[nycbug-talk] Stablity fixed??? Maybe???

Isaac Levy ike
Mon Jul 4 17:03:06 EDT 2005


Hi Matt,

Your comment made me want to share an experience from when I worked  
with a web hosting company,

On Jul 3, 2005, at 11:18 PM, Matt Juszczak wrote:

>> so you where not monitoring the system while you where doing the  
>> test?
>> you could also try running some combo of script+screen or syslog to
>> get data of system resource usage/interrupt usage etc.  this may give
>> us more info into what exactly is going on your system when it stops
>> responding...has the box wedged or are there just a ton of requests
>> that are starving resources like sshd from responding...
>>
>
> I think its the ton of requests response ... the box hasn't done it  
> since I added some changes into postfix's config.

This makes me ask myself, could your server be under deliberate  
malicious attack, and postfix is choking things?

Here's why I come to that conclusion:
At my small old web-hosting, we had over 1,000 hosted domains when I  
worked there- lots of activity.

Mail, became our worst nightmare- (and time/money waster), because it  
most frequently became the target for spacker attacks.  (Wired made  
up that word, it fits: http://www.encyclopedia-online.info/Spacker)   
There's serious money providing incentive for all the nastiest system  
crackers to own boxes for the spammers...

Anyhow, we dealt with attacks of all shapes and sizes, but one I find  
relevant to your situation here:

ATTACK:
Email Subject string-overflow attacks.  The attacker was sending  
massive volumes of spam (DDOS through bot-nets) to our box with over  
256 characters in the subject heading.

RESULT OF ATTACK:
Cyrus was our MTA of choice then, with Exim as the LTA (On FreeBSD  
4.x back then).  This attack was aimed at an esoteric flaw in the  
mechanism Cyrus uses to hand off messages to Exim for local delivery,  
a queue which used BerkeleyDB would explode, and the MTA would hang,  
and die, without much to go on in the logs.

INTERPERTED AIM OF ATTACK:
There were other reports that attackers were performing this attack  
to try to get us to bring a fresh Cyrus box online to replace it,  
hoping that we'd bring it online and still be configuring it, so they  
could take advantage of the fresh box while we were configuring it-  
and attempt to root the system alltogether.  This exact situation  
happened to another ISP, and they were effectively blackmailed- as  
the attacker didn't care if email came in/out from all the user  
accounts while they spammed, (and any other ISP's clients sure  
do!!!)  In their case, they had to take down the mail servers,  
rebuild them offline, while dealing with a ton of support calls from  
angry customers who wanted their email.

SHORT-TERM RESOLUTION:
To find this problem, a few troubleshooting methods (out of many  
things) were valuable:

ktrace was used to finally find the MTA was locking the server (we  
had no core dumps, anything, to go from)

network sniffers (ettercap then) was used to scan all mail coming in,  
from a neighboring box- and we found the extra-long subject headings  
that way.

google employed to find some esoteric notes on others who'd faced  
similar attacks, and we contacted them immediately.  They shyly gave  
us info about how they resolved their attack, who attacked them  
etc..., and that helped us out a lot.

LONG-TERM RESOLUTION:
We riped out the part of Cyrus that talks to the LTA, the stuff which  
uses BerkelyDB, and replaced it with a different embedded DB-  
(skiplist), which was modified to mitigate this, and a number of  
other problems- and I believe that the Cyrus folks integrated a fix  
in a later release.

All of that, just for the spackers.

--
Anyhow, just thought I'd share the story, it may help you Matt, or  
help someone in the future.  Mail is the roughest stuff to manage on  
the internet now IMHO- most attacked, most important... (which is why  
I now personally like to give it to Mail-specific hosting vendors, so  
I can focus on what I do... :)

Rocket-
.ike






More information about the talk mailing list