[nsp-sec] Info share: REN-ISAC alert DNS Amplification attacks

Eli Dart dart at es.net
Thu May 9 12:35:09 EDT 2013


Hi all,

On 5/8/13 11:39 AM, Smith, Donald wrote:
> ----------- nsp-security Confidential --------
>
> Minor nit, BCP38 is intended to block ingress traffic not egress traffic.
> " - Apply BCP38 filtering to prevent spoofed source address traffic from
>       leaving your network. "
>
> "Network Ingress Filtering:
> Defeating Denial of Service Attacks which employ
> IP Source Address Spoofing"
>
> So it should probably be from entering your network:)

Sorry to jump in late - it sounds like there might be a point of view 
issue here.

 From the perspective of a network provider, one wants to prevent 
spoofed traffic from entering the network.

The view is reversed from the perspective of a university campus (which 
I expect many REN-ISAC sites are).  A university or other end site 
should filter traffic leaving its network.

Do we need a term ("inverse BCP38 filtering?") to describe 
site-configured egress filtering to prevent the sending of spoofed 
traffic to a provider?

		--eli



>
> (coffee != sleep) & (!coffee == sleep)
>   Donald.Smith at centurylink.com
>
>
>
> From: nsp-security [nsp-security-bounces at puck.nether.net] on behalf of Gabriel Iovino [giovino at ren-isac.net]
> Sent: Wednesday, May 08, 2013 12:13 PM
> To: NSP nsp-security
> Subject: [nsp-sec] Info share: REN-ISAC alert DNS Amplification attacks
>
>
> ----------- nsp-security Confidential --------
>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> Greetings,
>
> The REN-ISAC released an alert to .edu today regarding DNS Amplification
> attacks.
>
> CIO version of the Alert
> http://www.ren-isac.net/alerts/dns_amp_ddos_cio_201305.html
>
> Technical version of the Alert
> http://www.ren-isac.net/alerts/dns_amp_ddos_tech_201305.html
>
> I share this with nsp-sec as most of us have constituents we are
> attempting persuade to mitigate open resolvers and implement bcp38.
> Maybe text from this alert will save you some time? Please feel free to
> borrow/steal from it as you see fit.
>
> A special thank you to everyone referenced in the alert, you are doing a
> lot of the heaving lifting.
>
> Here are a few other recent alerts I am aware of:
>
> US-CERT Alert (TA13-088A) DNS Amplification Attacks
> http://www.us-cert.gov/ncas/alerts/TA13-088A
>
> DNS amplification attacks and open DNS resolvers
> https://www.cert.be/pro/docs/dns-amplification-attacks-and-open-dns-resolvers
>
> [slight topic change -> remediation experience]
>
> When DNS amplification attacks are being shared in various remediation
> communities and we alert our constituents we see ~30-40% remediation in
> the first 24 hours. We also get feedback that:
>
> 1. Organizations have plans in place to mitigate open recursive resolvers
>
> 2. These notifications are helping them make the business case
> internally to do the right thing.
>
> Keep the attack data sets coming!
>
> thank you
>
> Gabe
>
> - --
> Gabriel Iovino
> Principal Security Engineer, REN-ISAC
> http://www.ren-isac.net
> 24x7 Watch Desk +1(317)278-6630
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.9 (MingW32)
>
> iEYEARECAAYFAlGKlbEACgkQwqygxIz+pTsh4gCgtD2R4Q++U8NR+P0JLaKS+Y4t
> 7YoAnRRiT2GI+4ZZ17tC08rkT1c48qGJ
> =0H49
> -----END PGP SIGNATURE-----
>
>
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
>
> Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
> community. Confidentiality is essential for effective Internet security counter-measures.
> _______________________________________________
>
>
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
>
> Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
> community. Confidentiality is essential for effective Internet security counter-measures.
> _______________________________________________
>

-- 
Eli Dart                                            NOC: (510) 486-7600
ESnet Network Engineering Group (AS293)                  (800) 333-7638
Lawrence Berkeley National Laboratory
PGP Key fingerprint = C970 F8D3 CFDD 8FFF 5486 343A 2D31 4478 5F82 B2B3



More information about the nsp-security mailing list