ripberge 6 hours ago

Huh, I got attacked from 170 countries last year (HTTP) and Cloudflare's autonomous detection (machine learning powered) rules did almost nothing. It was millions of the same requests over and over and the only thing that we could do to stop it was manually put in rules to block routes. Not only that, some of the attacking traffic came from within Cloudflare workers or it was at least going through their WARP client (those details are now fuzzy). Was a pretty miserable failure to perform on their part.

  • pacalleri an hour ago

    Similar experience last week. But tbh I'm using the free plan so I wasn't expecting too much from them. What it worked was to use nginx rate limiter aggressively, parse logs and deny top ips with nginx. Because all traffic comes through CF I wasn't able to use iptables for blocking

    • hombre_fatal 4 minutes ago

      If you can thwart it with your own nginx, then it can’t be much of an attack. Cloudflare is one of your only hopes against a volumetric attack especially when paying $0.

    • reassess_blind 18 minutes ago

      Cloudflare’s has a free rate limit feature, btw. Not as configurable as nginx but it’s nice to not have the requests touch your server at all.

jakub_g 13 hours ago

> QOTD DDoS attack

> How it works: Abuses the Quote of the Day (QOTD) Protocol, which listens on UDP port 17 and responds with a short quote or message.

Does any reasonable operating system those days support this protocol? Sounds like "IP over Avian Carriers" to me.

  • viraptor 12 hours ago

    Support - yes. Turn on without a bit of hassle - no. I'm not sure how they found that many active services. Honestly, at that small percentage I suspect misclassification instead.

    • Eridrus 11 hours ago

      Yeah, I think this is misclassification based on UDP port.

      If you take their random source ports (21,925), ~0.004% come from any single port, which lines up with what they said was "Other" traffic. The numbers don't quite work out right, but it seems like its within a factor of 2, so I wouldn't be surprised if it was something like udp source/dest port = 17 => QOTD.

  • unilynx 13 hours ago

    They're not an April fool's joke. A 90's linux might have these services enabled by default. I assume they were built to make network debugging slightly less boring

  • NoboruWataya 13 hours ago

    Huh, this sounds kind of cool, I like the idea of there being a few QOTD servers dotted around the internet. Shame that the first I'm heading about it is it being abused to launch a DDOS.

    • msgodel 12 hours ago

      You can always ssh to random hosts and read the netbanners.

      Of course nearly all of them are a long paragraph or two of legal jargon that more or less boils down to "fuck off."

      • coolcoder613 5 hours ago

        While not a random server in the internet, here is the start of the ssh banner on my router (before the legal "fuck off")

          _______              __           __              __
         |_     _|.-----.----.|  |--.-----.|__|.----.-----.|  |.-----.----.
           |   |  |  -__|  __||     |     ||  ||  __|  _  ||  ||  _  |   _|
           |___|  |_____|____||__|__|__|__||__||____|_____||__||_____|__|
                         N E X T   G E N E R A T I O N   G A T E W A Y
         --------------------------------------------------------------------
         NG GATEWAY SIGNATURE DRINK
         --------------------------------------------------------------------
          * 1 oz Vodka          Pour all ingredients into mixing
          * 1 oz Triple Sec     tin with ice, strain into glass.
          * 1 oz Orange juice
         --------------------------------------------------------------------
        • Gormo 3 hours ago

          Including a cocktail recipe in the login banner has been a signature of OpenWRT for a long time. Looks like Technicolor came up with their own recipe for their OpenWRT distribution.

          • dikei an hour ago

            OpenWRT stopped doing this 10 years ago, as it was too much hassle to pick a drink that satisfy everyone.

      • Retr0id 10 hours ago

        SSH banners come over TCP, requiring the 3-way handshake first, meaning you can't use it for traffic reflection (beyond the SYN-ACK itself).

        • msgodel 10 hours ago

          Right, in general unless you're going to put a lot of care into the state machine to deal with network congestion/abuse it's better to stick with TCP.

          • johncolanduoni 6 hours ago

            I was glad to see QUIC did a pretty good job of limiting its usefulness for reflection attacks. Hopefully we’ll see more uses of UDP move to it

  • tedunangst 9 hours ago

    I ran a qotd server for a while, only retired two months ago actually. It wasn't very popular.

    • Aachen 5 hours ago

      Did you have some sort of rate limiting on it?

  • zzo38computer 8 hours ago

    QOTD can also be used with TCP, which avoids a problem that it has if it is being used with UDP.

  • toast0 13 hours ago

    Is it part of Microsoft Services for Unix? That seemed to be the primary source of chargen reflectors when I was getting hit by that; and it feels like a similar thing.

  • immibis 5 hours ago

    A lot of security is just making stuff up to sound smart, since the clients aren't very technical. Someone saw packets on port 17 and looked up port 17 and decided that meant the QOTD service was involved in the attack. Probably.

dangoodmanUT 5 hours ago

It almost feels like writing about this is exactly what the attacker wants: Free validation and advertisement for exactly what their botnet can do

  • creatonez 5 hours ago

    Is this a sign that

    A: Cloudflare is feeding the trolls because they think that they are invincible. Or: These post-mortems don't establish any proof that the attack was successful, especially if they are covering DDoSes that were barely even noticed by the public until CF publishes a blog post 1 month later -- so it's actually embarrassing for them and hurts their ability to market botnets for rent, at least once they no longer have the literal world record.

    B: Cloudflare is feeding the trolls for free testing scenarios to improve the mitigation

    C: The trolls don't really care if you feed them, large DDoS is something that's happening all the time anyways

password4321 4 days ago

← Inserting standard complaint about Cloudflare protecting the sites selling these DDoS attacks here (at best: a conflict of interest selling the cure while protecting the disease).

losthobbies 14 hours ago

Dodgy IoT devices will be the end of us all.

  • bearjaws 14 hours ago

    It's wild to think with the proliferation of 1gbps fiber internet, even a modern pi board or old desktop is a potential 1gbps bot host.

    • franga2000 9 hours ago

      When your IP is found to have been part of a botnet, I think ISPs should just limit you to like 20Mbps for at least a year, so you think twice about buying that 10$ wifi baby monitor next time.

      • bogdan 8 hours ago

        That's quite harsh. Good thing you're not in charge of making decisions.

        • mschuster91 5 hours ago

          When you get caught speeding on the road or being a nuisance otherwise you can and will get punished by the courts, including temporary restrictions on your driver license. When you money mule for others, even if you don't know that you actually fell victim to a scam, you get punished as well. When you litter in Singapore, you can get ordered to work community service.

          I see no issue in handing out similar punishments in the digital space. The Internet is a shared medium, everyone who connects to it has a responsibility to not be a nuisance to others.

          • xwolfi 3 hours ago

            On the road you could have killed someone. Your 20$ baby monitor bought from an authorized store you know... whatever happens, it's not gonna kill anyone very directly ...

            The main ingredient of crime is intent, whatever you say. A smaller ingredient can be recklessness, but maybe it's the ISPs sending all those millions of empty packets to a single server that should start feeling some heat ?

      • NoMoreNicksLeft 6 hours ago

        If that could make people think about it, I'd be all for it. But the people buying that junk are absolutely clueless, and would remain so even after the punishment was well-underway.

        • philipallstar 2 hours ago

          Obviously they are - everyone's clueless about everything except the one thing they know about. I imagine for the clothes you're wearing you're clueless about the conditions of the people who made them.

      • hooverd 8 hours ago

        Thanks to CGNAT you, obviously an upstanding digital citizen, will also have to pay for your neighbor purchasing an IoT toaster.

        • BenjiWiebe 6 hours ago

          Your ISP can tell you apart from your neighbor since they are the ones doing the CGNAT.

        • ycombinatrix 4 hours ago

          That doesn't make any sense. Who do you think is doing the CGNAT?

pariainterpares 11 hours ago

Any proof that this happened except cloudflare claiming it did? Just wondering whether these kind of attacks are seen by other orgs.

sparrish 4 days ago

Anybody know who the "Cloudflare customer, a hosting provider" was and what IP they were targeting and why? I'm curious why someone would go to such great lengths to try to take down a service.

  • toast0 4 days ago

    The article says it was a 45 second attack. I used to run a high profile website which used to get a lot of 90 second attacks. Best I could figure was some of the ddos as a services would give a short attack as a free sample, and people picked us cause we were high profile. Thankfully, these would almost always attack our website rather than our service, and availability for our website didn't really matter. Most of the attacks weren't a big deal, and they'd get bored and move on to something else. The ones that did take a web server down were kind of nice... I could use those to tune both the webservers and the servers doing real work.

  • porkloin 9 hours ago

    I don't know who the provider is, but the attack was almost certainly not targeting the provider, but a site hosted on their platform. Many hosting companies upsell their customers into stuff like providing Cloudflare DDoS prevention. The target site was probably something political or controversial. I work at a hosting provider and we deal with this type of thing constantly.

    • overfeed 8 hours ago

      > The target site was probably something political or controversial.

      Since this is Cloudflare, my headcanon is that it was a rival DDOS service, after a wild flamewar on some .ru hacker forum.

londons_explore 14 hours ago

A DDoS gets some fraction of the entire internet to attack a single host.

As the internet gets more users and more devices connected, the ratio of DDoS volume to a single connections volume will only get larger.

Is there any kind of solution?

  • toast0 13 hours ago

    > As the internet gets more users and more devices connected, the ratio of DDoS volume to a single connections volume will only get larger.

    I'm not sure if that's the case. Large volumetric DDoS records have been increasing, but connection bandwidths have also been increasing.

    7 tbps is a lot of traffic, but it only takes 7,000 nodes with 1G symetric connections to do it. Botnet sizes don't seem to be getting that much bigger.

    The basic solution to volumetric DDoS is to get a bigger pipe; this works, kind of, but it's hard to get 7 Tbps of downstream capacity, and you need to be careful that you don't become a 7 Tbps reflector.

    The more scalable way is using BGP to drop traffic before it gets to you. Depending on your relationship with your hosting facility and their ISPs or your ISPs, it's often pretty easy to get packet to a given IP dropped one network before yours. Ocassionally, those blocks could propagate, and things like BGP Flow Spec promise more specific filtering... dropping all packets to an attacked IP mitigages the attack for the rest of the IPs on the path, but dropping all UDP to an attacked IP might get all the attack traffic and let most non-attack traffic through... More specific rules are possible if you wanted to try to let DNS and HTTP/3 survive while being attacked.

    To work against a 45 second attack, BGP based measures need a lot of automation.

    • dale_huevo 11 hours ago

      You don't think the proliferation of inexpensive dogshit IoT products from the Far East, running already-10-years-out-of-date versions of Linux (bonus if it has a hidden Telnet daemon with hardcoded root password!), hooked to ever-expanding 1Gbps residential fibre lines, has anything to do with it?

      This represents like 75% of surveillance camera systems out there btw.

      • toast0 11 hours ago

        I think the increase in 1G residential connections is a bigger factor than the IoShit products. I don't think botnet node counts are getting that much bigger, but the amount of garbage each one can push certainly is.

  • alyandon 14 hours ago

    Not a 100% solution but would help greatly if ISPs:

    1) performed egress filtering to prevent spoofing arbitrary source addresses

    2) temporarily shut off customers that are sending a large volume of malicious traffic

    • alberth 14 hours ago

      > sending a large volume of malicious traffic

      How would an ISP determine egress is malicious? Genuinely curious.

      • stackskipton 13 hours ago

        One simple way to do it is configure the customers routers to drop/reject all UDP/TCP packets where SRC address does not match Private IP/WAN Assigned Public IP.

        • __turbobrew__ 13 hours ago

          I cannot believe this is still not commonly done. I remember discussing this with some people in the industry over ten years ago and the sentiment was “if ISPs just stopped IP spoofing that would solve most problems”.

          • bombcar 12 hours ago

            It would solve a ton of other people’s problems, but cause a few for you, so it won’t be done until required by law.

            E.g., customer does something stupid with addresses but the “wrong address” is something they control on another network, so it works. Egress filtering breaks it, support call and crying.

        • Y_Y 13 hours ago

          The customer's router is for the customer to configure

          • __turbobrew__ 13 hours ago

            I think ideally the customers router shouldn’t be touched, but the ISP can still do packet filtering on the next hop to drop any packets which don’t have a src ip matching the assigned WAN address of the router.

            • pedrocr 11 hours ago

              Wouldn't that need a huge amount of extra hardware to do that filtering when the routers in each customer's home are mostly idle? Just setting egress filtering as the default and letting users override that if they need to for some reason should be a good outcome. The few that do change the default hopefully know what they are doing and won't end up part of a DDoS but they'll be few anyway so the impact will still be small.

              • citrin_ru 7 hours ago

                > Wouldn't that need a huge amount of extra hardware to do that filtering

                20 years ago Cisco (probably much longer) routers were able to do this without noticeable performance overhead (ip verify unicast reverse-path). I don't think modern routers are worse. Generally filtering is expensive if you need a lot of rules which is not needed here.

              • remram 9 hours ago

                The router in the customer's home cannot be trusted. With cable at least, you are able to bring in your own modem and router. Even if not, swapping it is easy, you just have to clone the original modem's MAC. In practice this is probably quite common to save money if nothing else (cable box rental is $10+/mo).

                Note that spoofing source IPs is only needed by the attacker in an amplification attack, not for the amplyfing devices and not for a "direct" botnet DDOS.

                • SoftTalker 8 hours ago

                  I would in fact guess that it's not common at all. Setting up your own cable modem and router is going to be intimidating for the average consumer, and the ISP's answer to any problems is going to be "use our box instead" and they don't want to be on their own that way. I don't know anyone outside of people who work in IT who runs their own home router, and even many of them just prefer to let the ISP take care of it.

                  • chainingsolid 7 hours ago

                    Common no, very easy to proliferate though as people become aware of the savings possible. And the 2 cases I've seen where litteraly order the same model online and swap it, no configuring required. And it wasn't even the family tech support guy(me) who came up with the idea. The ISPs incuding the router as a monthly line item on the bill are litteraly indirectly asking you to do this.

                    • SoftTalker 7 hours ago

                      Comcast/Xfinity in fact gives me a discount for using their router. Probably because (a) it lowers their support burden and (b) they are logging and selling my web traffic or at least DNS lookups.

                      • remram an hour ago

                        That's surprising to me, it was when I used Comcast (2016) that I first purchased a cable modem. It did save me money.

                  • __turbobrew__ 7 hours ago

                    I think it is less common now, but ISP routers on average used to be trash with issues — bufferbloat, memory leaks, crashes — so a number of people bought a higher end router to replace the ISP provided one. Mostly tech savvy people who were not necessarily in IT.

                    Nowadays my ISP just uses dhcp to assign the router an address so you can plug any box into it which talks ethernet and respects dhcp leases to be a router which is nice, albiet 99.9% of people probably leave the router alone.

          • rolandog 13 hours ago

            Indeed, though we're at the mercy of the tyranny of the default.

      • bityard 13 hours ago

        All large ISPs have fancy network visibility and DDoS mitigation solutions.[1] But getting them to actually USE them for problems that aren't lighting up their monitoring dashboards is another story entirely.

        (1. I know this, because I used to work for a company that made them, and the majority of worldwide ISPs were our customers.)

      • zokier 13 hours ago

        Hundreds of Gbps of UDP traffic to random ports of a single destination IP from residental (?) network should be pretty easy pattern to automatically detect and throttle.

        More advanced attacks are more tricky to detect, but plain dumb UDP flood should be easily detectable.

        • quotemstr 13 hours ago

          > Hundreds of Gbps of UDP traffic to random ports of a single destination IP from residental (?) network

          You mean my legitimate QUIC file transfer?

          • BenjiWiebe 12 hours ago

            Have you ever uploaded 100's of Gbps over QUIC from your residential connection to a single IP?

            And the aggregate across the ISP's network could in theory be monitored - so if you were uploading 1Gbps, yes, it could be legitimate. If you and 582 others were all uploading 1Gbps to the same IP at the same time, much less likely legitimate.

            • ongy 10 hours ago

              My homenet is 1GBit, so is my Internet

              I.e. no traffic beyond my legitimate saturation can reach the ISP

              I have saturated my link with quic or wireguard (logical or) plenty of times.

              The lack of any response on high data rates would be an indicator I've only tried that once and it failed gloriously due to congestion. I don't think there's many real protocols that are unidirectional without even ACKs

            • quotemstr 12 hours ago

              > Have you ever uploaded 100's of Gbps over QUIC from your residential connection to a single IP?

              Yes actually --- migration between cloud bulk storage providers.

              Edit: I misread Gbps as Mbps above.

              • zokier 12 hours ago

                Which residential ISP offers >100Gbps service?

      • alyandon 14 hours ago

        If someone is reporting malicious traffic coming from the ISP's network then an ISP should be obligated to investigate and shut off the offending customer if necessary until they've resolved the problem.

        • cyral 14 hours ago

          How would this ever work at scale? These attacks come from thousands of compromised devices usually. e.g. Someone's smart fridge with 5 year old firmware gets exploited

          • nhecker 13 hours ago

            As dijit (above this comment) has noted, this is somewhat possible and automated today.

            For example, one method has the attacked IP get completely null-routed, and the subsequent route is advertised. Upstream routers will pick up the null-route advertisement and drop the traffic ever closer to the source(s). The effect of the null route is that the attacked IP is unreachable by anyone until the null-route is lifted... so the aim of the DDoS isn't averted, but at least the flood of traffic won't pummel any network paths except for (ideally) the paths between the attacker(s) and the first router respecting the null-route. In my experience the DDoS tends to stop more quickly and shift away to other targets if the folks directing the attack can no longer reach the target (because: null-route) and then the null-route can be lifted sooner relative to a long-running DDoS that hasn't shifted away to other targets.

          • whstl 13 hours ago

            With SMTP there are services who provide a list of malicious servers so that they can be blocked at the receiving end.

            I wonder if this would work in reverse, having a standardised, automated protocol that allow providers like Cloudflare to notify upstream networks of attacks in real time, so malicious traffic can be blocked closer to the source.

            Genuinely curious, I'm not an expert in low-level networking ops.

          • viraptor 12 hours ago

            Your ISP likely knows you're part of a botnet quite early. For example many of them use magic domains as either shutoff switches or CC endpoints, so could be detected. But when was the last time anyone's ISP ever told them "hey one of your hosts is infected"?

          • alyandon 14 hours ago

            I don't have a specific answer for that but it is really a problem that residential ISPs are going to have to solve now that gigabit or faster symmetric internet connections are becoming the norm.

          • mschuster91 5 hours ago

            > How would this ever work at scale?

            We pay internet providers healthy amounts of money each month. Surely they can afford to hire some staff to monitor the abuse mailbox and react on it - we know they can when the MAFIAA comes knocking for copyright violations, because if they don't comply they might end up getting held liable for infractions.

    • dijit 14 hours ago

      Largely they do these things, it’s just not completely automatic.

  • franga2000 9 hours ago

    Banks have already figured out fraud detection through pattern recognition, ISPs can do the same. When a connection has never used more than 300/10 of a 1000/1000 link and 80% of that was TCP with dstport 80 or 443, then it starts doing /900 UDP to every possible dstport, maybe something is wrong?

    "Your network is generating an extraordinary amout of traffic, which is likely the result of a virus-infected device. As a result, we have lowered your speed to 100/20. Please read the steps to check your devices and unlock your connection here: ____"

    • overfeed 8 hours ago

      IoS botnets depend on total number of devices and not individual bandwidth. Most IoT devices have cheap network chipsets and unoptimized networking stacks, I wouldn't expect them to saturate a 100mbps connection.

    • orlp 3 hours ago

      Economic fraud detection is like trying to find a needle in a haystack.

      Blocking DDoS is like trying to separate the shit from the bread in a shit sandwich.

      It's a completely different problem.

    • itake 9 hours ago

      Banks have way lower traffic and slower reaction times than what cf needs to support.

      Lowering the speed means "good" traffic is also impacted, resulting in higher timeouts.

      count the number of events isn't cheap either.

    • xyst 5 hours ago

      So many false positives can happen here.

      Most ISPs are already a pain in the ass to deal with. (Fuck you Charter/Spectrum). I don’t trust them to do their due diligence and implement this correctly. Or worse, abuse it.

      “hey you pay for 1000/300 package. We detected abnormal traffic. Now you get throttled to 100/100. But still pay 1000/30”. Then they will drag on the resolution process until you give up.

  • sybercecurity 14 hours ago

    Apparently no solution that has gained traction, and no single solution that works everywhere. Source address filtering (BCP 38) got us part of the way, but it's difficult/undesired to do in data centers.

    IoT devices (speculated to be used here) would have to have a solution upstream. Things like MUD (RFC 8520) have been proposed, but have problems too - developers need to be able to list all communications of their device and make that available somehow (MUD profile server). Some consumers will never do it on their own, and may want to prevent alerting a device manufacturer they have a device (think connected adult toy...).

    Also given that IoT devices may never be updated by their owners, expect to see IoT botnet DoS attacks for years.

  • ByThyGrace 13 hours ago

    Consumer home/office routers provide their clients IP connectivity without reserve. Why is that the case?

    The default is to allow all available bandwidth, which presumably should be the case from ISP to consumer (most likely a paid-for service), but why should that be the default at consumer router <-> IoT? What need has your printer for 500Mbps outgoing? Or my fancy toothbrush?

    • ryandrake 13 hours ago

      Residential ISPs need to better police abuse of the network and they need to better respond to reports of abuse by cutting off the abusive, botnet-infected users. Of course, until there is a financial or regulatory incentive to cut off these customers, they won’t.

    • shermantanktop 13 hours ago

      Is there any method for a connected device to advertise the required throughput? Maybe some SNMP thing? That’s the only way this would work I think.

      • BenjiWiebe 12 hours ago

        You would want the advertised speed to be approved by the user at the time of setup.

        If it was automatically accepted, the malware would just change the advertisement.

  • pfdietz 13 hours ago

    Locate and brick IoT devices with vulnerabilities?

    • lofaszvanitt 7 hours ago

      Good idea. People only learn that something is wrong, when... they don't have internet anymore ;D.

  • resource_waste 14 hours ago

    Capachas?

    Sorry for the worst and most hated possible solution, but I thought I'd at least mention it.

    Maybe too many failed capachas causes you to not connect to the IP for an hour.

    • tliltocatl 14 hours ago

      How would you expect capachas to help against UDP flood? The attack works by oversaturating the network channel. Capachas is a (terribly bad) solution to prevent the server from spending CPU and transmit bandwidth on garbage request, but these wouldn't do anything if the server have too much packets receive in the first place.

  • blueflow 14 hours ago

    Make people pay per traffic.

    • loloquwowndueo 13 hours ago

      We already do. Attackers use stolen capacity.

      • blueflow 13 hours ago

        But why doesn't the market do the market thing, then?

        • viraptor 12 hours ago

          For each separate endpoint the impact is minimal. Being part of the attack would cost you an extra $1 and you wouldn't even notice. On the other hand, ensuring the metering works correctly, reporting to the billing system works, invoicing it properly, providing support, etc. likely costs more per-customer.

yamapikarya 2 hours ago

i just depends on waf, as long as the ddos attack does not reach my server. is that ok?

slt2021 10 hours ago

L4 level ddos is useless and is easily protected by Cloudflare.

App level DOS use Cloudflare evasion techniques and directly DOS the destination server, while keeping itself undetected by Cloudflare's systems.

Do not assume that Cloudflare will protect you from all attacks, if your app is dogshit python/js/php then even cloudflare wont protect you from L7 DDOS

knowitnone 6 hours ago

Should Cloudflare release the IPs and try to get those devices removed from the internet?

  • _alternator_ 5 hours ago

    That would just be a target list for hackers. Most of the devices that take part are going to be in homes or SMBs with old firmware that’s subject to known vulnerabilities. They will give the list to AS operators who request the offending IPs (presumably restricted to the AS ranges) but dropping it out on the public internet just invites trouble.

  • mschuster91 5 hours ago

    They could but it's whack-a-mole and most ISPs just route abuse reports straight to /dev/null.

    IMHO, ISPs caught in that act should get yanked off the internet.

candiddevmike 4 days ago

What does this botnet do when it's not performing a 7.3 Tbps DDoS? Yea it's probably regular folks computers, but what "wakes up" the botnet to attack? What makes an attack target worthwhile? Presumably something this large would be on someone's radar...

  • jamessinghal 4 days ago

    The Command-and-Control part of the botnet would be whatever component they build to instruct it to attack; often using some dummy website they register and have the compromised clients poll for changes with instructions.

    I think an increasing amount of them are state actors or groups offering the botnet as a service.

  • rasz 4 days ago

    >What does this botnet do when it's not performing a 7.3 Tbps DDoS?

    Living their best "Im a retail Asus router/iot from Amazon" life.

  • toast0 4 days ago

    I mean... 7 Tbps sounds like a lot, but 1Gbps symetric connections are common in many areas. 7,000 botnet nodes with good connectivity can deliver that. The article says the attack traffic came from 122,145 source IPs, but I would expect at least some traffic to be spoofed.

m463 4 hours ago

meanwhile, cloudflare has been blocking my reading of websites more and more.

wrs 12 hours ago

What was the goal of an attack lasting only 45 seconds?

  • dc396 12 hours ago

    A few options:

    - testing in preparation for a future attack

    - proof of capability ("Nice network you have there. It'd be a shame if something happened to it")

    - misfire ('What happens when I push this button that says "don't push"?')

  • dylan604 12 hours ago

    Maybe someone was interested in buying the services, and the creator need to prove the capabilities. I'm sure there's other reasons too.

  • mxuribe 7 hours ago

    I was thinking reconn...but the other reasons cited by others here seem totally viable too.

lordnacho 4 days ago

Possibly the only kind of advertising that I actually like. Informative, engaging, no overselling.

NetOpWibby 12 hours ago

Cloudflare is the One Punch Man of the internet

  • johnklos 10 hours ago

    Cloudflare protects scammers and want to recentralize the Internet around a for-profit company based in the Untied States.

    One-Punch Man is a reluctant mentor, is often broke, loves ramen and cares about others.

    They are not the same.

shrubble 14 hours ago

The current optics are 400gbps, and 800gbps are sampling; next up is 1.6 tbps; so this is 20x400gbps, basically 1 expensive switch’s worth of traffic. Which is itself a scary prospect!

  • immibis 5 hours ago

    It's cloudflare so it's distributed. 10Gbps at this POP, 20Gbps at that one...

thih9 13 hours ago

> DDoS sizes have continued a steady climb over the past three decades.

This is a bit misleading; according to Wikipedia[1], the first DDoS is said to have occurred less than three decades ago.

[1] "Panix, the third-oldest ISP in the world, was the target of what is thought to be the first DoS attack. On September 6, 1996, Panix was subject to a SYN flood attack, which brought down its services for several days while hardware vendors, notably Cisco, figured out a proper defense.", source: https://en.wikipedia.org/wiki/Denial-of-service_attack

  • jedberg 13 hours ago

    90's, 00's, 10's. Three decades.

    • thih9 11 hours ago

      Exactly, should be less. Unless we have some data about DDoS sizes in the early 90s, before the first DDoS has occurred.

      • jedberg 10 hours ago

        I'm going to give you the benefit of the doubt and assume you aren't just being pedantic to be a troll, and point out that when rounding 29 to the nearest 10, you get 30.

  • arp242 10 hours ago

    round(29 years) is three decades. This is hyper-pedantic to the point of being obnoxious.

    • thih9 10 hours ago

      Fair enough, apologies.

      In my defense, reading that for the first time gave me an impression that DDoS attacks themselves were older; I was disappointed and wanted to share so that others wouldn’t get similar hopes. Next time I’ll round more decimals.

  • sophacles 13 hours ago

    So the change from 0 sized ddos in June 1995 (30 years ago aka 3 decades ago) to a >0 sized ddos in September 1996 (29 years ago aka basically 3 decades ago) doesn't constitute an increase in size?

    • thih9 11 hours ago

      But that’s my point, I wouldn’t call it an increase from 0, I’d say 30 years ago that value was NULL - not even a zero sized DDoS has happened yet.

      • sophacles 10 hours ago

        So two problems...

        1) I'm not sure what your problem with the reasonable rounding of 29 years ago to 3 decades is... but the one that comes across is "extra pedantry for no reason"

        2) According to wikipedia the "first dos" attack was in 1996. There are other sources most of which attribute that 1996 panix attack as "one of the first" or "the first major" ddos attack. Before that there were other DoS attacks using udp and/or syn floods, and some of them likely involved several computers (and possibly people) working in coordination. Those several computers were probably not compromised machines that had malware responding to a cnc server, so the squishiness has to do in part with how exactly one defines DDoS - some definitions include a botnet requirement, others just need multiple computers working in coordination. It's claimed that Kevin Mitnick was targeting his prosecutor with syn floods in 1994 (over 30 years ago), but its not fully verified and the details are unknown from my research... likely though >1 computers were involved in that flood if it happened.

        In the early 90s there were all sorts of fun and games where people would knock over IRC servers by triggering bugs/behaviors in a lot of connected clients. It's primitive but it seems to have a huge number of elements of DDoS. Similar for attacks on various telecomms infrastructure as the soviet union/eastern bloc fell apart in that time period.

        Trying to put a hard "29 years ago" line in the sand is difficult to do... techniques evolve from previous ones and there are shared elements that make the line necessarily fuzzy.

        So yeah... theres no reason to quibble about "three decades" since theres 35+ years of history around "things that look like DDoS attacks but don't fit a strict definition that requires botnets"