Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fastnetmon misreports attack type and protocol #787

Open
XioNoX opened this issue Jan 2, 2020 · 6 comments
Open

fastnetmon misreports attack type and protocol #787

XioNoX opened this issue Jan 2, 2020 · 6 comments

Comments

@XioNoX
Copy link

XioNoX commented Jan 2, 2020

If you want to solve your issue please read following information below

First of all, please check following steps:

  • Do you have latest FastNetMon version? If not, please upgrade to 1.1.3 version.
    We're running 1.1.3
  • Do we have similar tickets already? Please check bug tracker and Mailing list about similar issues.
    None than I can find

If it does not help, please fill information below:

Then please describe your issue as detailed as possible! Thanks you :)

Fastnetmon report some attack as "Attack type: unknown", "Attack protocol: tcp" while it's for example the ICMP pps threshold that is being hit. And all the other values (eg. TCP pps/bandwidth) are well under the limits.
Eg. "Incoming icmp pps: 2020 packets per second".
Before we bumped the threshold in wikimedia/operations-puppet@e7ad32b

This caused us some confusion as we were looking at TCP traffic only at first, based on the report.

We're tracking the issue in https://phabricator.wikimedia.org/T241374 as well.

Thanks!

@pavel-odintsov
Copy link
Owner

Hello!

Thank you for detailed report! Unfortunately, attack type detection logic in FastNetMon is extremely basic and does not cover full variety of attack types. In many cases it will be unknown.

Protocol detection logic is pretty reliable but it looks only on packets per second:

unsigned int detect_attack_protocol(map_element& speed_element, direction attack_direction) {

So, it does not check which thresholds was hit. When it sees more TCP traffic than other traffic types then it decides that this attack is TCP.

@XioNoX
Copy link
Author

XioNoX commented Jan 6, 2020

Thanks for your quick reply! Are there plans to make it more accurate?

@pavel-odintsov
Copy link
Owner

Hello!

Sorry, no, we have no plans about it.

@pavel-odintsov
Copy link
Owner

If you can explain your needs in details we can check possible options!

@XioNoX
Copy link
Author

XioNoX commented Jan 9, 2020

The goal is to make the notification emails accurate, so SREs receiving an email from FastNetMon can quickly identify what triggered it.
We worked around the issue for now by rolling back our per protocols thresholds.

@pavel-odintsov
Copy link
Owner

Hello!

Thank you for feedback! I've re-tagged ticket as enhancement and we will check what's our options to make it more reliable.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants