Posted on 10/22/2002 4:54:09 PM PDT by j_tull
WASHINGTON (AP) - An unusually powerful electronic attack briefly crippled nine of the 13 computer servers that manage global Internet traffic this week, officials disclosed Tuesday. But most Internet users didn't notice because the attack only lasted one hour.
The FBI and White House were investigating. One official described the attack Monday as the most sophisticated and large-scale assault against these crucial computers in the history of the Internet. The origin of the attack was not known.
Seven of the 13 servers failed to respond to legitimate network traffic and two others failed intermittently during the attack, officials confirmed.
The FBI's National Infrastructure Protection Center was "aware of the denial of service attack and is addressing this matter," spokesman Steven Berry said.
Service was restored after experts enacted defensive measures and the attack suddenly stopped.
The 13 computers are spread geographically across the globe as precaution against physical disasters and operated by U.S. government agencies, universities, corporations and private organizations.
"As best we can tell, no user noticed and the attack was dealt with and life goes on," said Louis Touton, vice president for the Internet Corporation for Assigned Names and Numbers, the Internet's key governing body.
Brian O'Shaughnessy, a spokesman for VeriSign Inc., which operates two of the 13 computers in northern Virginia, said "these sorts of attacks will happen."
"We were prepared, we responded quickly," O'Shaughnessy said. "We proactively cooperated with our fellow root server operators and the appropriate authorities."
Computer experts who manage some of the affected computers, speaking on condition of anonymity, said they were cooperating with the White House through its Office of Homeland Security and the President's Critical Infrastructure Protection Board.
Richard Clarke, President Bush's top cyber-security adviser and head of the protection board, has warned for months that an attack against the Internet's 13 so-called root server computers could be dramatically disruptive.
These experts said the attack, which started about 4:45 p.m. EDT Monday, transmitted data to each targeted root server 30 to 40 times normal amounts. One said that just one additional failure would have disrupted e-mails and Web browsing across parts of the Internet.
Monday's attack wasn't more disruptive because many Internet providers and large corporations and organizations routinely store, or "cache," popular Web directory information for better performance.
"The Internet was designed to be able to take outages, but when you take the root servers out, you don't know how long you can work without them," said Alan Paller, director of research at the SANS Institute, a security organization based in Bethesda, Md.
Although the Internet theoretically can operate with only a single root server, its performance would slow if more than four root servers failed for any appreciable length of time.
In August 2000, four of the 13 root servers failed for a brief period because of a technical glitch.
A more serious problem involving root servers occurred in July 1997 after experts transferred a garbled directory list to seven root servers and failed to correct the problem for four hours. Traffic on much of the Internet ground to a halt.
Hmmm, I didn't see in this article where the attacks came from. But I can guess.
I didn't see time of day given so it's still conjecture -- but I sure noticed something yesterday. (Memory says somewhat in the 7 - 9 AM PDT timeslot.)
Well, regardless of whether your own machine ever touches those root servers, they are actually quite necessary.
DNS works by going from general-to-specific. The root servers manage a DNS zone that is really just "." (yup... dot).
So if you look up www.freerepublic.com, what you don't see is that domain names actually have a . on the end... just isn't needed really, it's assumed. :)
To lookup it's IP address, a DNS server would first find the servers that handle . (the root servers). Those would tell you where to find the servers that handle .com., and those servers tell you where to find freerepublic.com. and then it tells you where the server is for the hostname www in the domain freerepublic.com.
Rocket science, hardly, but just goes to show that without the root servers, we'd be screwed.
Practically speaking, any DNS server along the way can "cache" the data... I mean, DNS servers don't change all that often, so most servers out there, including the ones your local ISP uses, will cache data for hours, days, even weeks or months. I always get frustrated when I have to make a DNS change and there are servers out there that ignore my time-to-live settings and keep spitting out their invalid cached addresses. Urgh.
I concur, but I would REALLY like to know what the "defensive measures" are.
Counterattacking the IP address contained in the incoming packets would almost certainly be a bad idea because there's a high probability that the source IP is false, thus you'd be attacking a server that may not even exist or at worst is totally innocent, or belongs to a server that is simply doing what it is designed to do (as in the case of the unsolicited SYN/ACK attack).
For others that may not be familiar with the technology: this is what is known as a DDOS attack, or Distrubuted Denial Of Service. It is typically launched with a collection of servers that have already been compromised and have been held in waiting until given instructions to start the attack.
I don't know the specifics of this attack, but DNS lookup (port 53) is a connectionless UDP protocol, rather than TCP. So, there would be no SYN/ACK. However, I believe there are some aspects of DNS that are TCP.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.