TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

The largest DDoS attack to date, peaking above 398M rps

751 点作者 tomzur超过 1 年前

34 条评论

dang超过 1 年前
Related ongoing threads:<p><i>The novel HTTP&#x2F;2 &#x27;Rapid Reset&#x27; DDoS attack</i> - <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=37830987">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=37830987</a><p><i>HTTP&#x2F;2 Zero-Day Vulnerability Results in Record-Breaking DDoS Attacks</i> - <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=37830998">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=37830998</a>
pythonguython超过 1 年前
Who has an incentive to carry out these DDos attacks? Why would anyone be willing to spend large amounts of money and develop a sophisticated attack against corporate cloud infrastructure? It seems like the only reasonable answer is foreign governments. But still what is the result - you inconvenience American tech companies and their customers for a few hours? This happens all the time, so clearly someone finds it worthwhile. Can anyone help me understand?
评论 #37833074 未加载
评论 #37832817 未加载
评论 #37832931 未加载
评论 #37834071 未加载
评论 #37833143 未加载
评论 #37833544 未加载
评论 #37833127 未加载
评论 #37832888 未加载
评论 #37836676 未加载
评论 #37833764 未加载
评论 #37834882 未加载
评论 #37837079 未加载
评论 #37836381 未加载
评论 #37841357 未加载
评论 #37838919 未加载
评论 #37833394 未加载
评论 #37833457 未加载
评论 #37835654 未加载
oldtownroad超过 1 年前
At a previous company, we were subject to semi-frequent attacks (of a much smaller scale). The operating assumption internally was that it’s a competitor trying to undermine us but it remains a mystery.<p>Anyone involved in these type of attacks (at internet-infrastructure scale or targeting specific companies) brave&#x2F;crazy enough to create a throwaway account and tell hn about the motivations?
评论 #37831243 未加载
评论 #37831540 未加载
评论 #37834029 未加载
评论 #37831743 未加载
评论 #37839938 未加载
评论 #37833690 未加载
评论 #37831269 未加载
评论 #37832022 未加载
dduarte超过 1 年前
Same attack on Cloudflare <a href="https:&#x2F;&#x2F;blog.cloudflare.com&#x2F;zero-day-rapid-reset-http2-record-breaking-ddos-attack&#x2F;" rel="nofollow noreferrer">https:&#x2F;&#x2F;blog.cloudflare.com&#x2F;zero-day-rapid-reset-http2-recor...</a>
评论 #37831316 未加载
glenngillen超过 1 年前
&gt; We noticed these attacks at the same time two other major industry players — Google and AWS — were seeing the same.<p>Curious if there&#x27;s anyone in the HN crowd that works at this level in one of the major vendors. What happens during an attack of this scale? Are there people from Cloudflare + Google + AWS on a live videoconference call co-ordinating with each other in real-time to mitigate it? Or is each vendor mostly observing from a distance what is happening elsewhere, and solely focussed on sorting their own problems out?
评论 #37839217 未加载
sph超过 1 年前
How does DDoS mitigation work? When people say &quot;I put my website behind Cloudflare to mitigate DDoSes&quot;, what does it mean exactly?<p>Is it only about having a large enough ingress pipe that you can weather however many Gb&#x2F;s you are being bombarded with, and still having some spare capacity for legitimate traffic?
评论 #37831384 未加载
评论 #37831289 未加载
评论 #37832039 未加载
评论 #37831327 未加载
评论 #37831272 未加载
评论 #37831376 未加载
评论 #37832011 未加载
评论 #37842405 未加载
评论 #37831345 未加载
adzm超过 1 年前
Linked in this article is more info on the rapid reset feature of HTTP2 which was used at part of the ddos <a href="https:&#x2F;&#x2F;cloud.google.com&#x2F;blog&#x2F;products&#x2F;identity-security&#x2F;how-it-works-the-novel-http2-rapid-reset-ddos-attack" rel="nofollow noreferrer">https:&#x2F;&#x2F;cloud.google.com&#x2F;blog&#x2F;products&#x2F;identity-security&#x2F;how...</a>
ricardobeat超过 1 年前
No word on the origin of these attacks? This must require massive amounts of hardware, you’d imagine it to be easily traceable unless some kind of botnet.
评论 #37831355 未加载
评论 #37831277 未加载
评论 #37831541 未加载
评论 #37831383 未加载
dominicdoty超过 1 年前
Couldn&#x27;t cloudflare show a page to the next handful of http requests from an IP informing the user that &quot;something on your network is participating in DDoS attacks&quot;.<p>All the big providers could do this, just inject a little turnstile like page in front of the next cloudflare site you visit.<p>I would love to know if there&#x27;s a compromised device on my network, and I don&#x27;t have any real monitoring set up to detect it.<p>It&#x27;s not a full solution, but at least informing users there is a problem is a good start.
评论 #37893670 未加载
评论 #37841402 未加载
tuananh超过 1 年前
Cloudflare blog: <a href="https:&#x2F;&#x2F;blog.cloudflare.com&#x2F;zero-day-rapid-reset-http2-record-breaking-ddos-attack&#x2F;" rel="nofollow noreferrer">https:&#x2F;&#x2F;blog.cloudflare.com&#x2F;zero-day-rapid-reset-http2-recor...</a>
mihaic超过 1 年前
The fact that large cloud providers can handle huge DDoS attacks I think in the long run leads to a worse internet. It forces botnets to up their game and for websites the only solutions available are to pay Google, Amazon or Cloudflare a protection tax.<p>I honestly don&#x27;t see any other options, but I&#x27;d really wish for them to come through some community coordinated list of botnet infected IPs or something.
评论 #37831664 未加载
评论 #37832309 未加载
评论 #37831425 未加载
评论 #37831528 未加载
评论 #37831385 未加载
评论 #37831407 未加载
评论 #37831740 未加载
评论 #37831660 未加载
评论 #37831470 未加载
评论 #37831531 未加载
评论 #37831440 未加载
评论 #37831424 未加载
评论 #37832614 未加载
评论 #37831639 未加载
评论 #37834101 未加载
评论 #37832396 未加载
评论 #37832207 未加载
评论 #37832790 未加载
评论 #37832828 未加载
评论 #37832761 未加载
评论 #37831476 未加载
评论 #37833120 未加载
评论 #37832163 未加载
评论 #37835497 未加载
评论 #37832296 未加载
评论 #37831755 未加载
评论 #37832366 未加载
评论 #37834969 未加载
评论 #37831779 未加载
tommica超过 1 年前
Sorry, I forgot to break out of my while loop
metalrain超过 1 年前
So given that minimum size of HTTP request is something under 32 bytes, some sources say 18 bytes but let&#x27;s be generous here HTTP can be complex. In theory I could send 4M requests in second with 1 Gbps connection. 1 Tbps total connection capacity could do close to 4.3B rps given perfect distribution.<p>I imagine distributing the load becomes harder&#x2F;more expensive the bigger the scale. In real network you probably have to find the paths that don&#x27;t slow you down and then strike for short time before you are banned.<p>Cloudflare has made post about mitigating 2 Tbps DDOS in 2021, so in real attacks request sizes aren&#x27;t quite that optimal.
1vuio0pswjnm7超过 1 年前
&quot;In the end, H2 [HTTP&#x2F;2] is not much robust but each implementation has certain possibilities to cover some of the limitations and these differ due to many architectural constraints.&quot;<p>&quot;The good point in this is that this will probably make more people want to reconsider H3&#x2F;QUIC [HTTP&#x2F;3] if they don&#x27;t trust their products anymore :-)&quot;<p><a href="https:&#x2F;&#x2F;www.mail-archive.com&#x2F;haproxy@formilux.org&#x2F;msg44136.html" rel="nofollow noreferrer">https:&#x2F;&#x2F;www.mail-archive.com&#x2F;haproxy@formilux.org&#x2F;msg44136.h...</a>
codedokode超过 1 年前
Such attacks are possible because ISPs do not want to adopt a protocol that would allow any host to send a special packet to block malicious traffic on the upstream provider or even at the source network. In this case networks like Cloudflare would become unnecessary.
评论 #37832238 未加载
评论 #37832095 未加载
评论 #37833830 未加载
评论 #37831979 未加载
SigmundurM超过 1 年前
AWS blog: <a href="https:&#x2F;&#x2F;aws.amazon.com&#x2F;blogs&#x2F;security&#x2F;how-aws-protects-customers-from-ddos-events&#x2F;" rel="nofollow noreferrer">https:&#x2F;&#x2F;aws.amazon.com&#x2F;blogs&#x2F;security&#x2F;how-aws-protects-custo...</a>
Aissen超过 1 年前
Interestingly, the CVE is still &quot;reserved&quot;: <a href="https:&#x2F;&#x2F;nvd.nist.gov&#x2F;vuln&#x2F;detail&#x2F;CVE-2023-44487" rel="nofollow noreferrer">https:&#x2F;&#x2F;nvd.nist.gov&#x2F;vuln&#x2F;detail&#x2F;CVE-2023-44487</a> .
MuffinFlavored超过 1 年前
How large of a “botnet” did it take to cause 398M rps?
评论 #37831769 未加载
phendrenad2超过 1 年前
Any info on where these attacks originate? I&#x27;m guessing it&#x27;s hacked routers and IoT devices. I wonder if it&#x27;s time for governments to start giving IoT vendors &quot;DDoS scores&quot; and mandating that they appear on the label.
datadeft超过 1 年前
398 million requests per second is really the largest DDOS attack to date?
icing0超过 1 年前
You can send thousands of such Request+RST to an Apache httpd per connection, but it will only work on 2 of them at a time.<p>We are an old server. You have to be nice to us before we do more for you. -.-
sidcool超过 1 年前
I am impressed from both parties, from a tech perspective. The attackers who exploited HTTP2, and Google that mitigated it.<p>How did Google mitigate it exactly? Is there a technical deep dive?
评论 #37833882 未加载
nancyp超过 1 年前
Is there a chance that these cloud ddos service providers are attacking each other or themselves to create PR opportunities?
endisneigh超过 1 年前
Wonder how you could even handle this if you weren’t using a big cloud provider and didn’t have a lot of money to spend.
评论 #37831831 未加载
评论 #37832261 未加载
评论 #37832193 未加载
luckystarr超过 1 年前
Should Google actually provide the DDoS initiators with debug information like this graph? Just thinking...
评论 #37832691 未加载
theanonymousone超过 1 年前
Novice here. Should I seek the patch from the web application framework I use (e.g. Jetty, Spring Boot)?
qaq超过 1 年前
Hmm wasn&#x27;t there like 3.47Tbps attack on MS that&#x27;s prob about same magnitude
AtNightWeCode超过 1 年前
This is just Google bs. There is no way in hell they can&#x27;t mitigate anything at the edge of this nature. If this was a real problem it most likely originated from within GCP. The article does not even state where the traffic comes from.<p>EDIT: Ok, so this was a 0-day issue. Then it all makes more sense. Sorry.
jruohonen超过 1 年前
So is this a new world record?
评论 #37831319 未加载
评论 #37831401 未加载
narag超过 1 年前
Any clue who was the target?<p>Can such an attack be performed with botnets?
2OEH8eoCRo0超过 1 年前
Who was the target?!
mjan22640超过 1 年前
As elections are getting closer, the public needs to be primed for adversary attacks and disinformation.
mgaunard超过 1 年前
398M rps means a request every 2.5ns.<p>Most likely the figure is incorrect, or at least misleading.
评论 #37835063 未加载
评论 #37833715 未加载
ChumpGPT超过 1 年前
Cut China, North Korea, Iran and Russia off from the Internet and problem solved. It will be difficult but it can be done.
评论 #37832015 未加载
评论 #37832107 未加载
评论 #37831638 未加载