[nsp-sec] DNS Reflection DDoS
Brian J Smith-Sweeney
bsmithsweeney at nyu.edu
Wed Mar 2 18:21:06 EST 2011
On Wed, Mar 2, 2011 at 11:01 AM, Brian J Smith-Sweeney
<bsmithsweeney at nyu.edu> wrote:
> On Mon, Feb 28, 2011 at 11:26 PM, Nicholas Ianelli <ni at centergate.net> wrote:
>>
>> ----------- nsp-security Confidential --------
>>
>> -----BEGIN PGP SIGNED MESSAGE-----
>> Hash: SHA1
>>
>> We have been getting hit with a DNS reflection attack. Here are the specs:
>>
>> It's currently hitting 204.74.115.1, though it's hit a few different IPs
>> of ours. It's an ANY query for isc.org with the EDNS option set to 4096.
>>
>> Looks like this:
>>
>> 23:55:09.105010 00:19:e2:2d:45:79 > 00:30:48:cb:86:f0, ethertype IPv4
>> (0x0800), length 78: (tos 0x0, ttl 235, id 50959, offset 0, flags
>> [none], proto: UDP (17), length: 64) 204.74.109.1.25345 >
>> 204.74.103.145.53: [no cksum] 10809+ [1au] ANY? isc.org. ar: . OPT
>> UDPsize=4096 (36)
>>
>> We've captured over 3400 IPs involved in the attack. Full list can be
>> found here. Not sure what if anything can be done.
>>
>> https://asn.cymru.com/nsp-sec/upload/1298951475.whois.txt
>>
>> Full list beneath my sig.
>>
>> Cheers,
>> Nick
>>
>> - --
>> Nicholas Ianelli: Neustar, Inc.
>> Security Operations
>
> (belated) ACK for AS12. Looks like this stopped around 11:30pm last
> night from us, let me know if it kicks up again. We're working on
> getting recursion disabled for these boxes.
>
So it turns out I spoke too soon - my DNS guys assert recursion had
already been disabled for these system via BIND ACLs. Checking
netflow, I see records like the following:
0228.22:26:47.191 0228.22:31:51.575 217 204.74.115.1 25345 103
128.122.128.24 53 17 0 387403 24793792
0228.22:26:47.191 0228.22:31:51.575 103 128.122.128.24 53 217
204.74.115.1 25345 17 0 387429 24795456
Given the closely matching flow size in both directions, I'm inclined
to believe we were just answering with refusals rather than actually
amplifying. The DNS folks are going to confirm this with some of
their own tools (we don't have query logging enabled, so there's a bit
of digging involved).
Recursion was in recent memory enabled for these systems. Also I note
that not all of our DNS servers were part of the attack. Assuming I'm
correct and these are just refusals, I'm guessing the attackers have a
static list of what they believe are open DNS recursion boxes they
feed this tool. And they are a) not checking that list all that
often, and b) not verifying before they launch their attack. Not sure
why - seems like this would be trivial to verify if you had control of
another ip address you didn't mind someone tracking down. Perhaps
it's just not worth the effort.
Cheers,
Brian
More information about the nsp-security
mailing list