Of the small amount of name servers I run, each and every name server has had persistent attacks (I guess) in the form of "(sl): query (cache) 'sl/ANY/IN' denied". These attacks appear to be originating from legitimate ISP resolvers, but the majority of the attacks appear to be drones/malware of sorts. I am assuming the majority of these IP's are spoofed. These attacks appeared to begin in Dec 2020 / Jan 2021, and have persisted up to this writing. The worst of it was in Jan 2021 for me. Prior to me crafting a firewall rule, log monitoring and triggers, and adding some loose rate limiting (The various *-per-second options), I would see well more than 2500 queries an hour for the sl query from copious amounts of IP's. It probably was much more than that, as it was pegging a VPS single vCPU that I have to 100% - bad on me for not hardening that particular virtual machine in the first place months ago. The other name servers had similar attacks, but not to the same magnitude by a long shot. Today, and so far, the VPS above that was originally taking in such a huge amount of sl queries, has temporarily blocked 78 unique IPv4 addresses. Every query from each of the IP's has been in the form of: Apr 13 22:08:55 ns02 named[432]: client @0x7f98c063d430 50.99.83.201#80 (sl): query (cache) 'sl/ANY/IN' denied Apr 13 22:08:55 ns02 named[432]: client @0x7f98c063d430 50.99.83.201#80 (sl): query (cache) 'sl/ANY/IN' denied Apr 13 22:08:56 ns02 named[432]: client @0x7f98c063d430 50.99.83.201#80 (sl): query (cache) 'sl/ANY/IN' denied
[...]
Apr 13 22:44:02 ns02 named[9487]: client @0x7fc8740c7310 46.102.130.246#80 (sl): query (cache) 'sl/ANY/IN' denied Apr 13 22:44:02 ns02 named[9487]: client @0x7fc8740c7310 46.102.130.246#80 (sl): query (cache) 'sl/ANY/IN' denied Apr 13 22:44:04 ns02 named[9487]: client @0x7fc8740c7310 46.102.130.246#80 (sl): query (cache) 'sl/ANY/IN' denied

--Brett

------ Original Message ------
From: "Richard T.A. Neal" <rich...@richardneal.com>
To: "bind-users@lists.isc.org" <bind-users@lists.isc.org>
Sent: Apr 13, 2021 17:42:28 PM
Subject: FW: Preventing a particular type of nameserver abuse

 In the particular case of the .sl denied queries, I don't think these are 
forged queries from the attack victim. Something else is going on here. We see 
queries from systems like these, almost exclusively consumer endpoints:

[snipped]

 It seems unlikely that someone is trying to attack those specific endpoints. 
Unless the attack is *very* widely distributed and they are actually attacking 
the ISP infrastructure. But in that case, this seems to be a simultaneous 
attack on almost every major ISP, which I find unlikely.

Yes, another individual & I were discussing this off-list today. We wonder if those 
queries are from malware on infected hosts that are trying to determine whether a given 
nameserver can be used in a distributed reflection attack? The source IP is not spoofed 
(because it wants to get the answer), so if it gets either "refused" or a timeout 
then it knows that nameserver can't be used in the reflection attack. But if it gets a 
response with data then it knows it *can* be used in the reflection attack.

A lot of the "bad clients" that I block are also domestic IP addresses, and 
I've yet to come up with any other explanation so am always open to any plausible causes.

Best,
Richard.
_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to