Kaffis Mark V wrote:
So, wait. It's not distributed because you only had to block out 262k host addresses to block the actions of a few hundred bots, max?
I'm comfortable for allowing that there is a spectrum of efficiency and efficacy to DDoS attacks, and with that allowance, conceding that any DoS coming from more than one source can be said to be distributed.
Certainly, though, arbitrarily assigning an "aggretable" netblock isn't indicative of a DoS attack not being distributed. I can slap a 0.0.0.0 255.255.255.255 firewall rule down and stop any DDoS attack cold, but that doesn't mean it's an acceptable or practical defense.
So, I suppose, one way to approach this conversation is to ask, just how broad does the subnet (or rather, wildcard, I suppose) mask have to be in your firewall rule to qualify an attack as "distributed?"
First, a /14 isn't actually large. Second, if I had the sources, I could have made the filter a lot tighter, I'm certain.
Now, a DoS doesn't immediately become distributed when you have 1+n sources (where n is any nonzero positive integer), no matter how large or small n is. It requires diversity of netblocks, source ASNs, transit paths, etc. If you're attempting to mitigate an incident on a single firewall, you're close enough to the destination that whether it's a distributed denial of service, or just a denial of service is an entirely academic question. As a tangent, take two scenarios in which you are the target. In the first scenario, a single host is sending traffic and spoofing the source IP, setting from randomly generated IPs using the whole table. In the second scenario, diverse hosts are sending traffic spoofing the source IP to a single identical address. From the target's viewpoint, that second one is easier to filter, although it's actually the DDoS. Now back out a bit, where is the provider seeing the traffic enter their network? Is it coming through multiple peering/transit links, or just one? Going further toward the source (if possible), how many providers are seeing the traffic? How many ASNs are involved? You actually need to clear the diversity bar to classify an attack as distributed. When you're looking at a single ASN, and a single netblock, and probably a single Microsoft uplink, that's not clearing the bar.
Aegnor wrote:
I understand what you are saying, I just think you are wrong. You are using your own definition for a DDoS. You are saying it isn't a DDoS because it isn't a DDoS. That isn't an argument. The fact that the attack comes from sources that are in a single aggregate block, is completely irrelevant. It is still distributed across multiple systems. I'm curious what exactly your definition of a DDoS is.
Mookhow, it's still a DDoS, it is just an unintentional DDoS. I don't believe intent is necessary to satisfy the definition.
A small correction, I'm not sure if I misread, or if they changed the story, but it says that westeros was hit with "hundreds of requests per minute", not 200 requests per minute.
Hopefully I've addressed your first point.
Mookhow only addressed intent in order to classify it as an "attack", i.e. malicious.
Per
minute? Then that was a retardedly misconfigured web server, since that's only 4-16 requests per second.