Sun Microsystems, Inc.  Oracle System Handbook - ISO 7.0 May 2018 Internal/Partner Edition
   Home | Current Systems | Former STK Products | EOL Systems | Components | General Info | Search | Feedback

Asset ID: 1-71-2143079.1
Update Date:2017-06-22
Keywords:

Solution Type  Technical Instruction Sure

Solution  2143079.1 :   During a DoS Attack, Session Border Controller Drops Packets From Trusted Entities. Why Is This and How Is This Countered ?  


Related Items
  • Acme Packet 6300
  •  
Related Categories
  • PLA-Support>Sun Systems>CommsGBU>Session Delivery Network>SN-SND: Acme Service Provider
  •  




In this Document
Goal
Solution
References


Created from <SR 3-11769702261>

Applies to:

Acme Packet 6300 - Version S-Cz7.2.0 to S-Cz7.3.5 [Release S-Cz7.0]
Information in this document applies to any platform.

Goal

The environment consist of HA pair comprises of the Acme_6300 running SBC Version Acme Packet Net-Net 6300 SCZ7.2.x. In this example, the SBC is using sip-interface associated with the 'SIPConnect' realm. Upon any SIP messages that arrives to SBC using sip-interface associated with the 'SIPConnect' realm, SBC will forward the requests to the redirect servers based on the local policy routing. During the DoS attack, a spike in traffic from the unsolicited source to the 'SIPConnect' realm occurs. This caused:

1. The registration attempts from the IP Address of the unsolicted source were forwarded by SBC to the call servers based on response from re-direct servers. Such attempts were rejected with 403
2. Customers associated to the SIPConnect realms were primarily affected
3. Access SBC dropped the inbound SIP messages (requests and responses) from customers connected to the system which resulted in registrations and calls to fail
4. The session-agents corresponding to the re-direct servers were taken out-of-service quiet frequently (state transitioned from I to O to S to O)

Example of SBC settings:

media-manager
max-signaling-bandwidth 2500000

realm-config
identifier SIPConnect
access-control-trust-level medium
invalid-signal-threshold 1

session-agent
hostname 172.20.240.1
options trans-timeouts=2

 

sipd.log file has entries such as:

Line 30: Nov 24 04:27:45.020 sipd01@Acme_6300_Primary: MINOR SigAddr[SIPConnect:123.24.66.19:5073=medium:PERMIT] ttl=64 exp=64 last=0 P=0 exceeded message threshold of 1700

indicating the IP address from unsolicited source was going to untrusted but not to deny list

 

Why did the SBC drop the SIP messages from the trusted entities and how can this be countered ?

Solution


The trusted drops would have been caused by exceeding the trusted bandwidth limitations set in the customer configuration.

Each REGISTER request from the faulty endpoint generated two "trusted" responses (ie on the CoreTrusted_SIPConnect realm) - a 3xx redirect and a 403 forbidden - so you have a certain amount of amplification for each message that was received from this endpoint. If we assume that this endpoint was the only one generating untrusted traffic, this means it could generate REGISTER messages at up to 15% of the max signalling bandwidth (see media-manager/max-untrusted-signaling setting) - ie this would increase the amount of trusted traffic significantly.

NOTE: It is assumed that base traffic levels, would be high enough to push the trusted message rate high enough to exceed the bandwidth limits.

In addition, if SROP is used, the REGISTER request for the misbehaving endpoint was challenged before being reject. This would mean that the endpoint would be temporarily promoted to trusted increasing the amount of trusted signalling being received by the SBC.

Changing the trust level to low is a sensible precaution as it would demote the misbehaving endpoint to the denied list blocking all traffic from it.
In addition, we would suggest that the max-untrusted-signaling and min-untrusted-signaling media-manager settings are checked. These are percentage values meaning that when they increased the max-signaling-bandwidth setting they also increase the amount of untrusted traffic that the SBC will accept. These settings should be re-asses in accordance to the new bandwidth setting.

Other example of recommendations:

media-manager
max-signaling-bandwidth 11600000

realm-config
identifier SIPConnect
access-control-trust-level low
invalid-signal-threshold 250

session-agent
hostname 172.20.240.1
options trans-timeouts=0

 

 

References

<BUG:22330041> - SBC DROPPED PACKETS FROM TRUSTED ENTITIES UPON DOS ATTACK
<NOTE:1594384.1> - How to Smooth Register Requests and Lower CPU Utilization During a Registration Storm

Attachments
This solution has no attachment
  Copyright © 2018 Oracle, Inc.  All rights reserved.
 Feedback