SlideShare una empresa de Scribd logo
1 de 14
NTP Defense

Mustafa Golam
Common NTP Attack Signature

NTP amplification attacks work similar
to UDP amplification attacks. The
attacker sends a small packet with
spoofed source information via UDP
to the NTP server. This packet
contains a command like ‘monlist’
which requests a a large amount of
data from the NTP server. The NTP
server sends this data to the spoofed
source in the original small packet. In
effect, a few bytes of data can
generate megabytes worth of traffic.

Fixing the Problem
1. update NTP to version 4.2.7.
This removes the ‘monlist’ command.
2. You can disable querying via a configuration
change:
# grep -ai query /etc/ntp.conf
# Prohibit general access to this service.
restrict default ignore
restrict xxx.xxx.xxx.xxx mask 255.255.255.255
nomodify notrap noquery
This will prevent your NTP server from being
leveraged to launch DDoS attacks against other
networks.
3. Enable NTP Autokey.
Information can be in subsequent Slides. This is
supported in version 4.2.6 or later.
Check this Link:
http://support.ntp.org/bin/view/Support/Configuring
Autokey
NTP Reflection

Over the last few weeks (26th Dec, 2013) Symantec has seen a significant spike in
NTP reflection attacks across the Internet.
Notable cases (1)
Tardis and Trinity College, Dublin
Problem:
Copies of a program called Tardis with thousands of copies
around the world contacting the web server and obtaining a
timestamp via HTTP.
Solution:
modify the web server configuration so as to deliver a
customized version of the home page (greatly reduced in size)
Return a bogus time value, which caused most of the clients to
choose a different time server.
Release version of Tardis to correct for this problem.
Notable cases (2)
NETGEAR and the University of Wisconsin–Madison
Problem:
NETGEAR Hardcoded UWM’s NTP Servers’ address in their Product
Line DG814, HR314, MR814 and RP614, counting total 707,147 gears
who would send SNTP Request to those servers every second until
they get response. It resulted peak traffic of 250,000 packets-persecond (150 megabits per second) by June, 2013.
Solution:
Firmware Code Update to query SNTP Agents to NETGEAR's own
servers, poll only once every ten minutes, and give up after five
failures.
NETGEAR has donated 375,000 USD to the UWM.
Similar Problem between ‘SMC and CSIRO’.
Notable cases (3)
swisstime.ethz.ch and the Providers
Problem:
For over 20 years ETH Zurich has provided open access to the time
server swisstime.ethz.ch for operational time synchronization.
Due to excessive bandwidth usage, averaging upwards of 20 GB /
day, it has become necessary to direct external usage to public time
server pools,such as ch.pool.ntp.org.
Misuse, caused mostly by IT-providers synchronizing their client
infrastructures, has made unusually high demands on network
traffic, thereby causing ETH to take effective measures.
Solution:
As of Fall 2012 the availability of swisstime.ethz.ch has been changed
to Closed Access.
Since beginning of July 2013 access to the server is blocked entirely
for the ntp protocol.
Notable cases (3)
D-Link and Poul-Henning Kamp
Problem:
Poul-Henning Kamp was manager of Danish Str1 NTP server .
By convention, Stratum 1 time servers should only be used by applications
requiring extremely precise time measurements, such as scientific
applications or Stratum 2 servers with a large number of clients.
PHK observed a huge rise in traffic and discovered that between 75 and 90%
was originating with D-Link's router products.
Kamp contacted D-Link in November 2005, hoping to get them to fix the
problem and compensate him for the time … …
Solution:
After going public, Kamp realized that D-Link routers were directly querying
other Stratum 1 time servers, violating the access policies of at least 43 of
them in the process. ..
On April 27, 2006, D-Link and Kamp announced that they had "amicably
resolved" their dispute…
Recent Attacks on Gaming Servers
Mitigating 80 Gbps Attacks – NTP Amplification Attacks on the Rise:
The recent wave of attacks on EA, Riot Games, Blizzard, Valve, and
many others in the past few weeks have utilized a very uncommon
attack technology. These attacks are similar in nature to DNS
amplification attacks. Those attacks leveraged misconfigured DNS
servers to launch very large attacks. We’re now faced with a similar
situation with NTP.
Ref:
http://arstechnica.com/security/2014/01/new-dos-attacks-taking-downgame-sites-deliver-crippling-100-gbps-floods/
http://www.reddit.com/r/gaming/comments/1uacp8/derptrolling_is_c
urrently_ddos_on_steam_and_ea/
http://thehackernews.com/2014/01/ddos-attack-NTP-server-reflectionprotection.html
http://www.darkreading.com/attacks-breaches/attackers-wagenetwork-time-protocol-bas/240165063
What is NTP?
NTP is the Network Time Protocol, it is a relatively obscure
protocol that runs over port 123 UDP and is used to sync time
between machines on a network. If you have ever set up a
home computer or server and been asked which time server
you want to use, that is an NTP connection.
NTP is one of those set-it-and-forget-it protocols that is
configured once and most network administrators don't worry
about it after that. Unfortunately, that means it is also not a
service that is upgraded often, leaving it vulnerable to these
reflection attacks.
Common NTP client problems
(S)NTP server addresses hardcoded in the firmware of
consumer networking devices.
Generate query packets at short (less than 5 s) intervals until a
response is received.
Such grossly over-eager clients (particularly those polling once
per second) commonly make up more than 50% of the traffic of
public NTP servers, despite being a minuscule fraction of the
total clients.
How do NTP reflection attacks work?
Similar to DNS amplification attacks, the attacker sends a small
forged packet that requests a large amount of data be sent to
the target IP Address.
In this case, the attackers are taking advantage of the monlist
command. Monlist is a remote command in older version of
NTP that sends the requester a list of the last 600 hosts who
have connected to that server. For attackers the monlist query
is a great reconnaissance tool. For a localized NTP server it can
help to build a network profile. However, as a DDoS tool, it is
even better because a small query can redirect megabytes
worth of traffic:
ntpdc -c monlist [hostname]
[root@server ~]# ntpdc -c monlist [hostname]
remote address
port local address count m ver code avgint lstint
===============================================================================
localhost.localdomain 53949 127.0.0.1
172 0 0 0
tock.usshc.com
123 xxx.xxx.xxx.xxx
1 4 4 5d0 0 53
198.52.198.248
123 xxx.xxx.xxx.xxx
1 4 4 5d0 0 54
rook.slash31.com
123 xxx.xxx.xxx.xxx 1 4 4 5d0 0 55
eightyeight.xmission.c 123 xxx.xxx.xxx.xxx
1 4 4 5d0 0 56

Most scanning tools, such as NMAP, have a monlist module for
gathering network information and many attack
tools, including metasploit, have a monlist DDoS module.
How can you protect your servers?
The easiest way to update to NTP version 4.2.7, which removes
the monlist command entirely. If upgrading is not an option,
you can start the NTP daemon with noquery enabled in the NTP
conf file. This will disable access to mode 6 and 7 query
packetts (which includes monlist).
By disabling monlist, or upgrading so the the command is no
longer there, not only are you protecting your network from
unwanted reconnaissance, but you are also protecting your
network from inadvertently being used in a DDoS attack.
More Reading on NTP Security:
http://www.eecis.udel.edu/~mills/security.html
Q&A??
Thank You!!

Más contenido relacionado

Destacado

Nokia siemens networks_active_antenna_system_white_paper_26_01_12
Nokia siemens networks_active_antenna_system_white_paper_26_01_12Nokia siemens networks_active_antenna_system_white_paper_26_01_12
Nokia siemens networks_active_antenna_system_white_paper_26_01_12ssk
 
150154357 umts-multi-carrier-strategy-training
150154357 umts-multi-carrier-strategy-training150154357 umts-multi-carrier-strategy-training
150154357 umts-multi-carrier-strategy-trainingمحمد مشعل
 
Clock Synchronization (Distributed computing)
Clock Synchronization (Distributed computing)Clock Synchronization (Distributed computing)
Clock Synchronization (Distributed computing)Sri Prasanna
 
Lte epc trial experience
Lte epc trial experienceLte epc trial experience
Lte epc trial experienceHussien Mahmoud
 
Wcdma radio-network-optimization-guide
Wcdma radio-network-optimization-guideWcdma radio-network-optimization-guide
Wcdma radio-network-optimization-guideDobrin Dobrev
 
Logical Clocks (Distributed computing)
Logical Clocks (Distributed computing)Logical Clocks (Distributed computing)
Logical Clocks (Distributed computing)Sri Prasanna
 
actix-troubleshooting-and-optimizing-umts-network
actix-troubleshooting-and-optimizing-umts-networkactix-troubleshooting-and-optimizing-umts-network
actix-troubleshooting-and-optimizing-umts-networkRohit Joshi
 
Actix analyzer training_manual_for_gsm
Actix analyzer training_manual_for_gsmActix analyzer training_manual_for_gsm
Actix analyzer training_manual_for_gsmDragos Biciu
 
Huawei parameter strategy v1.4 1st dec
Huawei parameter strategy v1.4  1st decHuawei parameter strategy v1.4  1st dec
Huawei parameter strategy v1.4 1st decKetut Widya
 
Fukuoka University Public NTP Service Deployment Use case
Fukuoka University Public NTP Service Deployment Use caseFukuoka University Public NTP Service Deployment Use case
Fukuoka University Public NTP Service Deployment Use caseAPNIC
 
LTE EPC Technology Essentials
LTE EPC Technology EssentialsLTE EPC Technology Essentials
LTE EPC Technology EssentialsHussien Mahmoud
 

Destacado (13)

Nokia siemens networks_active_antenna_system_white_paper_26_01_12
Nokia siemens networks_active_antenna_system_white_paper_26_01_12Nokia siemens networks_active_antenna_system_white_paper_26_01_12
Nokia siemens networks_active_antenna_system_white_paper_26_01_12
 
150154357 umts-multi-carrier-strategy-training
150154357 umts-multi-carrier-strategy-training150154357 umts-multi-carrier-strategy-training
150154357 umts-multi-carrier-strategy-training
 
Clock Synchronization (Distributed computing)
Clock Synchronization (Distributed computing)Clock Synchronization (Distributed computing)
Clock Synchronization (Distributed computing)
 
Lte epc trial experience
Lte epc trial experienceLte epc trial experience
Lte epc trial experience
 
Wcdma radio-network-optimization-guide
Wcdma radio-network-optimization-guideWcdma radio-network-optimization-guide
Wcdma radio-network-optimization-guide
 
Logical Clocks (Distributed computing)
Logical Clocks (Distributed computing)Logical Clocks (Distributed computing)
Logical Clocks (Distributed computing)
 
actix-troubleshooting-and-optimizing-umts-network
actix-troubleshooting-and-optimizing-umts-networkactix-troubleshooting-and-optimizing-umts-network
actix-troubleshooting-and-optimizing-umts-network
 
actix lte
actix lteactix lte
actix lte
 
Actix analyzer training_manual_for_gsm
Actix analyzer training_manual_for_gsmActix analyzer training_manual_for_gsm
Actix analyzer training_manual_for_gsm
 
Actix for LTE
Actix for LTEActix for LTE
Actix for LTE
 
Huawei parameter strategy v1.4 1st dec
Huawei parameter strategy v1.4  1st decHuawei parameter strategy v1.4  1st dec
Huawei parameter strategy v1.4 1st dec
 
Fukuoka University Public NTP Service Deployment Use case
Fukuoka University Public NTP Service Deployment Use caseFukuoka University Public NTP Service Deployment Use case
Fukuoka University Public NTP Service Deployment Use case
 
LTE EPC Technology Essentials
LTE EPC Technology EssentialsLTE EPC Technology Essentials
LTE EPC Technology Essentials
 

Más de Mustafa Golam

BIND DNS IPWorks Introduction To Advanced
BIND DNS IPWorks Introduction To AdvancedBIND DNS IPWorks Introduction To Advanced
BIND DNS IPWorks Introduction To AdvancedMustafa Golam
 
Sapc upcc-pcrf- part 2 tbp
Sapc upcc-pcrf- part 2 tbpSapc upcc-pcrf- part 2 tbp
Sapc upcc-pcrf- part 2 tbpMustafa Golam
 
Sapc upcc-pcrf- part 1 tbp
Sapc upcc-pcrf- part 1 tbpSapc upcc-pcrf- part 1 tbp
Sapc upcc-pcrf- part 1 tbpMustafa Golam
 
EPG PGW SAPC SACC PISC Configuration
EPG PGW SAPC SACC PISC ConfigurationEPG PGW SAPC SACC PISC Configuration
EPG PGW SAPC SACC PISC ConfigurationMustafa Golam
 
PGW GGSN Optional Services Configuration
PGW GGSN Optional Services ConfigurationPGW GGSN Optional Services Configuration
PGW GGSN Optional Services ConfigurationMustafa Golam
 
GGSN-Gateway GPRS Support Node
GGSN-Gateway GPRS Support NodeGGSN-Gateway GPRS Support Node
GGSN-Gateway GPRS Support NodeMustafa Golam
 
SGSN- serving gprs support node - Platform - HW, SW and CLI
SGSN- serving gprs support node  - Platform - HW, SW and CLI SGSN- serving gprs support node  - Platform - HW, SW and CLI
SGSN- serving gprs support node - Platform - HW, SW and CLI Mustafa Golam
 
Packet core network basics
Packet core network basicsPacket core network basics
Packet core network basicsMustafa Golam
 
GPRS/EDGE Basics / knowledge sharing
GPRS/EDGE Basics /  knowledge sharingGPRS/EDGE Basics /  knowledge sharing
GPRS/EDGE Basics / knowledge sharingMustafa Golam
 

Más de Mustafa Golam (9)

BIND DNS IPWorks Introduction To Advanced
BIND DNS IPWorks Introduction To AdvancedBIND DNS IPWorks Introduction To Advanced
BIND DNS IPWorks Introduction To Advanced
 
Sapc upcc-pcrf- part 2 tbp
Sapc upcc-pcrf- part 2 tbpSapc upcc-pcrf- part 2 tbp
Sapc upcc-pcrf- part 2 tbp
 
Sapc upcc-pcrf- part 1 tbp
Sapc upcc-pcrf- part 1 tbpSapc upcc-pcrf- part 1 tbp
Sapc upcc-pcrf- part 1 tbp
 
EPG PGW SAPC SACC PISC Configuration
EPG PGW SAPC SACC PISC ConfigurationEPG PGW SAPC SACC PISC Configuration
EPG PGW SAPC SACC PISC Configuration
 
PGW GGSN Optional Services Configuration
PGW GGSN Optional Services ConfigurationPGW GGSN Optional Services Configuration
PGW GGSN Optional Services Configuration
 
GGSN-Gateway GPRS Support Node
GGSN-Gateway GPRS Support NodeGGSN-Gateway GPRS Support Node
GGSN-Gateway GPRS Support Node
 
SGSN- serving gprs support node - Platform - HW, SW and CLI
SGSN- serving gprs support node  - Platform - HW, SW and CLI SGSN- serving gprs support node  - Platform - HW, SW and CLI
SGSN- serving gprs support node - Platform - HW, SW and CLI
 
Packet core network basics
Packet core network basicsPacket core network basics
Packet core network basics
 
GPRS/EDGE Basics / knowledge sharing
GPRS/EDGE Basics /  knowledge sharingGPRS/EDGE Basics /  knowledge sharing
GPRS/EDGE Basics / knowledge sharing
 

Último

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Último (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 

NTP Defense -- Protecing Left-Alone Protocol

  • 2. Common NTP Attack Signature NTP amplification attacks work similar to UDP amplification attacks. The attacker sends a small packet with spoofed source information via UDP to the NTP server. This packet contains a command like ‘monlist’ which requests a a large amount of data from the NTP server. The NTP server sends this data to the spoofed source in the original small packet. In effect, a few bytes of data can generate megabytes worth of traffic. Fixing the Problem 1. update NTP to version 4.2.7. This removes the ‘monlist’ command. 2. You can disable querying via a configuration change: # grep -ai query /etc/ntp.conf # Prohibit general access to this service. restrict default ignore restrict xxx.xxx.xxx.xxx mask 255.255.255.255 nomodify notrap noquery This will prevent your NTP server from being leveraged to launch DDoS attacks against other networks. 3. Enable NTP Autokey. Information can be in subsequent Slides. This is supported in version 4.2.6 or later. Check this Link: http://support.ntp.org/bin/view/Support/Configuring Autokey
  • 3. NTP Reflection Over the last few weeks (26th Dec, 2013) Symantec has seen a significant spike in NTP reflection attacks across the Internet.
  • 4. Notable cases (1) Tardis and Trinity College, Dublin Problem: Copies of a program called Tardis with thousands of copies around the world contacting the web server and obtaining a timestamp via HTTP. Solution: modify the web server configuration so as to deliver a customized version of the home page (greatly reduced in size) Return a bogus time value, which caused most of the clients to choose a different time server. Release version of Tardis to correct for this problem.
  • 5. Notable cases (2) NETGEAR and the University of Wisconsin–Madison Problem: NETGEAR Hardcoded UWM’s NTP Servers’ address in their Product Line DG814, HR314, MR814 and RP614, counting total 707,147 gears who would send SNTP Request to those servers every second until they get response. It resulted peak traffic of 250,000 packets-persecond (150 megabits per second) by June, 2013. Solution: Firmware Code Update to query SNTP Agents to NETGEAR's own servers, poll only once every ten minutes, and give up after five failures. NETGEAR has donated 375,000 USD to the UWM. Similar Problem between ‘SMC and CSIRO’.
  • 6. Notable cases (3) swisstime.ethz.ch and the Providers Problem: For over 20 years ETH Zurich has provided open access to the time server swisstime.ethz.ch for operational time synchronization. Due to excessive bandwidth usage, averaging upwards of 20 GB / day, it has become necessary to direct external usage to public time server pools,such as ch.pool.ntp.org. Misuse, caused mostly by IT-providers synchronizing their client infrastructures, has made unusually high demands on network traffic, thereby causing ETH to take effective measures. Solution: As of Fall 2012 the availability of swisstime.ethz.ch has been changed to Closed Access. Since beginning of July 2013 access to the server is blocked entirely for the ntp protocol.
  • 7. Notable cases (3) D-Link and Poul-Henning Kamp Problem: Poul-Henning Kamp was manager of Danish Str1 NTP server . By convention, Stratum 1 time servers should only be used by applications requiring extremely precise time measurements, such as scientific applications or Stratum 2 servers with a large number of clients. PHK observed a huge rise in traffic and discovered that between 75 and 90% was originating with D-Link's router products. Kamp contacted D-Link in November 2005, hoping to get them to fix the problem and compensate him for the time … … Solution: After going public, Kamp realized that D-Link routers were directly querying other Stratum 1 time servers, violating the access policies of at least 43 of them in the process. .. On April 27, 2006, D-Link and Kamp announced that they had "amicably resolved" their dispute…
  • 8. Recent Attacks on Gaming Servers Mitigating 80 Gbps Attacks – NTP Amplification Attacks on the Rise: The recent wave of attacks on EA, Riot Games, Blizzard, Valve, and many others in the past few weeks have utilized a very uncommon attack technology. These attacks are similar in nature to DNS amplification attacks. Those attacks leveraged misconfigured DNS servers to launch very large attacks. We’re now faced with a similar situation with NTP. Ref: http://arstechnica.com/security/2014/01/new-dos-attacks-taking-downgame-sites-deliver-crippling-100-gbps-floods/ http://www.reddit.com/r/gaming/comments/1uacp8/derptrolling_is_c urrently_ddos_on_steam_and_ea/ http://thehackernews.com/2014/01/ddos-attack-NTP-server-reflectionprotection.html http://www.darkreading.com/attacks-breaches/attackers-wagenetwork-time-protocol-bas/240165063
  • 9. What is NTP? NTP is the Network Time Protocol, it is a relatively obscure protocol that runs over port 123 UDP and is used to sync time between machines on a network. If you have ever set up a home computer or server and been asked which time server you want to use, that is an NTP connection. NTP is one of those set-it-and-forget-it protocols that is configured once and most network administrators don't worry about it after that. Unfortunately, that means it is also not a service that is upgraded often, leaving it vulnerable to these reflection attacks.
  • 10. Common NTP client problems (S)NTP server addresses hardcoded in the firmware of consumer networking devices. Generate query packets at short (less than 5 s) intervals until a response is received. Such grossly over-eager clients (particularly those polling once per second) commonly make up more than 50% of the traffic of public NTP servers, despite being a minuscule fraction of the total clients.
  • 11. How do NTP reflection attacks work? Similar to DNS amplification attacks, the attacker sends a small forged packet that requests a large amount of data be sent to the target IP Address. In this case, the attackers are taking advantage of the monlist command. Monlist is a remote command in older version of NTP that sends the requester a list of the last 600 hosts who have connected to that server. For attackers the monlist query is a great reconnaissance tool. For a localized NTP server it can help to build a network profile. However, as a DDoS tool, it is even better because a small query can redirect megabytes worth of traffic:
  • 12. ntpdc -c monlist [hostname] [root@server ~]# ntpdc -c monlist [hostname] remote address port local address count m ver code avgint lstint =============================================================================== localhost.localdomain 53949 127.0.0.1 172 0 0 0 tock.usshc.com 123 xxx.xxx.xxx.xxx 1 4 4 5d0 0 53 198.52.198.248 123 xxx.xxx.xxx.xxx 1 4 4 5d0 0 54 rook.slash31.com 123 xxx.xxx.xxx.xxx 1 4 4 5d0 0 55 eightyeight.xmission.c 123 xxx.xxx.xxx.xxx 1 4 4 5d0 0 56 Most scanning tools, such as NMAP, have a monlist module for gathering network information and many attack tools, including metasploit, have a monlist DDoS module.
  • 13. How can you protect your servers? The easiest way to update to NTP version 4.2.7, which removes the monlist command entirely. If upgrading is not an option, you can start the NTP daemon with noquery enabled in the NTP conf file. This will disable access to mode 6 and 7 query packetts (which includes monlist). By disabling monlist, or upgrading so the the command is no longer there, not only are you protecting your network from unwanted reconnaissance, but you are also protecting your network from inadvertently being used in a DDoS attack. More Reading on NTP Security: http://www.eecis.udel.edu/~mills/security.html