[93625] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: DNS - connection limit (without any extra hardware)

daemon@ATHENA.MIT.EDU (Fergie)
Fri Dec 8 14:31:38 2006

From: "Fergie" <fergdawg@netzero.net>
Date: Fri, 8 Dec 2006 18:39:26 GMT
To: jabley@ca.afilias.info
Cc: geoincidents@nls.net, nanog@nanog.org
Errors-To: owner-nanog@merit.edu


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Sorry for the top-post, but wanted to retain context here.

Also, sorry for the specific product mention, but much of is
mentioned below is something that we are doing with ICSS/BASE:

 http://www.trendmicro.com/en/products/nss/icss/evaluate/overview.htm

$.02,

- - ferg

- -- Joe Abley <jabley@ca.afilias.info> wrote:

On 8-Dec-2006, at 11:52, Geo. wrote:

>
>> Actually, reading your reply (which is the same as my own, pretty  =

>> much), I
>> figure the guy asked a question and he has a real problem.  =

>> Assuming he
>> doesn't want to clean them up is not nice of us.
>
> Infected machines (bots) will cause a lot more than just DNS  =

> issues. Issues
> like this have a way of getting worse all by themselves if not  =

> addressed.
>
> Anyway, to play nice.. how about using a router to dampen traffic  =

> much like
> icmp dampening? Would it be possible to do DNS dampening?

I think the trouble comes when you want to limit the request rate  =

*per client source address*, rather than limiting the request rate  =

across the board. That implies the retention of state, and since DNS  =

transactions are brief (and since the client population is often  =

large) that can add up to a lot of state to keep at an aggregation  =

point like a router.

There some appliances which are designed to hold large amounts of  =

state (e.g. f5's big-ip) but you're talking non-trivial dollars for  =

that. Beware enterprise-scale stateful firewall devices which might  =

seem like sensible solutions to this problem. They are often not  =

suitable for use in front of busy DNS servers (even a few hundred new  =

flows per second is a lot for some vendors, despite the apparent  =

marketing headroom based on the number of kbps you need to handle).

You may find that you can install ipfw (or similar) rules on your  =

nameservers themselves to do this kind of thing. Take careful note of  =

what happens when the client population becomes large, though -- the  =

garbage collection ought to be smooth and painless, or you'll just  =

wind up swapping one worm proliferation failure mode for another.

Host-based per-client rate limits scale better if there are many  =

hosts providing service, e.g. behind a load balancer or using  =

something like <http://www.isc.org/pubs/tn/isc-tn-2004-1.html>.

As to the wider question, cleaning up the infected hosts is an  =

excellent goal, but it'd certainly be nice if your DNS servers  =

continued to function while you were doing so. Having every non- =

infected customer phone up screaming at once can be an unwelcome  =

distraction when you already have more man hours of work to do per  =

day than you have (staff * 24).


Joe

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.5.1 (Build 1557)

wj8DBQFFebFQq1pz9mNUZTMRAk+xAKCg1dPMivTo6ee5Nj1I4yjVXQzvCQCgnBSI
NV3RnsEijPJcHNawWS4uWog=3D
=3Dpawb
-----END PGP SIGNATURE-----

--
"Fergie", a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 fergdawg(at)netzero.net
 ferg's tech blog: http://fergdawg.blogspot.com/


home help back first fref pref prev next nref lref last post