|
BugTraq
RE: recursive DNS servers DDoS as a growing DDoS problem Mar 30 2006 09:08PM Geo. (geoincidents nls net) (2 replies) RE: recursive DNS servers DDoS as a growing DDoS problem Apr 03 2006 05:05AM MÃ¥ns Nilsson (mansaxel sunet se) RE: recursive DNS servers DDoS as a growing DDoS problem Mar 31 2006 05:38PM gboyce (gboyce badbelly com) (3 replies) Re: recursive DNS servers DDoS as a growing DDoS problem Apr 03 2006 04:34PM Simon Boulet (simon nostalgeek com) Re: recursive DNS servers DDoS as a growing DDoS problem Apr 02 2006 07:40AM Anton Ivanov (arivanov sigsegv cx) (1 replies) Re: recursive DNS servers DDoS as a growing DDoS problem Apr 04 2006 02:54AM Tim (tim-security sentinelchicken org) (1 replies) Re: recursive DNS servers DDoS as a growing DDoS problem Apr 05 2006 05:13AM Ross Wheeler (rossw albury net au) RE: recursive DNS servers DDoS as a growing DDoS problem Mar 31 2006 06:27PM Geo. (geoincidents nls net) (1 replies) |
|
Privacy Statement |
>> What is stopping you from running your own local DNS server?
>
> What is stopping you from running your own SMTP server? A port 25 block?
> Well if an ISP doesn't want to play whack-a-mole with unsecured dns servers
> popping up every day do you not think it likely that they will resort to the
> same techniques they used for smtp?
>
> Granted a port 53 inbound block would make more sense for the current
> example but just like bots started running their own SMTP engines I see the
> dns flood model changing to fit the new landscape.
We have done just this (block inbound udp/53) to certain subnets due to a
rash of CPEs that happily proxy DNS, including recursive queries, from their
WAN side. They DoS their own circuits more effectively than the intended DoS
targets.
Ingress/Egress filtering did not help because the traffic coming to the name
server was not spoofed to appear like it was coming from our network, it
really was. The attack reflected off of the routers and because they were
local to our name servers, they got replies to the recursive queries despite
our rejecting them from outside our network. And of course once it was
cached, it was open for public queries.
Broken/misconfigured/buggy routers appear to look just like open DNS
servers, and are likely to be much higher in numbers.
Jim
[ reply ]