On Thu, 31 Jan 2013 16:43:37 +0000, Stuart Henderson wrote:
On 2013/01/31 15:29, Jon Morby wrote:
If unicast RPF were a default part of the configuration of end user CPE
we'd see a dramatic reduction in this sort of crap killing the
networks. (but yes they'd probably find some even more ingenious way to
generate crap)

In a lot of cases the end user machines behind CPE routers are NATted
so they won't be spoofing the source address anyway - I would imagine the
bigger source of spoofed packets would be exploited servers etc. And
clearly most CPE vendors are taking a special approach to avoid being
affected by this on IPv6 ;)

On the CPE side I think the bigger problem is with caching DNS forwarders open to anyone (which seems like it may be a default on some CPE routers, or at least on some ISP default configurations), obviously answering the
spoofed queries and bombarding the supposed source.

I used to be able to send IP packets using any source address directly through my home cable modem.. that hasn't been possible with any ISPs I've used in the last 5 years, but there probably are still a few somewhere in the world.

Having said that, I think a lot of these kinds of attacks actually originate from complicit rogue malware ISPs that have deliberately setup servers such that they're able to spoof.. whether they have 'hacker clients' or 'hacked clients' or 'fake clients that (oops!) got hacked' or they're actually just doing it themselves is kindof beside the point. BCP-38 isn't going to help when people just turn it off.

Unless the attack persists for a very long time, coordinating the effort to trace the flow of spoofed dns queries will probably take longer and you'll lose the trail. Even if you trace it back it'll just turn out to be a 'hacked client' and nobody can prove anything.

It's slightly easier to trace this if it's your nameserver that's being used as one of the relay/reflectors rather than if you're the target since you're closer to the true source of the fake queries.

Probably the most productive thing one can do is try and contact the operators of the relay/refelector nameservers and try to get them to stop answering requests from outside their own networks.

In the long run though I suspect this attack would still work fairly well (although with less of an amplification) using authorative nameservers - which obviously don't have the option of simply ignoring the internet.

I guess it's something we'll just have to live with for now.. :/

Robert

Reply via email to