• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Forum running slow again?

Forum Feedback
13
20
3.8k
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • B
    biggsy
    last edited by Aug 10, 2015, 7:45 AM

    Anyone else seeing long delays in loading pages?

    1 Reply Last reply Reply Quote 0
    • N
      NOYB
      last edited by Aug 10, 2015, 7:48 AM

      Yup.  Running slow for me too.  Slow enough that I gave up waiting several times.

      1 Reply Last reply Reply Quote 0
      • ?
        Guest
        last edited by Aug 10, 2015, 10:11 AM Aug 10, 2015, 8:17 AM

        No, likes every day fast and liquid.
        From Germany here at 10:15 AM

        Now it sucks, pages are really needing long time to load.
        From Germany here at 10:26 AM

        Now its all liquid and fast again at 12:08 PM

        1 Reply Last reply Reply Quote 0
        • D
          divsys
          last edited by Aug 10, 2015, 2:33 PM

          Pretty laggy for me right now.

          ~25s to load a thread 2015-08-10 07:30 PDT.

          -jfp

          1 Reply Last reply Reply Quote 0
          • S
            Supermule Banned
            last edited by Aug 10, 2015, 4:18 PM

            Its must be a misconfigured appliance somewhere :D

            1 Reply Last reply Reply Quote 0
            • D
              Derelict LAYER 8 Netgate
              last edited by Aug 10, 2015, 5:46 PM

              Interestingly, it's working fine IPv6.

              Chattanooga, Tennessee, USA
              A comprehensive network diagram is worth 10,000 words and 15 conference calls.
              DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
              Do Not Chat For Help! NO_WAN_EGRESS(TM)

              1 Reply Last reply Reply Quote 0
              • C
                cmb
                last edited by Aug 10, 2015, 6:12 PM

                @Supermule:

                Its must be a misconfigured appliance somewhere :D

                read: Supermule is DDoSing us again. We banned him after this admission (no one other than whoever launched the attack could have any knowledge that's what was occurring), and as soon as he saw that, it came back. The attack that started immediately after he saw he was banned is still going on, now the longest of any attack that's been launched at us.

                @Derelict:

                Interestingly, it's working fine IPv6.

                Only getting DoSed on IPv4 so only null routed the v4 IP. Only reachable on IPv6 at the moment, until either the attack stops, or we finish architecting around the issue.

                1 Reply Last reply Reply Quote 0
                • D
                  doktornotor Banned
                  last edited by Aug 10, 2015, 7:04 PM

                  @cmb:

                  read: Supermule is DDoSing us again. We banned him after this admission (no one other than whoever launched the attack could have any knowledge that's what was occurring), and as soon as he saw that, it came back.

                  1 Reply Last reply Reply Quote 0
                  • D
                    Derelict LAYER 8 Netgate
                    last edited by Aug 10, 2015, 7:12 PM

                    So is it a proper DDoS or is it something tickling the asserted problem in pfSense SYN handling?

                    Chattanooga, Tennessee, USA
                    A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                    DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                    Do Not Chat For Help! NO_WAN_EGRESS(TM)

                    1 Reply Last reply Reply Quote 0
                    • J
                      johnpoz LAYER 8 Global Moderator
                      last edited by Aug 10, 2015, 8:47 PM

                      So supermule botnet doesn't have ipv6 capabilities ;) hehehehe

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                      1 Reply Last reply Reply Quote 0
                      • J
                        jwt Netgate
                        last edited by Aug 10, 2015, 9:06 PM

                        supermule (who's name is really Brian) is unlikely to have a botnet.  He has a bit of code, written by someone else, that he loves to inflict on innocent parties.  That code doesn't do anything with IPv6.

                        This whole thing is Charlie Foxtrot.

                        1 Reply Last reply Reply Quote 0
                        • ?
                          Guest
                          last edited by Aug 10, 2015, 9:15 PM

                          We banned him after this admission…....

                          So why we can see him even here in the forum if he is banned?

                          resend1_2.jpg
                          resend1_2.jpg_thumb

                          1 Reply Last reply Reply Quote 0
                          • M
                            mer
                            last edited by Aug 10, 2015, 9:28 PM

                            @BlueKobold:

                            We banned him after this admission…....

                            So why we can see him even here in the forum if he is banned?

                            "Banned" typically means "login disabled".  It would take a bit more effort to scrub the database of posts.

                            1 Reply Last reply Reply Quote 0
                            • C
                              cmb
                              last edited by Aug 11, 2015, 6:45 AM Aug 10, 2015, 9:38 PM

                              @Derelict:

                              So is it a proper DDoS or is it something tickling the asserted problem in pfSense SYN handling?

                              100K new connections/sec sustained of passed traffic is more than a C2758 will handle. Every DDoS that's been targeted at us has been a "proper DDoS", e.g. more new connections/sec than a C2758 can handle. More than most commercial firewalls can reasonably handle for that matter.

                              No super-top-secret recipe, just blast 100K/sec of spoofed source SYNs.

                              1 Reply Last reply Reply Quote 0
                              • C
                                cmb
                                last edited by Aug 10, 2015, 9:39 PM

                                @BlueKobold:

                                We banned him after this admission…....

                                So why we can see him even here in the forum if he is banned?

                                He was only banned, didn't delete his account.

                                1 Reply Last reply Reply Quote 0
                                • ?
                                  Guest
                                  last edited by Aug 10, 2015, 9:51 PM

                                  @cmb:

                                  @BlueKobold:

                                  We banned him after this admission…....

                                  So why we can see him even here in the forum if he is banned?

                                  He was only banned, didn't delete his account.

                                  Ahh, my thinking fault, thanks for the enlightenment!

                                  1 Reply Last reply Reply Quote 0
                                  • M
                                    maverick_slo
                                    last edited by Aug 11, 2015, 5:48 AM

                                    It's kinda funny that one guy with a simple script can bring down your any for that matter any pfsense protected network  ::)
                                    Makes you think…

                                    1 Reply Last reply Reply Quote 0
                                    • C
                                      cmb
                                      last edited by Aug 11, 2015, 6:45 AM

                                      @maverick_slo:

                                      It's kinda funny that one guy with a simple script can bring down your any for that matter any pfsense protected network  ::)
                                      Makes you think…

                                      No, any stateful firewall protected network where you're passing any traffic from untrusted networks. How big of an attack you can take in that case depends on how big of a box you have. To handle the number of new connections/sec that was thrown at us with a Cisco ASA, you'd need one of the two biggest 5585-X models. Starting at about $100K USD. And you wouldn't be too far from their stated new connections limit. Hence the "fundamental misapplication of technology" re: using a stateful firewall to process a DDoS (or DDoS-like traffic, just spoofed source often).

                                      1 Reply Last reply Reply Quote 0
                                      • M
                                        mer
                                        last edited by Aug 11, 2015, 11:11 AM

                                        cmb/jwt/johnpoz/et al: thanks for getting the problems squared away;  yesterday felt like a junkie trying to get a fix.  :o

                                        It's always about resources.  You can get hardware to handle the raw packet load, but then you spend all your time throwing the bad packets away and not doing any useful work.  5 gallon bucket with a 1 gal/minute drain getting filled at 2 gallons/minute, something has to give.  Getting a bigger bucket delays the inevitable.  Getting a 3 gal/minute drain works until you start filling at 5 gal/minute.

                                        1 Reply Last reply Reply Quote 0
                                        • P
                                          phil.davis
                                          last edited by Aug 11, 2015, 11:55 AM

                                          spoofed-DDOS (sDDOS, a new acronym?) really should be stopped at each ISP before it gets onto the internet backbone:
                                          a) Customers with public IPS:
                                          Each ISP has customers connected and knows what public IPs it has allocated to those customers. If it receives any packets from a customer with a source IP that is not one of the customer's proper allocated public IPs then drop the packet.

                                          b) Customers who are not given public IPs but are in a CGN or similar managed by the ISP and who end up on shared public IPs:
                                          The ISP can filter internally to make sure individual customer packets have source IPs that match the internal IP given to the customer.
                                          In any case the ISP will NAT this stuff out to the public internet so dodgy source IPs will (should) be NATed out to be the ISP public IP. Thus the "spoofed" and "distributed" are not effective. It becomes like an ordinary "DOS".

                                          c) In regions/countries where there are small ISPs that are [not willing|can't be trusted|do not have the technical skill] to do this filtering of traffic from their customers, then the next level up part of the backbone (to which these ISPs connect) should filter traffic, making sure that the source IP of all traffic received from "small and dodgy ISP X" is actually one of the public IPs that is allocated and routed to that ISP.

                                          If that was put in place, then end-customers could not mount spoofed DDOS attacks just from a single place.

                                          They could still do ordinary DOS from 1 or a few of their own source IPs. But that is easier to mitigate because the firewall can have pass rules that limit the number of new connections per second from each source IP and quickly start dropping the incoming SYN packets without creating state… - which should be much less processor intensive and not fill the state table.

                                          And of course if someone has a bot that that they have managed to get installed in 1 million hosts via some malware then they can mount a real DDOS, rather than sDDOS.

                                          As the Greek philosopher Isosceles used to say, "There are 3 sides to every triangle."
                                          If I helped you, then help someone else - buy someone a gift from the INF catalog http://secure.inf.org/gifts/usd/

                                          1 Reply Last reply Reply Quote 0
                                          1 out of 20
                                          • First post
                                            1/20
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.