robot attack
play

Robot Attack! Repelling Bots, DDOS, and other Fiends Stanford - PowerPoint PPT Presentation

Robot Attack! Repelling Bots, DDOS, and other Fiends Stanford Drupal Camp 2015 MEET YOUR GUIDES Suzanne Aldrich Martijn Gonlag Senior Customer Success Engineer - Pantheon Technical Support Engineer - CloudFlare AGENDA Surveying Robots


  1. Robot Attack! Repelling Bots, DDOS, and other Fiends Stanford Drupal Camp 2015

  2. MEET YOUR GUIDES Suzanne Aldrich Martijn Gonlag Senior Customer Success Engineer - Pantheon Technical Support Engineer - CloudFlare

  3. AGENDA Surveying Robots Detecting Attacks Evading Spam Withstanding High Traffic Questions

  4. HISTORY OF THE ROBOT Internet bot: Drupal’s robots.txt Robot, WWW bot, bot, botnet, zombies ● https://api.drupal.org/api/drupal/robots. txt/7 Automated scanning of website ● User-agent: * resources at high rate Good bots: Web spiders Crawl-delay: 10 ● Googlebot Disallow: /includes/ ○ MSNBot/Bingbot ○ Disallow: /CHANGELOG.txt Baidu ○ Disallow: /cron.php Yandex ○ Disallow: /install.php Pingdom ○ Disallow: /update.php Disallow: /xmlrpc.php

  5. BAD BOTS Bad bots: Spambots - advertising links ● Email harvesters ● Downloaders & scrapers ● Referral & click fraud ● Rogue spiders ● MegaIndex: ○ Mozilla/5.0 (compatible; MegaIndex.ru/2.0; +https://www. megaindex.ru/?tab=linkAnalyze) Infectious agents ● Botnets & zombies ●

  6. DETECTING ATTACKS Id Date Severit Type Message 3161818 16/Jun 16:45 notice spambot Blocked registration: email=supplyweqz@gmail. com,ip=120.43.21.95 3161817 16/Jun 16:45 notice user Login attempt failed for JulianHut. 3161794 16/Jun 16:44 notice user Login attempt failed for Julianml.

  7. EVADING SPAM Common SPAM Defense Methods: Popular Drupal Modules: CAPTCHA/reCAPTCHA - https://www.drupal. CAPTCHA - Completely Automated Public ● org/project/captcha Turing test to tell Computers and https://www.drupal.org/project/recaptcha Humans Apart Timegate (Time Difference) ● Mollom - https://www.drupal.org/project/mollom Honeypot ● Honeypot - https://www.drupal.org/project/honeypot Content analysis ● Antispam - https://www.drupal.org/project/antispam Visitor reputation ● Spambot - https://www.drupal.org/project/spambot CloudFlare - https://www.drupal.org/project/cloudflare Spam prevention - https://groups.drupal.org/node/77093

  8. ANTI-SPAM STRATEGIC PITFALLS Problems with CAPTCHA: Problems with External APIs: Cookies prevent anonymous caching 3rd party dependency ● ● High traffic sites require edge cache Availability & rate limiting ○ ● Usability CAPTCHA fallback ● ● Inconvenient Cost of service ○ ● Barrier User Privacy ○ ● Accessibility ● Visual impairment ○

  9. WITHSTANDING HIGH TRAFFIC Poor performance + bots = downtime ● $ curl -Ik http://www.example. com/comment/reply/12345 Server and log monitoring ● Fix site errors in module code and theme ... ● templates X-Varnish: 3649165893 Anonymous page caching Age: 0 ● Views query and rendered results caching ● Via: 1.1 varnish Dedicated cacheserver - Redis ● Connection: keep-alive Disable comments/cookies/statistics ● Vary: Cookie, Cookie Setup CDN for serving assets ● Block IPs at firewall ● Withstand many Layer 7 attacks ●

  10. CLOUDFLARE SECURITY • Cloud-based SaaS • Reverse Proxy • Security • Performance • Optimization • CDN • DNS

  11. CLOUDFLARE DRUPAL WAF RULES D0000 - Block Large Requests to xmlrpc.php for Drupal CMS 10.223.224.238 - - [05/Feb/2015:23:34:47 +0000] "POST /xmlrpc. D0002 - Block requests with odd array arguments php HTTP/1.1" 404 5377 "-" "Mozilla/4.0 (compatible: MSIE 7.0; D0001 - Block Requests to xmlrpc.php for Drupal CMS Windows NT 6.0)" 0.251 "5.189.129.224, 108.162.254.28, 10.183.251.3" 10.223.224.238 - - [05/Feb/2015:23:34:47 +0000] "GET /feed/ URIs: HTTP/1.1" 200 6354 "http://example.com/feed/" "SimplePie/1.3.1 /xmlrpc.php -- most common (Feed Parser; http://simplepie.org; Allow like Gecko) /?q=node&destination=node Build/20140407093003" 0.201 "54.216.178.194, 141.101.98.27, 10.183.251.3" /blog/xmlrpc.php 10.223.193.24 - - [05/Feb/2015:23:34:47 +0000] "POST /xmlrpc. /user/login/ php HTTP/1.1" 404 5377 "-" "Mozilla/4.0 (compatible: MSIE 7.0; Windows NT 6.0)" 0.233 "5.189.129.224, 108.162.254.28, HTTP Method: 10.183.251.3" POST -- most common GET

  12. CLOUDFLARE DRUPAL WAF TRIGGERS Frequency of WAF Triggers Over 30 Days Percentage of Triggers by WAF Rule

  13. CONNECT WITH US! https://twitter.com/SuzanneAldrich https://twitter.com/MartijnGonlag

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend