lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <442C3E5E.2060406@linuxbox.org>
Date: Thu, 30 Mar 2006 22:23:58 +0200
From: Gadi Evron <ge@...uxbox.org>
To: "Geo." <geoincidents@....net>
Cc: bugtraq@...urityfocus.com
Subject: Re: recursive DNS servers DDoS as a growing DDoS problem


Geo. wrote:
> The flood is a flood of answers not queries, you spoof the source address of
> a query with the address of your target, the target gets the response from
> the dns server. A cache on the dns server just makes it a more efficient
> response.

Queries are bad enough. This can be played with from any point in the 
chain. I.e. from the amount of querying clients, the number of so-called 
"relaying servers", possible /effective/ amplification and the size of 
the TXT SOA record.

Increase any of these and you somewhat increase the attack if one of the 
others is controlled. So treating just one is not really a solution.

We provided with an equation of sort to this effect in the paper we 
pre-released for the community when the FUD started (was supposed to 
eventually be an academic paper):
http://www.isotf.org/news/DNS-Amplification-Attacks.pdf

Yes, in my opinion recursion should be put under better control, but 
it's what-a-mole all over again if we do it by running after servers. 
The problem here (if we are to ignore just for a moment other UDP/DNS 
attacks) is with the attack vector - spoofing.

Many networks today allow spoofing.

Should recursion by default be disabled? Yes. Is it a problem when done 
insecurely? Yes. Is it what we should run after on the "client-side" 
servers? No, or maybe not Yes but not Only.

> I have not seen a perfect solution yet, at best the solutions I've seen
> mentioned eliminate this one flood vector. I would suggest that when
> considering which one to choose we look at what we lose with each choice.
> Eliminate spoofing and you lose virtually nothing, eliminate open recursive

I am with you so far. Spoofing is not the only problem of the Internet 
by far, but is is a problem mostly ignored thus far as it was not 
actively exploited *sniff*

> servers and you have just created a really powerful control mechanism for
> entities to control large sections of the internet since folks from those
> sections won't be able to use anyone else's DNS servers or even run their
> own (much like port 25 blocking limits who can run a mail server today). He
> who controls dns controls the network.

Is this like when you brought up Government conspiracies in this regard 
on another list?

I can understand discussion going on with different lists, I sin with 
that myself recently. There were no direct lists to handle DNS or 
botnets issues until not long ago, still - should we just skip a list 
whenever you are disagreed with?

	Gadi.


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ