On 2012-06-10 4:47 PM, sth...@nethelp.no wrote: >> to that end, vernon schryver and i have been exploring rate limiting in >> BIND 9. there's a patch available, which i've so far offered only to >> anyone whose server is currently getting abused. what i'm worried about >> is that our profile for goodput-vs-badput is wrong headed or too course >> grained. so far so good. >> >> config { >> // ... >> rate-limit { >> responses-per-second 5; >> window 5; >> }; >> }; > I'm afraid we may need more control. If my clients are generating a DDoS > attack at 20 responses per second, and I limit this to 5 per second - > the C&C can get the same effect by mobilizing four times as many clients > to do the job.
no. the client ip is spoofed. the number of spoofers doesn't matter, when the reflector is looking at both the apparent client ip and the intended response. when most well-provisioned authority servers are running with some kind of rate limiting, then the only way to do a reflective amplifying ddos will be (a) do it through recursive not authority servers, or (b) send a small number of queries to a large number of authority servers, or (c) switch to some other wide area udp such as ntp or snmp or syslog or whatever. none of those things is low hanging fruit; they will require enough work, even by script kiddies, that most attackers will switch back to ddos-for-hire which will work through direct bombing by botnets. this is because recursive servers can generally run closed (on-net or on-campus only) and the smallish number of open ones can rate limit (as opendns and googledns both do today); and because maintaining a catalogue of server+qtuple inputs for spoofed-source attacks will be a lot more work than "just use ripe.net or isc.org" as happens today; and because ntp and snmp generally reflect just fine but don't amplify as well as dns. > On my wishlist, in addition to rate limiting, is also: > > - Some way of dynamically blackholing clients, based on one or more of > -- Rate limit exceeded > -- Asking the *same* question (with a large response) repeatedly > -- Asking a *specific* question (e.g. ANY isc.org|ripe.net) > -- Input from an external system, e.g. via rndc all but the last is already done. distributed blackholing of abusive source addresses is dangerous, since in udp, the source addresses will often be spoofed. this means blackholing is likely to cut off responses to legitimate queries from the victims. (vernon and i spent a lot of time working on that problem especially.) paul _______________________________________________ dns-operations mailing list dns-operations@lists.dns-oarc.net https://lists.dns-oarc.net/mailman/listinfo/dns-operations dns-jobs mailing list https://lists.dns-oarc.net/mailman/listinfo/dns-jobs