How to prevent users from LAN to know the external local WAN IP ?
-
And yup, again going to say it again.
If your wanting to run with the big dogs, going to have to learn how to piss in the tall grass ;)
Hey I plugged in the switch and it worked.. I'm a network engineer ;)
If I could just keep everyone from knowing my IP they couldn't ddos me <rolleyes>
-
@JKnott said in How to prevent users from LAN to know the external local WAN IP ?:
@johnpoz said in How to prevent users from LAN to know the external local WAN IP ?:
then there a bajillion ways
I thought it was closer to a gazillion.
@JKnott said in How to prevent users from LAN to know the external local WAN IP ?:
@johnpoz said in How to prevent users from LAN to know the external local WAN IP ?:
then there a bajillion ways
I thought it was closer to a gazillion.
You are surrender! :)
-
Another one reason to care extremely well about DDoS is that source code of botnet creating system Mirai was in public access from 2016 and from this time amount of attacks of this kind rapidly grow.
Cryptocurrency give ability criminals to receive payments just sitting everywhere in the world. And creating attacks to anyone.
This mean You able to protect Yourself only by 2 ways (or in combination):
-
Using failover uplink (that mean doubling fiber cable connection, and additional agreement with ISP and a huge extra payment for traffic reservation for You);
-
Using cloud-based CDN with loading balance (in case of attack You downtime are only time for propagate renewed wan IPs, but here You also need to have ability quickly changing Your static WAN IPs, this mean additional agreement and monthly payment for uplink ISP and most of local ISP have no ability to make this in appropriate time slot, only Enterprise level of clients have this opportunity);
So, in real life if You are ordinary business, and if someone need to charge You several thousands of $$$, - that’s pretty easy.
Because You thinking all this wrote here in topic are just for “lovers of foil hats” and You newer going under DDoS.
Or may be You newer know about how the GitLab try to hide list of more than 5,000+ online shops that have malicious code in their CMS to collect credit cards data of customers?
More interesting that author of this research try to contact to this shops but receive “it's not our deal”, “we protected by https”, “we protected by PayPal”, or “this is coding mistake and not impact to our clients”, and so on... And more of shops in this list working until today.
Madness? Story for “foil hat lovers”? REALITY!
Just google this story... -
-
@johnpoz said in How to prevent users from LAN to know the external local WAN IP ?:
^ exactly... The only solution to "hide" for a ma and pop setup is vpn service or proxy... But that doesn't actually fix the problem... Its just trying to hide.. If they get your IP, they still can ddos you...
This is why you need to work with your ISP when your such a small fish.
Totally agree.
-
@stephenw10 said in How to prevent users from LAN to know the external local WAN IP ?:
Yeah, that^. Works great in that sort of situation... if you are willing to pay for it.
Not really possible for 5 static IPs at your office though. Only the ISP can do anything there.
See my earlier 'use a tunnel' comment.
Steve
In my current office in Kyiv we have more than 5 already :) -
@johnpoz said in How to prevent users from LAN to know the external local WAN IP ?:
@Sergei_Shablovsky said in How to prevent users from LAN to know the external local WAN IP ?:
This work only attack point on FQDN, but if attack pointed on Your real main gate IPs - nothing to do with this :)
Huh? Has zero to do with what fqdn might point to an IP.. We advertise what networks are used, the actual route is changed for network 6.15.0.0/16 as an example.
We have multiple networks routed to our connections in our DCs - multiple customers using different networks, /24s for example.. These routes are advertised via bgp to the internet...
So no dns record pointing to an IP has zero to do with the mitigation of such volumetric ddos attack.
I suggest you take a look at how such a service I linked to works.
But no such services don't work for small ma and pop setups where the ISP gives you IP address X to work with..
Thank You, I would pay more attention to this.
You trying to hide your IP is not a security anything - security through obscurity doesn't fix the actual problem.. Its trying to hide your head in the sand hoping the bad guy doesn't find you.
This is no-end game :)
-
@johnpoz said in How to prevent users from LAN to know the external local WAN IP ?:
@Sergei_Shablovsky said in How to prevent users from LAN to know the external local WAN IP ?:
This work only attack point on FQDN, but if attack pointed on Your real main gate IPs - nothing to do with this :)
Huh? Has zero to do with what fqdn might point to an IP.. We advertise what networks are used, the actual route is changed for network 6.15.0.0/16 as an example.
We have multiple networks routed to our connections in our DCs - multiple customers using different networks, /24s for example.. These routes are advertised via bgp to the internet...
So no dns record pointing to an IP has zero to do with the mitigation of such volumetric ddos attack.
But no such services don't work for small ma and pop setups where the ISP gives you IP address X to work with..
You trying to hide your IP is not a security anything - security through obscurity doesn't fix the actual problem..
Sorry my English. But I wrote the same: no matter how DDoS pointed on You
-
You receive all traffic on Your main gate static WAN IPs (or upstream ISP’s router, if attacker know it’s IPs);
-
Your ISP(s) receive all traffic pointed on You (because DNS records point on them);
In both cases (even You try to change static main gate WAN IPs once a hour :) - traffic overload the link capacity and Your services would be switched off (by Yourself in first case and by uplink ISP(s) in second case).
-
-
@johnpoz said in How to prevent users from LAN to know the external local WAN IP ?:
If your trying to run a business, and your worried about ddos then really the correct solution is to get with your ISP about ddos protection.. Any major isp you get your connection from will offer ddos mitigation services, be it as a pay you go option or as an insurance sort of option you buy, etc.. They will provide you with a specific threat number to call if your under attack, etc. etc..
As I wrote previously, the cost of DDoS nowadays are much lower for attacker, and profit loss for business are comparatively high than attacker charge You, but the same time this profit loss for business are much less than yearly TOC for ISP service to against DDoS attacks like this.
These are all things you have to take into account as your company grows and your connection becomes vital to the business, and not just your workers shopping amazon on their free time ;) on your $100 a month "business line" ;)
Here is the thing - none of its free! Thinking your going to find some solution with a 20$ a month vpn service is just plain nonsense..
In my reply’s I try each time point that our topic is not for “gamers that need solution for $20-100” ;)
If your wanting to run with the big dogs, going to have to learn how to piss in the tall grass ;)
Agree but here we return to point that I wrote before: most of osiers here on pfSense are small/middle rage business (in best case) and not able to pay $500-2k for ISP service this kind.
-
@gcu_greyarea said in How to prevent users from LAN to know the external local WAN IP ?:
So we went all the way - from "hiding WAN IP from internal users" to "protecting an enterprise from DDOS".
And we want all of that for free :)
If you cannot afford to host you application/website with one of the large providers you could still try this.
Rent a small VPS. Buy sufficient bandwidth and CPU to run a reverse proxy...
Connect to you VPS via VPN. Run all your public facing websites or application front-ends off the VPS...
Do the processing and Databases etc at home.
If you VPS gets attacked - switch over to another one...
And yes, there will be latency and costs of some sort.
Totally agree.
I more than sure the topic would be helpful for much more people’s in this forum. And this is also good for pfSense company ;)
-
@johnpoz said in How to prevent users from LAN to know the external local WAN IP ?:
And yup, again going to say it again.
If your wanting to run with the big dogs, going to have to learn how to piss in the tall grass ;)
Hey I plugged in the switch and it worked.. I'm a network engineer ;)
If I could just keep everyone from knowing my IP they couldn't ddos me <rolleyes>
C'mon, my friend, I love You ! ;)
One of my work are network engendering also.But hardware are nothing about solution.
We need to thinking widely, what we may propose to our employee and how this solution help our employee to running business and to solving his potential problems in a future.
-
Dude if you think hiding your IP is some sort of solution to anything your mistaken...
If you suggest hiding your IP as solution - you shouldn't have a job in the field. Plain and simple!
-
If you're big enough to have static IPs but not big enough to have a routed subnet that you advertise then there is no easy (cheap?) solution here. Only the ISP can do anything about a DoS attack in that instance so they can charge whatever they want for doing that.
Steve
-
in the 90's i remember there was this conspiracy theory that antivirus computers create viruses in order to sell antivirus software... say no more ... now that your isp know your fear it will ddos you to take your money ... big fish eat small fish !
-
This is not pfSense specific. Moving it to off-topic to continue.
-
@kiokoman said in How to prevent users from LAN to know the external local WAN IP ?:
in the 90's i remember there was this conspiracy theory that antivirus computers create viruses in order to sell antivirus software... say no more ... now that your isp know your fear it will ddos you to take your money ... big fish eat small fish !
Because amateur may be You newer come under real DDoS.
P.S. Another perfect example of new attacks vectors, that You may newer know https://www.washingtonpost.com/news/innovations/wp/2017/07/21/how-a-fish-tank-helped-hack-a-casino/