[41420] in bugtraq

home help back first fref pref prev next nref lref last post

Re: DNS query spam

daemon@ATHENA.MIT.EDU (Florian Weimer)
Wed Nov 30 05:33:23 2005

From: Florian Weimer <fw@deneb.enyo.de>
To: "Piotr Kamisiski" <rotunda@ktd.krakow.pl>
Cc: bugtraq@securityfocus.com
Date: Tue, 29 Nov 2005 17:42:50 +0100
In-Reply-To: <Pine.LNX.4.63.0511272319350.14403@raq.ktd.krakow.pl> (Piotr
	Kamisiski's message of "Sun, 27 Nov 2005 23:30:21 +0100 (CET)")
Message-ID: <87psojmmlx.fsf@mid.deneb.enyo.de>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii

* Piotr Kamisiski:

> 23:05:40.241026 IP 204.92.73.10.40760 > xx.xx.xx.xx.53:  38545+ [1au] ANY ANY? e.mpisi.com. (40)


204.92.73.10 is one of the IP addresses for irc.efnet.ca.  Someone is
spoofing the source addresses, in the hope that DNS servers will
return a large record set.

Could you check if the packets contain OPT records (e.g. using
"tcpdump -s 0 -v")?  This protocol extension is described in the RFC
for ENDS0 (RFC 2671).  EDNS0-capable DNS resolvers can send fragmented
UDP packets, exceeding the traditional 512 byte limit of DNS UDP
replies.  The BIND 9 default maximum response size is 4096, for
example.

If the spoofed requests contain OPT records , you typically get an
amplification factor of about 60 in terms of bandwidth, and 5 in terms
of packet rate, but actual numbers may vary.

Yet another reason to restrict access to your recursive resolvers to
customers only.

home help back first fref pref prev next nref lref last post