DNS problems to RoadRunner - tcp vs udp

Nathan Ward nanog at daork.net
Sun Jun 15 01:33:59 UTC 2008


On 15/06/2008, at 9:18 AM, Scott McGrath wrote:

> Yes - we are blocking TCP too many problems with drone armies and we  
> started about a year ago when our DNS servers became unresponsive  
> for no apparent reason.   Investigation showed TCP flows of hundreds  
> of megabits/sec and connection table overflows from tens of  
> thousands of bots all trying to simultaneously do zone transfers and  
> failing tried active denial systems and shunning with limited  
> effectiveness.
>
> We are well aware of the host based mechanisms to control zone  
> information,  Trouble is with TCP if you can open the connection you  
> can DoS so we don't allow the connection to be opened and this is  
> enforced at the network level where we can drop at wire speed.      
> Open to better ideas but if you look at the domain in my email  
> address you will see we are a target for hostile activity just so  
> someone can 'make their bones'.


There's really two problems here - one is packet/bit rate causing  
problems for your network, that's not necessarily an end system thing.  
Not really DNS specific, and blocking 53/TCP doesn't really help here  
as people could just send 53/UDP your way and get the same effect.

Connection table overflowing is a bit of a different issue, obvious  
way to overcome that is to whack a load balancer in there to share the  
load around. It's not immediately obvious to me why your connection  
table would be filling up - what state were connections stuck in?

Anyway, one thought that comes to me would be to split off UDP and TCP  
services to different servers - if some TCP attack kills your TCP DNS  
server you:
a) don't have to worry about UDP services failing.
b) can turn it off for the duration of the attack, and are no worse  
off than you are right now, then turn it back on when you see the high  
volume of SYN messages disappear.
c) as TCP DNS service recovery isn't super time critical (I'm assuming  
this, because you're not running it at all right now) you have time to  
look at the anatomy of the attack and figure out how to filter it more  
precisely if possible, instead of simply dropping all TCP.

Obviously, you'd want to make sure TCP from your other name servers  
always goes to the UDP one, etc. etc.

--
Nathan Ward








More information about the NANOG mailing list