Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Denial of Service Attack at Internet Root Servers
AP ^ | 22 OCT 2002 | TED BRIDIS

Posted on 10/22/2002 4:54:09 PM PDT by j_tull

WASHINGTON (AP) - An unusually powerful electronic attack briefly crippled nine of the 13 computer servers that manage global Internet traffic this week, officials disclosed Tuesday. But most Internet users didn't notice because the attack only lasted one hour.

The FBI and White House were investigating. One official described the attack Monday as the most sophisticated and large-scale assault against these crucial computers in the history of the Internet. The origin of the attack was not known.

Seven of the 13 servers failed to respond to legitimate network traffic and two others failed intermittently during the attack, officials confirmed.

The FBI's National Infrastructure Protection Center was "aware of the denial of service attack and is addressing this matter," spokesman Steven Berry said.

Service was restored after experts enacted defensive measures and the attack suddenly stopped.

The 13 computers are spread geographically across the globe as precaution against physical disasters and operated by U.S. government agencies, universities, corporations and private organizations.

"As best we can tell, no user noticed and the attack was dealt with and life goes on," said Louis Touton, vice president for the Internet Corporation for Assigned Names and Numbers, the Internet's key governing body.

Brian O'Shaughnessy, a spokesman for VeriSign Inc., which operates two of the 13 computers in northern Virginia, said "these sorts of attacks will happen."

"We were prepared, we responded quickly," O'Shaughnessy said. "We proactively cooperated with our fellow root server operators and the appropriate authorities."

Computer experts who manage some of the affected computers, speaking on condition of anonymity, said they were cooperating with the White House through its Office of Homeland Security and the President's Critical Infrastructure Protection Board.

Richard Clarke, President Bush's top cyber-security adviser and head of the protection board, has warned for months that an attack against the Internet's 13 so-called root server computers could be dramatically disruptive.

These experts said the attack, which started about 4:45 p.m. EDT Monday, transmitted data to each targeted root server 30 to 40 times normal amounts. One said that just one additional failure would have disrupted e-mails and Web browsing across parts of the Internet.

Monday's attack wasn't more disruptive because many Internet providers and large corporations and organizations routinely store, or "cache," popular Web directory information for better performance.

"The Internet was designed to be able to take outages, but when you take the root servers out, you don't know how long you can work without them," said Alan Paller, director of research at the SANS Institute, a security organization based in Bethesda, Md.

Although the Internet theoretically can operate with only a single root server, its performance would slow if more than four root servers failed for any appreciable length of time.

In August 2000, four of the 13 root servers failed for a brief period because of a technical glitch.

A more serious problem involving root servers occurred in July 1997 after experts transferred a garbled directory list to seven root servers and failed to correct the problem for four hours. Traffic on much of the Internet ground to a halt.


TOPICS: Breaking News; Technical
KEYWORDS: cyberterrorism
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-67 last
Comment #61 Removed by Moderator

To: toenail
"Sun. We're the invisible dot at the end of dot com. Really. No, really, there's an invisible dot at the end. That's us."

Sound like they're the idiot in dot.com.
62 posted on 10/22/2002 10:18:17 PM PDT by Mike Fieschko
[ Post Reply | Private Reply | To 55 | View Replies]

To: justlurking
DDoS attack

What an opportunity lost ... it ought to have been labelled
M utli
S ource
D enial
O f
S ervice
63 posted on 10/22/2002 10:21:01 PM PDT by Mike Fieschko
[ Post Reply | Private Reply | To 57 | View Replies]

To: justlurking
The actual source of the SYN/ACK is a third-party server responding to a SYN directed to a port on which it is listening, but it's responding to a client port (> 1023) on the victim's IP instead of the IP of the machine that actually sent the original SYN.

It doesn't matter if anything's listening to the destination port on the victim host or not, and it doesn't matter which protocols are supported by anything that happens to be listening on the destination port; the traffic is still arriving at the interface and the system has to look at each packet to decide what to do with it. The effect of this attack is the depletion of bandwidth (stressed routers, dropped packets, etc.) and server resources spent dealing with the bogus traffic.

64 posted on 10/22/2002 10:34:59 PM PDT by dwollmann
[ Post Reply | Private Reply | To 57 | View Replies]

To: MPB
Understood - and your explanation was better than my simple assertion that DNS root-server attacks would not cause "immediate" slow loading of pages from the FR web server. Name associations perk from the bottom-up to root, then back down through the network of Domain Name Servers in a matter of days, usually.
65 posted on 10/23/2002 3:14:07 AM PDT by Cboldt
[ Post Reply | Private Reply | To 31 | View Replies]

To: Yehuda
Got my PADI cert there. GREAT diving!

You must be psychic!! Got my cert as well while I was there!! Isn't it just great?


66 posted on 10/23/2002 4:34:35 AM PDT by unixfox
[ Post Reply | Private Reply | To 59 | View Replies]

To: MPB
Hmm... I would have imagined that the maintainers of the roots would have LONG ago turned if ICMP at the routers.

That surprised me as well. But, in the posting that I referenced, someone was in the process of writing a paper about the vulnerability, so it was already known.

To answer other questions, I could be entirely off my rocker, but I'm fairly certain the roots run just customized *nix of some form, with only DNS doing anything on the machine.

That's what I would expect as well. Of course, you may be able to get a response from other ports at the same IP address, but it's a simple matter to redirect requests to other servers at the firewall/router.

67 posted on 10/23/2002 6:36:01 AM PDT by justlurking
[ Post Reply | Private Reply | To 60 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-67 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson