Thanks for you reply. At least I know I´m not alone with this problem. I didn´t think about using VLAN, it really complicate the problem.interesting , today i was thinking in such post in forum and make a feature request. you did it first.
i think it is a MUST for each PPPoE concentrator . now i have more than 20 users which eat a lot of my resources.
about the bridge solution , i done it but if your pppoe users come from vlans this solution does not works and you just can block that mac address not just block the padi packets or limit them. i said the problem of the bridge to support and they said it will be solved in next version.
This is a VERY interesting post to me, I am planning to phase out a FreeBSD PPPoE server and this is the single problem that is worrying me the most.Hi, I´m looking for a solution to limit a PPPoE connection request attack (PADI). I have some users that sometimes sends a lot of PADI frames requests at same time and overload our radius server (even using a very fast machine and increasing a lot radius parameters).
I searched about this on Internet and discovered that professional PPPoE concentrators limits it natively with a max connection request per minute/second option for each MAC address (this is a very common attack for PPPoE). Well MKT PPPoE doesn´t have this kind of protection so I looking for a solution to stop this kind of attack.
The first thing I tried to do was to analyze radius log per minute and search for a MAC address which is sending too much connection requests and try to block it. The problem is that I cannot find a way to block a MAC address to not send more PADI frames to Mikrotik. I can only create rules in MK to block a PPPoE traffic in bridge mode but I cannot use bridge mode when acting as a PPPoE Server (at least not in the same interface).
I already asked to MK support team and they confirmed that it´s not possible to be done on the same MK machine (I need a second MK machine acting as bridge before PPPoE server just to do it, what is not a viable solution).
Some time ago I read something in this forum that someone did some trick to solve it but I lost this message.
If someone here have some idea to do that please I´m accepting suggestions.
I don´t think it. You can´t solve this problem with a single rule.I think the tools to implement this are already in place, it's just a matter of figuring out.
I thought to do exactly this, create a bridge with a single interface and create PPPoE on that bridge, but I thought this was a weird solution that could cause some problem or performance issue.This is a VERY interesting post to me, I am planning to phase out a FreeBSD PPPoE server and this is the single problem that is worrying me the most.Hi, I´m looking for a solution to limit a PPPoE connection request attack (PADI). I have some users that sometimes sends a lot of PADI frames requests at same time and overload our radius server (even using a very fast machine and increasing a lot radius parameters).
I searched about this on Internet and discovered that professional PPPoE concentrators limits it natively with a max connection request per minute/second option for each MAC address (this is a very common attack for PPPoE). Well MKT PPPoE doesn´t have this kind of protection so I looking for a solution to stop this kind of attack.
The first thing I tried to do was to analyze radius log per minute and search for a MAC address which is sending too much connection requests and try to block it. The problem is that I cannot find a way to block a MAC address to not send more PADI frames to Mikrotik. I can only create rules in MK to block a PPPoE traffic in bridge mode but I cannot use bridge mode when acting as a PPPoE Server (at least not in the same interface).
I already asked to MK support team and they confirmed that it´s not possible to be done on the same MK machine (I need a second MK machine acting as bridge before PPPoE server just to do it, what is not a viable solution).
Some time ago I read something in this forum that someone did some trick to solve it but I lost this message.
If someone here have some idea to do that please I´m accepting suggestions.
It's curious when you say you can't run a PPPoE server in a bridge because I do exactly that. I create a bridge with just one interface so I can place filters to pass only PPPoE Discovery and PPPoE Session protocols. Then I run the PPPoE server in that bridge.
My question is: assuming we can run the server in a bridge, how can we take advantage of that to limit the PADI packets? Has someone already implemented this? How the rules should look?
Looking from another angle, limiting global PADI packets per second protects your Radius server and only penalizes new connections, not the established ones....apparently there is no performance issue. It's pretty comfortable to filter every other protocols, saves a lot of headaches.
Looking closer, you are right about the rule being too broad and include non-attackers. I am shure we are not the first ones with this problem but I couldn't find any answer yet.
Yes, but if you have a few users flooding with PADI frames other users will be unable to connect (I have users connecting all time).Looking from another angle, limiting global PADI packets per second protects your Radius server and only penalizes new connections, not the established ones....apparently there is no performance issue. It's pretty comfortable to filter every other protocols, saves a lot of headaches.
Looking closer, you are right about the rule being too broad and include non-attackers. I am shure we are not the first ones with this problem but I couldn't find any answer yet.
i agreeYes, but if you have a few users flooding with PADI frames other users will be unable to connect (I have users connecting all time).
I agree. This would be a great feature.i think this such bridge solutions are just for temporary deleting the question and it is not the answer.
mikrotik should implement a way like maximum pppoe requests per mac per minute and with one mikrotik not with another bridge.
Advanced concentrators have exactly the feature I mention on this topic. At really I discovered this reading comercial PPPoE concentrators documentation. All them have this because it´s a very basic protection.now i have more than 50 ADSL users (which their credit is finished ) connect through pppoe and they have configured their modem to auto connect . each user have 3 pppoe connection per second . i think for an advanced concentrator there must be a feature to prevent this kind of problems.
think these users grow to 500 !!!
please dont say me to disable their ports etc . i know them but they are just for temporary solutions.
Hello shap,I have exact same issue, with 3500 PPPOE sessions, and 300/s incoming bad requests (wrong credentials, expired, etc) my radius server going to explode soon! that's amazing 5 years of topic start and no answered yet
Hello hci,Run over 1000 on x86 dual core. No issues.
[admin@CSC-auth-12] > system resource print
uptime: 20h12m54s
version: 5.22
free-memory: 1846632KiB
total-memory: 1943428KiB
cpu: Intel(R)
cpu-count: 2
cpu-frequency: 2133MHz
cpu-load: 16%
free-hdd-space: 240094612KiB
total-hdd-space: 240292452KiB
write-sect-since-reboot: 13818
write-sect-total: 13818
architecture-name: x86
board-name: x86
platform: MikroTik
[admin@CSC-auth-12] > system resource pci print
# DEVICE VENDOR NAME IRQ
0 06:05.0 ATI Technologies Inc ES1000 (rev: 2) 10
1 05:00.0 Intel Corporation 82572EI Gigabit Ethernet Controller (Copper) (rev: 6) 11
2 04:00.0 Broadcom Corporation NetXtreme BCM5721 Gigabit Ethernet PCI Express (rev: 17) 3
3 02:00.0 Intel Corporation 6702PXH PCI Express-to-PCI Bridge A (rev: 9) 0
4 01:00.1 Intel Corporation 82571EB Gigabit Ethernet Controller (rev: 6) 11
5 01:00.0 Intel Corporation 82571EB Gigabit Ethernet Controller (rev: 6) 3
6 00:1f.3 Intel Corporation 82801G (ICH7 Family) SMBus Controller (rev: 1) 0
7 00:1f.2 Intel Corporation 82801GB/GR/GH (ICH7 Family) SATA IDE Controller (rev: 1) 11
8 00:1f.1 Intel Corporation 82801G (ICH7 Family) IDE Controller (rev: 1) 0
9 00:1f.0 Intel Corporation 82801GB/GR (ICH7 Family) LPC Interface Bridge (rev: 1) 0
10 00:1e.0 Intel Corporation 82801 PCI Bridge (rev: 225) 0
11 00:1d.7 Intel Corporation 82801G (ICH7 Family) USB2 EHCI Controller (rev: 1) 11
12 00:1d.2 Intel Corporation 82801G (ICH7 Family) USB UHCI Controller #3 (rev: 1) 5
13 00:1d.1 Intel Corporation 82801G (ICH7 Family) USB UHCI Controller #2 (rev: 1) 10
14 00:1d.0 Intel Corporation 82801G (ICH7 Family) USB UHCI Controller #1 (rev: 1) 11
15 00:1c.5 Intel Corporation 82801GR/GH/GHM (ICH7 Family) PCI Express Port 6 (rev: 1) 0
16 00:1c.4 Intel Corporation 82801GR/GH/GHM (ICH7 Family) PCI Express Port 5 (rev: 1) 0
17 00:1c.0 Intel Corporation 82801G (ICH7 Family) PCI Express Port 1 (rev: 1) 0
18 00:01.0 Intel Corporation E7230/3000/3010 PCI Express Root Port (rev: 0) 0
19 00:00.0 Intel Corporation E7230/3000/3010 Memory Controller Hub (rev: 0) 0
Thank you.Xeon 3060 on Supermicro motherboard with integrated dual intel nics.
Hello Tamil!Whatever the spec you had in mikrotik...
when PPPOE request attack happen from multiple devices , it definitely slow the authentication for all other PPPOE clients .
even you got less than 20% of cpu usage.
ISP People who told all are fine in Mikrotik PPPOE server means the reason behind it is they use less than 500 users or else they don't take much care about PPPOE authenciation delay happening to random clients..
Mikrotik guyz must listen to this thread , instead of more concentrating on MUM & New RouterOS Features ....