05.19.09

Gemini version available ♊︎

DDOS and Migration (Updated)

Posted in Boycott Novell, Site News at 7:33 pm by Dr. Roy Schestowitz

Summary: Boycott Novell had been under DDOS attacks for almost 4 days. We were struggling to just stay online while hosts investigated where the attacks came from. We moved between hosts (to semi-dedicated) and the same pattern of attack persisted until yesterday.

WE have kept silent about it in order not to encourage the attacker/s, but it’s true. We have been under heavy DDOS attacks since Thursday night. What has happened since then? Well, a lot. Our previous host is no more as far as we are concerned. After struggling with the botnet for like 10 hours (filtering to no avail) our Web site got isolated. It did not serve any pages for almost 2 days. A reader of Boycott Novell was kind enough to lend us room on his server (more or less dedicated), on which he fought the botnets for over a day. The attackers kept changing tactics. Some other readers offered filtering advice and we are grateful to all of them. Ultimately, the attacks halted yesterday afternoon.

“Ultimately, the attacks halted yesterday afternoon.”The migration from the old server was not simple because the site was disabled abruptly following the early attacks. But now we have ensured that all data has been migrated. The only ‘good’ thing which came out of this attack is that, as oiaohm put it, the ordeal sort of made us more robust to future attacks.

Now that we have a new host in place, we also have more features. Data on the site (comments, posts, etc.) was not lost in the migration, just heaps of time and effort affecting several people. We have moved to a bigger, more robust environment that will hopefully facilitate the needs of the Web site as it continues to grow (we served about 200GB of data last month). We apologise for the downtime, which is unprecedented.

The plan is to carry on exposing Comes exhibits next month and also organise the Wiki. There is enough for years of work.

Again: we would like to thank all those who helped during the downtime and especially our generous reader ( Copilotco) who offered to host the Web site, taking us away from shared hosting in the process. Dedicated servers on normal Web hosts are just far too expensive for us to afford and I swear that I never made a single dime from this Web site. The ads merely covered the hosting fees which Shane has been paying since 2006.

One last clarification for lunatics who are now suggesting that we DDOSed ourselves, where to even begin refuting such nonsense (coupled with personal abuse)?

The attacks came from many addresses, for example 88.198.60.8 which is “tor-proxy.va6.de”. Multiple such IPs hit us constantly and relentlessly (all tor exit nodes at first). At one stage it seemed like the front page alone received 3 page requests per second. But the IPs were also doing a HEAD on the Web site as many times as possible, bringing the server down to its knees (both the old server and new server, the former running Red Hat and the latter CentOS).

Update: Here is a report from the administrator.

I took over hosting of boycottnovell.com for Roy in the middle of the DDOS attack. I am looking at the squid log for boycottnovell.com during the DDOS. I have squid caching/proxying/url-rewriting for apache for various reasons.

The attack initially (or at least, at the time the DNS was re-pointed to my server) consisted of lots of HEAD requests. Then I wrote up a script to tail the log finding anyone doing lots of HEAD requests and putting the offending IP into the iptables packet filter while I cooked up a more permanent solution. Eventually they figured this out and switched to a full on GET of the root of the site and then I think they started getting random pages from the site as fast as they could although I’m not sure about that.

The interesting part starts around timestamp 1242543590.804 which is apparently when most of the world’s DNS cut over to me including that of the machines in whatever bot net was employed in the attack.

If we run this command on the logfile with the logfile being /tmp/bn.log:


grep " HEAD http://boycottnovell.com/ " /tmp/bn.log | awk
'{print $3}' | sort | uniq -c |sort -n | tail -10

we get:

   2716 81.175.61.4
   2960 212.24.147.228
   3056 204.209.56.56
   5637 87.236.199.73
   6645 145.100.100.190
   7261 212.42.236.140
   8487 88.198.14.120
   9640 62.141.58.13
  11008 87.118.104.203
  11269 88.198.60.8

and if we do:


grep " GET http://boycottnovell.com/ " /tmp/bn.log |
awk '{print $3}' | sort | uniq -c |sort -n|tail -10

we get:


   5801 94.136.16.242
   5854 85.25.152.185
   5865 212.24.147.228
   6367 66.35.1.170
   6682 205.209.142.210
   6977 87.118.104.203
   8102 83.140.125.188
   8300 85.25.145.98
   8441 212.42.236.140
  20065 66.230.230.230

So one IP did a get of the root of the site 20k times before I really effectively got everything blocked off and another did a HEAD around 11k times. You can get a feel for how the attack progressed using:


egrep ' GET http://boycottnovell.com/ | HEAD
http://boycottnovell.com/ ' /tmp/bn.log | less

Assuming that everyone who did a GET or a HEAD more than 100 times (a conservative estimate) is involved in the attack:


egrep ' GET http://boycottnovell.com/ | HEAD http://boycottnovell.com/ '
/tmp/bn.log | awk '{print $3}' | sort | uniq -c| sort -n > /tmp/attackers

and then counting only the lines with greater than 100 hits we can see that there were 281 unique IP addresses involved in the attack.

However, it looks like they switched to targeting various different parts of the site later on or maybe just random pages because if we look at all of the accesses to the site which made more than 100 requests we get 863 IPs involved the top 19 being the following:


   6193 62.141.53.224
   7153 85.25.151.22
   7764 145.100.100.190
   8524 66.35.1.170
   8757 94.136.16.242
   9256 85.25.152.185
  10369 83.140.125.188
  10464 212.24.147.228
  10874 205.209.142.210
  10935 87.236.199.73
  11441 88.198.14.120
  12094 62.141.58.13
  12208 88.198.60.8
  12994 66.249.70.134
  13940 85.25.145.98
  19119 212.42.236.140
  19867 87.118.104.203
  26480 216.105.40.113
  29854 66.230.230.230

So 66.230.230.230 made 29k requests to the site in total.

Putting some iptables rules in place (which I document here):

http://www.kernel-panic.org/pipermail/kplug-list/2009-May/108075.html

nicely cut the problem down to size and now the effect of the DOS is unnoticeable.

11M of gzipped log are used for this sample.

Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Reddit
  • email

Decor ᶃ Gemini Space

Below is a Web proxy. We recommend getting a Gemini client/browser.

Black/white/grey bullet button This post is also available in Gemini over at this address (requires a Gemini client/browser to open).

Decor ✐ Cross-references

Black/white/grey bullet button Pages that cross-reference this one, if any exist, are listed below or will be listed below over time.

Decor ▢ Respond and Discuss

Black/white/grey bullet button If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

4 Comments

  1. Test said,

    May 20, 2009 at 7:09 am

    Gravatar

    site is super zippy fast now !

    great work team !

  2. aeshna23 said,

    May 20, 2009 at 8:48 pm

    Gravatar

    It’s sad that some people are so afraid of the ideas on this website that they resort to such tactics.

    I do have one suggestion, if this happens in the future. Don’t put long, technical explanations in the main post. You could put a link to a page with the long, technical explanation. The long, technical explanation dilutes the moral indignation about our opponents tactics. I know that what I’m saying is a rhetorical change, but rhetoric really matters here.

  3. Shane Coyle said,

    May 21, 2009 at 7:53 pm

    Gravatar

    Actually, according to Google, I am still receiving hits and clicks from BN for Adsense. I guess when you copied over the site you left in the publisher id for my account.

    Roy Schestowitz Reply:

    Shane,

    Yes, I am still speaking to Tracy to figure out how we shall work this out. I moved all three domains to his DNS namehost and we will probably use the adverts to pay him for all he has done to save us, not to mention hosting. Last night we moved to account to a VM (to limit the damage of future attacks).

DecorWhat Else is New


  1. Links 20/03/2023: Amazon Linux 2023 and Linux Kernel 6.3 RC3

    Links for the day



  2. IRC Proceedings: Sunday, March 19, 2023

    IRC logs for Sunday, March 19, 2023



  3. An Update on Sirius 'Open Source' Pensiongate: It's Looking Worse Than Ever

    It's starting to look more and more like pension providers in the UK, including some very major and large ones, are aiding criminals who steal money from their workers under the guise of "pensions"



  4. Services and Users TRApped in Telescreen-Running Apps

    TRApp, term that lends its name to this article, is short for "Telescreen-Running App". It sounds just like "trap". Any similarity is not purely coincidental.



  5. Links 19/03/2023: Release of Libreboot 20230319 and NATO Expanding

    Links for the day



  6. Great Things Brewing

    We've been very busy behind the scenes this past week; we expect some good publications ahead



  7. Links 19/03/2023: LLVM 16.0.0 and EasyOS Kirkstone 5.1 Releases

    Links for the day



  8. IRC Proceedings: Saturday, March 18, 2023

    IRC logs for Saturday, March 18, 2023



  9. Links 18/03/2023: Many HowTos, Several New Releases

    Links for the day



  10. Links 18/03/2023: Tor Browser 12.0.4 and Politics

    Links for the day



  11. Links 18/03/2023: Docker is Deleting Free Software Organisations

    Links for the day



  12. IRC Proceedings: Friday, March 17, 2023

    IRC logs for Friday, March 17, 2023



  13. New Talk: Richard Stallman Explains His Problem With Rust (Trademark Restrictions), Openwashing (Including Linux Kernel), Machine Learning, and the JavaScript Trap

    Richard Stallman's talk is now available above (skip to 18:20 to get to the talk; the volume was improved over time, corrected at the sender's end)



  14. Links 17/03/2023: CentOS Newsletter and News About 'Mr. UNIX' Ken Thompson Hopping on GNU/Linux

    Links for the day



  15. The European Patent Office's Central Staff Committee Explains the Situation at the EPO to the 'Yes Men' of António Campinos (Who is Stacking All the Panels)

    The EPO’s management is lying to staff (even right to their faces!) and it is actively obstructing attempts to step back into compliance with the law; elected staff representatives have produced detailed documents that explain the nature of some of the problems they’re facing



  16. Links 17/03/2023: Linux 6.2.7 and LibreSSL 3.7.1 Released

    Links for the day



  17. GNU/Linux in Honduras: 10% Market Share? (Updated)

    As per the latest statistics



  18. Links 17/03/2023: Update on John Deere’s Ongoing GPL Violations and PyTorch 2.0

    Links for the day



  19. IRC Proceedings: Thursday, March 16, 2023

    IRC logs for Thursday, March 16, 2023



  20. RMS: A Tour of Malicious Software, With a Typical Cell Phone as Example

    Tonight in Europe or this afternoon in America Richard M. Stallman (RMS), who turned 70 yesterday, gives a talk



  21. Skyfall for Sirius 'Open Source': A Second Pension Provider Starts to Investigate Serious (Sirius) Abuses

    Further to yesterday's update on Sirius ‘Open Source’ and its “Pensiongate” we can gladly report some progress following escalation to management; this is about tech and “Open Source” employees facing abuse at work, even subjected to crimes



  22. NOW: Pensions Lying, Obstructing and Gaslighting Clients After Months of Lies, Delays, and Cover-up (Amid Pension Fraud)

    The “Pensiongate” of Sirius ‘Open Source’ (the company which embezzled/robbed many workers for years) helps reveal the awful state of British pension providers, which are in effect enabling the embezzlement to carry on while lying to their clients



  23. Links 16/03/2023: War Escalations and More

    Links for the day



  24. Links 16/03/2023: OpenSSH 9.3 Released and WordPress 6.2 Release Candidate 2, Lapdock News

    Links for the day



  25. IRC Proceedings: Wednesday, March 15, 2023

    IRC logs for Wednesday, March 15, 2023



  26. Links 16/03/2023: OpenSSL 3.1 Released, 10,000 More Staff Cut in Facebook, and Windows Loses 10% in Speed

    Links for the day



  27. Links 15/03/2023: Transmission 4.0.2 and Lots in Geminispace

    Links for the day



  28. Links 15/03/2023: Qubes OS 4.1.2, Mozilla Swallows Buzzwords

    Links for the day



  29. Founder of the Free Software Movement, Richard Stallman, Turns 70

    In some parts of the world it is already the 16th of the month; that’s the 70th birthday of Richard Stallman



  30. Links 15/03/2023: DietPi 8.15 and digiKam 7.10.0

    Links for the day


RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

Recent Posts