Project 1999

Go Back   Project 1999 > Blue Community > Blue Server Chat

Closed Thread
 
Thread Tools Display Modes
  #1  
Old 07-19-2013, 11:13 AM
azxten azxten is offline
Fire Giant

azxten's Avatar

Join Date: May 2010
Posts: 757
Default

Its pretty simple really. There is some volume of traffic directed at the server. Some percentage of this is malicious DDOS attack traffic.

Can that malicious traffic be differentiated from legitimate traffic?

If yes, then it can be filtered out. However, filtering takes CPU cycles and more complex rules typically require more cycles.

Where do we do the filtering? Options are on the server ($) or on an upstream router ($$) or security appliance ($$$). Doing it on your own server is cheap but its also a bit too late because now the server is handling the packet filtering thus overloading itself. Doing it on an upstream router is more expensive because XYZ data center has to maintain the rules for you but moves the load off the server. Doing it on a security appliance is most expensive because they cost to buy but is most effective due to being purpose built.

If no, then all of that traffic needs to hit the server and the server needs to keep up. ($$$$)

This typically means bringing in a load balancer and shifting to a multi-server architecture which typically means the server software will require adjustments to run properly since this is all custom code. ($$$$$)

I'm guessing the server is at the point where the attack is being mitigated on an upstream router/security appliance but its dynamic enough in nature that it can still cause outages until the firewall adjusts to the new sources.
Last edited by azxten; 07-19-2013 at 11:15 AM..
  #2  
Old 07-19-2013, 01:51 AM
spoils spoils is offline
Sarnak


Join Date: May 2013
Posts: 348
Default

Yea ***** don't u know dem shitz?
  #3  
Old 07-19-2013, 02:07 AM
Lopretni Lopretni is offline
Kobold

Lopretni's Avatar

Join Date: Jun 2011
Posts: 197
Default

Maximius, can you gather anything from the image Tiggles posted in another thread?
https://www.project1999.org/forums/s...9&postcount=54
__________________
Burning with Revenge
In Outer Heaven...
Men become Demons
  #4  
Old 07-19-2013, 10:45 AM
azxten azxten is offline
Fire Giant

azxten's Avatar

Join Date: May 2010
Posts: 757
Default

There are only two ways to mitigate a DDOS. Expensive hardware (both on the network and server side) and well written firewall rules.

If I had to guess I would say that the firewall rules are already fine and this is purely a matter of money. P99 is already hosted by a company that offers DDOS mitigation. However, as with all things, you get what you pay for. It's likely that if the P99 staff payed out another $5k-$10k a month the attack would be fully mitigated.

What we have right now is the best performance we can get with the resources available.

It would be interesting to see a packet capture from the server side though if any sensitive information could be stripped.
Last edited by azxten; 07-19-2013 at 10:47 AM..
  #5  
Old 07-19-2013, 10:54 AM
Nirgon Nirgon is offline
Banned


Join Date: Jun 2011
Location: Ruins of Old Paineel
Posts: 14,480
Default

Donate button to save your beloved project

Time to have a bake sale or some shit

Need to know if having a bake sale and hitting the donate button is considered RMT first
  #6  
Old 07-19-2013, 11:20 AM
Nirgon Nirgon is offline
Banned


Join Date: Jun 2011
Location: Ruins of Old Paineel
Posts: 14,480
Default

Is this ICMP or what?

I know the server is being DDoS'd but we know nothing of the nature of the attack.

Going jihad on Kegz and pissing him off (if its not him) is just going to add more problems.
  #7  
Old 07-19-2013, 11:28 AM
azxten azxten is offline
Fire Giant

azxten's Avatar

Join Date: May 2010
Posts: 757
Default

I'd be interested to see a packet capture as well or hear something from staff.

Considering the amount of trouble this has caused I imagine this is something more custom built which mimics legitimate traffic. Login server login attempts or something like that.

Then I would guess there is a firewall rule which watches for X packets per Y time to the server which is considered abnormal and blacklists the IP for some period of time.

So, every time there is a lag spike its when the attack starts from a new collection of IPs which must be allowed access for a period of time to determine if they are malicious or not.

This is all just a rough guess but hopefully it provides some insight into how these things work for those who are curious.
  #8  
Old 07-19-2013, 12:07 PM
rickjames rickjames is offline
Large Bat


Join Date: Jul 2013
Posts: 11
Default

There are two potential effects:

A) There is a socket connection and the server is requested to perform some sort of task (i.e. login) This taxes the servers process resources.

B) Its mostly dropped trash traffic (ICMP flood etc.) and overwhelms network equipment.


Scenario B is mitigated by over-provisioning bandwidth usually. Scenario A is much more difficult to respond to unless a solution is developed to trust connections sources and therefore drop packets before they reach the server.

Regardless, to fix the problem by throwing money at it is unlikely to be very efficient or effective.

Now one potential theory I had (im a receptionist at an IT firm too) is that they may be abusing socket connections to the webserver (spam HTTP requests) as it seems the website goes down (colocated/same box/same VM) with the game server. If someone would be able to confirm or refute this, i would be willing to pony up a little cash to help get the website/forums hosted on a separate instance to mitigate that vulnerability.
  #9  
Old 07-19-2013, 01:10 PM
MaximiusM MaximiusM is offline
Banned


Join Date: Feb 2013
Posts: 52
Default

Quote:
Originally Posted by rickjames [You must be logged in to view images. Log in or Register.]
Now one potential theory I had (im a receptionist at an IT firm too) is that they may be abusing socket connections to the webserver (spam HTTP requests) as it seems the website goes down (colocated/same box/same VM) with the game server. If someone would be able to confirm or refute this, i would be willing to pony up a little cash to help get the website/forums hosted on a separate instance to mitigate that vulnerability.
you've essentially come to the same conclusion as me, fellow internet receptionist. PM'ing with details.
  #10  
Old 07-19-2013, 05:48 PM
August August is offline
Fire Giant


Join Date: Sep 2010
Posts: 703
Default

If I can help in any way let me know. I have a background in cryptography and filter analysis and have been in software for 7 years.

More importantly, if you need to find out how to do something, I can find that out almost assuredly. I'm not an expert in cyber security, however.
Closed Thread


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


All times are GMT -4. The time now is 03:18 PM.


Everquest is a registered trademark of Daybreak Game Company LLC.
Project 1999 is not associated or affiliated in any way with Daybreak Game Company LLC.
Powered by vBulletin®
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.