7
Avoiding DNS amplification attacks

Avoiding dns amplification attacks

Embed Size (px)

Citation preview

Page 1: Avoiding dns amplification attacks

Avoiding DNS amplification attacks

Page 2: Avoiding dns amplification attacks

Who am I?

@deassain

Security Advisor at a Big 4 company

security.stackexchange.com contributor

cloud101.eu

Page 3: Avoiding dns amplification attacks

What is DNS amplification?

Distributed Denial of Service Attack

Abusing flaw in the DNS protocol's architecture

Spamhaus 300 Gbit/s

Page 4: Avoiding dns amplification attacks

Reasons

DNS request vs DNS response (UDP)

Open resolving name servers

No implementation of BCP38

Page 5: Avoiding dns amplification attacks

DNS Request vs Response Size

30 byte request → up to 500 byte response

1 Mbit on your machine → 17 Mbit at the target machine

Amplification

Page 6: Avoiding dns amplification attacks

Open resolvers

Resolves DNS queries for any host

Spoof UDP source to target IP address

Tons of DNS responses end up at the target

Get your machines and disable recursion from the internet! (or the crypto bear will kick your ass )

Page 7: Avoiding dns amplification attacks

BCP38: Ingres Filtering

Works for IPv4

http://tools.ietf.org/html/rfc2827

Upstream providers only allow traffic for IP blocks for which their clients are configured

Cooperation between ISPs