[dns-operations] DNS deluge for x.p.ctrc.cc

Sam Norris Sam at ChangeIP.com
Mon Feb 27 18:38:19 UTC 2006


I believe we will find that SIP phones are going to also have this same 
problem.  Many people even give voip a high qos priority : )  Soon there 
will be a VOIP phone on every desk and each will be able to reply back to a 
spoofed IP with a packet larger than 512 bytes... its going to be fun when 
this becomes a more popular attack - NOT.

Sam

----- Original Message ----- 
From: "Sam Norris" <Sam at ChangeIP.com>
To: "John Kristoff" <jtk at ultradns.com>; <dns-operations at mail.oarc.isc.org>
Sent: 02/27/2006 10:11 AM
Subject: Re: [dns-operations] DNS deluge for x.p.ctrc.cc


> Isn't this an issue even if the dns server isn't an open-recursive but
> simply listens on port 53?  Sending a packet with a spoofed source is a
> problem for ANY udp service.  If open resolvers are all taken off the net
> whats to stop the botnets from sending enough queries to the root servers
> with spoofed sources to accomplish the same goal?  Sure it takes more
> packets but ...
>
> Why bother testing if its recursive if either way its going to send 
> packets
> back to a victim?  Sure its a smaller payload but its still an attack
> vector.
>
> Sam
>
>
>
> ----- Original Message ----- 
> From: "John Kristoff" <jtk at ultradns.com>
> To: <dns-operations at mail.oarc.isc.org>
> Sent: 02/27/2006 9:30 AM
> Subject: Re: [dns-operations] DNS deluge for x.p.ctrc.cc
>
>
>> On Sun, Feb 26, 2006 at 09:23:23AM -0800, william(at)elan.net wrote:
>>> What is a correct way to verify if dns server is recursive from your
>>> resolver? Is asking info on your own domain from remote nameserver ok
>>> for it? What timeout should be used to decide that there was no answer?
>>
>> It is possible in some configurations, for example with BIND and an
>> allow recursion ACL, where generally hosts even outside the ACL will
>> still receive an answer the server is not authoritative for if it is
>> cached locally.  So one possible way obvious way around this would be
>> to query for a record with a TTL=0 that the server is not authoritative
>> for.
>>
>> John
>> _______________________________________________
>> dns-operations mailing list
>> dns-operations at lists.oarci.net
>> http://lists.oarci.net/mailman/listinfo/dns-operations
>
> _______________________________________________
> dns-operations mailing list
> dns-operations at lists.oarci.net
> http://lists.oarci.net/mailman/listinfo/dns-operations 




More information about the dns-operations mailing list