2021 DDoS Issue

I am also a big fan of Mikrotik RouterOS systems, they are very simple to setup, manage, and apply firewall/access rules to. I've run multiple ones for SMB's and they are rock solid.

The CRS326-24S+2Q+RM is overkill as he will never get a QSFP+ line run from the Colo to his rack unless it's sub 10M. The cable cost alone will be fucking insane. A 10gbps native RouterOS built device CCR1036-8G-2S+ will give Dual 10gbps connetions to the colocation for redundancy, redundant power, and an m.2 slot for a quick network cache. Downside is only 8 network ports @ 1gpbs. I'd have to look to see if you can bond multiple lines together via the device.

I'll assume @Null that your server(s) have 1gb network cards in them? Would you be willing to upgrade them, or can you upgrade them, to 10gbps cards?

I personally would stay away from Fiber at all costs unless you want to go full on fiber for everything at which there are other models of Routers to recommend. Fiber is expensive and there is little to gain from using fiber sub 10gbps speed.

At some point you will reach the tipping point of separating your Router from your Switch for 2 devices. In fact that might be a better idea to have TWO routers in a Round Robin mode to alleviate some of the stress on your router. This will require some networking guru work and some special software but you alleviate the bottleneck and make it difficult (not impossible) to take your network down.

PFSense is a fantastic piece of software and very customizable, buy the hardware which comes with a support contract and you'll get some Sales Engineer support as well to advise you on Best practices:

Whatever you do, at this rate, DO NOT ROLL YOUR OWN ROUTER SOFTWARE AND INSTALL IT ON A SERVER! DO NOT! NO NO NO NO NO. Your life is fucking hell as it is, and to troubleshoot HARDWARE as well as SOFTWARE is a pain in the proverbial dick. If you want to enjoy your time in Estoniastan spend the money get a refurb ENTERPRISE grade equipment and call it a day. It's cute for the house but not for high traffic sites like this. If you like sleep you won't do this.

P.S. Don't hate me for tagging you.
Load balancing across two routers is a lot harder than most people think it is. Bear in mind that he’s in colo, paying per rack unit, and only has 1 upstream carrier, 1 advertisable /24, and most likely 1 physical uplink

On the ‘round robin’ front, the biggest problem by far is that you only get 1 uplink from your carrier, even if you’re in a DC and they’ve given you a cross connect to the carrier. You can only plug this into 1 device. Sure, you can put a switch in front of it and plug 2 routers into it, but this doesn’t load balance your traffic across both.

HSRP (Cisco) or VRRP work by floating 1 IP address across multiple devices; there is always a master, and the traffic always goes to the master. All the switch in front will see is a MAC address sitting on one port, and that is where it will forward traffic

if you want to load balance across two routers, you need a switch operating at layer 3, with ECMP set up on the switch pointing to both of the routers. If Josh did this, the switch would have to advertise his prefix to his upstream peer which just means his switch would just end up becoming a router anyway. At this point, just go and buy a router and forget the switch, or buy a mellanox SN2700

Also, I’d like to address the whole ‘everything SFP is expensive’ I’ve seen on here from a few people:

My advice:
Easy mode: buy a thicc ass box in a 1RU form factor with a dedicated NPU/ASIC that can handle DoS protection, firewall, and routing all in 1 box. Cisco, Palo, Juniper or Fortinet all have boxes for this, my personal recommendation is Fortinet (see my post above) just because of personal experience. Not gonna hate on the cheaper vendors like Mikrotik, just haven’t used them that much.

Hard mode: buy a 1RU server with a good cpu and at least 16GB memory, buy some 10GbE SFP+ NICs off ebay (mellanox pls), install RHEL and run FRR.
 
fpga vs. higan latency. Those are my thoughts at the moment. Is there a platform where higan could function with the least overhead?

- spergy newfag (hi everybudy)
 
  • Autistic
Reactions: awoo and 820㎌Cap
637607340495587030.png

don't know if this helps or not. asked my IT friend if he had any suggestions and this is what he came back with

 
Load balancing across two routers is a lot harder than most people think it is. Bear in mind that he’s in colo, paying per rack unit, and only has 1 upstream carrier, 1 advertisable /24, and most likely 1 physical uplink

On the ‘round robin’ front, the biggest problem by far is that you only get 1 uplink from your carrier, even if you’re in a DC and they’ve given you a cross connect to the carrier. You can only plug this into 1 device. Sure, you can put a switch in front of it and plug 2 routers into it, but this doesn’t load balance your traffic across both.

HSRP (Cisco) or VRRP work by floating 1 IP address across multiple devices; there is always a master, and the traffic always goes to the master. All the switch in front will see is a MAC address sitting on one port, and that is where it will forward traffic

if you want to load balance across two routers, you need a switch operating at layer 3, with ECMP set up on the switch pointing to both of the routers. If Josh did this, the switch would have to advertise his prefix to his upstream peer which just means his switch would just end up becoming a router anyway. At this point, just go and buy a router and forget the switch, or buy a mellanox SN2700

Also, I’d like to address the whole ‘everything SFP is expensive’ I’ve seen on here from a few people:

My advice:
Easy mode: buy a thicc ass box in a 1RU form factor with a dedicated NPU/ASIC that can handle DoS protection, firewall, and routing all in 1 box. Cisco, Palo, Juniper or Fortinet all have boxes for this, my personal recommendation is Fortinet (see my post above) just because of personal experience. Not gonna hate on the cheaper vendors like Mikrotik, just haven’t used them that much.

Hard mode: buy a 1RU server with a good cpu and at least 16GB memory, buy some 10GbE SFP+ NICs off ebay (mellanox pls), install RHEL and run FRR.
The suggestion I had was based arround advertising different IPs on each router and doing load balancing via DNS. Seems like the problem Null is facing is just arroud the router shitting itself due to crap traffic, as opposed to requiring 'real' routing capacity as with most enterprise setups.

It's just the volume of shite that's being the problem, if that gets stripped out by a pair of routers, a single high-end router or a 1u pizza box, end result is the same. Going by traffic graphs does not look like link itself is saturated.

I guess that if Null manages to deal with the router shitting itself, they're just going to ramp up on L7 attacks or increase the traffic volume and saturate the interface. Presuming the router attack was easiest and cheapest option (low hanging fruit)
 
View attachment 2308188
don't know if this helps or not. asked my IT friend if he had any suggestions and this is what he came back with

This was my biggest concern being data exfiltration, DDoS attacks are usually smokescreens to cover for a more sophisticated attack. Though they've shown that they are pretty much just script kiddying it and just know "haha I push button site go down.

I also second the Fortigate/Corero pitch, we have a lot of high risk DC customers that swear by them, the user interfaces are pretty friendly as well.
 
My advice:
Easy mode: buy a thicc ass box in a 1RU form factor with a dedicated NPU/ASIC that can handle DoS protection, firewall, and routing all in 1 box. Cisco, Palo, Juniper or Fortinet all have boxes for this, my personal recommendation is Fortinet (see my post above) just because of personal experience. Not gonna hate on the cheaper vendors like Mikrotik, just haven’t used them that much.
Name something specific please
 
The suggestion I had was based arround advertising different IPs on each router and doing load balancing via DNS. Seems like the problem Null is facing is just arroud the router shitting itself due to crap traffic, as opposed to requiring 'real' routing capacity as with most enterprise setups.

It's just the volume of shite that's being the problem, if that gets stripped out by a pair of routers, a single high-end router or a 1u pizza box, end result is the same. Going by traffic graphs does not look like link itself is saturated.

I guess that if Null manages to deal with the router shitting itself, they're just going to ramp up on L7 attacks or increase the traffic volume and saturate the interface. Presuming the router attack was easiest and cheapest option (low hanging fruit)
Yeah, looks like the routers are just struggling to deal with the bad requests. I think a beefier box is the simplest option, if perhaps not the cheapest

DNS load balancing is not a bad idea, but from the looks of it, this guy is targeting the actual IPs; DNS-LB won’t help against these attacks so there probably isn’t much point.
 
Yeah, looks like the routers are just struggling to deal with the bad requests. I think a beefier box is the simplest option, if perhaps not the cheapest

DNS load balancing is not a bad idea, but from the looks of it, this guy is targeting the actual IPs; DNS-LB won’t help against these attacks so there probably isn’t much point.
DNS LB is only for web traffic - ddos traffic will go to individual IP addr, but they'll need 2x as much of it to bring down two routers. DNS LB should also keep customer traffic flowing even if one of the routers does die. Should also scale nicely - still having issues, add another router.

Doesn't help when someone just switches to another attack mode tho
 
Load balancing across two routers is a lot harder than most people think it is. Bear in mind that he’s in colo, paying per rack unit, and only has 1 upstream carrier, 1 advertisable /24, and most likely 1 physical uplink

On the ‘round robin’ front, the biggest problem by far is that you only get 1 uplink from your carrier, even if you’re in a DC and they’ve given you a cross connect to the carrier. You can only plug this into 1 device. Sure, you can put a switch in front of it and plug 2 routers into it, but this doesn’t load balance your traffic across both.

HSRP (Cisco) or VRRP work by floating 1 IP address across multiple devices; there is always a master, and the traffic always goes to the master. All the switch in front will see is a MAC address sitting on one port, and that is where it will forward traffic

if you want to load balance across two routers, you need a switch operating at layer 3, with ECMP set up on the switch pointing to both of the routers. If Josh did this, the switch would have to advertise his prefix to his upstream peer which just means his switch would just end up becoming a router anyway. At this point, just go and buy a router and forget the switch, or buy a mellanox SN2700
PFSense does the same thing with High Availability Routing (Virtual IP):

I was mistaken that the routers would be unable to Round Robin without something in the middle to handle the traffic. Too much time in TEH CLOUD.
I have used PFSense to do this and it works well.
 
Last edited:
Name something specific please
First choice would be the Fortigate 500E, but you said you need 3 SFP+ ports and the 500E only has 2.
Other highlights on the 500 are in my previous post a couple of pages back
the 200F has 4, but has a smaller routing throughput and a lot less memory (4gb from memory).
Anything above 600 in the Fortinet range is too expensive.

you could also look at the Juniper SRX1500, which has 4 SFP+ ports, but juniper is a very different world config-wise when compared with Cisco…. Takes a while to pick up.



Better question though, why do you need at least 3 SFP+? Why not just slap a cheap 10GbE switch behind the firewall, then go 1 10GbE to the carrier, and 1 10GbE to the switch?

on another note, it might be worth looking at something like this for our-of-band management:
 
So whats a good way to anonymously send crypto if i was an idiot who bought crypto on a certain well known exchange? The fact that a bunch of idiots are paying for this on twitter pisses me off.

As for DDOS protection, i wish i had paid more attention in my networking classes. If i find something ill let ya know
 
Back