BugTraq
Re: [Full-disclosure] Re: recursive DNS servers DDoS as a growing DDoSproblem Mar 08 2006 10:55PM
Mark Senior (senatorfrog gmail com) (1 replies)
Re: [Full-disclosure] Re: recursive DNS servers DDoS as a growing DDoSproblem Mar 14 2006 12:04PM
Robert Story (rstory-l 2006 revelstone com) (1 replies)
On Wed, 8 Mar 2006 15:55:21 -0700 Mark wrote:
MS> Correct me if I'm wrong, but I was under the impression that DNS
MS> responses that go over the max size of a UDP datagram won't get split
MS> into multiple UDP datagrams. Rather, a response with only partial
MS> data will be sent back, and the client has to reconnect over TCP to
MS> get the full data.
MS>
MS> RFC 2671 even suggests that UDP DNS messages can't go over 512 bytes
MS> (although it may be old news now that that has been increased).

Exactly. The attackers do use EDNS0 [RFC2671], which allows clients to declare
the maximum size of UDP message they are willing to handle. So the spoofed
packet sets this value to whatever they want.

MS> So, you can send a bunch of source-spoofed requests that are under 100
MS> bytes, and get a bunch of 512 bytes responses.

In the most recent round of attacks, the attackers were using 4k TXT records,
so a 100 byte request is hugely amplified...

[ reply ]
Re: [Full-disclosure] Re: recursive DNS servers DDoS as a growing DDoSproblem Mar 18 2006 02:26AM
Bram Matthys (Syzop) (syzop vulnscan org) (1 replies)
Re: [Full-disclosure] Re: recursive DNS servers DDoS as a growing DDoSproblem Mar 20 2006 05:25PM
Tim (tim-security sentinelchicken org)


 

Privacy Statement
Copyright 2010, SecurityFocus