On Jan 19, 2009, at 7:48 AM, John Wobus wrote:
Nathan Ollerenshaw escreveu:
I have an Authoritative BIND server. It is configured to only allow
recursive queries from localhost, with recursion disabled for any
remote clients.
If you attempt to perform a recursive query against this server, it
will respond with a "query refused" packet, as this is what BIND
does if you try to recursively query a server configured to
disallow recursive queries.
[ ........ ]
Any ideas? Anyone facing this same problem found a solution? I'd be
glad to hear it :)
If you need 53 to answer for authoritative zones, you could run two
bind instances, one for your caching server,
the other for the authoritative data. Then a firewall or instance-
wide black-hole config would take care of it.
Not too inspired a solution, but it's all I can think of.
I fear that what you are seeing is difficult to handle, thus may
well become only more popular as time passes,
especially if it really does cause trouble for the victim. If the
traffic is negligible for you, then does it really
hurt the victim? How would they be harmed? Is the victim someone
who queries your authoritative
server enough to get some confusing "hits" of matching port, ID, and
server of outstanding queries? Even if you
block recursive error returns, would an attack using valid
authoritative answers be equally harmful to the victim?
What's happening is, the attacker uses a botnet to send recursive
packets for ./IN/NS (or any other query likely to get a large
response) to a large number "reflectors", using a spoofed source
address (the address of the target).
one controller
100000 bots
1000000 reflectors (per second - they can change from one second to
another)
one target
The controller (the bot herder) already has an efficient way to
control his botnet. Each bot (a compromised machine, usually running
Windows, that's owned by an unsuspecting normal person) sends 10 DNS
packets per second to 10 different servers - not very much traffic.
Each reflector, a DNS server that accepts any kind of query from the
Internet, sees 1 query per second (or less) - a very small amount of
traffic. So none of these machines are seeing much load.
The target gets one million bogus responses per second.
Chris Buxton
Professional Services
Men & Mice
_______________________________________________
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users