Open resolvers again
Spotted this earlier: http://blog.cloudflare.com/deep-inside-a-dns-amplification-ddos-attack "NZ Attack Sources: 167 AU Attack Sources: 1237" Are the local open resolvers seen as a problem? Hei kona- mai,* -- *Juha Saarinen AITTP* *juha.saarinen.org http://juha.saarinen.org http://twitter.com/juhasaarinen Twitter http://twitter.com/juhasaarinen
On 02/11/12 10:05, Juha Saarinen wrote:
Spotted this earlier:
http://blog.cloudflare.com/deep-inside-a-dns-amplification-ddos-attack
"NZ Attack Sources: 167 AU Attack Sources: 1237"
Are the local open resolvers seen as a problem?
Unmanaged Open Resolvers are a problem, given DNS Amplification Attacks are getting more frequent, bigger and Open Resolvers play a role on it. Team Cymru keeps the list of identified open resolvers in reserve, a valid contact for an specific ASN can get the list of addresses associated for that ASN. I see potential on this for NZRS through InternetNZ to gather the list and start nudging some local administrators. Cheers,
Hei konā mai,* -- *Juha Saarinen AITTP* *juha.saarinen.org http://juha.saarinen.org
http://twitter.com/juhasaarinen Twitter http://twitter.com/juhasaarinen
_______________________________________________ NZNOG mailing list NZNOG(a)list.waikato.ac.nz http://list.waikato.ac.nz/mailman/listinfo/nznog
-- Sebastian Castro DNS Specialist .nz Registry Services (New Zealand Domain Name Registry Limited) desk: +64 4 495 2337 mobile: +64 21 400535
On 2012-11-02 10:17 , Sebastian Castro wrote:
On 02/11/12 10:05, Juha Saarinen wrote:
Are the local open resolvers seen as a problem? [....] I see potential on this for NZRS through InternetNZ to gather the list and start nudging some local administrators.
NCSC (the NZ National Cyber Security Centre) contacted at least some of them during October. I'm not sure where their contact list came from. Possibly they could be asked to talk to Team Cymru as a Trusted Third Party and then make local contact with the remainder? Ewen
On 2 November 2012 10:05, Juha Saarinen
http://blog.cloudflare.com/deep-inside-a-dns-amplification-ddos-attack
The article notes without elaboration: "In order to increase your attack's volume, you could try and add more compromised machines to your botnet. That is becoming increasingly difficult. " Is that good news, or have botted devices reached saturation? That there aren't any un-botted left to be taken. And I'm a bit confused, "That's a 64 byte query that resulted in a 3,223 byte response." My understanding was at a certain size of response, DNS switched to TCP to return results, but maybe the unsolicited response handshake is accepted blindly?
Juha Saarinen AITTP
Hamish. -- http://hamish.kiwi.me
On 3/11/12 10:59 AM, Hamish MacEwan wrote:
And I'm a bit confused, "That's a 64 byte query that resulted in a 3,223 byte response." My understanding was at a certain size of response, DNS switched to TCP to return results, but maybe the unsolicited response handshake is accepted blindly?
Presumably when the attacker sends the spoofed queries towards the DNS server, they indicate that they would very much like the response to do the EDNS0 thing - allowing the server to stick to UDP when replying. -Mike
Does someone know how a dns server decides to respond based on the size of
the response it's about to send?
I'm asking this question as it doesn't seem possible for a server to switch
to tcp.
Look at this scenario :
- client behind firewall (and or NAT) sends a request via UDP.
- server "decides" to answer with tcp and creates a session with the client
Actually it can try as much as it wants :
- if the server is behind nat, it will try to create a tcp session with the
device that does the NAT
- with a firewall and no NAT, it will get blocked as no one allows session
initiation towards a client (dns here)
On Nov 3, 2012 12:10 PM, "Mike Jager"
On 3/11/12 10:59 AM, Hamish MacEwan wrote:
And I'm a bit confused, "That's a 64 byte query that resulted in a 3,223 byte response." My understanding was at a certain size of response, DNS switched to TCP to return results, but maybe the unsolicited response handshake is accepted blindly?
Presumably when the attacker sends the spoofed queries towards the DNS server, they indicate that they would very much like the response to do the EDNS0 thing - allowing the server to stick to UDP when replying.
-Mike _______________________________________________ NZNOG mailing list NZNOG(a)list.waikato.ac.nz http://list.waikato.ac.nz/mailman/listinfo/nznog
On 3/11/12 12:58 PM, Florent Bouron wrote:
Does someone know how a dns server decides to respond based on the size of the response it's about to send?
I'm asking this question as it doesn't seem possible for a server to switch to tcp. Look at this scenario : - client behind firewall (and or NAT) sends a request via UDP. - server "decides" to answer with tcp and creates a session with the client
The server responds using only UDP to a request received via UDP. If the response is "too large," the TC (truncated) bit is set in the response header, indicating to the client that the response wouldn't fit. Upon receiving a response with TC set, a client could then retry the query using TCP - the connection is established outbound from the client to the server. -Mike
On 3/11/2012 1:12 p.m., Mike Jager wrote:
On 3/11/12 12:58 PM, Florent Bouron wrote:
Does someone know how a dns server decides to respond based on the size of the response it's about to send?
I'm asking this question as it doesn't seem possible for a server to switch to tcp. Look at this scenario : - client behind firewall (and or NAT) sends a request via UDP. - server "decides" to answer with tcp and creates a session with the client The server responds using only UDP to a request received via UDP.
If the response is "too large," the TC (truncated) bit is set in the response header, indicating to the client that the response wouldn't fit.
Upon receiving a response with TC set, a client could then retry the query using TCP - the connection is established outbound from the client to the server.
To carry further what the article is skipping over there... ... servers which support EDNS0 will, on attacker request, respond with large UDP packets containing the whole 3K response. Which if that reaches the victim it either causes some buffering problems for clients can't handle EDNS large packets, or causes the client extra CPU overheads discarding too-large packets out of its input stream. Both of which lean towards making the attack worse for the victim. FWIW, my testing of EDNS support for some services here in NZ has shown that the cheap Linksys DSL boxes favoured by ISPs and small businesses are extremely sensitive to crashing under receipt of EDNS packets. Not that they could withstand a medium sized DDoS anyway, but 2 packets being sufficient to DoS them is a bit annoying. AYJ
And here is an example of consumer complaining about excessive usage and complaining about his ISP.
http://www.geekzone.co.nz/forums.asp?forumid=81&topicid=111127
He then realises his pfsense box is actually servicing DNS requests for his own network - and to the world. He even admits later responses were being sent out to CloudFlare IP addresses, which seems to indicate his DNS was part of those attacks.
Slingshot was nice to waive some of the fees. Customers should read the T&Cs where ISPs say they have to keep their devices safe - this is not only from malware but also from misconfigurations introduced by the users themselves...
Cheers
Mauricio Freitas
www.geekzone.co.nz
www.freitasm.com
www.twitter.com/freitasm
-----Original Message-----
From: nznog-bounces(a)list.waikato.ac.nz [mailto:nznog-bounces(a)list.waikato.ac.nz] On Behalf Of Hamish MacEwan
Sent: Saturday, 3 November 2012 10:59 a.m.
To: nznog(a)list.waikato.ac.nz
Subject: Re: [nznog] Open resolvers again
On 2 November 2012 10:05, Juha Saarinen
http://blog.cloudflare.com/deep-inside-a-dns-amplification-ddos-attack
The article notes without elaboration: "In order to increase your attack's volume, you could try and add more compromised machines to your botnet. That is becoming increasingly difficult. " Is that good news, or have botted devices reached saturation? That there aren't any un-botted left to be taken. And I'm a bit confused, "That's a 64 byte query that resulted in a 3,223 byte response." My understanding was at a certain size of response, DNS switched to TCP to return results, but maybe the unsolicited response handshake is accepted blindly?
Juha Saarinen AITTP
Hamish. -- http://hamish.kiwi.me _______________________________________________ NZNOG mailing list NZNOG(a)list.waikato.ac.nz http://list.waikato.ac.nz/mailman/listinfo/nznog
On Nov 2, 2012, at 4:05 AM, Juha Saarinen wrote:
Are the local open resolvers seen as a problem?
A combination of three things enable DNS reflection/amplification attacks:
1. Lack of anti-spoofing deployed at the customer aggregation edge (shameful in 2012).
2. Open DNS recursors (also shameful in 2012).
3. EDNS0 (necessary).
Before going on a chase for open recursors, it would be a wise investment of time and effort to ensure that one has implemented BCP84 anti-spoofing at one's customer aggregation edge. Without the ability to emit spoofed packets, the open recursors can't be abused in this way.
Also note that DNS reflection/amplification attacks can be initiated without utilizing open recursors, simply by sending spoofed packets directly to authoritative servers. So, deploying anti-spoofing should be the priority.
-----------------------------------------------------------------------
Roland Dobbins
On a related note; I've been running an Urban Terror game server open to
the internet at our community house and seeing very high traffic occasionally
(mostly outbound, fully saturating our ADSL). It took me longer than it
should have to figure out what was going on, seems that the Urban Terror
server can be exploited as a UDP traffic amplifier too.
http://www.urbanterror.info/forums/topic/27825-drdos/
On 4 November 2012 17:21, Dobbins, Roland
On Nov 2, 2012, at 4:05 AM, Juha Saarinen wrote:
Are the local open resolvers seen as a problem?
A combination of three things enable DNS reflection/amplification attacks:
1. Lack of anti-spoofing deployed at the customer aggregation edge (shameful in 2012).
2. Open DNS recursors (also shameful in 2012).
3. EDNS0 (necessary).
Before going on a chase for open recursors, it would be a wise investment of time and effort to ensure that one has implemented BCP84 anti-spoofing at one's customer aggregation edge. Without the ability to emit spoofed packets, the open recursors can't be abused in this way.
Also note that DNS reflection/amplification attacks can be initiated without utilizing open recursors, simply by sending spoofed packets directly to authoritative servers. So, deploying anti-spoofing should be the priority.
----------------------------------------------------------------------- Roland Dobbins
// http://www.arbornetworks.com Luck is the residue of opportunity and design.
-- John Milton
_______________________________________________ NZNOG mailing list NZNOG(a)list.waikato.ac.nz http://list.waikato.ac.nz/mailman/listinfo/nznog
On Nov 4, 2012, at 12:37 PM, Bruce Kingsbury wrote:
It took me longer than it should have to figure out what was going on, seems that the Urban Terror server can be exploited as a UDP traffic amplifier too.
We see Quake3 (!) servers being exploited in this fashion, as well.
DNS reflection/amplification attacks are generally the largest attacks in terms of bandwidth (e.g., bps), followed by SNMP reflection/amplification attacks and then ntp reflection/amplification attacks. The various game servers come after that.
-----------------------------------------------------------------------
Roland Dobbins
participants (10)
-
Bruce Kingsbury
-
Dobbins, Roland
-
Ewen McNeill
-
Florent Bouron
-
Hamish MacEwan
-
Juha Saarinen
-
Mauricio Freitas
-
Mike Jager
-
Sebastian Castro
-
TreeNet Admin