[Pdns-users] DNS amplification attack advice

kalpesh thaker kalpesh at webdevworld.com
Tue May 29 14:32:23 UTC 2012


Dear PDNS list,

i need some advice on an issue that we've been experiencing on our 
public DNS servers the last days.
we have been, and still are currently the victims of a terrible DNS DOS 
amplification attack.

im not sure how many others out there are experiencing this issue, but 
im hoping that someone out there
may have useful PDNS tips that can be used as a counter-measure. (i've 
attached a few lines below from the log files,
to give you an idea of what is going on). i am currently using PDNS AS 
2.9.21.2-1 on debian 5 x86.

May 28 15:01:13 ns1 pdns[9603]: Not authoritative for 'filezilla.de 
<http://filezilla.de>', sending servfail to 184.22.170.194 (recursion 
was desired)
May 28 15:01:18 ns1 pdns[9603]: Not authoritative for 'filezilla.de 
<http://filezilla.de>', sending servfail to 184.22.170.194 (recursion 
was desired)
May 28 15:01:18 ns1 pdns[9603]: Not authoritative for 'filezilla.de 
<http://filezilla.de>', sending servfail to 184.22.170.194 (recursion 
was desired)
May 28 15:01:18 ns1 pdns[9603]: Not authoritative for 'blogylana.com 
<http://blogylana.com>', sending servfail to 184.22.170.194 (recursion 
was desired)
May 28 15:01:19 ns1 pdns[9603]: Not authoritative for 'blogylana.com 
<http://blogylana.com>', sending servfail to 184.22.170.194 (recursion 
was desired)
May 28 15:01:20 ns1 pdns[9603]: Not authoritative for 'blogylana.com 
<http://blogylana.com>', sending servfail to 184.22.170.194 (recursion 
was desired)
May 28 15:01:23 ns1 pdns[9603]: Not authoritative for 'filezilla.de 
<http://filezilla.de>', sending servfail to 184.22.170.194 (recursion 
was desired)
May 28 15:01:25 ns1 pdns[9603]: Not authoritative for 'filezilla.de 
<http://filezilla.de>', sending servfail to 184.22.170.194 (recursion 
was desired)
May 28 15:01:25 ns1 pdns[9603]: Not authoritative for 'blogylana.com 
<http://blogylana.com>', sending servfail to 184.22.170.194 (recursion 
was desired)
May 28 15:01:26 ns1 pdns[9603]: Not authoritative for 'filezilla.de 
<http://filezilla.de>', sending servfail to 184.22.170.194 (recursion 
was desired)
May 28 15:01:28 ns1 pdns[9603]: Not authoritative for 'filezilla.de 
<http://filezilla.de>', sending servfail to 184.22.170.194 (recursion 
was desired)
May 28 15:01:30 ns1 pdns[9603]: Not authoritative for 'blogylana.com 
<http://blogylana.com>', sending servfail to 184.22.170.194 (recursion 
was desired)
May 28 15:01:33 ns1 pdns[9603]: Not authoritative for 'blogylana.com 
<http://blogylana.com>', sending servfail to 184.22.170.194 (recursion 
was desired)
May 28 15:01:33 ns1 pdns[9603]: Not authoritative for 'filezilla.de 
<http://filezilla.de>', sending servfail to 184.22.170.194 (recursion 
was desired)
May 28 15:01:34 ns1 pdns[9603]: Not authoritative for 'blogylana.com 
<http://blogylana.com>', sending servfail to 184.22.170.194 (recursion 
was desired)
May 28 15:01:38 ns1 pdns[9603]: Not authoritative for 'blogylana.com 
<http://blogylana.com>', sending servfail to 184.22.170.194 (recursion 
was desired)
May 28 15:01:39 ns1 pdns[9603]: Not authoritative for 'filezilla.de 
<http://filezilla.de>', sending servfail to 184.22.170.194 (recursion 
was desired)
May 28 15:01:41 ns1 pdns[9603]: Not authoritative for 'filezilla.de 
<http://filezilla.de>', sending servfail to 184.22.170.194 (recursion 
was desired)
May 28 15:01:41 ns1 pdns[9603]: Not authoritative for 'blogylana.com 
<http://blogylana.com>', sending servfail to 184.22.170.194 (recursion 
was desired)
May 28 15:01:43 ns1 pdns[9603]: Not authoritative for 'blogylana.com 
<http://blogylana.com>', sending servfail to 184.22.170.194 (recursion 
was desired)

our DNS server is setup as an authoritative server for the zones we host 
(via bind backend)...and i can confirm that all recursion has
been disabled on this authoritative server.

so far i have done the following:

- cache-ttl is set to 0
- distributor-threads set to 1
- max-tcp-connections set to 60
- negquery-cache-ttl set to 0
- setup IPtables with a chain to reject udp/tcp connections to port 53 
if they create more than 7 connections per second

(most of the cache settings were disabled anyway, as it messes with a 
highly modified geo backend that i use)

the firewall has helped alot... and our ourstream ISP has started 
throttling traffic to our nameservers.. which has also helped
at the cost of some dropped legit requests.

apon discussion with one of the ISP's which we sent an abuse report for 
one of their IP's, they seem to think they these IP address
have all been spoofed for this amplification attack.

any advice/criticism/tips would be appreciated

thanks

kalpesh



-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.powerdns.com/pipermail/pdns-users/attachments/20120529/2e872a30/attachment.html>


More information about the Pdns-users mailing list