Community discussions

MikroTik App
 
User avatar
marsark
Member Candidate
Member Candidate
Topic Author
Posts: 138
Joined: Mon Jul 20, 2009 4:02 pm
Location: Prague, Czech Republic

CCR1036-8G-2S+EM taken down by 200kpps DDoS

Sun Oct 05, 2014 12:50 am

Hi,

our CCR1036-8G-2S+EM (ROS 6.11, Connection tracking enabled) was taken down by 200kpps DDoS in a role of a firewall yesterday. Some details about incoming traffic: target was IP address of our SMTP relay server, traffic came from different IPs and random port. Type UDP packets, size from 128 to 255B. Destination ports also random. CCR was congested up to 100% and became unresponsive. So we cut of our upstream, setup deadhole routing at the edge of our AS, rebooted CCR and connect our upstream again.

:)
You do not have the required permissions to view the files attached to this post.
 
FutileNetworks
newbie
Posts: 36
Joined: Tue Jan 15, 2013 9:14 pm

Re: CCR1036-8G-2S+EM taken down by 200kpps DDoS

Mon Oct 06, 2014 12:55 am

I'm not sure why but the CCR routers seem hopelessly inadequate dealing with DDoS, MikroTik's performance figures boast 15 mpps but under DDoS they will fall over with only 200 or so kpps.

I've tested the 1036-12G-4S using the hping3 tool and been able to lock up the router with less than 100 mbit of traffic.

I'm hoping ROS V7 will come with an optimised and improved routing engine but until then I created some firewall rules to add the dst IP to an address list with a 5 minute timeout if pps exceeds 150 kpps, once in the address list all traffic to that IP is dropped but there are a few exceptions if say it's a web server then port 80 is kept open but limited to 1 kpps.

I've also written a script that adds a real time blackhole to our upstreams BGP blackhole server if the attack is sustained and over a certain threshold.
 
DLNoah
Member Candidate
Member Candidate
Posts: 144
Joined: Fri Nov 12, 2010 5:33 pm

Re: CCR1036-8G-2S+EM taken down by 200kpps DDoS

Mon Oct 06, 2014 1:18 am

If you're doing simple queuing on the CCR, you'll have better performance out of v6.19 and newer; MT made optimizations to the process that balances queue handling across the multiple cores.
 
User avatar
marsark
Member Candidate
Member Candidate
Topic Author
Posts: 138
Joined: Mon Jul 20, 2009 4:02 pm
Location: Prague, Czech Republic

Re: CCR1036-8G-2S+EM taken down by 200kpps DDoS

Thu Oct 09, 2014 12:05 am

I upgraded to 6.20, let see what happens next time :)
 
iluxa85
just joined
Posts: 4
Joined: Fri Apr 03, 2015 8:14 pm

Re: CCR1036-8G-2S+EM taken down by 200kpps DDoS

Fri Apr 03, 2015 8:23 pm

Colleagues good time.
There is a BGP router to mikrotike Cloud Core Router 1036-8G-2S + EM
To test the use 10Gigabitny port SFP +
BGP runs fine.
Decided to test the router.
From another data center generates a flood on the order of 500 megabits and packages about 300kpps
DDoS test server which is behind mikrotik.
That eventually got to download all 36 cores in the regiment and through 3-5minut router falls, tears bgp.
The router management interface is configured on another port while the management interface also
stops responding.

Here's a picture with a 10G port
then the router dies.Image
 
iluxa85
just joined
Posts: 4
Joined: Fri Apr 03, 2015 8:14 pm

Re: CCR1036-8G-2S+EM taken down by 200kpps DDoS

Fri Apr 03, 2015 8:24 pm

Colleagues good time.
There is a BGP router to mikrotike Cloud Core Router 1036-8G-2S + EM
To test the use 10Gigabitny port SFP +
BGP runs fine.
Decided to test the router.
From another data center generates a flood on the order of 500 megabits and packages about 300kpps
DDoS test server which is behind mikrotik.
That eventually got to download all 36 cores in the regiment and through 3-5minut router falls, tears bgp.
The router management interface is configured on another port while the management interface also
stops responding.

Here's a picture with a 10G port
then the router dies.
 
iluxa85
just joined
Posts: 4
Joined: Fri Apr 03, 2015 8:14 pm

Re: CCR1036-8G-2S+EM taken down by 200kpps DDoS

Fri Apr 03, 2015 8:26 pm

Colleagues good time.
There is a BGP router to mikrotike Cloud Core Router 1036-8G-2S + EM
To test the use 10Gigabitny port SFP +
BGP runs fine.
Decided to test the router.
From another data center generates a flood on the order of 500 megabits and packages about 300kpps
DDoS test server which is behind mikrotik.
That eventually got to download all 36 cores in the regiment and through 3-5minut router falls, tears bgp.
The router management interface is configured on another port while the management interface also
stops responding.

Here's a picture with a 10G port
then the router dies.
 
iluxa85
just joined
Posts: 4
Joined: Fri Apr 03, 2015 8:14 pm

Re: CCR1036-8G-2S+EM taken down by 200kpps DDoS

Fri Apr 03, 2015 8:28 pm

Colleagues good time.
There is a BGP router to mikrotike Cloud Core Router 1036-8G-2S + EM
To test the use 10Gigabitny port SFP +
BGP runs fine.
Decided to test the router.
From another data center generates a flood on the order of 500 megabits and packages about 300kpps
DDoS test server which is behind mikrotik.
That eventually got to download all 36 cores in the regiment and through 3-5minut router falls, tears bgp.
The router management interface is configured on another port while the management interface also
stops responding.

Here's a picture with a 10G port
then the router dies.

Schedule download network interface:
http://pixs.ru/showimage/Skrinshot2_741 ... 912807.png
 
lavv17
Member Candidate
Member Candidate
Posts: 120
Joined: Sat Sep 01, 2007 9:01 am

Re: CCR1036-8G-2S+EM taken down by 200kpps DDoS

Wed Sep 13, 2017 5:20 pm

Any news on the issue? I've problems with 300kpps flood with connection tracking disabled.
 
idlemind
Forum Guru
Forum Guru
Posts: 1146
Joined: Fri Mar 24, 2017 11:15 pm
Location: USA

Re: CCR1036-8G-2S+EM taken down by 200kpps DDoS

Wed Sep 13, 2017 5:29 pm

Any news on the issue? I've problems with 300kpps flood with connection tracking disabled.
One of your best tools will be to implement a solution that identifies the malicious traffic in a way that it can be blocked at layer three via routing. One of the earlier posters talked about their solution with scripts.

I've seen all nature of solutions on a detailed scale. To get it working that's what they all do. Identify traffic behind a main router and then distribute and manage black hole routes in the network in front of the more performance sensitive inspection devices.

Additionally you may see better performance with rules in the RAW table. I can't remember if that tracks PPS though.

Who is online

Users browsing this forum: jaclaz, makrob, Sacred9670 and 101 guests