Re: [Ntp] [EXT] Re: DDoS meets NTP

Daniel Franke <dfoxfranke@gmail.com> Tue, 20 April 2021 09:06 UTC

Return-Path: <dfoxfranke@gmail.com>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E60783A1945 for <ntp@ietfa.amsl.com>; Tue, 20 Apr 2021 02:06:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id v64ih7RyPdja for <ntp@ietfa.amsl.com>; Tue, 20 Apr 2021 02:06:40 -0700 (PDT)
Received: from mail-pg1-x535.google.com (mail-pg1-x535.google.com [IPv6:2607:f8b0:4864:20::535]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 62EF03A1943 for <ntp@ietf.org>; Tue, 20 Apr 2021 02:06:40 -0700 (PDT)
Received: by mail-pg1-x535.google.com with SMTP id w10so26177990pgh.5 for <ntp@ietf.org>; Tue, 20 Apr 2021 02:06:40 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=jne5W3lAAXg2eMRT9PeK8ocFcY3OMa3cvWSUCrZdI9A=; b=INGtJGA0sK4knB2ONCU5uSGuRZCIw7nb/3ut0oeXznSkNouflqzr/5/Q4GA8rMuFVX XhBD7Y+1n4OGta8cQG1Ki6qFl1dRcwAaNoqAmV7bo8w5IBEMv3v7gtXtEdSZTp2NytzV B1XdXBmpf4g+p1dfQTtWOEO0B69JRs2DE7WdqoY6UN/6dvonBiafhhqWEOGWwxJ7wxHf nQ+1Pzlvhf1lZZ4XhV6R1IoNfVtTYYklY6/2dExyWUCTyZP4n3eDBvG5AJT8hUy/ZzGD MKplct2zx+/hBMp+bRLpz0teoT87AE02dwAKjXMB7SCEkLoJd6Tnw4z23OPGw68flfc7 azvg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=jne5W3lAAXg2eMRT9PeK8ocFcY3OMa3cvWSUCrZdI9A=; b=pxnmo7S/p3cPpeujjt5B/lU2T4AliPHcqEZQlLLXCdFGwSVOQVuMUDFyJNbnq+Jv6+ tSzXRIp1gylnFtNNbxbRbi6ouJXkR3lJ0aA53zkLdLrBy8CZY/PmhCLCJQWbwrQJ6ntp aI6DikiXI0n/Al47zDvGzYbFzHZDBIi4OPgZwLGhYlLJ3++g1eVBI+v5A0e9447p3Ki6 YClkQGPuUj1FwjvcbmAia2UDYWxP4jYlwbWkB271Fyf//2c9pxCAuoWibWtuEKCNTAcU LoL4QKR2rLliti4x8ZjlSzp7F4e8WYRnSCKFL2gAyz4XUgw1w5LRjoMx9GCT7ANyOz/c 2N4g==
X-Gm-Message-State: AOAM532Al0b8cAh/8BWIlCB2kQG/jB5TWw2l4vrQJcEqEQQPDe5lMgcI loUbGysuRk0ZC4QKTdeh3HW6WhPiA/0YQKlpWD0=
X-Google-Smtp-Source: ABdhPJy4hxNGkIl5UpWkN0XOrNjrHPOruRFjBx+g+rL97rr/oEgcEPZnizSymIThWHQ4f3uxWWNwm06gBZawBKQUUgs=
X-Received: by 2002:aa7:82ce:0:b029:242:deb4:9442 with SMTP id f14-20020aa782ce0000b0290242deb49442mr24264973pfn.73.1618909597290; Tue, 20 Apr 2021 02:06:37 -0700 (PDT)
MIME-Version: 1.0
References: <dfoxfranke@gmail.com> <CAJm83bDzve+x7zxtp-g4+RmkbQ8_rBkainOXCim-q37W=7borg@mail.gmail.com> <20210419191226.5AD8740605C@ip-64-139-1-69.sjc.megapath.net> <CAJm83bAmsSDJ0hMPimXFxo2M+KzcfNpY2Kv5h541R4=Sv__+-Q@mail.gmail.com> <78A017D50200007043047E14@gwsmtp.uni-regensburg.de> <118C0E41020000F8AB59E961@gwsmtp.uni-regensburg.de> <788187C10200009C43047E14@gwsmtp.uni-regensburg.de> <8C96E46D020000BCAB59E961@gwsmtp.uni-regensburg.de> <607E7C26020000A100040A49@gwsmtp.uni-regensburg.de>
In-Reply-To: <607E7C26020000A100040A49@gwsmtp.uni-regensburg.de>
From: Daniel Franke <dfoxfranke@gmail.com>
Date: Tue, 20 Apr 2021 05:06:26 -0400
Message-ID: <CAJm83bCnS_dow3fvq1JxHK_zMG7_wdsicUZbgg+hqnyAEiXvWA@mail.gmail.com>
To: Ulrich Windl <Ulrich.Windl@rz.uni-regensburg.de>
Cc: Hal Murray <hmurray@megapathdsl.net>, "ntp@ietf.org" <ntp@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000007855b905c063c37f"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/DgvAkUWtqrZXYodXW2zIzXXV-AQ>
Subject: Re: [Ntp] [EXT] Re: DDoS meets NTP
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 20 Apr 2021 09:06:45 -0000

On Tue, Apr 20, 2021 at 3:00 AM Ulrich Windl <
Ulrich.Windl@rz.uni-regensburg.de> wrote:

> But the point is: Will they realize (or just continue the mis-use)?


Regardless, mitigating non-amplifying reflection is impractical and
pointless. Literally every server on the internet is "vulnerable" to this.
You can spam TCP SYNs to any server with a TCP stack and flood the victim
with SYN/ACKs (if the port is open) or RSTs (if it's closed). Or send UDP
traffic to a closed port and hit the victim with ICMP port-unreachable
messages. Or ICMP echo-request and hit with echo-replies.