[dns-operations] Slow Drip DDOS Attack Research

Roy Arends roy at dnss.ec
Wed Nov 7 11:12:06 UTC 2018


RFC8198 can easily be defeated by registering domains, not signing them, and delegating it to existing targets (if the targets are authoritative domains)

Roy


> On 7 Nov 2018, at 01:55, Warren Kumari <warren at kumari.net> wrote:
> 
> I'm somewhat surprised that this document makes no mention of DNSSEC /  RFC8198 "Aggressive Use of DNSSEC-Validated Cache".
> 
> As an example, see Petr's presentation @ RIPE76: 
> DNSSEC aggressive cache(RFC 8198)
> Protection from random subdomain attacks
> https://ripe76.ripe.net/presentations/71-RIPE76-presentation-RFC8198.pdf
> 
> W
> 
> On Fri, Nov 2, 2018 at 10:39 PM Renee Burton <rburton at infoblox.com> wrote:
>  
> 
> Hi,
> 
>  
> 
> I’m a longtime lurker of the mailing list and appreciate the wisdom and occasional debates in these exchanges. I wanted to share with the group a paper a colleague and I released some months ago on Slow Drip DDOS attacks.  I had been waiting for the paper to be hung off of the National Security Agency website, but that hasn’t yet happened, so I’ve decided to just go ahead and send to the mailing list.
> 
>  
> 
> This paper shares the findings of a slow drip attack system we called ExploderBot, which is the largest and longest running such system, and a single actor. At this point, it might be OBE as the actor has been quiet since May 18, 2018, but they might yet pop up again.  I wanted to share this because:
> 
> 	• We heavily leveraged the mailing list archives and learnt a great deal from the DNS operating community during this research – thank you
> 	• We do provide packet signatures that provide over 40 bits of check (over 60 if fully done) so that network operators who can do packet filtering could drop and thwart this actor.
>  
> 
> There remain a lot of open questions for this actor, but we can leverage what we learnt here to identify and protect against other systems.
> 
>  
> 
> Here’s the link to ExploderBot: A Slow Drip System
> 
>  
> 
> https://www.researchgate.net/publication/328355903_ExploderBot_A_Slow_Drip_System
> 
>  
> 
>  
> 
> Renée Burton
> 
>  Sr. Staff Threat Researcher, Cyber Intelligence
> 
> rburton at infoblox.com | www.infoblox.com
> 
>  
> 
> DNS is like Othello: “five minutes to learn, a lifetime to master.”
> 
>  
> 
> _______________________________________________
> dns-operations mailing list
> dns-operations at lists.dns-oarc.net
> https://lists.dns-oarc.net/mailman/listinfo/dns-operations
> dns-operations mailing list
> https://lists.dns-oarc.net/mailman/listinfo/dns-operations
> 
> 
> -- 
> I don't think the execution is relevant when it was obviously a bad idea in the first place.
> This is like putting rabid weasels in your pants, and later expressing regret at having chosen those particular rabid weasels and that pair of pants.
>    ---maf
> _______________________________________________
> dns-operations mailing list
> dns-operations at lists.dns-oarc.net
> https://lists.dns-oarc.net/mailman/listinfo/dns-operations
> dns-operations mailing list
> https://lists.dns-oarc.net/mailman/listinfo/dns-operations





More information about the dns-operations mailing list