Results 1 to 25 of 35
Thread: How to stop DDOS/DOS attacks?
-
07-16-2011, 05:46 PM #1Newbie
- Join Date
- Jul 2011
- Posts
- 22
How to stop DDOS/DOS attacks?
Hey WHT,
I've been lurking on WHT for a while, and recently I joined up as a systems administrator on a Minecraft server (full administrator, as in I set up everything and keep it running smoothly, I fully manage it myself), and while I got everything working perfectly fine on our Limestone Networks dedi (C2Q 9400 2.66ghz, 8GB RAM, 500GB HDD, 100mbps port), I've been having some troubles with DDOS/DOS attacks recently.
Yes, a 3 week old server having troubles with attacks. (The most recent ones I've been having are from a very disgruntled banned player).
Now I can handle CentOS and the like fine for most tasks, but I've never learned much about what to do about DDOS/DOS attacks, especially with the scale of these attacks (75-100 mbps usually, which often maxes out our line). Limestone has great support, and they automatically stop most attacks within a few minutes, but I'm wondering if there's a way to detect/stop/log these attack instead of waiting for Limestone to get rid of them? We're also thinking of switching hosts due to cost issues, and I would especially need a method to stop attacks on hosts with stricter bandwidth and QOS policies.
I caught the attacker's IPs once (they were using Amazon EC2), but Amazon denied that the IPs ever touched us.
Basically, how and with what tools would I be able to stop/log DOS and DDOS attacks on CentOS 5.5, with that hardware/network.
I would love any and all advice on this matter.
-
07-16-2011, 06:05 PM #2Web Hosting Master
- Join Date
- Mar 2007
- Posts
- 2,050
You would need something that is sitting outside of the server to stop the attacks from reaching your server. Once they have reached your server it starts to affect the performance and bandwidth availability of the server. There are small time scripts to stop user's from getting a response from certain services running on your server but none of them keep the attack from reaching your physical server which is the key in stopping them.
I would recommend looking for a host that specializes in DDOS mitigation that does not just null route IPs when attacks occur. Some can add the IPs to their ACLs so they do not reach your physical server which will help mitigate the DOS and DDOS attacks.
-
07-16-2011, 06:20 PM #3Junior Guru
- Join Date
- Jan 2008
- Location
- Sweden
- Posts
- 182
Ask your provider to place a hardware firewall (this can even be a server configured as a firewall) between the switch and your server.
SwedenDedicated Unmanaged & managed solutions.
Dedicated Servers, VPS and colocation in Stockholm, Malmö and Oslo
1000Mbit Unmetered servers
Follow us on twitter @swedendedicated
-
07-16-2011, 06:37 PM #4Web Hosting Master
- Join Date
- May 2011
- Posts
- 586
DDoS Attacks have always been a major problem on all game servers.
I would try this script: http://deflate.medialayer.com/
Also, if you can prove that the attacks are coming from Amazon EC2 (Get Limestone to write a statement for proof, too, with the IP address in logs), and Amazon EC2 is denying the attack (Even after you send the log), then hire a lawyer and see what can be done. DDoS attacks are a major problem, and when a host does not comply with reports then there can be trouble.
-
07-16-2011, 07:00 PM #5Disabled
- Join Date
- Sep 2010
- Posts
- 627
Upgrade to gigabit port. problem solved.
-
07-16-2011, 08:03 PM #6
Yup. If the attacker can only manage to send about 100 megabit to your server, a gig port is the easiest way to deal with this. If you can find a host who doesn't meter incoming bandwidth, then this should be fine, unless the particular user can find a way to throw 10x as much bandwidth into the attack.
IOFLOOD.com -- We Love Servers
Phoenix, AZ Dedicated Servers in under an hour
★ Ryzen 9: 7950x3D ★ Dual E5-2680v4 Xeon ★
Contact Us: sales@ioflood.com ★
-
07-16-2011, 08:05 PM #7Web Hosting Master
- Join Date
- May 2008
- Posts
- 667
-
07-16-2011, 10:35 PM #8
That's true, but it's not really a fair comparison because softlayer will null you even if there isn't a spike, just quite a bit of use. I've had this issue a number of times, and so wouldn't use them for anything requiring much reliability. For what it's worth, I've only heard of softlayer doing this for 100tb clients, it seems they treat direct clients better.
IOFLOOD.com -- We Love Servers
Phoenix, AZ Dedicated Servers in under an hour
★ Ryzen 9: 7950x3D ★ Dual E5-2680v4 Xeon ★
Contact Us: sales@ioflood.com ★
-
07-16-2011, 11:49 PM #9Newbie
- Join Date
- Jul 2011
- Posts
- 22
We use Limestone Networks, so they _do_ mitigate DDOS/DOS attacks for us instead of null routing our IPs, but they are a little too expensive for us to continue using, and it takes between 5min-3hours to mitigate the attacks on their side, and because we run a gaming community ANY downtime becomes a major problem, even in the Minecraft gameplay environment.
As I mentioned above, they get rid of attacks for us after shortish delays, but they do not sell hardware firewalls and the cost of renting a second server just for that is very prohibitive.
Yeah, we've been having a LOT of problems..
http://img813.imageshack.us/img813/3...10716at101.png
When you try running a gaming community, it sucks when your users can't access the server due to network attacks...
I'll take a look at the script, thanks!
I contacted Limestone, they said that "They log all attacks and automatically send reports to the authorities". That wasn't enough for me, so I went and managed to capture a attacker's IP (3 IPs, registered to Amazon EC2), but when I sent a report in they claimed to have no record of such a attack... I ran whois lookups on all IPs I found connected the one time I was on the SSH when we were being hammered, and those 3 were the only ones that tripped any flags, plus they quickly disconnected and the attack stopped...
We're a (very) small gaming community, we barely cover operating costs, so we simply have no money for lawyers.
A 1gbps port from Limestone is $45/month extra, a little too much when we can barely afford the bills as-is, and we're thinking of moving to Hetzner to save money and get more power (and possibly a 1gbps port, although we're not sure if we even want to switch providers, especially so when we found out that Hetzner has a policy to null route your server if a attack is detected).
Limestone doesn't meter incoming BW, but again, the amount pushed in isn't the problem here, it's our line being saturated. I might be a little whiny, seeing as the attacks are usually stopped by Limestone with no interaction on our part in a relatively timely manner, but downtime for the type of services we are trying to offer can be catastrophic.
======
The software firewall is up, but the attackers just target random ports and overwhelm the line with brute force... Would there be a firewall rule that I could set up to LOG any suspicious connections on any port at any time? I'm still playing around with setup, trying to get a compromise between a massive log file and detailed log info.Last edited by battlekid; 07-16-2011 at 11:51 PM. Reason: Spelling errors
-
07-16-2011, 11:52 PM #10Hello World
- Join Date
- Nov 2009
- Location
- /etc/my.cnf
- Posts
- 10,657
-
07-17-2011, 03:10 AM #11CISSP-ISSMP, CISA
- Join Date
- Aug 2002
- Location
- Seattle
- Posts
- 5,525
-
07-17-2011, 06:49 AM #12Web Hosting Master
- Join Date
- Feb 2010
- Posts
- 1,030
-
07-17-2011, 09:56 AM #13Web Hosting Master
- Join Date
- May 2008
- Posts
- 667
-
07-17-2011, 10:02 AM #14IOFLOOD.com -- We Love Servers
Phoenix, AZ Dedicated Servers in under an hour
★ Ryzen 9: 7950x3D ★ Dual E5-2680v4 Xeon ★
Contact Us: sales@ioflood.com ★
-
07-18-2011, 06:49 PM #15Newbie
- Join Date
- Jul 2011
- Posts
- 22
Alright, just found out that we're being targeted by some idiot hacker group (quantumbooter.info), this is not going well...
We basically told them to piss off and went and patched several major security holes they had been exploiting, so now they've decided to hammer us with a ~50mbps attack... Again.....
I must say, although Limestone is very expensive, they are very good about attacks!
Anyways, I guess the best idea right now is for us to just keep cleaning up security and rely on Limestone to mitigate the attacks as they appear.
-
07-18-2011, 07:01 PM #16Web Hosting Master
- Join Date
- May 2011
- Posts
- 586
Hello,
quantumbooter.info is a website for a "Booter". A Booter is an illegal hacking product which is sold on the internet. All a booter does is DDoS websites and people.
In other words, Somebody has purchased Quantum Booter, and is using it to DDoS your server(s).
Booters have became a big problem. A lot of kids (Around 12-13) purchase booters to DDoS people on Xbox Live and similar online gaming services, then brag about it.
After some research, I have found out that Quantum Booter is sold (and bought) on a "hacking" website, HackForums.net. HackForums.net is also on the Limestone network (I have no idea how they let a hacking website which sells these illegal products on their network). For more info, pull up google and search "site:hackforums.net quantum booter".
After an IP trace of quantumbooter.info, I found out that it is hosted by Hetzner. Hetzner does NOT allow ANY of this content on their network. I HIGHLY suggest you contact Hetzner's abuse department and get the website shutdown. After the website is shutdown, your server(s) should no longer be under any DDoS attacks by Quantum Booter. Also, you're helping cleanup the internet from little kids attacking servers and people using $10 tools, which is always a bonus.
If you require any help, feel free to PM me.
-
07-18-2011, 07:03 PM #17Disabled
- Join Date
- Sep 2010
- Posts
- 627
-
07-18-2011, 07:06 PM #18Aspiring Evangelist
- Join Date
- Jun 2011
- Location
- California
- Posts
- 412
|████| SSD Nodes
|████| Build more for far less with the best value in cloud hosting.
|████| RAID 10 SSDs | 10Gbps NICs | Tier-1 backbone | Scale without downtime | 9 years in business
|████| https://www.ssdnodes.com
-
07-18-2011, 07:15 PM #19Newbie
- Join Date
- Jul 2011
- Posts
- 22
I know what hackforums.net is, I read it occasionally in my quest for info (and good Minecraft hacks), and I saw that the guy has a presence on there... I am not sure what I'll do about it, hackforums is a very large site and not technically illegal in and of itself...
As for the site itself, I also just looked it up, I will go submit a complaint to Hetzner and get their box shutdown.
Eh, at least I'll try to stop them. I have their proxy's IP, chat logs and some other info... At the very least, I'll do my best to make life VERY hard for them, as they've made the past 3 weeks complete hell for us (we just started this community/server ~1 month ago, and out of all people, this group decided to pick US...).
-
07-18-2011, 07:18 PM #20Web Hosting Master
- Join Date
- May 2011
- Posts
- 586
Personally, I roam Hackforums.net and report all illegal Web Hosts, booters, and websites. I've been very successful; shutting down nearly 10 booters, 4 web hosts, and MANY websites.
It has a lot of useful info, but the community is slowly destroying it. I doubt it will be alive in 5 years from today.
I highly recommend you report the site. One less malicious IP on the internet.
-
07-18-2011, 07:54 PM #21
Right, this could just be how SL treats low budget reseller customers: null first and ask questions later. I would certainly hope if you're paying list price and buying direct from them, they would be more sensible about this. It's really a shame that they've got this two tiered system, as it allows how they treat their low budget clients to drag their name through the dirt, making people think twice about signing up for their higher cost offerings.
IOFLOOD.com -- We Love Servers
Phoenix, AZ Dedicated Servers in under an hour
★ Ryzen 9: 7950x3D ★ Dual E5-2680v4 Xeon ★
Contact Us: sales@ioflood.com ★
-
07-18-2011, 08:00 PM #22Aspiring Evangelist
- Join Date
- Jun 2011
- Location
- California
- Posts
- 412
I completely agree, and I suspect that 100tb customers cause a substantial amount of grief. Unfortunately, as you mentioned, 100tb hinges on SL's brand and the result of this multi-tiered system tarnishes both reputations.
It's been a completely positive experience directly working with SL.|████| SSD Nodes
|████| Build more for far less with the best value in cloud hosting.
|████| RAID 10 SSDs | 10Gbps NICs | Tier-1 backbone | Scale without downtime | 9 years in business
|████| https://www.ssdnodes.com
-
07-18-2011, 08:13 PM #23
Exactly. It makes 100tb look bad that they can't resolve simple issues, supposedly because SL is in charge, and it makes SL look like the bad guy when they do this kind of thing to customers who have been sold on the SL brand.
The only reason I can see why SL would have done the 100tb deal in the first place, is because they wanted to pump up their revenues before selling out to GI Partners. Perversely, since hosts are often valued on a multiple of revenues, getting a few thousand extra customers at break even, or even at a loss, would have meant a much bigger payday when they sold out. The end result is a loss leader subsidized product that wouldn't exist if it were a standalone company.IOFLOOD.com -- We Love Servers
Phoenix, AZ Dedicated Servers in under an hour
★ Ryzen 9: 7950x3D ★ Dual E5-2680v4 Xeon ★
Contact Us: sales@ioflood.com ★
-
07-19-2011, 05:43 PM #24Junior Guru Wannabe
- Join Date
- Jun 2007
- Location
- Argentina
- Posts
- 36
deflate ?
thats not work with reals ddos attack...
if the attack is against your apache .. use varnish.. with a good .vcl or litespeed if you want to pay for it. but.. you will need a good provider with ddos protections at network level if the problem persistwww.IPSecureNetwork.com
Hosting , IRCD Servers , Streaming Audio-video, Dedicated Servers
The Best Way to Be protected Against DDoS Attacks
-
07-20-2011, 09:59 AM #25Newbie
- Join Date
- Jul 2011
- Posts
- 29
Aren't you able to modify the source code for the minecraft server?
If your 100mbit line isn't completely flooded and you're only experiencing lag in-game you could easily implement a timeout on your minecraft server before it accepts the connection from any client.
This can be done using hooks as well.
Usually when they ddos a gameserver they go for the login port. They continuisly connect & disconnect which could result in your server running out allocatable stuff (can't come up with the exact term, whenever someone connects to a server they get 1 of this "thing" from the stack)
So if the server waits, lets say 5 seconds before allocating, users that actually want to play will be stuck on the login screen for 5 seconds and get allocated, whereas the attacks won't be, thus free'ing up your system.
If you are getting flooded, then the above won't work ofcourse
Similar Threads
-
DDoS and DoS attacks
By rcpersons1 in forum Reseller HostingReplies: 17Last Post: 08-03-2007, 12:28 AM -
Got DDoS? BLCC DDoS Protection sale! Stop HTTP GET attacks in their tracks!
By ddosguru in forum Dedicated Hosting OffersReplies: 7Last Post: 01-17-2007, 12:49 PM -
DoS/DDoS Attacks - Need Info.
By Babushka99 in forum Hosting Security and TechnologyReplies: 5Last Post: 06-18-2005, 12:22 PM -
DoS or DDos attacks prevention
By varunbihani in forum Hosting Security and TechnologyReplies: 11Last Post: 06-09-2005, 09:43 PM