RE: recursive DNS servers DDoS as a growing DDoS problem

2006-04-10 Thread Geo.
They don't need more servers, just better software. If you think open recursion (DNS DoS amplification) is an issue ISPs can ignore, I suggest you look at the history of open SMTP relays and networks supporting/allowing directed broadcast. I'll address the ignore part. I don't think closing

Re: recursive DNS servers DDoS as a growing DDoS problem

2006-04-09 Thread Jim Pingle
Geo. wrote: We have done just this (block inbound udp/53) to certain subnets due to a rash of CPEs that happily proxy DNS, including recursive queries, from their WAN side. What devices? Is this a default or something customers are configuring? Just about every Siemens/Efficient *DSL router

Re: recursive DNS servers DDoS as a growing DDoS problem

2006-04-09 Thread Gadi Evron
Geo. wrote: Really? Ok educate me, how do you do this with Windows 2000 running MS dns? (telling people to use another server is not acceptable) If Microsoft's products are broken, why souldn't I tell people to use something else? You tell them whatever you like, they aren't going to

Re: recursive DNS servers DDoS as a growing DDoS problem

2006-04-09 Thread Geo.
Geo, the default is bad. However, it is not a Microsoft issue, this is a spoofing issue. Many like to bash Microsoft, some hate them. Myself I am known as a Microsoft critic at times. Please don't misunderstand me, I'm not bashing MS or even being a critic (although I have been at times),

Re: recursive DNS servers DDoS as a growing DDoS problem

2006-04-09 Thread Ross Wheeler
If your goal is to eliminate the recursive resolution reflection amplification, then you must disable it for all but trusted subnets. This also defends the server from the more trivial of cache poisoning attacks (assuming your own systems use the resolver as well). I know this is a more

Re: recursive DNS servers DDoS as a growing DDoS problem

2006-04-04 Thread Anton Ivanov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Tim wrote: All it takes is to throttle traffic from the resovers to outside the ISP network to a reasonably low value. Depending on the ISP this is usually in the low Kbits. All it takes is a moderate amount of competence in the ISP: I don't

RE: recursive DNS servers DDoS as a growing DDoS problem

2006-04-04 Thread Geo.
We have done just this (block inbound udp/53) to certain subnets due to a rash of CPEs that happily proxy DNS, including recursive queries, from their WAN side. What devices? Is this a default or something customers are configuring? Ingress/Egress filtering did not help because the traffic

RE: recursive DNS servers DDoS as a growing DDoS problem

2006-04-04 Thread Måns Nilsson
--On den 30 mars 2006 16.08.51 -0500 Geo. [EMAIL PROTECTED] wrote: Don't you think creating a control point like that is dangerous? Especially dangerous when it's DNS which runs virtually every function on the internet? The control point is there already, as has been demonstrated by several

Re: recursive DNS servers DDoS as a growing DDoS problem

2006-04-04 Thread Tim
Hello Anton, This is feasible only for corporate networks where the allocations are constant and change once in a few years. It is not feasible in any ISP/Telco above a certain size. In fact, considering the consolidation over the recent years it is not feasible for most ISPs or

Re: recursive DNS servers DDoS as a growing DDoS problem

2006-04-04 Thread Marco Ivaldi
On Thu, 30 Mar 2006, Geo. wrote: Don't you think creating a control point like that is dangerous? Especially dangerous when it's DNS which runs virtually every function on the internet? Yeah, it could be indeed... It's not directly related to the discussion topic, but i just wanted to

Re: recursive DNS servers DDoS as a growing DDoS problem

2006-04-04 Thread Jim Pingle
Geo. wrote: What is stopping you from running your own local DNS server? What is stopping you from running your own SMTP server? A port 25 block? Well if an ISP doesn't want to play whack-a-mole with unsecured dns servers popping up every day do you not think it likely that they will resort

Re: recursive DNS servers DDoS as a growing DDoS problem

2006-04-04 Thread Simon Boulet
gboyce wrote: I haven't heard anyone talk about requiring that users use their ISP's DNS server. Just that they should not be able to use any random DNS server on the internet. What is stopping you from running your own local DNS server? My system at home runs named in a configuration

RE: recursive DNS servers DDoS as a growing DDoS problem

2006-04-03 Thread Geo.
What is stopping you from running your own local DNS server? What is stopping you from running your own SMTP server? A port 25 block? Well if an ISP doesn't want to play whack-a-mole with unsecured dns servers popping up every day do you not think it likely that they will resort to the same

Re: recursive DNS servers DDoS as a growing DDoS problem

2006-04-03 Thread Geo.
1. Resolvers and Authoritative nameservers must be separate and authoritative nameservers must have recursion turned off. Otherwise there is no way to throttle only recursive queries. Great, for small ISP's you just doubled the number of machines they need to dedicate to DNS. 2. In a smaller

Re: recursive DNS servers DDoS as a growing DDoS problem

2006-04-03 Thread Anton Ivanov
[snip] I haven't heard anyone talk about requiring that users use their ISP's DNS server. Just that they should not be able to use any random DNS server on the internet. This is standard practice in Wireless and other ISPs which operate pay as you go service (hotels, conferences,

Re: recursive DNS servers DDoS as a growing DDoS problem

2006-04-01 Thread Gadi Evron
Geo. wrote: The flood is a flood of answers not queries, you spoof the source address of a query with the address of your target, the target gets the response from the dns server. A cache on the dns server just makes it a more efficient response. Queries are bad enough. This can be played with

Re: recursive DNS servers DDoS as a growing DDoS problem

2006-04-01 Thread Paul Stepowski
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Stephen Samuel wrote: | To put it another way: UDP as a purely connectionless | protocol is fast becoming a liability in situations where | significant amplification is possible. My thoughts exactly. This attack is possible because of a design

RE: recursive DNS servers DDoS as a growing DDoS problem

2006-03-31 Thread Geo.
servers and you have just created a really powerful control mechanism for entities to control large sections of the internet since folks from those sections won't be able to use anyone else's DNS servers or even run their own (much like port 25 blocking limits who can run a mail server

Re: recursive DNS servers DDoS as a growing DDoS problem

2006-03-30 Thread mike davis
If you have a 20,000 bot botnet and each bot has 2 defined recursive dns servers that it is allowed to use and these bots are on the local subnet (ie BCP38 is implimented at the gateway but not at every router) then how exactly is locking down recursive servers so you can only use yours going

Re: recursive DNS servers DDoS as a growing DDoS problem

2006-03-30 Thread gboyce
On Sun, 26 Mar 2006, Geo. wrote: Spoofing is indeed the attack vector and it can also be utilized for NTP, ICMP, etc. It is to blame. Still, DNS is what's being exploited and in my opinion a broken feature being exploited needs fixing, or it will be exploited. What feature of DNS is being

Re: recursive DNS servers DDoS as a growing DDoS problem

2006-03-30 Thread Stephen Samuel
Geo. wrote: What feature of DNS is being exploited, UDP or the fact that there are a lot of dns servers you can use? I think that this is probably a better point than you think. It's almost impossible to change the design of the DNS protocol now but, going foreward, I think that we do need

Re: recursive DNS servers DDoS as a growing DDoS problem

2006-03-30 Thread Geo.
BCP38 is implimented at the gateway but not at every router) then how exactly is locking down recursive servers so you can only use yours going to solve anything? uh... caching maybe?... the second field of your answer section when using dig.. The flood is a flood of answers not

Re: recursive DNS servers DDoS as a growing DDoS problem

2006-03-27 Thread Anton Ivanov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Chris Thompson wrote: Michael Sierchio [EMAIL PROTECTED] writes: Robert Story wrote: VG In the scenario you describe, I cannot see any actual amplification... The amplification isn't in the number of hosts responding, but in packet size. A very

Re: recursive DNS servers DDoS as a growing DDoS problem

2006-03-27 Thread Geo.
Spoofing is indeed the attack vector and it can also be utilized for NTP, ICMP, etc. It is to blame. Still, DNS is what's being exploited and in my opinion a broken feature being exploited needs fixing, or it will be exploited. What feature of DNS is being exploited, UDP or the fact that

Re: recursive DNS servers DDoS as a growing DDoS problem

2006-03-25 Thread MaddHatter
We discussed recursive DNS servers before (servers which allow to query anything - including what they are not authoritative for, through them). ... One of the problems is obviously the spoofing. ... Maybe I'm misunderstanding the problem here (but I don't think so). It seems to be the issue

Re: recursive DNS servers DDoS as a growing DDoS problem

2006-03-25 Thread Gadi Evron
MaddHatter wrote: We discussed recursive DNS servers before (servers which allow to query anything - including what they are not authoritative for, through them). ... One of the problems is obviously the spoofing. ... Maybe I'm misunderstanding the problem here (but I don't think so). It

Re: recursive DNS servers DDoS as a growing DDoS problem

2006-03-20 Thread Michael Sierchio
Robert Story wrote: VG In the scenario you describe, I cannot see any actual amplification... The amplification isn't in the number of hosts responding, but in packet size. A very small DNS request packet results in a huge response packet. Are you talking about rogue authoritative servers?

Re: recursive DNS servers DDoS as a growing DDoS problem

2006-03-17 Thread Robert Story
On Tue, 7 Mar 2006 19:26:19 +0200 Ventsislav wrote: VG Are you sure about that amplification process?? Yes. VG In the scenario you describe, I cannot see any actual amplification... The amplification isn't in the number of hosts responding, but in packet size. A very small DNS request packet

Re: recursive DNS servers DDoS as a growing DDoS problem

2006-03-10 Thread Ventsislav Genchev
Are you sure about that amplification process?? Actually if the packet reaches huge sizes it will be fragmented at the attacker's own place cuz of the network equipment's mtu... or won't be transmitted at all... The concept of the smurf attack is in sending large amount of spoofed packets to the

Re: recursive DNS servers DDoS as a growing DDoS problem

2006-03-02 Thread v9
Here are some dns servers I gathered/scanned during the time I researched this months ago(that appear to still be up): 68.1.199.151 68.1.196.116 68.1.195.161 68.1.193.177 Just remember when you test/capture packets that the domain being resolved must NOT exist(ie. x). On Thu, 2 Mar 2006, Gadi

Re: recursive DNS servers DDoS as a growing DDoS problem

2006-03-02 Thread Gadi Evron
Looking at this further, it seems to be the same attack with the x60 amplification effect. We will know more when we know more. Gadi.

Re: recursive DNS servers DDoS as a growing DDoS problem

2006-03-01 Thread v9
While you're on the subject of the potentials of DOSing using DNS servers, I noticed several months ago some possible abuses myself, although I soon lost interest for some reason or another. I noticed that a portion of the worlds DNS servers for some reason or another send back large amounts

recursive DNS servers DDoS as a growing DDoS problem

2006-02-28 Thread Gadi Evron
Hi guys. We discussed recursive DNS servers before (servers which allow to query anything - including what they are not authoritative for, through them). The attack currently in the wild is a lot bigger and more complicated than this, but to begin, here is an explanation (by metaphor) of