[162791] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Mitigating DNS amplification attacks

daemon@ATHENA.MIT.EDU (Doug Barton)
Wed May 1 16:02:08 2013

Date: Wed, 01 May 2013 13:01:59 -0700
From: Doug Barton <dougb@dougbarton.us>
To: nanog@nanog.org
In-Reply-To: <CDA5D62D.10DBD%tstpierre@iweb.com>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On 04/30/2013 05:28 PM, Thomas St-Pierre wrote:
> The large majority of the servers being used in the attacks are not
> open resolvers. Just DNS servers that are authoritative for a few
> domains, and the default config of the dns application does referrals
> to root for anything else.

It sounds like you're already aware that this is the default behavior 
for an authoritative-only server, and while the referral to the roots is 
a largeish response and has been used for amplification attacks, it's 
also rather difficult to mitigate against.

A BIND server can be configured to not do that, but contacting each of 
your customers about it might not have a good ROI. See 
https://www.dns-oarc.net/oarc/articles/upward-referrals-considered-harmful 
for more information.

Meanwhile, thank you very much for being proactive in this regard. Would 
that more SPs were as net.responsible as you. :)

Doug


home help back first fref pref prev next nref lref last post