BugTraq
DNS query spam Nov 27 2005 10:30PM
Piotr Kamisiski (rotunda ktd krakow pl) (4 replies)
Re: DNS query spam Nov 29 2005 04:42PM
Florian Weimer (fw deneb enyo de) (2 replies)
* Piotr Kamisiski:

> 23:05:40.241026 IP 204.92.73.10.40760 > xx.xx.xx.xx.53: 38545+ [1au] ANY ANY? e.mpisi.com. (40)

204.92.73.10 is one of the IP addresses for irc.efnet.ca. Someone is
spoofing the source addresses, in the hope that DNS servers will
return a large record set.

Could you check if the packets contain OPT records (e.g. using
"tcpdump -s 0 -v")? This protocol extension is described in the RFC
for ENDS0 (RFC 2671). EDNS0-capable DNS resolvers can send fragmented
UDP packets, exceeding the traditional 512 byte limit of DNS UDP
replies. The BIND 9 default maximum response size is 4096, for
example.

If the spoofed requests contain OPT records , you typically get an
amplification factor of about 60 in terms of bandwidth, and 5 in terms
of packet rate, but actual numbers may vary.

Yet another reason to restrict access to your recursive resolvers to
customers only.

[ reply ]
Re: DNS query spam Nov 30 2005 12:49PM
Jim Pingle (jim hpcisp com)
Re: DNS query spam Nov 29 2005 04:57PM
Piotr Kamisiski (rotunda ktd krakow pl)
Re: DNS query spam Nov 29 2005 06:52AM
Alexander Lourier (aml rulezz ru)
Re: DNS query spam Nov 29 2005 06:50AM
Josep Ma Castells (jcb kastells com) (2 replies)
Re: DNS query spam Nov 30 2005 09:20AM
Florian Weimer (fw deneb enyo de)
Re: DNS query spam Nov 30 2005 03:23AM
Joe (joe hostpc com)
Re: DNS query spam Nov 29 2005 12:37AM
Antone Roundy (antone geckotribe com) (1 replies)
Re: DNS query spam Nov 30 2005 04:41AM
Stephen Stuart (stuart tech org)


 

Privacy Statement
Copyright 2010, SecurityFocus