On 10 Jun 2012, at 09:19, DTNX Postmaster wrote:

What type of queries?

ANY queries for ihren.org with no UDP checksum:

shaun# tcpdump -vv -n port 53
09:32:30.139803 IP (tos 0x0, ttl 251, id 24876, offset 0, flags [none], proto UDP (17), length 66) 37.221.160.125.28832 > 93.186.33.42.53: [no cksum] 18554+ [1au] ANY? ihren.org. ar: . OPT UDPsize=9000 (38) 09:32:30.139806 IP (tos 0x0, ttl 251, id 24877, offset 0, flags [none], proto UDP (17), length 66) 37.221.160.125.28832 > 93.186.33.42.53: [no cksum] 18554+ [1au] ANY? ihren.org. ar: . OPT UDPsize=9000 (38) 09:32:30.139929 IP (tos 0x0, ttl 251, id 24878, offset 0, flags [none], proto UDP (17), length 66) 37.221.160.125.28832 > 93.186.33.42.53: [no cksum] 18554+ [1au] ANY? ihren.org. ar: . OPT UDPsize=9000 (38)

The iptables rules mentioned in the first comment work well for us

Well for starters, I [dw]on't use Linux. The server runs FreeBSD. Besides, the damage is done by the time these packets hit the server's ethernet card. At ~4000qps inbound, this is close to saturating the server's VLAN in the data centre. The traffic needs to be blocked before it reaches that. I've hopefully got the offending addresses blackholed by the name server now: don't know though if those addresses were spoofed or not.

I posted here to see if anyone else is experiencing this behaviour or can identify the root cause. DDoS attacks against "important" name servers are fairly common. Could the bad guys now be picking easier targets that may be more likely to fall over? And why pick on my name server which has never done anyone any harm?

_______________________________________________
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

Reply via email to