[j-nsp] Using IDP/AppFW on SRX for preventing DNSSEC Amplification Attacks

Phil Mayers p.mayers at imperial.ac.uk
Fri Sep 14 05:49:55 EDT 2012


On 09/14/2012 09:05 AM, Thomas Eichhorn wrote:

> as I believe most of us have encountered some DNS (DNSSEC)
> amplification attacks, I wonder if any of you had some success
> of stopping these using a SRX device.

I'd be surprised if it was "most of us". But yes, they're getting more 
common.

> Does anyone have some other ideas or maybe even solutions? I have seen
> some implementations on the DNS-server side - but as always, if there is
> some closed source server behind you need to find another way..


Most sites I know of that are dealing with this issue are either using 
OS-level filtering such as ipfw/iptables recipies to rate-limit the 
"ANY" queries, or are runnng "bind" as their authoritative servers and 
using the response rate-limit patchset here:

http://www.redbarn.org/dns/ratelimits

Whilst the latter stops the reflection attacks, there is some debate 
about whether this helps with the inbound/DNS server load.

Since these are all source-spoofed attacks, I've been encouraging people 
to work with their network and upstream to deal with the root problems - 
source spoofing - either via S/RTBH or better yet by tracking the source 
spoofing across peerings and WHACKING ON THE ISP EMITTING THEM WITH A 
CROWBAR.

Because honestly - what platform can't do BCP 38 these days?


More information about the juniper-nsp mailing list