October 28, 2003
Here we go again
(Category:
Other People's Stuff
)
The Instapundit has pointed out what looks to be another DOS attack on Internet Haganah for Thursday. After using the handy dandy Arabic to English translator at Ectaco I must say that I agree with him. Loosely translated, the message says that 7PM on Thursday, October 30 is a favorable time for anybody who is available. It then gives details for Internet Haganah and their IP on all of their mirror sites.
So expect all of the Hosting Matters sites to go down around 7PM (time zone would be helpful) on Thursday.
UPDATE: From the comments comes good news for many blogs from Aaron at Internet Haganah -
Haganah is no longer hosted at HostingMatters. Trust me, I know, I'm the Director of Internet Haganah. HostingMatters ' network is not on the target list.
Posted by Jim | Permalink
TrackBacks
TrackBack URL for this entry: http://blog2.mu.nu/cgi/trackback.cgi/5354
Irreconcilable Musings linked in Go to Yellow Alert - Shields up! on October 28, 2003 03:13 PM
Irreconcilable Musings linked in Go to Yellow Alert - Shields up! on October 28, 2003 03:18 PM
lingosphere daily linked in more DDOSes this week? on October 28, 2003 08:53 PM
Wizbang linked in New DDOS Attacks? on October 29, 2003 12:07 AM
I think that is CMT...
Central Moron Time.
Haganah is no longer hosted at HostingMatters. Trust me, I know, I'm the Director of Internet Haganah. HostingMatters ' network is not on the target list.
Good lucki Aaron. (Is there some kind of poison pill code you can insert that blows up in their faces when they contact your site?)
Not really. The DoS attacks they use to bring down his site are not sent to him, but rather to computers that don't check for forged source addresses and don't bother to trace anything back (and often don't even bother keeping activity logs). The DoS packets have HostingMatters servers as their source IP addresses, and were designed to make the "sucker" computers think they were receiving constant misshapen ping traffic from HostingMatters, to which they would respond with SYN packets... enough to clog the network and take HostingMatters offline.
The perpetrators could only be determined by convincing the "sucker" servers to share their system logs from during the attack, something they are loath to do... not only because most of the admins don't even know how to log their server traffic, but the few that do are too prideful to admit that their server was used to assist a DoS attack.
Apparently you have to join the group to read the message. Any chance you might post the message here?
Crap. Looks like they closed the group. It was open when I looked at it.
well, now that he's at a new host, not sure if this is going to pan out today. but the mirrors might have a problem since they were named in the group, before it was closed.
"The DoS attacks they use to bring down his site are not sent to him, but rather to computers that don't check for forged source addresses and don't bother to trace anything back (and often don't even bother keeping activity logs). The DoS packets have HostingMatters servers as their source IP addresses, and were designed to make the "sucker" computers think they were receiving constant misshapen ping traffic from HostingMatters, to which they would respond with SYN packets... enough to clog the network and take HostingMatters offline."
This is an entirely incorrect assessment of the technical details behind not only the original DDoS attack, but the manner in which such attacks work. There was *no* ping traffic originating *from* our network to any destination - that would make us the attacker and not the host of the target. The linked message (prior to the group being closed) had no sites or IPs listed that were within our network, and quite clearly we suffered no issues related to the proposed attacks in that message.
Annette,
Tatterdemalian may not have been describing a classic DDOS attack or the type of attack that was implemented on HostingMatters. What he is describing is what is referred to as a Reflected Denial Of Service. You can forge an IP header and put the sender address as HostingMatters, then send the packet to Google or Yahoo or wherever. The server will respond to the sender (multiple times) with a SYN packet or even a NAK.
www.grc.com is a good place to learn about how this kind of thing works. I'm not an expert (by any stretch), but everythign I know I learned there!
Timberland Sale
Timberland Outlets
Timberland Work Boot
Timberland Boot
Timberland shoes