[dns-operations] Slow Drip DDOS Attack Research

Warren Kumari warren at kumari.net
Wed Nov 7 01:55:09 UTC 2018


I'm somewhat surprised that this document makes no mention of DNSSEC /
RFC8198 "Aggressive Use of DNSSEC-Validated Cache".

As an example, see Petr's presentation @ RIPE76:
DNSSEC aggressive cache(RFC 8198)
Protection from random subdomain attacks
https://ripe76.ripe.net/presentations/71-RIPE76-presentation-RFC8198.pdf

W

On Fri, Nov 2, 2018 at 10:39 PM Renee Burton <rburton at infoblox.com> wrote:

>
>
> Hi,
>
>
>
> I’m a longtime lurker of the mailing list and appreciate the wisdom and
> occasional debates in these exchanges. I wanted to share with the group a
> paper a colleague and I released some months ago on Slow Drip DDOS
> attacks.  I had been waiting for the paper to be hung off of the National
> Security Agency website, but that hasn’t yet happened, so I’ve decided to
> just go ahead and send to the mailing list.
>
>
>
> This paper shares the findings of a slow drip attack system we called
> ExploderBot, which is the largest and longest running such system, and a
> single actor. At this point, it might be OBE as the actor has been quiet
> since May 18, 2018, but they might yet pop up again.  I wanted to share
> this because:
>
>    - We heavily leveraged the mailing list archives and learnt a great
>    deal from the DNS operating community during this research – thank you
>    - We do provide packet signatures that provide over 40 bits of check
>    (over 60 if fully done) so that network operators who can do packet
>    filtering could drop and thwart this actor.
>
>
>
> There remain a lot of open questions for this actor, but we can leverage
> what we learnt here to identify and protect against other systems.
>
>
>
> Here’s the link to *ExploderBot: A Slow Drip System*
>
>
>
>
> https://www.researchgate.net/publication/328355903_ExploderBot_A_Slow_Drip_System
>
>
>
>
>
> Renée Burton
>
>  Sr. Staff Threat Researcher, Cyber Intelligence
>
> rburton at infoblox.com | www.infoblox.com
>
>
>
> *DNS is like Othello: “five minutes to learn, a lifetime to master.”*
>
>
> _______________________________________________
> dns-operations mailing list
> dns-operations at lists.dns-oarc.net
> https://lists.dns-oarc.net/mailman/listinfo/dns-operations
> dns-operations mailing list
> https://lists.dns-oarc.net/mailman/listinfo/dns-operations
>


-- 
I don't think the execution is relevant when it was obviously a bad idea in
the first place.
This is like putting rabid weasels in your pants, and later expressing
regret at having chosen those particular rabid weasels and that pair of
pants.
   ---maf
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.dns-oarc.net/pipermail/dns-operations/attachments/20181107/cca2c23a/attachment.html>


More information about the dns-operations mailing list