Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

eridani

(51,907 posts)
Fri Nov 15, 2013, 06:05 AM Nov 2013

Right wing cyber attacks on Healthcare.gov website confirmed


http://www.examiner.com/article/right-wing-cyber-attacks-on-healthcare-gov-website-confirmed

Yesterday, the House Homeland Security Committee published a video on their Youtube page highlighting a portion of the committee questioning Roberta Stempfley, acting assistant secretary of the Department of Homeland Security’s Office of Cyber-security and Communications, who confirmed at least 16 attacks on the Affordable Care Act’s portal Healthcare.gov website in 2013.

Roberta Stempfley highlighted one successful attack that is designed to deny access to the website called a Distributed Denial of Service (DDoS) attack. A DDoS attack is designed to make a network unavailable to intended users, generally through a concerted effort to disrupt service such as repeatedly accessing the servers, saturating them with more traffic than the website is designed to handle.

Right wingers have been distributing the link to the necessary tools to perform the attacks on the Healthcare.gov website through social networking, as pointed out by Information Week, and other websites .

The name of the attack tool is called, "Destroy Obama Care!"
117 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
Right wing cyber attacks on Healthcare.gov website confirmed (Original Post) eridani Nov 2013 OP
I hope JesterCS Nov 2013 #1
I hope so too. This is outrageous. LuvNewcastle Nov 2013 #3
Exactly, it is RW terrorism, it may not be directly violent, but IMO it is terrorism. Also, RKP5637 Nov 2013 #28
for those of us who desperately need insurance to see a doctor rurallib Nov 2013 #34
I definitely think so ... it's inciting terror. To me, terror can be physical, violent and/or RKP5637 Nov 2013 #36
It's not terrorism. It's cyber-crime. Maedhros Nov 2013 #73
Excellent point and exact! n/t RKP5637 Nov 2013 #74
Thank You agent46 Nov 2013 #76
That's what they charged Anonymous kid with Rockyj Nov 2013 #79
Also a conspiracy and RICO violation? Thanks elehhhhna Nov 2013 #80
I agree. toddwv Nov 2013 #111
The NSA should have been on this Rosa Luxemburg Nov 2013 #85
The first seven words of your post made me stop and think- stlsaxman Nov 2013 #112
Being right wind means sulphurdunn Nov 2013 #17
thanks for naming it for what it is, cyber-terrorism KittyWampus Nov 2013 #44
To them it's not about nice or not nice ffr Nov 2013 #75
"Why can't people be nice?" Spitfire of ATJ Nov 2013 #86
Post removed Post removed Nov 2013 #2
When people see it, they'll want Medicare for All, not the Repuke status quo n/t eridani Nov 2013 #4
It's not a complete failure. There are a lot of people who are getting affordable LuvNewcastle Nov 2013 #6
It isn't a failure at all, not in the slightest meaning of the word. Half-Century Man Nov 2013 #11
You're right, "failure" was too strong a word. LuvNewcastle Nov 2013 #14
I'm not blaming you for the failure title Half-Century Man Nov 2013 #15
Should be good for 3-5 in a federal penitentiary. Scuba Nov 2013 #5
Absolutely. n/t LuvNewcastle Nov 2013 #7
LOL. Didn't you read? MannyGoldstein Nov 2013 #20
Yup. Track 'em down and lock 'em up. gulliver Nov 2013 #30
Maybe. They are still busting people for using the "anonymous" LOIC against Mastercard, Visa etc seveneyes Nov 2013 #41
+1 uponit7771 Nov 2013 #61
A) Is this provable? annabanana Nov 2013 #8
It's not only proveable, but recordable and traceable. Easily, with the capability of jtuck004 Nov 2013 #13
Actually, it would make it to the site and impact the site. That's where it is discoverable. Coyotl Nov 2013 #42
If it was a Distributed Denial of Service Attack using hijacked computers it can be very hard PoliticAverse Nov 2013 #49
Actually it wouldn't "make it to the site" and neither do the thousands of attacks that happen every jtuck004 Nov 2013 #57
The DoS attack software is being mass distributed, so the requests come in from Anywhere, USA Coyotl Nov 2013 #58
Ok, you can think what you want, but on a modern system the attacks aren't directed at the jtuck004 Nov 2013 #65
When you interact with another computer online, it is a web server. I have a web server. Coyotl Nov 2013 #67
Like I said, think what you want. But that doesn't explain the thousands of security people jtuck004 Nov 2013 #72
Insult and derision. That's real classy. Coyotl Nov 2013 #77
I get anywhere from 2000 to 6000 defacto7 Nov 2013 #82
Exactly. None of these people understand the scope of what goes on out there, nor do they jtuck004 Nov 2013 #96
Absolutely. defacto7 Nov 2013 #97
Yeah... jtuck004 Nov 2013 #98
Your entire argument hinges on this: dreamnightwind Nov 2013 #84
Sigh. Does nobody read anything for themselves any longer? jtuck004 Nov 2013 #95
Haaa.. LOL defacto7 Nov 2013 #101
OK, thanks for trying to explain dreamnightwind Nov 2013 #102
Awww, I'm just irritated by the whole thing. Bunches of people seem to want to grasp at anything and jtuck004 Nov 2013 #109
I get it, not making excuses for the web site dreamnightwind Nov 2013 #110
The problem is that OUR side doesnt control the NSA or anything related to the Patriot Act. nm rhett o rick Nov 2013 #43
The Director of the NSA is approved by the President. And enforcement of the Patriot Act is PoliticAverse Nov 2013 #53
By law that's true. IMO the spy agencies have more power than the President. rhett o rick Nov 2013 #54
Spy agencies don't have agency. Humans are the actors. Coyotl Nov 2013 #59
Republicons Against America Berlum Nov 2013 #9
I'm soo sick of RW nutters getting away with breaking the law!! Where is the DOJ?? hue Nov 2013 #10
What a waste of time, for more than one reason. First, you can't put a computer on the Internet jtuck004 Nov 2013 #12
Medicare for all would have been the intelligent solution from day 1. n/t RKP5637 Nov 2013 #39
Pretty stupid thing to do. I hope they get caught! B Calm Nov 2013 #16
On the boards I'm active on JackInGreen Nov 2013 #18
I think I'd start with the FBI Cyber Crime Division... Buns_of_Fire Nov 2013 #25
I wonder if a U.S. Attorney will hound the hackers until they are driven to suicide vt_native Nov 2013 #19
Excellent question. truebluegreen Nov 2013 #31
Further proof that Republicans can't win a fair fight mac56 Nov 2013 #21
Why is this not the #1 story on all media this morning malaise Nov 2013 #22
Seriously! nt PasadenaTrudy Nov 2013 #45
What about our adept NSA? Puzzledtraveller Nov 2013 #23
I think there has been a concerted effort to stop the ACA KrazyinKS Nov 2013 #24
shared RitchieRich Nov 2013 #26
RW hackers attack Healthcare.gov..... HooptieWagon Nov 2013 #27
lol. you really did make me laugh out loud. I tried visiting FR maybe twice… it hurt my eyes. KittyWampus Nov 2013 #46
Same here. HooptieWagon Nov 2013 #48
I'm shocked, Shocked I tell you! truebluegreen Nov 2013 #29
K&R! Pryderi Nov 2013 #32
The right always resorts to violence and bullying so no surprise. libtodeath Nov 2013 #33
K and R Kingofalldems Nov 2013 #35
Sic the NSA on them. One would think they could track them right down to their loony fingertips RKP5637 Nov 2013 #37
The NSA has a completely different agenda and they dont work for the President. nm rhett o rick Nov 2013 #55
Domestic terrorists. nt City Lights Nov 2013 #38
Yep, but they don't get called out for it ... n/t RKP5637 Nov 2013 #40
Exactly. It's infuriating! City Lights Nov 2013 #56
If true, why hasn't Obama addressed this? B2G Nov 2013 #47
It is weird PasadenaTrudy Nov 2013 #50
Publicizing denial of service attacks is a mixed bag, it can ecourage more and make things worse. PoliticAverse Nov 2013 #51
There's no "one thing" wrong BumRushDaShow Nov 2013 #52
I don't know many of the details yet (no time to digest them at the moment) but deutsey Nov 2013 #63
...and these people aren't going to jail becauzzzzz?! uponit7771 Nov 2013 #60
neo confederate sabotage proud patriot Nov 2013 #62
Why hasn't this been all over the news....this is a criminal movonne Nov 2013 #64
let me guess....this will be all over the m$m tonight! right? spanone Nov 2013 #66
I'm not surprised. GoCubsGo Nov 2013 #68
it's a hell of a lot easier to be pissed at Obama, tho. Whisp Nov 2013 #69
again I told you so albino65 Nov 2013 #70
This won't be headline news for one simple reason. Xithras Nov 2013 #71
surprise surpise DonCoquixote Nov 2013 #78
I am not surprised DissidentVoice Nov 2013 #81
K&R Pryderi Nov 2013 #83
They just can't help it. NealK Nov 2013 #87
Message auto-removed Name removed Nov 2013 #88
welcome to DU gopiscrap Nov 2013 #90
"It's incredible how these thugs manage to stay in power. . ." YOHABLO Nov 2013 #91
Hope they arrest those fuckers! gopiscrap Nov 2013 #89
Catch em... DirtyDawg Nov 2013 #92
I'm SURE the Mainstream Media with Give this Lots of Coverage! chuckstevens Nov 2013 #93
Another Thought chuckstevens Nov 2013 #94
COOOOOOOOME OOON, Why is this not at the top of every news paper and every news segment? Firebrand Gary Nov 2013 #99
Might it be possible it's not "true" in the sense that it's not "true"? cherokeeprogressive Nov 2013 #100
Quelle surprise. n/t area51 Nov 2013 #103
I suspected this emsimon33 Nov 2013 #104
Republicans are not Americans, they are evil selfish fux. tofuandbeer Nov 2013 #105
Reminds me of the IRS Scandal when the Tea Party AND Progressive groups were flagged for SleeplessinSoCal Nov 2013 #106
Seriously? There are conservatives that are smart enough to run a cyber attack??? Amimnoch Nov 2013 #107
Recommended. (nt) NYC_SKP Nov 2013 #108
Has the MSM covered this yet????!!! n/t Pryderi Nov 2013 #113
I'm Shocked MrsChrist Nov 2013 #114
welcome to DU gopiscrap Nov 2013 #115
Welcome to DU Mrs C. Here are two things that may be of help to you: chknltl Nov 2013 #116
correction bukhlaw Feb 2017 #117

LuvNewcastle

(16,856 posts)
3. I hope so too. This is outrageous.
Fri Nov 15, 2013, 06:37 AM
Nov 2013

Trying to shut down a government website so people can't buy the insurance they need and that the government requires isn't civil disobedience, it's terrorism. I'm really sick of these RW terrorists being allowed to pull shit and not suffer any consequences. If leftists had done something like this while Bush was in office, they would be getting waterboarded right now. Obama wouldn't put up with it either. When RWers do it, the government acts like it's a damned fraternity prank.

RKP5637

(67,112 posts)
28. Exactly, it is RW terrorism, it may not be directly violent, but IMO it is terrorism. Also,
Fri Nov 15, 2013, 09:31 AM
Nov 2013

those distributing the link are inciting terrorism. The whole pack of them should be charged and prosecuted. The US worries about outsiders disrupting the country ... hell, I think we've got our fair share right in the borders trying to inflict pain and suffering on many in the populace. Exactly as you said! "When RWers do it, the government acts like it's a damned fraternity prank."

rurallib

(62,448 posts)
34. for those of us who desperately need insurance to see a doctor
Fri Nov 15, 2013, 10:04 AM
Nov 2013

it could end up in much worse illnesses or other untreated problems.
So it does have that component of violence of a sort.

RKP5637

(67,112 posts)
36. I definitely think so ... it's inciting terror. To me, terror can be physical, violent and/or
Fri Nov 15, 2013, 10:28 AM
Nov 2013

psychological. And for some, it could well end in death because of denial of medical care.

 

Maedhros

(10,007 posts)
73. It's not terrorism. It's cyber-crime.
Fri Nov 15, 2013, 05:26 PM
Nov 2013

We can't follow the right-wing lead and start calling every criminal act "terrorism" just because it makes our political opponents look bad. The term "terrorism" is so vaguely defined that it is effectively meaningless.

The fact that invoking the magical word "terrorism" automatically allows law enforcement to ignore the Constitution underscores the need to refrain from using the term to describe crimes of other types. This is a DDOS attack, an incredibly common type of Internet crime.

Rockyj

(538 posts)
79. That's what they charged Anonymous kid with
Fri Nov 15, 2013, 07:23 PM
Nov 2013

for DOS attack on Scientology's web site: http://www.theregister.co.uk/Print/2008/10/17/scientology_ddos_guilty_plea/
This was a kid who was threatened prison for up to 10 years!

These are grown adults (well physically maybe not mentally) but the F.B.I. needs to be on them!
How about a petition encouraging their arrests?

 

elehhhhna

(32,076 posts)
80. Also a conspiracy and RICO violation? Thanks
Fri Nov 15, 2013, 07:26 PM
Nov 2013

for saying the above much better than I could.

Belated WELCOME to DU!

toddwv

(2,830 posts)
111. I agree.
Sun Nov 17, 2013, 03:27 PM
Nov 2013

Let's stop using the term "terrorism" so loosely that it is applied by both sides to anything they don't like.

A DDOS is a crime and is likely a federal crime. Anyone want to bet that Issa doesn't bother launching an investigation over this?

stlsaxman

(9,236 posts)
112. The first seven words of your post made me stop and think-
Mon Nov 18, 2013, 07:44 AM
Nov 2013

"Trying to shut down a government website..."

Wait- if someone tries to shut down ANY other federal website- that's a felony, right?

ffr

(22,671 posts)
75. To them it's not about nice or not nice
Fri Nov 15, 2013, 05:36 PM
Nov 2013

It's about the money. And they have a financial interest in keeping America from improving. Oppressing those without political connections and maintaining GOP power is their goal.

This is why we need to register voters and get them to the polls EVERY election with one key idea in mind: NO MORE REPUBLICANS. NMR for short. Once they're gone from positions of political power, things like this will fade from view.

Response to eridani (Original post)

LuvNewcastle

(16,856 posts)
6. It's not a complete failure. There are a lot of people who are getting affordable
Fri Nov 15, 2013, 06:49 AM
Nov 2013

health insurance for the first time in their lives. It's got a lot of problems that need to be sorted out, and it's not nearly as good as Medicare, but it's a start. Give them some more time to make it better.

We do need to keep up pressure to get universal Medicare or something like it, and we need to make valid criticisms of the ACA so they'll get busy fixing it, but let's not toss the whole thing. If we lose it, we might never see any sort of health care reform in this country. You won't get lawmakers to stick their necks out again if the ACA is repealed.

Half-Century Man

(5,279 posts)
11. It isn't a failure at all, not in the slightest meaning of the word.
Fri Nov 15, 2013, 07:22 AM
Nov 2013

One aspect of the ACA, the website wasn't as ready as it could/should have been. "X" amount of the problems with the website were caused by outside vested interests opposing successful implementation. One of the contractors involved seems to have had a severe conflict of interest.
Insurance companies who sold inadequate predatory policies in the past, blamed the government to camouflage their previously barely legal consumer fraud. The actual guilt of the government in this issue lays in the past, the reduction or non-existance of proper regulation of medical is the real issue.

LuvNewcastle

(16,856 posts)
14. You're right, "failure" was too strong a word.
Fri Nov 15, 2013, 07:33 AM
Nov 2013

What I mean is that it's kind of a mess right now. There are some things about it that need fixing. I look at it as sort of a work in progress with the ultimate goal being something like a universal single-payer system. We'll have it eventually, and it'll be as popular as Medicare is now. In fact, it might even be combined with Medicare. They just didn't have the votes needed to pass what we needed all at once, but it will be done gradually, I'm pretty sure.

 

seveneyes

(4,631 posts)
41. Maybe. They are still busting people for using the "anonymous" LOIC against Mastercard, Visa etc
Fri Nov 15, 2013, 10:51 AM
Nov 2013

It takes time for the FBI to get subpenas for ISPs to release the IP owners that run the scripts.

annabanana

(52,791 posts)
8. A) Is this provable?
Fri Nov 15, 2013, 07:03 AM
Nov 2013

B) Is it prosecutable?

This kind of attack can be classified as an attack on National Security, surely.

Is it OUR turn to exercise the Patriot Act?

 

jtuck004

(15,882 posts)
13. It's not only proveable, but recordable and traceable. Easily, with the capability of
Fri Nov 15, 2013, 07:29 AM
Nov 2013

the government network folks. The "attack" likely never made it to the site, since any such attack would simply be re-routed and/or dropped.

Still, the very act of trying is a federal offense, so we will see what happens.
 

Coyotl

(15,262 posts)
42. Actually, it would make it to the site and impact the site. That's where it is discoverable.
Fri Nov 15, 2013, 11:02 AM
Nov 2013

The site log files will indicate every request it receives, timed to the hundredth of a second, IP of the requesting computer, etc. This is easy to prosecute if you follow the evidence.

 

jtuck004

(15,882 posts)
57. Actually it wouldn't "make it to the site" and neither do the thousands of attacks that happen every
Fri Nov 15, 2013, 02:37 PM
Nov 2013

year on military and government sites across the country and around the world, because there is a network in front of them that prevents it. You would be correct if they had hosted this in someone's garage connected to their cable network, but I bet it's just like all the other serious networks in Federal facilities, which sit behind hardware and software run by rooms of people across the nation and around the world which protect them.

Malicious packets are routed away and dropped, and the sites go on. Else all the sites run by the government would be down on a continual basis. Perfect, no, but the crap in that article is nothing but shiny stuff to dangle in front of people who don't know better. Like getting one's news from the tabloid section of the supermarket.

You are correct about the log files, but those are not at the server, they are at switches and routers and in programs removed (logically) from the sites, behind doors protected by a lot of security. You must have higher clearance than most people to even get in the rooms. And the traffic must go through their control to get anywhere on a government computer behind that network.

Attacks on government computers are constant, 365 days a year, much of it international. If there wasn't security and an infrastructure to handle this the entire government would be unable to operate, whether military or civilian. And those log files you talk about show exactly that.

In our own private world we were dealing with DOS attacks back in the 90's, so this really isn't anything new. And the people being described in that article don't have enough sophistication to have done even those attacks, much less get through today's security.









 

Coyotl

(15,262 posts)
58. The DoS attack software is being mass distributed, so the requests come in from Anywhere, USA
Fri Nov 15, 2013, 03:17 PM
Nov 2013

and the system is confronted with the requests that are sent to it.

 

jtuck004

(15,882 posts)
65. Ok, you can think what you want, but on a modern system the attacks aren't directed at the
Fri Nov 15, 2013, 04:08 PM
Nov 2013

website, they are directed at the IP address the DNS directs them to, and that's not the web server, not directly. This is just one of many ways it could be done, but, for example:


Notice how "Web Instances" are on a private subnet? The traffic to them comes from the Internet, hits a load balancer then routers and proxy servers - and HAS to be routed onto their network, which is otherwise unreachable. No one that is competent is going to allow such a juvenile attempt at creating attack traffic onto the network. And the people caring for government computers are some of the most competent in the world.

But they aren't the ones who managed the creation of the web site.

Unless someone who couldn't even buy a clue set this up, (which is possible, I suppose, but I doubt it) that IP address points to an interface on a separate network. The traffic, IF you decide to let it through, is then routed onto a virtual network where the actual web site resides. It NEVER, EVER gets directly to the interface of the server, which likely only exists in software anyway.

So the whole idea that a bunch of bubbas can run a kiddie script and have any effect on this at all is more like a fairy tale.

But if you want to think otherwise, that's your option, of course. cya.

 

Coyotl

(15,262 posts)
67. When you interact with another computer online, it is a web server. I have a web server.
Fri Nov 15, 2013, 04:34 PM
Nov 2013

Yes, there is a DNS server too, of course. My domain is served on the web by a web server hosting my files. That is how web pages are relayed to those requesting them. I've taught this basic CIS literacy at the college level.

Clients request files and servers respond by delivering the requested files. The DoS attacking software requests file after file, constantly switching the request, attempting to overload the server and interfere with response performance.

 

jtuck004

(15,882 posts)
72. Like I said, think what you want. But that doesn't explain the thousands of security people
Fri Nov 15, 2013, 04:57 PM
Nov 2013

preventing, successfully, attacks that go on all day long on government servers, in exactly the manner I described. And as soon as it is detected, the packets are diverted or dropped, end of story. But that is only one of hundreds of different attacks that are seen every day.

You might want to spend a little time reading up on how this is done in 2013, however. Because that traffic only gets to the server if it is allowed. Well, except maybe at your junior college.

Then again, you are teaching, not doing, so perhaps that's not as necessary.

Enjoy the echo.



 

Coyotl

(15,262 posts)
77. Insult and derision. That's real classy.
Fri Nov 15, 2013, 06:06 PM
Nov 2013

Like I said, that's how it is. Get used to it.

A million security people cannot stop the file requests from coming down the series of tubes to the server in question.

defacto7

(13,485 posts)
82. I get anywhere from 2000 to 6000
Fri Nov 15, 2013, 08:40 PM
Nov 2013

hits from injection attacks per day, about the same every few days from brute force attacks and several DoS attacks every once in a while... and that's just on one mail server alone. They barely make a dent. I've never had to shut down or have the services reset. Who ever tries to hit has .5 second to do their best before the IP they're using is blocked at the route for several hours. 99.99 percent of the time, the IPs are false so there is no tracking them. If the same IP attacks again after unblock, they go strait to the iptables for a month. Rarely does an IP get logged 5 times within half a second before they are blocked.

I'm sure the site was hit hard and the load is way over mine but I would imagine they would have many routes to redirect traffic. The attacks shouldn't happen but I'm not sure that would be an excuse for Internet problems.

 

jtuck004

(15,882 posts)
96. Exactly. None of these people understand the scope of what goes on out there, nor do they
Sat Nov 16, 2013, 01:29 AM
Nov 2013

want to, apparently, understand that what is being reported only ranges between trivial and nonsensical.

And if there really was a serious attack from domestic sources that really did anything there would be people with guns responding to inform them of the finer points of the law. But most have so little effect that it doesn't even warrant spending the gas to go to their house.

Did you see the Dilbert cartoon of a few weeks ago?

http://dilbert.com/strips/comic/2013-10-02/ <-- Like many others, I've lived through that, so this is eerily familiar.

The problem is the site design and the lack of preparation and testing, which means it is no different from most poorly implemented sites in the private sector. The tragedy is that it is so important to people's lives, and visible, and wasn't given the attention and seriousness it deserved. And now millions of people get to pay the price. And that's on the project managers and their bosses.

And if people will quit wanting to be lied to, it will get fixed faster.

defacto7

(13,485 posts)
97. Absolutely.
Sat Nov 16, 2013, 01:55 AM
Nov 2013

Most average computer users have the unrealistic notion that computers are magic and should work just "because". They don't know the serious technical nature of the beast, the difference between hardware, software, networking and all the totally different languages they speak or can speak, and how that has to be choreographed with data from thousands even millions of different sources... THEN translated into a form that they, Mr. and Mrs. John Q. Public, can make common sense of. The people who do know or have at least the impression of the complexity are on three sides: those who are able and are trying to make the system work, those who are patient because they understand, and those who use the ignorance of the public to undermine the process for political gain. Which one do you think has the easiest job?

People have no idea what the system is made of. They play their "angly birds", write their email and do Facebook trusting that the system and it's lords will make it work.... and that is a very dangerous.

Education is sorely lacking. Lackadaisical attitude and childish demand are legion.

(Sorry for the goofy language. I write that way when I get pissed)

dreamnightwind

(4,775 posts)
84. Your entire argument hinges on this:
Fri Nov 15, 2013, 09:22 PM
Nov 2013

"Malicious packets are routed away and dropped"

Seems to me a well-executed distributed DDOS attack could be indistinguishable from legitimate page requests. Coming from different IP's, probably requesting different pages too, if well-written. How would such page requests be identified as malicious? I'm not attacking you, but as far as I can tell you haven't explained this, and without it, the rest of your argument is meaningless.

 

jtuck004

(15,882 posts)
95. Sigh. Does nobody read anything for themselves any longer?
Sat Nov 16, 2013, 12:11 AM
Nov 2013

So we will keep it simple...

Because a legitimate request is just that - a tcp/ip request, a syn flag that starts the conversation. What is the problem with that? Do you think there is some evil magic smoke in there that's going to dust the software? Understand - that packet is 1s and 0s in a predetermined sequence as prescribed by RFCs. If if varies, it is detectable. When it isn't detected, that is a failure of a human to do their job, or something that hasn't been discovered yet (which happens, but just because it is discovered doesn't mean it was tried or successful). It's not magic.

Also know that there's probably not a single machine under that single server - it's all virtual, created in software, like the other 50 servers on that box, all running under (over) a main server that actually is on the hardware, right? And the whole network they are on doesn't exist except in software. And ALL of that exists behind management and routing hardware and software which takes care of all the packet checking, etc, before it even considers sending on to the virtual network. And ALL of it exists separately and apart from the Internet.

So when that hardware, or software, or management system, or whatever, gets what appears to be a properly formed packet, it opens a session, it gets a packet with a SYN flag but the sender address is forged (one type of DDOS attack), followed by many, many more. The server tries to answer the first few, but there is no answer, and it waits...but as soon as the security software senses the delay it starts looking for just such an attack, (it really is old school, but still used) and routes those packets off the network so they never get to the server. The impact is trivial, and likely has already been addressed by the time you quit thinking about what you were going to have for dinner and realized there was a problem (assuming you are sitting at the console). The job for humans comes after, in documenting, collecting evidence, etc.

So then it gets a packet, opens a session, gets a packet with a SYN flag, but something is different, it's legitimate, and is forwarded to the the server. It establishes it's handshake and serves up the page. Woohoo, Houston, we are ready for launch, And here comes a few hundred more, and then a few thousand.

On a properly designed web site that just means new machines (remember, they are all software), so they start "spinning up" to handle the demand of legitimate requests. And when the requests drop off, so do the machines.

I was just listening to a webcast where they described one of the Amazon services as accepting 14,000 i/o requests a second. How fast you think bubba can send his ddos attack? Think he or she has control of 14,000 machines? Doubt it, but just for arguments sake, let's say yes. Okay, there goes 3-4 seconds. What's next? And if some moron tries to send 14,000 requests from one machine, how many seconds do you think it will be until we figure it out? 2? 3?. The lines on the detection system monitor will be bright red by the time you can look up from your comic book.

If, as you said, it is "indistinguishable from legitimate page requests" then it IS a legitimate request. If it is an attack, it will be formed differently - some 1s and 0s will be in places they should not be - and that is detectable. If the source is forged, the detection will be that there are too many unanswered tcp handshakes, and the response will be appropriate. WHAT they are attacking may change, as new vulnerabilities are seen all the time as new software appears, but in a well-designed system at the level of the government, with thousands of some of the best security people in the world at the controls and gates, the odds of such an attack even getting to it's target is quite small, and actually causing a disruption even less so.

We are really, really good at this as a country. On your WIndows box, or even Linux or Mac, it's simply a different world. At your local ISP, unless it is in a really big data center like IBM's, or maybe RackSpace, or AWS, the odds are somewhere in between. Game players face this problem, because the servers that provide their service are not protected as well, so such an attack (as well as others) has more chance of succeeding. Amazon Web Services is an even higher level, but the use a shared security responsibility model, so you can actually put up a server that has a security issue which it is your responsibility to take care of - and if you don't, it could cost you, and potentially others.

In a government site the entire network is behind a classified network that allows packets onto it, and the technology that protects it is truly amazing. The odds of any such event happening are pretty small, and the silly, amateurish actions being described in the article above are almost trivial compared to what they face every day - say from a few million IP addresses in China used by computer scientists being paid by ??? to get what they can. Or a dedicated radical (not necessarily out of the country) out to kill as many as possible with software placed in a strategic area.

How healthcare.gov is set up is anyone's guess, but why would they leave it open to attacks that we prevent on a daily basis? The simple answer without other evidence to the contrary: it's not. The problems with the site are how it was designed and implemented, and lay at the feet of the project management and who they work for.

Which is why they brought in more help, like the guy who contributed to Obama's campaign. It's the design of the site, not jim bob renaming some worthless piece of crap script just so he can get a bunch of unformed people jumping up and down like meerkats with seizures.

Go read some man pages on TCP/IP, some sites about tcpdump and attacks - hell, just google it and you will see how humorous all this really is.






defacto7

(13,485 posts)
101. Haaa.. LOL
Sat Nov 16, 2013, 02:23 AM
Nov 2013

I wish I had written that!

Anyway, The implementation of the site was too quick, too untested and constantly being thwarted... not by Internet attacks but by human ones making demands on project management that were out of order and unreasonable, some of which were by insurance companies (who were very careful) and the worst of which were by red state and federal politicians who wanted to trip up the systems implementation. There is a lot of blame to go around under the magnitude of the project and because of over zealous demands. Simply... it needed more time; no one had it and no one would give it.

dreamnightwind

(4,775 posts)
102. OK, thanks for trying to explain
Sat Nov 16, 2013, 03:26 AM
Nov 2013

I have not been claiming a DDOS attack was responsible for the ACA website problems, I just didn't understand your statements about how it could not be, or how unlikely that is.

I'm a programmer, not a network protocol person at all, so I know something about this stuff, but only at a pretty superficial level.

"If, as you said, it is "indistinguishable from legitimate page requests" then it IS a legitimate request. If it is an attack, it will be formed differently - some 1s and 0s will be in places they should not be - and that is detectable. If the source is forged, the detection will be that there are too many unanswered tcp handshakes, and the response will be appropriate. "

I get that a forged IP would lead to handshakes not completing. I don't get the first part, that the page requests from multiple hacked machines (or a large network of attackers, which seems less likely to me, though possible if it's a RW orchestrated attack) would be formed differently. I agree that it would take a lot of machines to make much of an impact.

I don't have to understand this, probably shouldn't have waded in, but if it wasn't clear to me it probably wasn't clear to a lot of people.

 

jtuck004

(15,882 posts)
109. Awww, I'm just irritated by the whole thing. Bunches of people seem to want to grasp at anything and
Sat Nov 16, 2013, 05:55 AM
Nov 2013

everything to find excuses for this instead of looking at where the real issue is and getting it fixed. Excuses don't fix anything. You had a legitimate question and I shouldn't get so snippy.

What I meant to say in my inept writing is that thousands upon thousands of legitimate requests (from the computer's point of view) could do a similar thing, take up system resources which would deny those services to others if the systems are not designed well (and that sure appears to be the case). But that's a a design problem, not having systems that should be able to handle the load - because that WAS the predicted legitimate load, if several million people were expected to sign up. It should have been designed to handle that with room to spare. It would likely take hundreds of thousands to make a real difference, and even then it should at most slow, not disable the site. Repeated IP addresses would have been flagged fairly quickly, and they probably don't control enough machines to really make a dent anyway. And just because they found a script that someone named "take down the site" doesn't say it was used, or effective, or anything else. There was a lot of inference in that story, not much of anything substantial. I could name my dog "flew to the moon", but it doesn't mean he did it. Sounds more like people trying to offer up excuses, in the hopes that something will divert attention from the real issue.

But what seems to be missing is the idea that the sites sit behind a network of really good security people that would nip that in the bud so fast it would make a person's head spin. So a lot of this speculation ignores reality.

I'm a sysadmin type - I admire the work most programmers do, but I never had the patience to argue for hours about the most elegant way to create a method, ya' know? I'm expected to get things working and keep them that way, not make excuses, and I have a hundred other fires to put out after the one I'm currently working on. So I have to cut to the problem, figure out WHY it's a problem, do my best to understand the why of the engineering, and make a good, solid fix across lots of different systems. It may not be elegant, but it works. I'm not always right, but I'm good at what I do and I'm right most of the time. I am always fixing things for people who get in their own way by insisting on creating demons that don't exist, or looking for things that "should be". They need to focus on "what is", and it is just hard for them to do.

This was/is a really important program, but I think inept management at several levels left us with a pile of crap, not realizing the work that needed to be done while either patting themselves on the back for doing a good job or thinking that they could shove the responsibility off on someone else. (And having worked on government projects that's not unusual. I can certainly picture that happening in D.C.). There were pressures from outside, but that doesn't really excuse this, and it doesn't get it fixed. The sooner people quit letting all the ancillary stuff that has little or nothing to do with it get in the way the sooner a solution will begin to emerge.

I was reading about it in the NY TImes. Some of the folks working on it said there were a few more people, but not much had changed, except that there were a "lot more suits walking around" (most of whom are probably not useful). A computer scientist commented on what it was going to take to fix it, and noting all the new experts that had been called in, said something to the effect of "Just because you get 9 women together doesn't mean you can have a baby in a month". And now we are hearing lengthening promises of when it will be ready. So we will see...

I'm seriously wondering if there are parts of this that were never really tested or working, just because the project managers never fully developed the requirements and outcomes. Wouldn't surprise me.




dreamnightwind

(4,775 posts)
110. I get it, not making excuses for the web site
Sun Nov 17, 2013, 02:56 AM
Nov 2013

A lot more suits walking around sounds like a recipe for a bad environment. It would be one of my worst programming nightmares to work on a high-profile project such as this, have the roll-out fail, and have management escalating to get an expedited fix by adding a bunch of people to the team who haven't been there from the start. The 9 women quote is a great way to say exactly that. It might end up helping but you can bet it's a terrible mess as far as working as a team in a reasonable way.

I haven't gotten into this issue too much so I don't know where the fault lies. It's often impossible to tell from the outside anyway.

PoliticAverse

(26,366 posts)
53. The Director of the NSA is approved by the President. And enforcement of the Patriot Act is
Fri Nov 15, 2013, 12:18 PM
Nov 2013

the responsibility of Obama appointee Eric Holder.

 

rhett o rick

(55,981 posts)
54. By law that's true. IMO the spy agencies have more power than the President.
Fri Nov 15, 2013, 12:46 PM
Nov 2013

I dont think it was coincidence that the spy agencies remained unchanged after Obama became president. The President should fire Gen Clapper but he hasnt. I dont think he can.

 

Coyotl

(15,262 posts)
59. Spy agencies don't have agency. Humans are the actors.
Fri Nov 15, 2013, 03:19 PM
Nov 2013

People have power because they are the ultimate actors. And yes, someone gets to be the big boss. And yes, that's the President.

 

jtuck004

(15,882 posts)
12. What a waste of time, for more than one reason. First, you can't put a computer on the Internet
Fri Nov 15, 2013, 07:25 AM
Nov 2013

today without it being immediately scanned and/or attacked. What is in that article is a very minimal portion of what goes on out there every single day, and any site not designed to account for it would have to be running on a site like "JImmy Joe's Web Hosting and Bait Sales", or at least by people completely ignorant of computer work in this decade. The stuff above is mostly for show, busy work for politicians and others who know nothing about how things really work. The odds that it has any effect on the site at all is probably nill. (Just FYI, there is a whole secret network, classified, behind doors you will never see behind, run by the military, that routes the government stuff, staffed by some of the best network security folks in the world, and they are VERY, VERY good at what they do. The people discussed in this article would have no chance of having the slightest impact on the network they protect, one which is hit by hundreds of attacks from sophisticated, intelligent criminals and curiosity seekers EVERY DAY.) In other words the coverage in the article is mostly sensationalist b.s. Those packets would have been dropped before they ever got there, because it would not have been left up to the project managers responsible for this screwed up implementation. And if they aren't protecting this one, one would have to ask why not?).

Note that any computer on the will see a scan, likely in less than a minute from the time they first hook to the Internet. Leave it on unprotected a few hours and it is almost certain that, if it is a Windows machine, it will be not only compromised but probably used to take part in attacks on others. (Not something you want to test without experience and precautions, btw. Because YOU might be held liable for putting an unprotected machine out there). The majority of the attacks come from overseas, a bit from inside the country. Anyone stupid enough to pick up these alleged tools and run them probably doesn't have the sophistication to realize they are committing a Federal offense, and nowhere near the knowledge to hide their attack, so they might as well put a big sign on their door saying "come arrest me, I'm a big dumbass".

Second, the site is a big pile of steaming shit, so what's the point? It doesn't work without their "attacks", laughable as they are, so why risk committing Federal crimes?

Third, unless things change, it appears that 5 times as many people who were previously uninsurable or are elderly are signing up, and unless that trend undergoes a real and sudden reversal, we should remember that the rates are based on a completely opposite prediction of many more younger, healthier people paying in. If this group, which happens to be suffering from some real unemployment issues - among others at the moment - doesn't jump up and start signing up in droves by the deadline, (which may happen, sure, but the preliminary numbers say it hasn't so far) then those who have already signed up will find their premiums increasing, perhaps a lot. (This possibility was foreseen, which is why there is no upper cap on premiums, just a 10% cap on the amount they can be raised in a year without asking permission. Then again, who is going to deny them permission when they say they will have to close their doors and go bankrupt because the costs are too high?)

If that happens it might just might push us into Medicare for all. With any luck.

JackInGreen

(2,975 posts)
18. On the boards I'm active on
Fri Nov 15, 2013, 08:06 AM
Nov 2013

I'll be keeping my eyes out, anyone know where to report anything like this if we encounter someone distributing it or it's like on the net?

vt_native

(484 posts)
19. I wonder if a U.S. Attorney will hound the hackers until they are driven to suicide
Fri Nov 15, 2013, 08:26 AM
Nov 2013

like with Aaron Schwartz.

malaise

(269,157 posts)
22. Why is this not the #1 story on all media this morning
Fri Nov 15, 2013, 09:04 AM
Nov 2013

Treason and Sedition are taking place and no one is being punished.

Puzzledtraveller

(5,937 posts)
23. What about our adept NSA?
Fri Nov 15, 2013, 09:10 AM
Nov 2013

Surely they already know who was doing this and has the goods on them packed up and ready to go to trial.

KrazyinKS

(291 posts)
24. I think there has been a concerted effort to stop the ACA
Fri Nov 15, 2013, 09:14 AM
Nov 2013

in any way possible. There are some pretty good computer geeks out there that could probably hack the site successfully. Second the insurance plans that were being canceled will probably have to raise their premiums because now when someone gets sick, the companies can no longer cancel their policies. Third, there was a story just this morning on Yahoo about young people staying put, meaning they are staying at home, not buying houses and moving. Because they can not get well paying jobs and are underemployed and broke. I am a big fan of heal care reform. This is an uphill battle and we can not afford to throw up our hands and quit.

RitchieRich

(292 posts)
26. shared
Fri Nov 15, 2013, 09:19 AM
Nov 2013

when I shared this on Facebook I made a point of posting the Fox"news" version as a comment below it, so all my intentionally acquired right "friends" would have to take it seriously. It made for an interesting result, seeing the two next to each other.
http://nation.foxnews.com/2013/11/13/attempted-cyber-attack-healthcaregov-confirmed

 

HooptieWagon

(17,064 posts)
48. Same here.
Fri Nov 15, 2013, 11:36 AM
Nov 2013

A couple of visits...damned difficult to follow the threads and make out who responses were directed at. No organization, so navigating to look for specific topics was impossible. It just looks like a whole bunch of random drunken rants.

RKP5637

(67,112 posts)
37. Sic the NSA on them. One would think they could track them right down to their loony fingertips
Fri Nov 15, 2013, 10:33 AM
Nov 2013

typing away. We put up with way too F'en much from these assholes.

 

B2G

(9,766 posts)
47. If true, why hasn't Obama addressed this?
Fri Nov 15, 2013, 11:20 AM
Nov 2013

You would think he would be shouting it from the rooftops rather than eating all of the blame.

Weird.

BumRushDaShow

(129,442 posts)
52. There's no "one thing" wrong
Fri Nov 15, 2013, 12:13 PM
Nov 2013

and just about every public-facing government system gets jacked at one time or other.

I.e., people (including the media) focus too much on whining about problems and less on finding solutions. This is why the President is saying "yes there are a multitude of issues but here is what we are doing to address them" and then you move on.

deutsey

(20,166 posts)
63. I don't know many of the details yet (no time to digest them at the moment) but
Fri Nov 15, 2013, 03:49 PM
Nov 2013

I'll be interested in learning whether the people who worked on the site had anticipated such politically motivated attacks and tried to guard against them.




GoCubsGo

(32,088 posts)
68. I'm not surprised.
Fri Nov 15, 2013, 04:36 PM
Nov 2013

I also won't be surprised when this information doesn't make the MSM tonight or any other time.

 

Whisp

(24,096 posts)
69. it's a hell of a lot easier to be pissed at Obama, tho.
Fri Nov 15, 2013, 04:38 PM
Nov 2013

this sounds like one of those crazy conspiracy theories! things like that don't Really happen!

 

albino65

(484 posts)
70. again I told you so
Fri Nov 15, 2013, 04:41 PM
Nov 2013

My post of October 24:

I know there are a lot of problems with the ACA website, but I am not sure you can count out a coordinated DOS attack by right wing nut jobs. We already know that they use bots and trolls to disrupt discourse on many news forums. I'm also sure that a large number of people were just there "kicking tires " rather than actively seeking health insurance. Also, some of the contractors may not have been giving their best in the run up to roll out due to being disheartened by the controversy and obstructionism by the GOP. If they thought that it was likely that the ACA would fail to launch, they may have seen little prospect in their work. We need to take the example of Kentucky and press our state lawmakers to institute state exchanges. No matter, the media grabs hold of the failures and never the successes.

Xithras

(16,191 posts)
71. This won't be headline news for one simple reason.
Fri Nov 15, 2013, 04:52 PM
Nov 2013

DDOS attacks are only effective against small-scale web services and enterprise services that have failed to implement modern security architectures. If the government were to try and blame it on hackers, they'd have to admit that the new website was implemented using a model at least a decade out of date.

A modern, scalable, distributed web architecture is effectively DDOS proof. Heck, HHS could have parked the site behind Cloudflare's distributed network and made it DDOS proof for only a few thousand dollars a month, even WITH an outdated single datacenter web server model. The fact that it was vulnerable to this kind of attack isn't a great sign, and I doubt that the government really wants us web security types pointing that out.

It would be like saying "Yes, we knew that there were burglars in the neighborhood, and that they hated us, and we left the doors unlocked anyway...but it's not our fault we got robbed!"

DissidentVoice

(813 posts)
81. I am not surprised
Fri Nov 15, 2013, 08:30 PM
Nov 2013

The far right has already demonstrated they will do anything in their power (Constitutional, legal or not) to block anything they don't like - by extension, anything President Barack H. Obama has done or will do.

They didn't like "Obamacare"...so they played chicken with a government shutdown.

They still don't like "Obamacare"...so they have their hackers screw up the ACA website.

From here on out, we should not be surprised at anything these people will do, and be prepared for the worst.

NealK

(1,879 posts)
87. They just can't help it.
Fri Nov 15, 2013, 09:56 PM
Nov 2013

They always have to cheat and/or commit crimes in order to push their agenda or win elections.

Response to eridani (Original post)

 

YOHABLO

(7,358 posts)
91. "It's incredible how these thugs manage to stay in power. . ."
Fri Nov 15, 2013, 10:15 PM
Nov 2013

Well you have the super rich multinational groups like the Kochs .. what can you say?

 

DirtyDawg

(802 posts)
92. Catch em...
Fri Nov 15, 2013, 10:28 PM
Nov 2013

...take em out and shoot em...no trial, no Miranda, no notice...and it'll only take one.

 

chuckstevens

(1,201 posts)
93. I'm SURE the Mainstream Media with Give this Lots of Coverage!
Fri Nov 15, 2013, 11:08 PM
Nov 2013

NOT!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

 

chuckstevens

(1,201 posts)
94. Another Thought
Fri Nov 15, 2013, 11:26 PM
Nov 2013

If the President and his administration refuse to make the public aware of this, then they deserve to fail. RAISE HOLY FUCKING HELL OVER THIS! Would they ONCE go on the offensive?

If the president does want to save his reputation, he's a fool, but dam it; he will hurt the whole Democratic Party in the 2014 mid-terms and God knows where that will take the nation.

Firebrand Gary

(5,044 posts)
99. COOOOOOOOME OOON, Why is this not at the top of every news paper and every news segment?
Sat Nov 16, 2013, 02:04 AM
Nov 2013

This is crazy! Why are we not plastering this all over the place, I'm so over this BS... Ahhhh

tofuandbeer

(1,314 posts)
105. Republicans are not Americans, they are evil selfish fux.
Sat Nov 16, 2013, 04:52 AM
Nov 2013

Like Jerry Brown said in his bid for president (too many years ago): Let's Take America Back.

SleeplessinSoCal

(9,145 posts)
106. Reminds me of the IRS Scandal when the Tea Party AND Progressive groups were flagged for
Sat Nov 16, 2013, 05:08 AM
Nov 2013

political donations. But I'd bet 90% of Americans think only the Tea Party was flagged.

This is not likely to get the same kind of attention as the glitches and dropped coverage is getting.

 

Amimnoch

(4,558 posts)
107. Seriously? There are conservatives that are smart enough to run a cyber attack???
Sat Nov 16, 2013, 05:13 AM
Nov 2013

I don't think I've ever met a far right conservative that wasn't a technophobe, and completely computer stupid. Generally anything past facebook, skype, and rightwing blogs is beyond their capability.

Of course, if we can prove that some of them are smart enough to actually run a successful cyber attack, then they no longer have any ground at all to argue against evolution.

MrsChrist

(1 post)
114. I'm Shocked
Tue Nov 19, 2013, 04:01 PM
Nov 2013

I'm shocked, Agast, and clutching the pearls around my neck thinking it's probably the Main Stream Media's fault for not letting those State Governor create their own web site, or shutting down the government for the 1st two weeks, or just Defunding present bills. Time for the Nucular Option

Latest Discussions»General Discussion»Right wing cyber attacks ...