Urban Terror Forums: DRDoS - Urban Terror Forums

Jump to content

 Login | Register 
Advertisement
  • (27 Pages)
  • +
  • « First
  • 14
  • 15
  • 16
  • 17
  • 18
  • Last »
  • You cannot start a new topic
  • This topic is locked

DRDoS Rate Topic: ***** 1 Votes

Server used as reflector fro DRDoS

#151 User is offline   Pussnboots Icon

  • Account: pussnboots
  • Joined: 01-March 10
  • Posts: 556

Posted 28 January 2012 - 02:43 AM

Let me make some brief points and explain.

A: With this exploit running freely on your system (No fix), your server will be running rampant with bandwidth.
B: With the exploit FIX, your server will be freed up, BUT it will only stop your server from responding (sometimes)

Though with the fix your server will run MUCH better, your bandwidth usage will still suffer tremendously!

Let me explain.

Before exploit fix:

Attacker (packet) => Reflector Server => Your Server => Reflector Server


After exploit fix:
Attacker (packet) => Reflector Server => Your Server


The fix ONLY stops your server from responding (SOMETIMES) to the sent packet from the reflector server.

Nonetheless, you are STILL receiving the packet request AND response from a: The attacker and b: The reflector server (Full server info)

Server providers monitor usage at the switch. NOT your server. It may be easier to see how this works with a textual diagram;

packets => Switch (Where bandwidth is monitored/measured) => Your vlan port on the switch => Your server:port => Your iptables (firewall) => Your game server binary


As you can see, the bandwidth is monitored WAY before your server binary even gets a chance to see it.

Even though your binary may be fixed, there are literally HUNDREDS of servers that are not. This means.. because the code is written something like:

GetMasterServerList => ForeachIP(SendBadPacketWithFalseHeader) => (Reflector) Reply to (YourServer as given in False header) of with the Response of request.



The ONLY true fix(es) to this problem would be;
1: For FS to limit clients/servers to be latest version for connection to Master Server list
2: Take advantage of Closed source URT HD and encrypt packets <=> master server list/servers/clients
3: (Step by step)
A: Close all their game servers @ current ports.
B: Contact their server host and have them block previously used UDP ports at the switch
C: Startup server leaving reporting to master server list OFF
4: (Step by step)
A: Change IP
B: Turn off master server list.

Those of you with metered bandwidth.. This is the ONLY way to save your a** a sh** ton of $$.
I can only hope that FS makes some changes VERY fast. It is in everyone's best interest. All old servers need to be removed from the master server list. The list needs to be changed to require some sort of encrypted string and to disallow certain connections. I'll be glad to provide a diagram of a simple authentication protocol I've made in case FS is interested. It's similar to GPG in how it works, but incredibly different and does not require an encrypted cipher.


EDIT: Addendum, I've also discovered the exploiters script also appears to be using connection verification functions as well. It seems it's only checking response of the IP though. That would make sense of course to only check the IP because you can't reliably check the port via UDP without getting your own medicine back at ya..

Perhaps another option would be to shut down the server completely for a period of time. Even with this option, you'd still have to remove your server from the master server list.

That being known.. EDIT I'll keep this a secret! :D . Oh I can't wait to get my hands on his grubby neck..

Edit (1-28-12 @ 11:58 AM): I've been monitoring all night several stacks.. So far, my above theory about explicit ICMP seems not to hold any water. This does not mean that there is no sort of connection verification. Just not through normal methods one may use for a simple verification. I've traced back several "odd" connections only to be led to things like qtracker (Why the are using a Mortgage firms IP subnet is WAY beyond me.) And also, several other "home-made" master list scripts (Such as UrtDB by wtf clan) etc.

Though, on a side note.. I couldn't believe how many Master Server scripts were out there.. All over the world, Sweden, Spain, UK, France (Although this is FS servers) etc. Many of them sending a slightly different connection string for getstatus and getinfo. (Strange). I've also found some servers that had WAY more exploit usage than others... This may be due to the fact that they are closer to offending server (Not quite sure.) I've contacted several ISP's an Host providers.. With this last instance I spoke of I suggested, since Comcast has metered bandwidth on it's customers, to have them send a warning of some sorts to this user letting them know that they are going to have a VERY large bill if they don't terminate their server. It seems the folks at Comcast were kind enough to oblige. They gave me no specifics, but the reaction of looking at their usage was... stark.


I just read the update about the Master Server List; this is GREAT news to hear that such changes will be implemented. I was definitely holding my breath on that one. Well, only to say that the implications of ongoing attacks could be severe and that I am ECSTATIC these changes are being made.

<rant>
I will also add something else as well... To those of you that do not understand the severity of the situation, don't comment on how URT is becoming "hidden" or "closed" or "harder to access info" etc etc. That is the most profoundly ignorant sort of thought I could ever hear! This exploit is NOT AT ALL limited to UrT. It's a Quake3 exploit. Meaning EVERY Quake3 game is vulnerable! At least FS is taking very strong heed at this and making a very workable resolution for us all!</rant>

Edit: (1-28-2012 18:34): Well, I've been working with several ISP's today to find the original sender. Because the packets are UDP, they are connectionless. This means validations is only done by packets. (Which as you can see in this case, is unreliable). This is a very long process indeed, but I am lining up the cards nicely.

I do have an advantage in the sense that I work for an ISP. Therefore, I can capture encapsulated packets pre-delivery. Unfortunately, I have to go through the daisy-chain of it all and contact the person that sent it before me and so on. It's been quite a hurdle because of legal issues. (Blah blah blah). Though the process has been slow, so far, the general response has been positive even though the latency of the response makes me want to bite my fingers off.

That being said, I hope to find out the true exploiter soon. This is not to say I won't hit a roadblock. Which I hope I do not because that could make things messy. Then again.. a subpoena is only $5 bucks.. So.. I'll just throw that into the lawsuit when I find this tool. So far, I'm 5 hops into this. Anyways.. I'll keep updating.

This post has been edited by Pussnboots: 29 January 2012 - 12:34 AM


#152 User is offline   Pussnboots Icon

  • Account: pussnboots
  • Joined: 01-March 10
  • Posts: 556

Posted 29 January 2012 - 08:51 PM

IMPORTANT
Well. Some good news perhaps. I've been able to narrow down who is the exploiter. If there is more than 1, I am unaware at this moment. But I am pleased to say with certainty, that the attacks are originating from Fort Collins, Colorado U.S.A.

I will provide more information as I can. For now, I'll start the legal process and get some subpoenas and send them to the 2 known providers this person is using. I will disclose the name and address of this individual when I find I can legally disclose this information.

Unfortunately, it is Sunday and no courts are open. I'll post updates as I get them.

#153 User is offline   mogul Icon

  • Account: mogul
  • Main tag: |<3|
  • Country:
  • Joined: 20-February 11
  • Posts: 350

Posted 29 January 2012 - 10:48 PM

You the man,pnb

#154 User is offline   Pussnboots Icon

  • Account: pussnboots
  • Joined: 01-March 10
  • Posts: 556

Posted 29 January 2012 - 11:45 PM

View Postmogul, on 29 January 2012 - 10:48 PM, said:

You the man,pnb


lol.. Not quite. There are still hurdles to get over which may be impassible. aka.. The law. But, I don't foresee any issues arising as far as that is concerned.

There are extra steps I have to take in order to ensure the process is followed "by-the-book". Those of which I will not mention here just yet. Of course, I don't know how cross-state legal issues proceed as each state has their own requirements. Say, if I need to get any legal documents directly from that state etc.

Anywho.. *fingers crossed*

#155 User is offline   whohah Icon

  • Account: whohah
  • Joined: 22-September 11
  • Posts: 1

Posted 30 January 2012 - 04:24 AM

The clients may need a patch also :

http://www.urbanterr...178#entry324178

Looks like the old quake3 issue still exists .?

http://www.derkeiler...5/msg00168.html

securityfocus/bugtraq/2006-05/msg00168.html

This post has been edited by whohah: 30 January 2012 - 04:24 AM


bullet_loaderAdvertisement

#156 User is offline   s.e.t.i. Icon

  •   former FS member   
    Engine Developer
  • Account: seti
  • Country:
  • Joined: 07-November 08
  • Posts: 504

Posted 30 January 2012 - 10:31 PM

View Postwhohah, on 30 January 2012 - 04:24 AM, said:

The clients may need a patch also :

http://www.urbanterr...178#entry324178

Looks like the old quake3 issue still exists .?

http://www.derkeiler...5/msg00168.html

securityfocus/bugtraq/2006-05/msg00168.html

You are incorrect, whohah. I responded to your concerns, as have the Ubuntu support forums. Your issue is one of local mismanagement of your install and running your game as root. The exploit you are talking about is over 5 years old and was resolved long ago.
Cheers... s.e.t.i.
[img]http://www.urbanterr...ers/13.0.80.png[/img]

#157 User is offline   Diggs Icon

  •   verified donator   
  • Account: diggs
  • Joined: 28-February 10
  • Posts: 89

Posted 02 February 2012 - 12:36 AM

The question arises as to how a server admin can tell if his host is running the patched build? How can the server be queried to find this out?
続けてゲーム

#158 User is offline   3spades Icon

  •   verified donor   
    Support Guy
  • Account: 3spades
  • Country:
  • Joined: 28-February 10
  • Posts: 389

Posted 02 February 2012 - 01:14 AM

Click server info when server is highlighted in game and look at version. If you want to query externally:

See bold text below.

$ qstat -R -q3s 72.26.193.228
...
g_gear=51,g_teamnamered=SPAZZY SPAS,g_teamnameblue=RETARR RETTAS,g_survivorrule=1,version=ioq3 1.35urt linux-i386 Jan 14 2012,sv_privateClients=0, Admin=3spades,
...

This post has been edited by 3spades: 02 February 2012 - 01:17 AM

urt.voxel.net :: Ruining your URT experience [2] weapons limited servers at a time.
Kevlar in CTF is like sex with a condom. Sure you get the general feel of things, but everyone would enjoy the game without it.

#159 User is offline   Diggs Icon

  •   verified donator   
  • Account: diggs
  • Joined: 28-February 10
  • Posts: 89

Posted 02 February 2012 - 04:35 AM

View Post3spades, on 02 February 2012 - 01:14 AM, said:

Click server info when server is highlighted in game and look at version. If you want to query externally:


Hmmm... Every server I game on shows the exact same Dec 20 2 in game and some of those servers I know are patched and some did not appear to be patched. Why I can't see the year in the date completely I don't know unless it is a resolution setting.
続けてゲーム

#160 User is offline   ButterdBread Icon

  •   verified user   

Posted 04 February 2012 - 11:30 PM

Any ideas when this might stop?
I'm using the patched files combined with iptables and it works quite well, but still my incoming traffic is way too high...
I mean, this can't go on indefinitely!

  • (27 Pages)
  • +
  • « First
  • 14
  • 15
  • 16
  • 17
  • 18
  • Last »
  • You cannot start a new topic
  • This topic is locked

1 User(s) are reading this topic
0 members, 1 guests, 0 anonymous users

Advertisement


Copyright © 1999-2024 Frozensand Games Limited  |  All rights reserved  |  Urban Terror™ and FrozenSand™ are trademarks of Frozensand Games Limited

Frozensand Games is a Limited company registered in England and Wales. Company Reg No: 10343942