Home / Blogs

DNS Reflection/Amplification Attack: Proved

Last year there was a “threat” by anonymous group to black out Internet by using DNS Reflection/Amplification attack against the Internet DNS Root servers. I even wrote a little article about it: “End of the world/Internet

In the article I was questioning if this was even possible and what was needed as general interest and curiosity.

Well, looking at the “stophaus” attack last week, we are getting some answers.

I would say it is a real threat now and is a valid attack vector. Seems you only need a couple of ingredients:

Open recursive DNS servers

Many of these are already available, and numbers increase. This not only includes dedicated DNS Server systems, but also any equipment attached to the internet capable of handling DNS requests it seems (like cable-modems, routers, etc). So the risk this will be utilized again, will be greater every day now.

A party that is capable/willing do set it off

Seems that there are more and more parties on the Internet that open to “attack” certain entities on the Internet to defend their believes. In above case, stressing even the Internet and influence the usage of everyone on it.

Infrastructure

Lets call it the “Internet”, “Logistics” and “Bandwidth”. Looking at the numbers, it is apparent that you need little (in context) and it is possible to do so if you want. Technology, services or other wise it is not really challenging. And it can be done not from a shady area/country either.

I suspect we will see more of this happening now the “proof-of-concept” is done. It still worries me when the real guns are pulled out and focus would shift from particular entities to the root infrastructure of the Internet.

I had a couple of talks with my expertise peers on this how to mitigate this, it is very difficult as it is sheer load coming from every corner of the Internet. We really did not come up with a single solution. Mitigation would probably mean “breaking” some parts of the Internet as collateral damage, which in size would probably be disruptive enough as well.

Main concern in this, again, is the “open resolvers” out there that we cannot control without education and regulation on how DNS is deployed (you know, the thing we are allergic/apathetic about on/about Internet).

The more thoughts I give this, the more I think the solution is not only technical but mostly an organisational/educational/regulation one… Before that is in place, we probably will experience some outages…

By Chris Buijs, Cultivator of Organizations, Products and Services

Filed Under

Comments

Filtering Todd Knarr  –  Mar 29, 2013 8:10 PM

I think it’s not so much the open resolvers, although anything that’s open unintentionally should be closed. Most resolvers should only be handling queries from the local network or downstream, not from the outside world.

The real problem is the address spoofing that allows these attacks in the first place. The attack depends on being able to forge the source address and have the packets routed. But unless your network’s carrying a lot of transit traffic from a variety of address space, you shouldn’t be allowing that. Upstream interfaces should only be allowing traffic out if it’s from addresses your network should be carrying. Downstream interfaces should only be allowing traffic in that’s from addresses that should be downstream of that interface. And the upstream interfaces shouldn’t be allowing traffic in that’s not to an address on or downstream of your network. That kind of filtering should be standard on every network it’s feasible to do on, and it’d shut down this attack (and many others) at the source.

I know it won’t work for all networks. But there’s a lot of networks near the edge where you find only a reasonable chunk of address space that ought to be sending traffic up through that interface, where you’re connecting end-user networks that shouldn’t be carrying other people’s traffic. Why are those connections still allowing spoofed/forged traffic through them?

I agree that the open resolvers are Chris Buijs  –  Apr 2, 2013 7:54 AM

I agree that the open resolvers are not "only" the problem. But they are accessible without much limitations. Spoofing is just not helping here, and makes the amplification attack possible. All other attacks (mostly poisoning) are still possible.

Cable modems with recursive DNS server? Frank Bulk  –  Mar 29, 2013 8:28 PM

... also any equipment attached to the internet capable of handling DNS requests it seems (like cable-modems, routers, etc)

I’m not aware of cable modems that have recursive DNS server support, though RGs (residential gateways) surely support them.  But in those devices, of all CPE deployed, would be manageable by the service provider such that they could change that setting universally.

Do you have evidence that cable modems are a big part of the recursive DNS problem?  If I had to guess where the problems were, I would first list customer-owned routers, then DSL modems, then non-firewalled hosts, and then firewalls/routers NATing to an internal DNS server.

Cable modems were mentioned in a couple Chris Buijs  –  Apr 2, 2013 7:58 AM

Cable modems were mentioned in a couple of articles concerning the stophaus attack, seems to be mostly in the UK. I must admit I was wondering as well how this work. Didn't give it much thoughts and just jolted it down in the article. But I think the context is probably more "broadband" related and that more and more residentials have mail and dns servers running local nowadays (in proportion that is), and most of them seem to be "open" or not as tightly secured/configured as wished for.

I read a reference to "cable boxes" Frank Bulk  –  Apr 2, 2013 2:30 PM

I read a reference to "cable boxes" in another article yesterday, and I believe that is also misleading. Open recursors can be found on all types of network gear.

PoC? Frank Bulk  –  Mar 29, 2013 8:32 PM

I suspect we will see more of this happening now the “proof-of-concept” is done. It still worries me when the real guns are pulled out and focus would shift from particular entities to the root infrastructure of the Internet.

I had a couple of talks with my expertise peers on this how to mitigate this, it is very difficult as it is sheer load coming from every corner of the Internet. We really did not come up with a single solution. Mitigation would probably mean “breaking” some parts of the Internet as collateral damage, which in size would probably be disruptive enough as well.

Main concern in this, again, is the “open resolvers” out there that we cannot control without education and regulation on how DNS is deployed (you know, the thing we are allergic/apathetic about on/about Internet).

Why are you calling this a proof-of-concept?  This is attack on CloudFlare appears to be the real thing.

Why would we need to come up with a single solution?  The immediate mitigation approach was traffic scrubbing, and the long-term approach is closing open DNS resolvers and minimizing the amount of spoofable hosts by using features such as uRPF.  As it was, CloudFlare “mitigated” the issue significantly by having used anycast across many sites.

Just fancy wording :-)Actually it proofs the Chris Buijs  –  Apr 2, 2013 8:03 AM

Just fancy wording :-) Actually it proofs the scale, magnitude and possibility of the attack for real and it was made visible by all the media attention, which I think was a first on this scale. Cloudfare mitigated the attack indeed, which took some effort (interesting read how they did it and what was happening BTW). They did not solve the cause though. As you said, the open resolvers are still there and spoofing is still possible, so the attack is ready to use again but we are on our toes now.

It is getting quite an attention... Chris Buijs  –  Apr 3, 2013 6:39 AM

Wow… Lots of articles and news items on this. Guess we are worrying (for a good reason), but also get out of proportion.

Nice articles:

http://www.circleid.com/posts/20130402_open_dns_resolvers_coming_to_an_ip_address_near_you/

http://www.techrepublic.com/blog/security/ddos-strike-on-spamhaus-highlights-need-to-close-dns-open-resolvers/9296

Gizmodo Article: It's a lie ... Chris Buijs  –  Apr 3, 2013 6:41 AM

Another nice one, whatever is going on, it’s getting attention on all fronts :-).

http://gizmodo.com/5992652

Comment Title:

  Notify me of follow-up comments

We encourage you to post comments and engage in discussions that advance this post through relevant opinion, anecdotes, links and data. If you see a comment that you believe is irrelevant or inappropriate, you can report it using the link at the end of each comment. Views expressed in the comments do not represent those of CircleID. For more information on our comment policy, see Codes of Conduct.

CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

I make a point of reading CircleID. There is no getting around the utility of knowing what thoughtful people are thinking and saying about our industry.

VINTON CERF
Co-designer of the TCP/IP Protocols & the Architecture of the Internet

Related

Topics

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix