[Pdns-users] DDos Reflector
Leen Besselink
leen at wirehub.nl
Mon Jan 19 22:38:02 UTC 2009
Leen Besselink wrote:
> Christof Meerwald wrote:
>> Hi,
>>
>> since about Friday late evening I am seeing lots of pdns errors in my
>> syslog
>> like:
>>
>> Not authoritative for '', sending servfail to 76.9.31.42 (recursion was
>> desired)
>>
>> Over in comp.protocols.dns.bind there is already some discussion about
>> these
>> DNS requests (which apparently use a spoofed source IP address).
>>
>> Is there anything a DNS server/PowerDNS can do to avoid being used as
>> a DDoS
>> reflector, like rate-limiting SERVFAILs per IP address? What's the
>> general
>> opinion?
>>
>
> The idea of the DOS-attack is to try and get the authoritive or public
> recursive nameserver to send a larger amount of packets or size then the
> original request. PowerDNS (atleast the installations I checked) doesn't
> do that, it just sends a ServFail of the pretty much the same size.
>
> Other then dropping the packet with a firewall-rule as I have (that
> IP-address specifically, I actually will remove it after it has stopped
> !) I don't think there is a lot you could do. Maybe someone could
> implement some kind of rules in PowerDNS to, again not answer this
> query specifically. But well, that would just be wrong and make it
> easier to make a DNS cache poisoning attack at some recursor more
> effective.
>
> Only other thing I can think about is, that maybe a rate limiter
> could be kinda useful.
>
> As I've mentioned in other fora, people should just filter their
> egress traffic from spoofed addresses, that would get rid of the
> whole problem.
>
Maybe there is a way to find the badguys, because I did notice one
thing, the TTL is pretty much always the same and they are all arriving
from the same Transit-provider. So that means it's probably just a very
small number of badguys, fairly close together.
The TTL I have here is 56 or 57:
# tcpdump -c 10 -vvntpi XXX host 76.9.31.42
tcpdump: listening on XXX, link-type XXX
76.9.31.42.39499 > XXX.XXX.XX.XXX.53: [udp sum ok] 47478+ NS? . (17)
(ttl 57, id 28226, len 45)
76.9.31.42.35973 > XXX.XXX.XX.XXX.53: [udp sum ok] 31418+ NS? . (17)
(ttl 56, id 40252, len 45)
76.9.31.42.10658 > XXX.XXX.XX.XXX.53: [udp sum ok] 47176+ NS? . (17)
(ttl 56, id 23872, len 45)
76.9.31.42.41104 > XXX.XXX.XX.XXX.53: [udp sum ok] 20777+ NS? . (17)
(ttl 57, id 6198, len 45)
76.9.31.42.25856 > XXX.XXX.XX.XXX.53: [udp sum ok] 12812+ NS? . (17)
(ttl 57, id 32978, len 45)
76.9.31.42.61992 > XXX.XXX.XX.XXX.53: [udp sum ok] 8502+ NS? . (17) (ttl
56, id 7053, len 45)
76.9.31.42.28488 > XXX.XXX.XX.XXX.53: [udp sum ok] 64677+ NS? . (17)
(ttl 56, id 38187, len 45)
76.9.31.42.32527 > XXX.XXX.XX.XXX.53: [udp sum ok] 49277+ NS? . (17)
(ttl 56, id 59157, len 45)
76.9.31.42.25435 > XXX.XXX.XX.XXX.53: [udp sum ok] 719+ NS? . (17) (ttl
56, id 27208, len 45)
76.9.31.42.3991 > XXX.XXX.XX.XXX.53: [udp sum ok] 14463+ NS? . (17) (ttl
57, id 12013, len 45)
The Transit provider in my case is AboveNet.
If people with a higher TTL would give some information where they think
it's arriving from maybe we would be able to find pinpoint them.
>>
>> Christof
>>
>
> _______________________________________________
> Pdns-users mailing list
> Pdns-users at mailman.powerdns.com
> http://mailman.powerdns.com/mailman/listinfo/pdns-users
>
More information about the Pdns-users
mailing list