We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
80,259 News Articles

CloudFlare briefly drops off Internet deflecting DDOS attack

CloudFlare's Juniper routers choked on a new rule designed to stop an attack

CloudFlare's Juniper routers choked on a slight programming change designed to deflect a distributed denial-of-service attack, knocking the company's services off the Internet for about an hour early Sunday morning.

The San Francisco-based company provides a service that speeds up the delivery of web pages and reduces bandwidth. It also provides a suite of security tools that helps website owners identify and filter malicious traffic.

CEO Matthew Prince wrote that a bug in its routers caused its services to effectively drop off the Internet around 1:47 a.m. PST on Sunday. The routers had been modified with a new rule, or a type of filter, intended to deflect a DDOS attack underway against one of its customers.

CloudFlare saw that the attack used data packets that appeared to be between 99,971 and 99,985 bytes, far larger than the 500- to 600-byte average. The company's engineers wrote a rule for the routers to drop the extra large packets, which was then distributed to the routers using the Flowspec protocol, Prince wrote.

"What should have happened is that no packet should have matched that rule because no packet was actually that large," he wrote "What happened instead is that the routers encountered the rule and then proceeded to consume all their RAM until they crashed."

Some of the crashed routers rebooted themselves, but others didn't. When some of the data centers came online, those centers bore the brunt of all of the traffic hitting CloudFlare's network, then crashed again.

"We were able to access some routers and see that they were crashing when they encountered this bad rule," Prince wrote. "We removed the rule and then called the network operations teams in the data centers where our routers were unresponsive to ask them to physically access the routers and perform a hard reboot."

A little over an hour later, CloudFlare had fixed the problem. The company has asked Juniper if the bug is a known issue or one that is unique to CloudFlare's network setup, Prince wrote.

"We will be doing more extensive testing of Flowspec provisioned filters and evaluating whether there are ways we can isolate the application of the rules to only those data centers that need to be updated, rather than applying the rules network wide," Prince wrote.

CloudFlare customers with service-level agreements will be issued credits, Prince wrote.

"Any amount of downtime is completely unacceptable to us and the whole CloudFlare team is sorry we let our customers down this morning," he wrote.

Send news tips and comments to [email protected] Follow me on Twitter: @jeremy_kirk


IDG UK Sites

Sony Xperia Z3 Compact review: A better deal than the Z3 and most smartphones

IDG UK Sites

Why people aren't upgrading to iOS 8: new features are for power users, not the average Joe

IDG UK Sites

Framestore recreates ancient China for Mr Bean's martial arts misadventure

IDG UK Sites

iPad Air 2 review: Insanely fast and alarmingly thin. Speed tests, camera tests and more