P2P Networks Supplement Botnets 74
stuckinarut writes "Peer to peer file sharing network popularity is at an all time high, with hundreds of thousands of computers connected to a single P2P network at a given time. These networks are increasingly being used to trick PCs into attacking other machines, experts say. In fact, some reports indicate that peer-to-peer may actually exceed web traffic. Computer scientists have previously shown how P2P networks can be subverted so that several connected PCs gang up to attack a single machine, flooding it with enough traffic to make it crash. This can work even if the target is not part of the P2P network itself. Now, security experts are warning that P2P networks are increasingly being used to do just this. "Until January of this year we had never seen a peer-to-peer network subverted and used for an attack," says Darren Rennick of internet security company Prolexic in an advisory released recently. "We now see them constantly being subverted.""
It would be interesting... (Score:5, Interesting)
However, this will rule out a lot of corporate machines from being used as bots in this fashion; most decent sysadmins filter P2P traffic.
Re: (Score:2, Offtopic)
Re:It would be interesting... (Score:4, Insightful)
Spoof some packets and forward them to a torrent tracker that so-and-so-IP-address is a seed for popular torrents.
Watch as requests for that file flood the target. Repeat as necessary (actually, probably will need to repeat a whole lot).
Re: (Score:2)
And depending on the P2P protocol, if you point a standard client at a web server, the p2p client handshake could tie up a socket until the HTTP server times it out.
What seems to be needed is for the popular client implementations to refuse to connect to peers that have a standard protocol port number, eg SMTP, HTTP, FTP, HTTPS.
That doesn't sound THAT bad. (Score:5, Informative)
Actually, that won't happen.
Computers do not AUTOMATICALLY hit the "target computer". A person has to CHOOSE to download whatever the content is supposed to be.
In order to get "thousands of computers" to attack the target, you'd have to claim that the content was something that "thousands" of people wanted
Otherwise your "attack" will be limited to how many people are trying to download the content at any one time that have not timed out.
It's not how many TOTAL computers over a TOTAL time period.
If each of those 50,000 computers timed out and gave up in 60 seconds (a very reasonable time frame), then you're only looking at 278 (rounded up) "attacks" a minute.
Between 4 and 5 "attacks" a second.
It doesn't sound like much when you do the math, does it?
Re:That doesn't sound THAT bad. (Score:5, Funny)
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
How did you calculate that? If a new episode of office comes out, and say 10000 users want to download it in the first 10 minutes, that would be 10000 / 600 = 16,6 connections/second. that's a fair bit.
Re: (Score:2)
This is easy. Just put PR0N or NAKED, or LESBIAN, or HOT ACTION, or a combination of thereof in the title of your fake file, put it on ThePirateBay and the download will be started by millions in the following couple
Re: (Score:1)
If a user has already chosen to download something, their client may try to connect to anybody who has it.
1) find a popular torrent
2) tell tracker a certain IP address has the entire file, lots of upload slots, and huge upload bandwidth
3) tens of thousands of bittorrent clients try to connect to the IP address
4) successful DDoS
Re: (Score:2)
Re:It would be interesting... (Score:4, Insightful)
We're talking about subverting P2P protocols in such a manner that completely legit P2P client software all over the net will be making regular requests to a certain target machine, because as far as the client software knows, that's where the requested file (SHREK_3_SCREENER_DVDRIP.AVI etc.) is supposedly located.
Re: (Score:2)
It wouldn't surprise me at all to find many of the largest "information wants to be free" torrent sites being run by black hats in order to gather IP addresses and routing information for attacks.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Nothing. Another seed/peer is sending data at 30k/sec.
You don't. You just send the requests to the target.
Re: (Score:1)
Now, to
Re: (Score:2)
Actually analyzing every packet and trying to recognize the protocol used is excessively CPU intensive (for the firewall), and requires pretty powerful machines if you're expecting to catch every "P2P" protocol on the network.
Re: (Score:1)
Re: (Score:2)
Shouldn't have to do more than run SNORT and some packet analysis software on the gateway machine. We're assuming of course that all the workstations are properly NATed behind a gateway. Once you find out which machine's taken over, you can do what you need to do on it. No big deal.
Re:It would be interesting... (Score:4, Interesting)
You should read the advisory. Apparently firewalls aren't generally enough to prevent an attack. I suspect I've actually been the victim of some of these attacks, though I have no idea why and it's possible that it's something else, but I've had "attacks" that appear to be related to the ED2K (eMule/eDonkey) network where I just get flooded with incoming ED2K packets and it quickly hoses my DSL modem, which obviously isn't designed to handle a DDOS attack. My iptables firewall seems to survive longer than the DSL modem. Fortunately, switching off the modem for a few seconds and firing it back up gives me a new address (one of the benefits of dynamic addresses).
I don't know why I'd be attacked. It's possible people are just testing out their botnets or something, but it's happened several times over the past few months. Since it's fairly simple for me to fix the problem (restarting the modem) and it's only happened a few times, I haven't really bothered to dig too deep into it.
Re: (Score:1)
Web traffic? (Score:5, Funny)
well (Score:3, Insightful)
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
Like I'm really missing something by not bothering to hit Myspace...
So please tell me about all the garbage pages I don't see cause I don't use Myspace. I can live without bad video, bad music, and teeniebopper angst...
Re: (Score:1)
Re: (Score:2)
Re: (Score:1)
Re: (Score:1)
BitTorrent (Score:3, Informative)
I can't say the same for certain non-standard extensions to BitTorrent, or for official's DHT-based trackerless system, unfortunately; I haven't studied them enough to assert their infallibility.
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
Care to share any names?
Re: (Score:1)
http://utorrent.com/faq.php#I_get_tons_of_hashfai
Re: (Score:2)
Another reason to better utilize P2P networks (Score:3, Insightful)
These associations will only be used as excuses to involve clueless regulators to inflict even more damage than they already do.
P2P also is used to distribute OS images, large collections of data, etc. Companies and organizations--especially involved with free software--need to get on the ball and rely more on P2P. There's more than just bandwidth savings at stake.
Re: (Score:2)
P2P spreads the load much more widely, and with less effort.
I cannot run an FTP server over my NATed ADSL connection, but when I use bit-torrent I can see uploads happening.
FTP only spreads the load to those who deliberately mirror you. P2P spreads the load over everyone who is downloading.
How do you explain the fact that P2P (bittorrent es
Re: (Score:2)
Show me an FTP server or client whose transfer rate scales superlinearly with popularity, and I'll be very very impressed.
Time? (Score:2)
What does it look like? (Score:2)
1) Edonkey/Emule
2) Bittorrent
In the second case, it sounds a lot like the attacker needs to run their own tracker, which means they have convince people to come to their tracker in the first place, making it relatively easy to avoid.
But the first case, with Edonkey, sounds like it might only need a naughty client. But they don't go into details, instead referencing an academic paper which I am too lazy to read and suspect it won't answer my ultimate question anyway, which
What probably gave the author the idea: (Score:2, Informative)
That night I look over at my modem and the send/receive lights are flashing like crazy. I check my firewall logs and see mass connection attempts on some port I wasn't aware was associated with anything. I do some Google searching and come to find out it's that peer-to-peer edonkey crap.
I thought "Whatever, surely the client will sto
A bit of Older news (Score:5, Informative)
Thankfully some Peer to Peer network protocols aren't badly implemented (and the client software isn't as bad as others). Netcraft has a decent article about this with examples of the P2P networks that have been shown as exploitable.
http://news.netcraft.com/archives/2007/05/23/p2p_
I can confidently say that these attacks can easily span the 800,000 pkt/sec (per link) and include millions of source addresses for a "cheap cost" compared to the botnets that previously have been almost exclusive to the attacks. Thankfully most P2P clients aren't hijackable in a way to simply pulse connections (all at once) or the more traditional SynFlooding. Connection (fully negotiated) tends to be easier to diagnose than the strictly syn-flooding style attacks can be, on top of it they tend to be more directed (single destination vs. rotating with some kind of intelligence across an entire netblock).
Re: (Score:2)
Re: (Score:1)
Geez. (Score:1, Informative)
I believe most everyone who has posted here must work at Best Buy in their Geek Squad. They use all the
Re: (Score:1)
Reference to the actual studies (Score:2)
a) N. Naoumov, and K.W. Ross, Exploiting P2P Systems for DDoS Attacks, International Workshop on Peer-to-Peer Information Management, May 2006 http://cis.poly.edu/~ross/papers/p2pddos.pdf [poly.edu]
They show that one can subvert Overnet traffic (applicable to eMule th
Re: (Score:1)
(and isn't OverNet officially dead ?)
Not that new (Score:2)
I then added the ability to query and download files, and while experimenting with making it cache queries to others, added a slight bug, in that instead of giving the actual address of the resource, it kept spitting out my address... Shortly after, I realized I had a dandy means for a DOS
P2P-ize everything! (Score:3, Insightful)
While in some cases this is an attempt to avoid legal repercussions of hosting illegal content, on other cases, where content is legal, it's an attempt for the content providers to make their very big bandwidth problem, someone else's bandwidth problem.
Because this is all P2P is doing, moving the problem elsewhere, and actually multiplying it. Downloading a 100 MB file via bittorent will generate far more traffic and connection on the Internet as a whole, than a direct download from a proper server farm. No wonder ISP-s are stressed out from this whole P2P deal.
And then there's the security problems. I wonder: where did all those guys shouting with full throat "P2P-ize everything" do? I've read here on Slashdot, bold commenters proclaim boldly how lame it is that there are still things that aren't P2P yet. We need P2P search engines! P2P hosting! P2P banking! All of those are actual things I've read.
But back to the beginning, P2P means no central authority. Hence, it means no central trusted entity, no trust, no security.
Re: (Score:1)
Re: (Score:2)
Yers, I use "P2P" (bittorrent) as a hack. But the DIRECT problem I use bittorrent to address is the disparity between my download speed (5ish mbits/second) vs. my upload speed (256ish kbits/second).
I prefer to be in control of my own network resources -- and not rely on "central authority". So, yes, that is the "end reason" for using bittorrent.
But there would be no reason to use a "P2P" solution if my upl
Re: (Score:1)
Well, I would suggest you take a basic course in network design. Peer to Peer is not just a hack. It's the fundamental principle of how Internet is designed.
Internet architecture is built on the principle that all nodes are created equal and should be able to communicate. There are no specific addresses for producers of content and consumer of content... Unlike for example TV. All traffic on the Internet should, according to the original design, be peer to peer.
If you look at the capa
Re: (Score:2)
Damn right it's a hack. A hack to get around the fact that ISPs have refused to properly deploy IP multicasting. Until then, I'll take my hack, thanks.
P2P traffic dominant since 2002 (Score:2)
This was already the case in most of the measurements we collected in 2002. In fact by 2003, video traffic was the largest by volume, followed by audio, followed by web traffic. Our numbers came from sophisticated measurement devices that could, among other things, tell apart web pages from audio/video traffic on port 80.