Re: [dns-operations] Mozilla Firefox and ANY queries

2015-03-05 Thread Lutz Donnerhacke
* KLaM Postmaster wrote:
 But nobody is asking the fundamental question, why do they need this info in 
 the first place?

Because they added their own caching code for DNS responses. The
getaddrinfo/getaddrbyname API is designed to be called on every new socket.
But they hacked around this design and now trying to fix it.
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] Google DNS used as amplification - aren't they caching?

2014-08-06 Thread Lutz Donnerhacke
* Paul Wouters wrote:
 It seems that the nsd ratelimits to send TC=1 isn't working well either
 to reduce the incoming amount of UDP queries.

 Why does google dns seems so inefficient at caching?

I can second this. With rate limiting and dampening (at my side) I get
customer complains, that the Google webmaster tools report an unreachability
of the DNS servers (about 5%).

OTOH there are customers which use Google public DNS and do have sporadic
resolving problems Internet is not working! We can't even access our own
home page!

And this is true: Google IP ranges hit the dampening limits several times
the day.
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] DNS Issue

2013-05-01 Thread Lutz Donnerhacke
* John Kristoff wrote:
 And why auditors do not like tcp53 open to public?

 They may have an outdated, naive view of what should be open and
 what shouldn't be?  Show them the above and ask them why.  I'd be
 curious what the response is.

We have never seen TCP/53 in public beside strange examples or attack.
TCP/53 ise superseded by EDNS0
TCP/53 is only needed for AXFR, allow TCP/53 only to(!) your primary NS
DNS works over UDP

There are more such answers. But the most prominent answer is:
We marked it red, because it's a security risk. Close it!
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] N-Root

2013-04-01 Thread Lutz Donnerhacke
* Stephane Bortzmeyer wrote:
 Congratulations: you've solved the easy problem, the technical one,
 and left open the really hard one, finding who has the legitimacy to
 hire/fire root name server operators :-)

Oh, this problem was solved years ago. ICANN was founded to bind all efforts
of gouvernments, private people, and orgranisations in a burocracy impossible to
understand nor to survice, with the simple goal to keep all those from
affecting the real work of the real root server operators. The funny part
is, that the root server operators (which does not exist as an organization)
appears to be an organisation within ICANN. But this is only just another
level of indirection and confusion. ICANN is very successful in doing their
(hidden) primary goal: Let the operators work.
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] Force TCP for external quereis to Open Resolvers?

2013-03-31 Thread Lutz Donnerhacke
* Jim Reid wrote:
 In this case, DDoS attackers would get those truncated responses sent
 to their victims. OK, they lose the amplification factor but they still
 get to flood the victim(s) with unsolicited traffic.

That does already happen in the wild. I was part of such an TC=1 attack
and got sued over the remaining(!) 2Mbps. That's why I went further and stop
query processing at all for this victim: DNS Dampening.

___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] Recently closed open resolver and reflection attacks

2013-03-08 Thread Lutz Donnerhacke
* wbr...@e1b.org wrote:
 Any idea how long it takes before the formerly abusable server gets taken 
 off the lists of open recursive servers?

About a week. Then the attacks calm down.
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] Another whitepaper on DDOS

2013-02-22 Thread Lutz Donnerhacke
* Tony Finch wrote:
 DigiNotar's bogus Google certificate would not have worked with DANE.

But the errornous transfer of ebay.de would create a deasaster with DANE.
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] Defending against DNS reflection amplification attacks

2013-02-20 Thread Lutz Donnerhacke
* Jan-Piet Mens wrote:
 FYI, a paper (Feb 2013) titled Defending against DNS reflection
 amplification attacks at [1].

Despite they are using the wrong patch for DNS Dampening, the results are
impressing. Works as designed.

Of course, they require a SLIP parameter. I heard this.
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] DNS ANY requests / UltraDNS

2013-01-10 Thread Lutz Donnerhacke
* Colm MacCárthaigh wrote:
 On Wed, Jan 9, 2013 at 4:24 PM, Scott Brynen
scott.bry...@visioncritical.com wrote:
 In an interesting development to this, UltraDNS are starting to REFUSE a
 UDP/ANY request on some of their name servers.

 Considering that a status=REFUSED response is exactly as large as a
 TC=1 response with no answer section, is there a technical benefit to
 responding with REFUSED?

Both approches does not help. The traffic generated by such small answers to
spoofed queries is still sufficient to bring the target down. Be there, done
that, got sued.

That's why I switched to a much more aggressive DNS dampening.
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] DNS ANY requests from Amazon?

2012-12-18 Thread Lutz Donnerhacke
* Stephane Bortzmeyer wrote:
 No one in his right mind limits simply by the client's IP address.

Interesting point. Nice to read.
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] First experiments with DNS dampening to fight amplification attacks

2012-11-05 Thread Lutz Donnerhacke
* Klaus Darilion wrote:
 Agreed. That's why I mentioned that our iptables based rate limiting 
 only mitigates the current ANY amplification attacks, not all kind of 
 attacks.

I did see some attacks with repeated DNSKEY queries. Dampening catched them.
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] First experiments with DNS dampening to fight amplification attacks

2012-10-25 Thread Lutz Donnerhacke
* Lutz Donnerhacke wrote:
 If they are optimal or not is still an open question. But the patch is
 useable now. Far from perfect or finished, but used in practice.

I was able to collect some statistics and keep an eye on the attacks itself.
Interestingly the attackers seem to honor the RRL defaults and apply their
attacks in a way to render this patch useless.

http://lutz.donnerhacke.de/eng/Blog/DNS-Dampening-under-the-microscope
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] First experiments with DNS dampening to fight amplification attacks

2012-10-15 Thread Lutz Donnerhacke
* Lutz Donnerhacke wrote:
 The defaults are not optimal yet.

If they are optimal or not is still an open question. But the patch is
useable now. Far from perfect or finished, but used in practice.
http://altlasten.lutz.donnerhacke.de/mitarb/lutz/bind-9.9.2-dampening.patch

Unfortunly I do have a serious problem: The attack volume decreased that
drastically on my servers, that I can't test the patch in real
environments anymore. I do have one or two amplification attackes per hour
left ... #firstworldproblems

So if anybody is willing to try it out: Please do. Please report to me.

Minimal configuration is dampening {}; in options or view. I do
recommend at least dampening { exempt-clients { local_AS; resolvers; };};.

If you want to help, please add report-interval secs;. The number of
seconds should be less than the overrun of a 32bit counter under your query
rate. Reports can be found in the dampening category.

There are two implemtations activated in the patch: The (old) heap and a
(new) hash/queue. I do not know which of them performs better so I run both
in parallel to gather information. If you do not like such a play, please
remove the approbiate init function from implementations in dampening.c.
Personally I do think, the heap implementation is more stable to variable
load, but I do not have hard evidence for it yet.

Please let me thank the developers of the RRL patch, which point me to the
right files. I'm still unsure, if the RRL patch and my idea came to the same
results at the current type of attacks. I'm still wonder, if the patch
really survives a higher query rate than those I have access to.


 Cut from the changed ARM 
  Dampening
  
Spoofed UDP queries are a major security threat especially when
reflected and possibly amplified by DNS servers. Dampening is a
dynamically adapting method for dealing with such kinds of misuse.
So dampening a about spoofing, hence TCP connections are not
affected at all.
  
Every piece of a query and its response is associated with
specific penalty points. Those points aggregate over all queries
from netblocks defined by |IPv6-prefix-length| and
|IPv4-prefix-length|. Over the time, the penalty
decreases exponentially (determined by |halflife|).
So each netblock gains a penalty over time characteristics.
  
In order to allow local clients, which should be protected by
anti-spoof techniques at the edge of the operated network, to
send any amount of queries without fear the risks of being blocked,
push them into a seperate view with other or no dampening rules or
add them to |exempt-clients|.
  
If the penalty exeeds |limit-enable-dampening|, the netblock gets
dampened. No further query processing will occur.
Every further query is dropped silently before inspecting the
content of the query itself. So the penalty value can decrease
slowly, if the sender collect not quickly enough further
|score-per-query| points. Please note, that
penalty values can't exceed |limit-maximum|.
  
If the penalty drops below |limit-disable-dampening|,
query processing for the netblock switchs back to normal. If
the penalty drops as low as |limit-irrelevant|,
the netblock is removed ..from the statistics. The next query
gains |score-first-query| for this netblock
and reenteres the collection.
  
Comment current attacks gain a huge amplification from ANY query
to DNSSEC signed zones. So each ANY query is charged with
additional |score-qtype-any| points. Furthermore
current attackers repeat the same packet over and over again, so
keeping the same id in each query. Such repetitions are recognised
and give |score-duplicates| points times the
repetition of this id.

Amplification attacks aims to huge answers, so the next penalty
comes from the response size. The penalty increased lineary from
zero for responses up to |minimum-score-size|
bytes. The maximum penalty of |score-size| is
reached when the response reaches or exceeds
|maximum-score-size| bytes.
  
In order to minimize expensive calulations for each query, the
penalty decay is delayed by at least
|update-delay| seconds. The statistics table
has space for |min-table-size| elements but
might increase to |max-table-size| elements if
necessary.
  
In order to compare various storage models, which are activated
at compile time, regular statistics can by extracted by setting
|report-interval| to the seconds between reports.
Those statistic lines contain the numerical index of the
implementation |Stats for #...|, the number of
queries processed, dampened, and exempted |queries ././.|,
and aggregated time spend in the various functions.
 End of Cut 
___
dns-operations mailing list
dns-operations

Re: [dns-operations] First experiments with DNS dampening to fight amplification attacks

2012-10-01 Thread Lutz Donnerhacke
* Lutz Donnerhacke wrote:
 Exactly that's the result, I do observe.

Details: http://lutz.donnerhacke.de/eng/Blog/Two-weeks-of-DNS-Dampening
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] How many kinds of DNS DoS attacks are we trying to stop ?

2012-09-27 Thread Lutz Donnerhacke
* Stephane Bortzmeyer wrote:
 For instance, I'm a big fan of rate-limiting ANY requests because it
 works fine *today* in *some* attacks but I would never say it is *the*
 solution to DNS-based DoS attacks. It is just a tool among others.

I collected a few statistics. It's far from complete nor perfectly designed,
but it covered my ass. Right now. This week.
 http://lutz.donnerhacke.de/eng/Blog/First-results-from-DNS-Dampening

One observation I'm not sure about is: Attacker query rate seems to drop by
half about two to tree weeks after rate limiting or three days after
dampening. To verify the alternatives, I had to relist my server on the
scriptkiddies pastbin. But I does not know the URL nor I'm willing to do so.
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


[dns-operations] First experiments with DNS dampening to fight amplification attacks

2012-09-24 Thread Lutz Donnerhacke
Hi everybody,

after serveral heavy misuse of my authoritive servers, I was urged to
*solve* the problem. This is obviously not possible, but I'd like to share
my results with you.

I managed to drop the outgoing bandwith from a saturated 100Mbps to 80% of
the incoming attack data rate in a first step. Now I so stop each attack
within 40 packets. I do only respond to 30 out of 1 queries.

Most production traffic is untouched. There are some collateral damage,
which needs to be investigated, i.e. recursive resolvers of IPv6 tunnel
providers with qmail customers are overblocked from time to time: The
defaults are not optimal yet.

Please have a look at http://lutz.donnerhacke.de/eng/Blog/DNS-Dampening
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] First experiments with DNS dampening to fight amplification attacks

2012-09-24 Thread Lutz Donnerhacke
* Miek Gieben wrote:
 1. Why didn't you use: http://www.redbarn.org/dns/ratelimits ?

Because the remaining rate of attack is still high enough to cause problems.
We had a serious query from a lawyer of an small company which can't work
anymore because their 2Mbps line is saturated.

 2. Will this scale to TLD sized DNS servers?

It's in a very early state of development. Currently I'm trying to collect
real world data to find a reasonable set of defaults.

With much conservative values, it might work for a TLD. But I do not
understand the problem space to claim anything.

Please feel free to try it out at you site and tell me about the results.

Paul, yes it drops all the responses in dampening state. It does it for a
very good reason: Even REFUSED messages are enough to run the attack.
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs