Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-03 Thread Paul Vixie
On Friday, 3 April 2020 11:13:17 UTC Steven Miller wrote: > Essentially, yes. Some increase in capacity on your side plus RRL will > certainly keep you safer, but it's no guarantee. > > ... i saw the question differently: > On 4/3/2020 5:03 AM, Tessa Plum wrote: > > So no way to stop reflector

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-03 Thread Steven Miller
Adding more servers and going to 10G NICs seems relatively inexpensive and that should be helpful for "casual" attacks where you're being used as a reflector.  In those attacks, no one's out to attack you: they just want you to attack someone else, and don't mind eating all your

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-03 Thread Lanlan Pan
TLD can make class identification to serve the most important client, such as the backend server of isp recursive dns and important public recursive dns. But there are many long-tail clients which can not reject directly, pre-build greylist and whitelist. Compare to TLD, SLD is simpler, it can

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-03 Thread Steven Miller
Essentially, yes.  Some increase in capacity on your side plus RRL will certainly keep you safer, but it's no guarantee. Though to be clear, every few years, someone's going to hit a public DNS provider with enough load to cause a problem.  IMHO that'll happen less on average, and the

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-03 Thread Tessa Plum
So no way to stop reflector attack unless migrating servers to professional IDC? Thanks. Steven Miller wrote: Adding more servers and going to 10G NICs seems relatively inexpensive and that should be helpful for "casual" attacks where you're being used as a reflector.  In those attacks, no

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-03 Thread Tessa Plum
Hi Steve I am so appreciate to get your kind private message, though I would like to reply my content to the list. We are running authoritative name servers only, zone data are for the university only. When the attack happened, the bandwidth watched in our gateway was about 20Gbps. That

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread Paul Vixie
On Friday, 3 April 2020 02:55:21 UTC Tessa Plum wrote: > Where is "dnsdbq" coming from? I didn't see my ubuntu system has that a > command. it's an example of passive dns lookups. the source code is here: https://github.com/dnsdb/dnsdbq there are dozens of passive dns database systems; only two

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread Tessa Plum
Where is "dnsdbq" coming from? I didn't see my ubuntu system has that a command. Thank you. Paul Vixie wrote: $ dnsdbq -r '\*.berkeley.edu/ns' -A 2020-01-01 -j | jq .rrname | uniq ___ dns-operations mailing list dns-operations@lists.dns-oarc.net

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread John Levine
In article <26a9dd93-91a3-dbc4-c34b-145f33e74...@plum.ovh> you write: >Hi Stephane, > >I saw you were from FRNIC. May I ask a question that, since I got a >domain from .ovh, It seems anyone can have a domain extension? So how >can I have my own extension, such as .plum? Shall I contact the root

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread Paul Vixie
On Friday, 3 April 2020 01:18:46 UTC Tessa Plum wrote: > ... > > Not only for those private domain names, but zone data also includes the > administrative structure of corp/group. nothing in the dns is private. if you don't want something viewed, cataloged, indexed, searched, and used, then do

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread Tessa Plum
Hi Stephane, I saw you were from FRNIC. May I ask a question that, since I got a domain from .ovh, It seems anyone can have a domain extension? So how can I have my own extension, such as .plum? Shall I contact the root server operators to put .plum glues there? Thank you. Tessa Stephane

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread Tessa Plum
Fred Morris wrote: There is this thing called a "search list". Love 'em or hate 'em (kind of like DNAMEs!). Suppose your (ab)user is in a coffee shop (wearing appropriate hazmat gear of course). They load their web browser. It's visited secret-project.university-example.edu previously.

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread Fred Morris
Yes, although if you don't believe us maybe you're looking in the wrong place On Thu, 3 Apr 2020, John Levine wrote: In article , Tessa Plum wrote: University has generally some private research projects who have their domain names, but university won't let others see these domain names

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread Tessa Plum
John Levine wrote: If those names are ever retrieved by users on networks outside your university, it's very likely that they're in public passive DNS databases that are widely visible. It is not realistic to believe that you can put names in your public DNS and not have the world know about

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread John Levine
In article , Tessa Plum wrote: >University has generally some private research projects who have their >domain names, but university won't let others see these domain names >unless the projects have got public. If those names are ever retrieved by users on networks outside your university,

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread Mark Andrews
> On 3 Apr 2020, at 00:09, Tessa Plum wrote: > > On 2020/4/2 7:28 下午, Stephane Bortzmeyer wrote: >> BCP38 is Good,*but* it protects others against you. So, to be >> protected, you need the*others* to implement it. > > Ah OK. > So BCP38 is useless for my case. Others don't care if I am

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread Paul Vixie
strong +1 here. recommended reading or re-reading. On Thursday, 2 April 2020 17:23:22 UTC Fred Morris wrote: > On Thu, 2 Apr 2020, Davey Song wrote: > > I'm very confused that why people on the list are suggesting RRL (even > > BCP38) to the victim of DoS attack? > > The reason rate limiting, of

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread Paul Vixie
On Thursday, 2 April 2020 11:28:51 UTC Stephane Bortzmeyer wrote: > On Thu, Apr 02, 2020 at 03:06:17PM +0800, > Tessa Plum wrote > > a message of 18 lines which said: > > I never knew BCP38 before. I will try to study it. > > BCP38 is Good, *but* it protects others against you. So, to be >

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread Fred Morris
On Thu, 2 Apr 2020, Davey Song wrote: I'm very confused that why people on the list are suggesting RRL (even BCP38) to the victim of DoS attack? The reason rate limiting, of any kind (not just DNS, not just UDP; TCP SYN for example), helps in a spoofed source attack is because it makes you a

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread Stephane Bortzmeyer
On Thu, Apr 02, 2020 at 09:31:18PM +0800, Tessa Plum wrote a message of 7 lines which said: > I think we can put the devices in our own network to protect such attacks. Commercial boxes are typically optimised for HTTP, DNS is very different. I remember a box which was creating an entry in

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread Tony Finch
Tessa Plum wrote: > > Does RRL work based on IP addr? but the requesting IP seems spoofed. RRL is based on the contents of the DNS response as well as the IP address. Usually for a DDoS attack the IP address is spoofed as the address of the victim, so rate limiting reduces the amount of response

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread Davey Song
> I think we can put the devices in our own network to protect such attacks. > Sorry. I think no such kind of devices effective for your university, IMHO. Usually anti-DoS solution providers are able to undertake huge amont traffic and clean them bacause they can utilize huge amout of network

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread Tessa Plum
On 2020/4/2 9:29 下午, Davey Song wrote: Usually the commercial DoS mitigation solution require you to put your service in their network I think we can put the devices in our own network to protect such attacks. regards. ___ dns-operations mailing

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread Davey Song
Usually the commercial DoS mitigation solution require you to put your service in their network, like the secondary DNS in which you have privacy concern. Davey On Thu, 2 Apr 2020 at 21:15, Tessa Plum wrote: > On 2020/4/2 7:09 下午, Klaus Darilion wrote: > > > > So my advice: use a name server

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread Tessa Plum
On 2020/4/2 7:35 下午, Stephane Bortzmeyer wrote: You said you are managing DNS for your university and your concern for secondary DNS is privacy. I'm not sure what exactly the privacy concerns are. RFC 7626. Also, it may raise issues about integrity/trust/etc. In that case, DNSSEC certainly

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread Davey Song
On Thu, 2 Apr 2020 at 20:58, Tessa Plum wrote: > On 2020/4/2 5:39 下午, Ray Bellis wrote: > > If it's an authoritative server, turn on Response Rate Limiting (RRL) if > > it's BIND, or the equivalent feature if is isn't. > > Yes they are authoritative servers. > Does RRL work based on IP addr? but

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread Tessa Plum
On 2020/4/2 7:28 下午, Stephane Bortzmeyer wrote: BCP38 is Good,*but* it protects others against you. So, to be protected, you need the*others* to implement it. Ah OK. So BCP38 is useless for my case. Others don't care if I am meeting the attack or not. regards.

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread Tessa Plum
On 2020/4/2 7:09 下午, Klaus Darilion wrote: So my advice: use a name server which can fill your upstream bandwith (NSD, Knot ...). And for volumetric attacks use a commercial DDoS mitigation provider which filters your traffic (ie. buy the service from your ISP or from a remote DDoS

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread Tessa Plum
On 2020/4/2 6:43 下午, Klaus Darilion wrote: So what was the bottleneck? I.e. if you use PowerDNS with DB backend you quite early hit the limit with random subdomains, which are not a problem if you use NSD for example. To mitigation such traffic patterns for example we use dnsdist with 2

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread Davey Song
On Thu, 2 Apr 2020 at 19:38, Stephane Bortzmeyer wrote: > > RFC 7626. > > Also, it may raise issues about integrity/trust/etc. In that case, > DNSSEC certainly helps a lot. > OK. I need more sense of privacy :) Davey ___ dns-operations mailing list

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread Tessa Plum
On 2020/4/2 5:39 下午, Ray Bellis wrote: If it's an authoritative server, turn on Response Rate Limiting (RRL) if it's BIND, or the equivalent feature if is isn't. Yes they are authoritative servers. Does RRL work based on IP addr? but the requesting IP seems spoofed. Thanks Tessa

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread Stephane Bortzmeyer
On Thu, Apr 02, 2020 at 05:39:48PM +0800, Davey Song wrote a message of 111 lines which said: > You said you are managing DNS for your university and your concern > for secondary DNS is privacy. I'm not sure what exactly the privacy > concerns are. RFC 7626. Also, it may raise issues about

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread Stephane Bortzmeyer
On Thu, Apr 02, 2020 at 11:05:48AM +0100, Tony Finch wrote a message of 30 lines which said: > > ACLs in the server are not enough, you also need ingress filtering > > on the borders of your network, to prevent packets claiming to be > > from your network to get inside. > > That kind of

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread Klaus Darilion
Indeed - I only wanted to comment on the rate limiting. It is not that I argue against rate limiting, but that admins should be aware when it actually helps, and when not. Sorry, when my email seemed a bit harshly. We also used rate limiting with dnsdist, but due to the mentioned problems we

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread Stephane Bortzmeyer
On Thu, Apr 02, 2020 at 03:06:17PM +0800, Tessa Plum wrote a message of 18 lines which said: > I never knew BCP38 before. I will try to study it. BCP38 is Good, *but* it protects others against you. So, to be protected, you need the *others* to implement it.

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread Davey Song
On Thu, 2 Apr 2020 at 18:22, Jim Reid wrote: > > RRL won’t help with the volume of incoming queries. Exactly! > It will however reduce the volume of outgoing responses which may well be > DoS’ing another innocent victim. > Agree Davey ___

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread Frank Louwers
That's very selective cutting of my sentence Klaus > On 2 Apr 2020, at 13:09, Klaus Darilion > wrote: > > Am 02.04.2020 um 09:15 schrieb Frank Louwers: >> dnsdist allows you to do general ratelimiting/blocking > > Ratelimiting is often not the correct

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread Davey Song
But Tessa Plum are asking for help when they were under attack with a lot of UDP requests flooding to the servers. When a patient with flu asking for help, but his doctor only suggest him to mask himself avoid he inffectiing others. Wearing masks is generally good for public but not a cure for

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread Klaus Darilion
Am 02.04.2020 um 09:15 schrieb Frank Louwers: dnsdist allows you to do general ratelimiting/blocking Ratelimiting is often not the correct choice. If the source IP is random (which is usually the case with spoofed source IP addresses), a rate limiting based on source IP is not useful. If

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread Klaus Darilion
Am 02.04.2020 um 05:51 schrieb Tessa Plum: Hello Paul We were under some attack like UDP flood to the authority servers, there were a lot of UDP requests flooding to the servers. The traffic size was about 20Gbps last time as I have said in last message. The clients seem using spoofed IP

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread Ray Bellis
On 02/04/2020 11:10, Davey Song wrote: > I'm very confused that why people on the list are suggesting RRL (even > BCP38) to the victim of DoS attack? If I remember correctly, the goal of > both RRL and BCP38 is to reduce the chance of participating the attack > as a innocent helper. > > In the

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread Tony Finch
Stephane Bortzmeyer wrote: > On Thu, Apr 02, 2020 at 03:06:49AM +, > Paul Vixie wrote > a message of 29 lines which said: > > > to keep your own recursive servers from amplifying spoofed-source > > attacks, you need ACL's that make it unreachable outside your > > specific client base. > >

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread Davey Song
<> The intuitive solution against the DoS attack is to scale your system wiith mulitple servers in the globe. You can either develop global anycast instance as Paul suggested or select and operate secondary DNS servers documented in RFC2182/BCP16. There are many secondary DNS providers

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread Ray Bellis
On 02/04/2020 10:12, Tessa Plum wrote: > All the packages were DNS requests, some queries like 'dig domain.com any'. > but their IP address seems spoofed. > A request from the fake address to our nameserver, but nameserver try > its best to reply to this unreal address. If it's a recursive

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread Stephane Bortzmeyer
On Thu, Apr 02, 2020 at 05:12:29PM +0800, Tessa Plum wrote a message of 11 lines which said: > All the packages were DNS requests, some queries like 'dig domain.com any'. > but their IP address seems spoofed. In that case, yes, RRL would help. ___

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread Tessa Plum
On 2020/4/2 3:19 下午, Stephane Bortzmeyer wrote: DNS or another type? Stephane, All the packages were DNS requests, some queries like 'dig domain.com any'. but their IP address seems spoofed. A request from the fake address to our nameserver, but nameserver try its best to reply to this

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread Stephane Bortzmeyer
On Thu, Apr 02, 2020 at 11:51:05AM +0800, Tessa Plum wrote a message of 37 lines which said: > We were under some attack like UDP flood to the authority servers, DNS or another type? > The traffic size was about 20Gbps Note that for DNS traffic, the useful metric is often

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread Frank Louwers
> >> May I ask if there are any solutions for DDoS mitigation of DNS? > > All solutions that were mentioned here are correct but incomplete: > there is no general solution against dDoS, because "it depends". There > are many types of dDoS. You will need several tools in your toolbox, > and

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread Stephane Bortzmeyer
On Thu, Apr 02, 2020 at 03:06:49AM +, Paul Vixie wrote a message of 29 lines which said: > to keep your own recursive servers from amplifying spoofed-source > attacks, you need ACL's that make it unreachable outside your > specific client base. ACLs in the server are not enough, you also

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread Tessa Plum
On 2020/4/2 12:25 下午, Mark Andrews wrote: You use all the mechanisms available to you. Traceback. Getting BCP38 installed at the sites emitting spoofed traffic help yourself and everyone else. In many cases this is coming from compromised machines. You enable/tune response rate filtering.

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread Stephane Bortzmeyer
On Wed, Apr 01, 2020 at 07:35:35PM -0700, Fred Morris wrote a message of 10 lines which said: > Depends on what you mean. You might look at "response rate limiting" in for > instance BIND. -- FWM RRL protects people against you (when your name server is used as a reflector) but not really

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread Stephane Bortzmeyer
On Thu, Apr 02, 2020 at 10:14:14AM +0800, Tessa Plum wrote a message of 14 lines which said: > May I ask if there are any solutions for DDoS mitigation of DNS? All solutions that were mentioned here are correct but incomplete: there is no general solution against dDoS, because "it depends".

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-01 Thread Paul Vixie
On Thursday, 2 April 2020 03:51:05 UTC Tessa Plum wrote: > Hello Paul > > We were under some attack like UDP flood to the authority servers, there > were a lot of UDP requests flooding to the servers. The traffic size was > about 20Gbps last time as I have said in last message. The clients seem >

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-01 Thread Mark Andrews
You use all the mechanisms available to you. Traceback. Getting BCP38 installed at the sites emitting spoofed traffic help yourself and everyone else. In many cases this is coming from compromised machines. You enable/tune response rate filtering. You use DNS COOKIES and encourage your

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-01 Thread Tessa Plum
Hello Paul We were under some attack like UDP flood to the authority servers, there were a lot of UDP requests flooding to the servers. The traffic size was about 20Gbps last time as I have said in last message. The clients seem using spoofed IP addresses. Thanks. Tessa Paul Vixie wrote:

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-01 Thread Paul Vixie
On Thursday, 2 April 2020 02:14:14 UTC Tessa Plum wrote: > Hello > > May I ask if there are any solutions for DDoS mitigation of DNS? > Both commercial or free solutions could be considered. > > Thanks. > > Tessa > https://plum.ovh/ to keep your own authority servers from amplifying

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-01 Thread Fred Morris
Depends on what you mean. You might look at "response rate limiting" in for instance BIND. -- FWM On Thu, 2 Apr 2020, Tessa Plum wrote: May I ask if there are any solutions for DDoS mitigation of DNS? Both commercial or free solutions could be considered.

[dns-operations] solutions for DDoS mitigation of DNS

2020-04-01 Thread Tessa Plum
Hello May I ask if there are any solutions for DDoS mitigation of DNS? Both commercial or free solutions could be considered. Thanks. Tessa https://plum.ovh/ ___ dns-operations mailing list dns-operations@lists.dns-oarc.net