DNS problems to RoadRunner - tcp vs udp
Nathan Ward
nanog at daork.net
Sun Jun 15 01:33:59 UTC 2008
On 15/06/2008, at 9:18 AM, Scott McGrath wrote:
> Yes - we are blocking TCP too many problems with drone armies and we
> started about a year ago when our DNS servers became unresponsive
> for no apparent reason. Investigation showed TCP flows of hundreds
> of megabits/sec and connection table overflows from tens of
> thousands of bots all trying to simultaneously do zone transfers and
> failing tried active denial systems and shunning with limited
> effectiveness.
>
> We are well aware of the host based mechanisms to control zone
> information, Trouble is with TCP if you can open the connection you
> can DoS so we don't allow the connection to be opened and this is
> enforced at the network level where we can drop at wire speed.
> Open to better ideas but if you look at the domain in my email
> address you will see we are a target for hostile activity just so
> someone can 'make their bones'.
There's really two problems here - one is packet/bit rate causing
problems for your network, that's not necessarily an end system thing.
Not really DNS specific, and blocking 53/TCP doesn't really help here
as people could just send 53/UDP your way and get the same effect.
Connection table overflowing is a bit of a different issue, obvious
way to overcome that is to whack a load balancer in there to share the
load around. It's not immediately obvious to me why your connection
table would be filling up - what state were connections stuck in?
Anyway, one thought that comes to me would be to split off UDP and TCP
services to different servers - if some TCP attack kills your TCP DNS
server you:
a) don't have to worry about UDP services failing.
b) can turn it off for the duration of the attack, and are no worse
off than you are right now, then turn it back on when you see the high
volume of SYN messages disappear.
c) as TCP DNS service recovery isn't super time critical (I'm assuming
this, because you're not running it at all right now) you have time to
look at the anatomy of the attack and figure out how to filter it more
precisely if possible, instead of simply dropping all TCP.
Obviously, you'd want to make sure TCP from your other name servers
always goes to the UDP one, etc. etc.
--
Nathan Ward
More information about the NANOG
mailing list