[151837] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Attack on the DNS ?

daemon@ATHENA.MIT.EDU (sthaug@nethelp.no)
Sat Mar 31 16:28:54 2012

Date: Sat, 31 Mar 2012 22:28:17 +0200 (CEST)
To: adrian.minta@gmail.com
From: sthaug@nethelp.no
In-Reply-To: <4F774C51.3000805@gmail.com>
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

> We already have this type of attack in Bucharest/Romania since last 
> Friday. The targets where IP's of some local webhosters, but at one 
> moment we event saw IP's from Go Daddy.
> Tcpdump will show something like:
> 11:10:41.447079 IP target > open_resolver_ip.53: 80+ [1au] ANY? isc.org. 
> (37)
> 11:10:41.447082 IP target > open_resolver_ip.53: 59147+ [1au] ANY? 
> isc.org. (37)
> 11:10:41.447084 IP target > open_resolver_ip.53: 13885+ [1au] ANY? 
> isc.org. (37)
> 
> After one week the attack has been mostly mitigated, and the remaining 
> open resolvers are probably windows servers. Apparently in bill'g world 
> is impossible to restrict the recursion.

This is a spoofed source amplification/reflection attack, and is really
going on all the time. It has nothing to do with any possible Anonymous
attack on the root name servers.

ANY queries for isc.org and ripe.net are popular (ietf.org has also been
seen), since they give a potentially large amplification factor.

Steinar Haug, Nethelp consulting, sthaug@nethelp.no


home help back first fref pref prev next nref lref last post