DNS DoS ???
Mark Andrews
marka at isc.org
Mon Aug 1 02:22:01 UTC 2011
In message <AE105312-3108-4B0B-8445-7116B84EC428 at arbor.net>, "Dobbins, Roland"
writes:
> On Aug 1, 2011, at 7:42 AM, Mark Andrews wrote:
>
> > Named already takes proper precautions by default. Recursive service is =
> limited to directly connected networks by default. The default
> > was first changed in 9.4 (2007) which is about to go end-of-life once the=
> final wrap up release is done.
>
> This alone isn't enough. There are quite a few other things folks must do =
> from an architectural and operational standpoint which aren't found in name=
> d.conf.
>
> > The real problem is that many ISP's don't do effective ingress/egress fil=
> tering.
>
> Well, no. The real problem is a protocol set/implementation which lends it=
> self so readily to spoofing in the first place, followed (as you say) by IS=
> P/endpoint network inattention to anti-spoofing, followed by protocols whic=
> h make use of the eminently-spoofable UDP for a critical service.
And even if DNS/TCP was use by default machines can still get DoS'd
because IP is spoofable.
This one looks like a direct attack on the machine as there are
multiple source addresses rather than a reflector attack unless they
are attempting to attack thousands of sites simultaniously.
> > This prevents compromised machines impersonating other machines.
>
> Concur, but see above - spoofing is the symptom, not the disease.
>
> -----------------------------------------------------------------------
> Roland Dobbins <rdobbins at arbor.net> // <http://www.arbornetworks.com>
>
> The basis of optimism is sheer terror.
>
> -- Oscar Wilde
>
>
--
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: marka at isc.org
More information about the NANOG
mailing list