<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic behaviour with pbox and synatk in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/behaviour-with-pbox-and-synatk/m-p/108859#M14756</link>
    <description>&lt;P&gt;Hey everyone,&lt;/P&gt;&lt;P&gt;I am currently trying to get a better understanding of SecureXL's PenaltyBox and SYN Attack feature. For that, I set up a Lab with R81 Mgmt &amp;amp; Gateway. On the external interface is the attacker machine and on the internal interface is a target running a webserver.&lt;BR /&gt;To simulate a SYN Attack I use hping3 on the attacker machine and flood the webserver with syns.&lt;/P&gt;&lt;P&gt;On the Gateway I have enabled Penalty Box and SYN Defender, with the only configuration change setting the Global Threshold for Syn Defender to 1000 connections via cli. If I understand correctly, once the gateway has more than 1000 half-opened connections, SYN Attack Defender will become active and is enforced before the penalty box?&lt;/P&gt;&lt;P&gt;I tried two different scenarios:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&amp;nbsp;Flood the target with the original IP of Attacker PC&lt;/LI&gt;&lt;LI&gt;&amp;nbsp;Flood the target with a spoofed IP on Attacker PC&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Scenario 1 Flooding with original src IP:&lt;/P&gt;&lt;P&gt;sudo hping3 -c 15000 -d 0 -S -w 64 -p 80 --flood 192.168.1.142&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Behavior on the GW:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;the attacker is put into the penalty box after a few seconds, future packets getting dropped.&lt;/LI&gt;&lt;LI&gt;the peak of fw connections table entries right after the attack is ~100k and then drops rapidly (aggressive aging?)&lt;/LI&gt;&lt;LI&gt;SecureXL connection table doesnt contain any entries&lt;/LI&gt;&lt;LI&gt;tcpdump shows packets exiting the outgoing interface until put in pbox&lt;/LI&gt;&lt;LI&gt;SYN Defender shows active and "Under Attack" and sends cookies as expected, connection table doesn't fíll anymore.&lt;/LI&gt;&lt;LI&gt;Kernel debug shows that the pbox violation counter is updated until it hits the threshold.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Scenario 2 Flooding with spoofed src IP&lt;/P&gt;&lt;P&gt;sudo hping3 -c 15000 -d 0 -S -w 64 -p 80 --flood 192.168.1.142 -a 53.52.51.50&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Behavior on the GW:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;the attacker is not put into the penalty box&lt;/LI&gt;&lt;LI&gt;the peak of connection table entries right after the attack is ~150k and the connections dont seem to age out until the default 25 second timer is reached.&lt;/LI&gt;&lt;LI&gt;SecureXL connection table is beeing filled aswell&lt;/LI&gt;&lt;LI&gt;tcpdump captures incoming and outgoing packets w. spoofed ip&lt;/LI&gt;&lt;LI&gt;SYN Defender shows active and "Under Attack" and sends cookies as expected, connection table doesn't fíll anymore.&lt;/LI&gt;&lt;LI&gt;kernel debug shows that the pbox violation counter isn't updating&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now I have a few questions:&lt;/P&gt;&lt;P&gt;Why is the Attacker is the Attacker in Scenario 1 put into the penalty box but not in Scenario 2? They match the same rule in the rulebase but somehow in Scenario 2, the counter either doesn't get updated or doesn't exceed the threshold..?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A somewhat borad question: How would you defend against a real ddos attack where you have thousands of different source ips?&lt;/P&gt;</description>
    <pubDate>Tue, 26 Jan 2021 11:07:06 GMT</pubDate>
    <dc:creator>796570686578</dc:creator>
    <dc:date>2021-01-26T11:07:06Z</dc:date>
    <item>
      <title>behaviour with pbox and synatk</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/behaviour-with-pbox-and-synatk/m-p/108859#M14756</link>
      <description>&lt;P&gt;Hey everyone,&lt;/P&gt;&lt;P&gt;I am currently trying to get a better understanding of SecureXL's PenaltyBox and SYN Attack feature. For that, I set up a Lab with R81 Mgmt &amp;amp; Gateway. On the external interface is the attacker machine and on the internal interface is a target running a webserver.&lt;BR /&gt;To simulate a SYN Attack I use hping3 on the attacker machine and flood the webserver with syns.&lt;/P&gt;&lt;P&gt;On the Gateway I have enabled Penalty Box and SYN Defender, with the only configuration change setting the Global Threshold for Syn Defender to 1000 connections via cli. If I understand correctly, once the gateway has more than 1000 half-opened connections, SYN Attack Defender will become active and is enforced before the penalty box?&lt;/P&gt;&lt;P&gt;I tried two different scenarios:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&amp;nbsp;Flood the target with the original IP of Attacker PC&lt;/LI&gt;&lt;LI&gt;&amp;nbsp;Flood the target with a spoofed IP on Attacker PC&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Scenario 1 Flooding with original src IP:&lt;/P&gt;&lt;P&gt;sudo hping3 -c 15000 -d 0 -S -w 64 -p 80 --flood 192.168.1.142&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Behavior on the GW:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;the attacker is put into the penalty box after a few seconds, future packets getting dropped.&lt;/LI&gt;&lt;LI&gt;the peak of fw connections table entries right after the attack is ~100k and then drops rapidly (aggressive aging?)&lt;/LI&gt;&lt;LI&gt;SecureXL connection table doesnt contain any entries&lt;/LI&gt;&lt;LI&gt;tcpdump shows packets exiting the outgoing interface until put in pbox&lt;/LI&gt;&lt;LI&gt;SYN Defender shows active and "Under Attack" and sends cookies as expected, connection table doesn't fíll anymore.&lt;/LI&gt;&lt;LI&gt;Kernel debug shows that the pbox violation counter is updated until it hits the threshold.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Scenario 2 Flooding with spoofed src IP&lt;/P&gt;&lt;P&gt;sudo hping3 -c 15000 -d 0 -S -w 64 -p 80 --flood 192.168.1.142 -a 53.52.51.50&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Behavior on the GW:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;the attacker is not put into the penalty box&lt;/LI&gt;&lt;LI&gt;the peak of connection table entries right after the attack is ~150k and the connections dont seem to age out until the default 25 second timer is reached.&lt;/LI&gt;&lt;LI&gt;SecureXL connection table is beeing filled aswell&lt;/LI&gt;&lt;LI&gt;tcpdump captures incoming and outgoing packets w. spoofed ip&lt;/LI&gt;&lt;LI&gt;SYN Defender shows active and "Under Attack" and sends cookies as expected, connection table doesn't fíll anymore.&lt;/LI&gt;&lt;LI&gt;kernel debug shows that the pbox violation counter isn't updating&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now I have a few questions:&lt;/P&gt;&lt;P&gt;Why is the Attacker is the Attacker in Scenario 1 put into the penalty box but not in Scenario 2? They match the same rule in the rulebase but somehow in Scenario 2, the counter either doesn't get updated or doesn't exceed the threshold..?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A somewhat borad question: How would you defend against a real ddos attack where you have thousands of different source ips?&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jan 2021 11:07:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/behaviour-with-pbox-and-synatk/m-p/108859#M14756</guid>
      <dc:creator>796570686578</dc:creator>
      <dc:date>2021-01-26T11:07:06Z</dc:date>
    </item>
    <item>
      <title>Re: behaviour with pbox and synatk</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/behaviour-with-pbox-and-synatk/m-p/108860#M14757</link>
      <description>&lt;P&gt;Penalty box is thoroughly described in&amp;nbsp;&lt;SPAN&gt;sk112454.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jan 2021 11:24:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/behaviour-with-pbox-and-synatk/m-p/108860#M14757</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2021-01-26T11:24:17Z</dc:date>
    </item>
    <item>
      <title>Re: behaviour with pbox and synatk</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/behaviour-with-pbox-and-synatk/m-p/108863#M14758</link>
      <description>&lt;P&gt;Thanks I have read it, but I still don't understand why it is once added to the penalty box and the other time its not&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jan 2021 11:53:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/behaviour-with-pbox-and-synatk/m-p/108863#M14758</guid>
      <dc:creator>796570686578</dc:creator>
      <dc:date>2021-01-26T11:53:16Z</dc:date>
    </item>
    <item>
      <title>Re: behaviour with pbox and synatk</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/behaviour-with-pbox-and-synatk/m-p/108866#M14759</link>
      <description>&lt;P&gt;Please share the exact steps you are doing to enable SynDefender and DOS policy. Also, do you have an actual server behind FW to hit?&lt;BR /&gt;&lt;BR /&gt;From where I stand, Penalty box is not in play at all in both of your scenarios.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jan 2021 12:02:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/behaviour-with-pbox-and-synatk/m-p/108866#M14759</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2021-01-26T12:02:08Z</dc:date>
    </item>
    <item>
      <title>Re: behaviour with pbox and synatk</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/behaviour-with-pbox-and-synatk/m-p/108869#M14761</link>
      <description>&lt;P&gt;Hi, thanks for your help! If you prefere screenshots instead, please let me know, it was just quicker that way &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To enable SynDefender: fwaccel synakt -e (enable&amp;nbsp; on external iface, monitor on internal - attacker comes from external(defined in topology)) I have not enabled the SYN Protection in SmartConsole, it is set to inactive.&lt;/P&gt;&lt;P&gt;fwaccel synatk config get:&lt;/P&gt;&lt;P&gt;enabled 1&lt;BR /&gt;enforce 1&lt;BR /&gt;global_high_threshold 1000&lt;BR /&gt;periodic_updates 1&lt;BR /&gt;cookie_resolution_shift 6&lt;BR /&gt;min_frag_sz 80&lt;BR /&gt;high_threshold 500&lt;BR /&gt;low_threshold 100&lt;BR /&gt;score_alpha 100&lt;BR /&gt;monitor_log_interval (msec) 60000&lt;BR /&gt;grace_timeout (msec) 30000&lt;BR /&gt;min_time_in_active (msec) 60000&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To enable Penalty Box:&amp;nbsp;fwaccel dos config set --enable-pbox&lt;/P&gt;&lt;P&gt;fwaccel dos config get:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;rate limit: enabled (without policy)&lt;BR /&gt;rule cache: enabled&lt;BR /&gt;pbox: enabled&lt;BR /&gt;deny list: enabled (without policy)&lt;BR /&gt;drop frags: disabled&lt;BR /&gt;drop opts: disabled&lt;BR /&gt;internal: disabled&lt;BR /&gt;monitor: disabled&lt;BR /&gt;log drops: enabled&lt;BR /&gt;log pbox: enabled&lt;BR /&gt;notif rate: 100 notifications/second&lt;BR /&gt;pbox rate: 500 packets/second&lt;BR /&gt;pbox tmo: 180 seconds&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have no rate limit rule configured&amp;nbsp;&lt;/P&gt;&lt;P&gt;[Expert@FW_01_DDOS:0]# fwaccel dos rate get&lt;BR /&gt;No DOS/Rate Limiting policy rules found&lt;BR /&gt;(0 rules found)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Dos white &amp;amp; blacklist is not configured:&lt;/P&gt;&lt;P&gt;[Expert@FW_01_DDOS:0]# fwaccel dos allow -s&lt;BR /&gt;[Expert@FW_01_DDOS:0]# fwaccel dos deny -s&lt;BR /&gt;The deny list is empty&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Penalty Box whitelist is not configured:&amp;nbsp;&lt;/P&gt;&lt;P&gt;[Expert@FW_01_DDOS:0]# fwaccel dos pbox allow -s&lt;BR /&gt;[Expert@FW_01_DDOS:0]#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;fwaccel dos stats get:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[Expert@FW_01_DDOS:0]# fwaccel dos stats get&lt;/P&gt;&lt;P&gt;Firewall Instances in Aggregate:&lt;BR /&gt;Memory Usage: 0&lt;BR /&gt;Total Active Connections: 0&lt;BR /&gt;Number of Elements in Tables:&lt;BR /&gt;Penalty Box Violating IPs: 3 (size: 8192)&lt;BR /&gt;Rate Limit Source Only Tracks: 0 (size: 0)&lt;BR /&gt;Rate Limit Source and Service Tracks: 0 (size: 0)&lt;/P&gt;&lt;P&gt;SecureXL:&lt;BR /&gt;Memory Usage: 0&lt;BR /&gt;New Connections/Second: 0&lt;BR /&gt;Packets/Second: 0&lt;BR /&gt;Bytes/Second: 0&lt;BR /&gt;Reasons Packets Dropped:&lt;BR /&gt;IP Fragment: 0&lt;BR /&gt;IP Option: 0&lt;BR /&gt;Penalty Box: 5736148&lt;BR /&gt;Deny list: 0&lt;BR /&gt;Rate Limit: 0&lt;BR /&gt;Number of Elements in Tables:&lt;BR /&gt;Penalty Box: 0 (size: 937432)&lt;BR /&gt;Non-Empty Deny lists: 0 (size: 0)&lt;BR /&gt;Deny List IPs: 0 (size: 0)&lt;BR /&gt;Rate Limit Matches: 0 (size: 0)&lt;BR /&gt;Rate Limit Source Only Tracks: 0 (size: 0)&lt;BR /&gt;Rate Limit Source and Service Tracks: 0 (size: 0)&lt;BR /&gt;Rate Limit Dest Only Tracks: 0 (size: 0)&lt;BR /&gt;Rate Limit Dest and Service Tracks: 0 (size: 0)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also checked&amp;nbsp; the penalty box table with "fwaccel tab -t dos_pbox -f" and it the original IP always lands in there.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Behind the firewall I have an Ubuntu VM which is running a webserver, which I can also browse without any issues.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jan 2021 12:23:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/behaviour-with-pbox-and-synatk/m-p/108869#M14761</guid>
      <dc:creator>796570686578</dc:creator>
      <dc:date>2021-01-26T12:23:07Z</dc:date>
    </item>
    <item>
      <title>Re: behaviour with pbox and synatk</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/behaviour-with-pbox-and-synatk/m-p/108881#M14763</link>
      <description>&lt;P&gt;&lt;EM&gt;&amp;gt;&amp;nbsp;internal: disabled&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Which interfaces are you using for these tests?&amp;nbsp; You probably need to run &lt;STRONG&gt;fwaccel dos config set --enable-internal&lt;/STRONG&gt;.&amp;nbsp; By default only traffic hitting an external interface will have these mechanisms applied, see:&lt;/P&gt;
&lt;P&gt;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk111881&amp;amp;partition=Advanced&amp;amp;product=SecureXL" target="_blank"&gt;sk111881: Rate Limiting rules for DoS Mitigation are not taking effect&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jan 2021 13:50:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/behaviour-with-pbox-and-synatk/m-p/108881#M14763</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2021-01-26T13:50:53Z</dc:date>
    </item>
    <item>
      <title>Re: behaviour with pbox and synatk</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/behaviour-with-pbox-and-synatk/m-p/108883#M14764</link>
      <description>&lt;P&gt;The Interface the attacking machine is connected to is eth1 which is defined as an External Interface in Smartconsole. This is the only network adapter they share and a tcpdump on this interface also shows that packets are arriving via this interface in both scenarios.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jan 2021 14:01:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/behaviour-with-pbox-and-synatk/m-p/108883#M14764</guid>
      <dc:creator>796570686578</dc:creator>
      <dc:date>2021-01-26T14:01:35Z</dc:date>
    </item>
  </channel>
</rss>

