![]() | Oracle System Handbook - ISO 7.0 May 2018 Internal/Partner Edition | ||
|
|
![]() |
||||||||||||||||
Solution Type Technical Instruction Sure Solution 2143079.1 : During a DoS Attack, Session Border Controller Drops Packets From Trusted Entities. Why Is This and How Is This Countered ?
In this Document
Created from <SR 3-11769702261> Applies to:Acme Packet 6300 - Version S-Cz7.2.0 to S-Cz7.3.5 [Release S-Cz7.0]Information in this document applies to any platform. GoalThe environment consist of HA pair comprises of the Acme_6300 running SBC Version Acme Packet Net-Net 6300 SCZ7.2.x. In this example, the SBC is using sip-interface associated with the 'SIPConnect' realm. Upon any SIP messages that arrives to SBC using sip-interface associated with the 'SIPConnect' realm, SBC will forward the requests to the redirect servers based on the local policy routing. During the DoS attack, a spike in traffic from the unsolicited source to the 'SIPConnect' realm occurs. This caused: 1. The registration attempts from the IP Address of the unsolicted source were forwarded by SBC to the call servers based on response from re-direct servers. Such attempts were rejected with 403 Example of SBC settings: media-manager realm-config session-agent
sipd.log file has entries such as: Line 30: Nov 24 04:27:45.020 sipd01@Acme_6300_Primary: MINOR SigAddr[SIPConnect:123.24.66.19:5073=medium:PERMIT] ttl=64 exp=64 last=0 P=0 exceeded message threshold of 1700
indicating the IP address from unsolicited source was going to untrusted but not to deny list
Why did the SBC drop the SIP messages from the trusted entities and how can this be countered ? Solution
Each REGISTER request from the faulty endpoint generated two "trusted" responses (ie on the CoreTrusted_SIPConnect realm) - a 3xx redirect and a 403 forbidden - so you have a certain amount of amplification for each message that was received from this endpoint. If we assume that this endpoint was the only one generating untrusted traffic, this means it could generate REGISTER messages at up to 15% of the max signalling bandwidth (see media-manager/max-untrusted-signaling setting) - ie this would increase the amount of trusted traffic significantly. NOTE: It is assumed that base traffic levels, would be high enough to push the trusted message rate high enough to exceed the bandwidth limits.
In addition, if SROP is used, the REGISTER request for the misbehaving endpoint was challenged before being reject. This would mean that the endpoint would be temporarily promoted to trusted increasing the amount of trusted signalling being received by the SBC. Changing the trust level to low is a sensible precaution as it would demote the misbehaving endpoint to the denied list blocking all traffic from it. Other example of recommendations: media-manager realm-config session-agent
References<BUG:22330041> - SBC DROPPED PACKETS FROM TRUSTED ENTITIES UPON DOS ATTACK<NOTE:1594384.1> - How to Smooth Register Requests and Lower CPU Utilization During a Registration Storm Attachments This solution has no attachment |
||||||||||||||||
|