, no slowdown, nothing. So the danger is a lot more benign.) > Here's an example of how it could work: > I recently posted about a Flash plugin risk that can crash or hang a browser. > > Let's say that someone placed a corrupt Flash (SWF) file on a web server. > All clients that access the web server and that view the Flash file > (about 90% of all browsers can, so this is a good assumption) will > have their browsers crash or hang. > > This is a DoS against the site, but it attacks the clients rather than > the server. Yes, but this not new in the sense that if you can place a corrupt SWF file there, you can place any other "bad" content as well. Exploiting scripting bugs, eg. Also, a DoS is IMHO more sweeping in definition. If a site is DoS-ed than you cannot get at it, period. While here merely not having or disabling the offending plugin already gives you access. If this were a DoS, then some leading portal and other high-profile sites continually are DoS-ing their users with eg scripts that only work on IE but may crash Netscape. (At one time microsoft.com came into such suspicion because a certain page took almost forever to download and render with Netscape on non-windows platforms and some users experienced browser hang or crash. However, upon more testing it was found that the page took longest to display on Win98 and I think IE4. Whoo-whoo:-) > Now, let's take it one step further. > Doubleclick, adtegrity.spinbox.net, and Akamai are linked by most > large web sites. (Amazon, eBay, AltaVista, etc.) > I have observed these sites returning banner ads written as jpeg, > gif, and SWF. > Let's say that one of the SWF files is corrupted. > The single ad site can effectively deny all client access to the host > site by crashing/hanging all client browsers. > > Server 'A' (the ad site) can directly prevent all clients from > accessing server 'B' (the host web site). Well, this is possible but again, as soon as you disable ads, you get in. This remains an issue however, but should be named differently. How about access blockage? Also, scripting "tricks" can be used similarly. Easy verification in all cases: try a text browser. If you get in, it is access blockage. (quickly coined abbreviation: AB) > What's worse: This is more difficult to identify since local testing > on the local server may not identify why the clients are crashing. Well, if local testing involves loading the page with one of the leading browsers, then it almost surely will:-) Eg with an ad it has to target your site specifically (and display with every new download) or else it may not be noticeable. > Question: How can sites protect themselves from this? > (I mean: Aside from the obvious, "don't link to ad sites.") It is equally tricky IMHO than it would be with a real DoS. Just as with a DoS you can only act on a case-by-case basis and general rules are hard to make, here it helps only if you react on a case-by-case basis. After all, we are talking circumstances outside of your control here. But you are right, considering that most people use one of the leading browsers and have all sorts of interesting plugins and have no notion of to handle them (eg how to disable them) this will become a problem just as viruses have with the advent of all-singing-all-dancing, totally-transparent-to-the-user mail clients. Just my HUF 0.02... -- Regards: Szilveszter ADAM Szeged University Szeged Hungary (5935627) --------------------------------(Ombruten) 5935710 2001-01-09 10:51 -0800 /44 rader/ Alfred Perlstein <bright@WINTELCOM.NET> Sänt av: joel@lysator.liu.se Importerad: 2001-01-10 00:28 av Brevbäraren (som är implementerad i) Python Extern mottagare: BUGTRAQ@SECURITYFOCUS.COM Externa svar till: bright@WINTELCOM.NET Mottagare: Bugtraq (import) <14684> Kommentar till text 5934494 av nealk <nealk@VERINET.COM> Ärende: Re: New DDoS? ------------------------------------------------------------ From: Alfred Perlstein <bright@WINTELCOM.NET> To: BUGTRAQ@SECURITYFOCUS.COM Message-ID: <20010109105144.V15744@fw.wintelcom.net> * nealk <nealk@verinet.com> [010109 10:41] wrote: > I think I have stumbled across a new category of distributed denial > of service (DDoS). (If this is old news, I'm sure I'll be corrected; > it's new to me.) > > Traditional DDoS have the follow flow: > - A host (or few hosts) controls a large number of clients. > - The clients are directed by the host to attack a single site/server. > The attack can either be network or service oriented. > > > Alternate (New) DDoS model: > - Server 'A' directly prevents all clients from accessing server 'B'. > > > Here's an example of how it could work: > I recently posted about a Flash plugin risk that can crash or hang a browser. > > Let's say that someone placed a corrupt Flash (SWF) file on a web server. > All clients that access the web server and that view the Flash file > (about 90% of all browsers can, so this is a good assumption) will > have their browsers crash or hang. While this is a possibility, it doesn't make much sense, news would spread like wildfire and people would drop links to the add service pretty quickly. Your attack would need either: a) a suicidal company. b) a hacked ad server. c) widespread DNS poisoning. Ad services can do other nasties like using 302s to redirect hundreds or thousands of hits to a particularly system intensive service on a remote site, that's a nasty DoS but also a good way to get yourself involved in a nasty lawsuit. -- -Alfred Perlstein - [bright@wintelcom.net|alfred@freebsd.org] "I have the heart of a child; I keep it in a jar on my desk." (5935710) ------------------------------------------