[dns-operations] responding to spoofed ANY queries
Mark Andrews
marka at isc.org
Thu Jan 10 23:43:07 UTC 2013
In message <201301102157.r0ALvdAh025741 at calcite.rhyolite.com>, Vernon Schryver writes:
> > From: Mark Andrews <marka at isc.org>
>
> > As far as I can tell there is no way to stop reflection attacks as
> > long as ISP's allow spoof traffic to enter their networks. The
> > attackers will just go broad spectrum (millions of reflectors) and
> > no single reflector will be able to see that it is part of a attack.
>
> A problem with using a million reflectors is that it is a lot more
> hassle. The goal need not be preventing all reflection attacks but
> only making reflection attacks less rewarding and more costly than
> other attacks, such as simple UDP floods from a modest botnet.
The other part of the goal is to not lose resourse. Reflection
attacks help there.
> > It is possible to detect current reflection attacks and mitigate
> > them using RRL but this is only a stop gap measure which causes the
> > attackers to choose different refectors.
>
> I agree, with the reservation that eventually RRL could eventually
> cause attackers to choose different attacks.
>
> > What we can do is turn off amplification attacks. We know a number of
> > methods of how to do this.
> >
> > * set TC=1 on all UDP query replies and force the client to TCP.
>
> which would kill busy DNS servers.
Indeed. RRL does this selectively.
> > * do a handshake over UDP before sending amplified replies.
>
> What qualifies as amplification? An unsigned (no DNSSEC) A request/response
> is good for at least 3X. 10X or 20X is impressive but merely eases
> the attacker's job by allowing fewer reflectors.
We can go from 1X upwards.
> Would you turn off all DNS/UDP without a DNS cookie by augmenting
> https://tools.ietf.org/html/draft-eastlake-dnsext-cookies-03
> with some kind of minimal "try again with a cookie" response similar
> to but different from a minimal TC=1? I like DNS cookies, but they
> would take many more years to deploy widely enough to matter than have
> already passed since the I-D expired.
If we had a code point we could see 10% deployment within a year
especially if it pushed out in maintanence releases of older code
trains.
> If cookies, ttcp, or some other DNS protocol change is The Answer,
> then in the years before The Answer is deployed, you're stuck with
> making reflection attacks less attractive than alternatives,
> which will slow The Answer.
>
>
> Vernon Schryver vjs at rhyolite.com
> _______________________________________________
> dns-operations mailing list
> dns-operations at lists.dns-oarc.net
> https://lists.dns-oarc.net/mailman/listinfo/dns-operations
> dns-jobs mailing list
> https://lists.dns-oarc.net/mailman/listinfo/dns-jobs
--
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: marka at isc.org
More information about the dns-operations
mailing list