On Sep 10, 2008, at 9:17 PM, Ron Bonica wrote:

> Folks,
>
> Based on the response that we have seen from the WG so far, I don't  
> see
> any reason to amend the draft. BCP 38 is already published.

In defense of publishing draft-ietf-dnsop-reflectors-are-evil I'd like  
to put forward the following article that was part of a paper I co- 
authored in 2005. I do this to show that the publication of this draft  
is long overdue, and that I rather have it published sooner than  
later. Furthermore, to defend against abuse that includes open- 
resolvers I would welcome an RFC as soon as possible, to have a  
boilerplate that I can show folks, who unknowingly run open resolvers,  
but need a pointer to defend the cost of configuration change to their  
management.

The article:

About Open Relays and Open Resolvers

In the early days of the Internet it was common to offer services to  
everyone, either intentionally or as a side effect.  The rise of spam  
taught us that this approach was not well suited for the real world,  
so over time most open relays were closed.  Spam did not cease but  
just one abuse mechanism disappeared.  In the DNS there is a service  
similar to open relays: resolvers offering recursive service to  
anyone.  While large ISPs or organisations need one or more recursive  
name servers (resolvers) to serve their own clients, there is no need  
to serve the world.  Even worse, due to the existence of cache  
poisoning, this kind of munificence may expose the system to certain  
attacks.  While this has been known for quite some time, we will show  
how third parties can communicate through open resolvers, using  
nothing else but DNS protocol conformant packets.

Cache poisoning is done in several ways, each part of a different  
class of attacks.  There is the intrusive attack, where a picaro can  
sit on the wire and alters host addresses in response packets, which  
will subsequently be cached for a certain time by a resolver.  Another  
class is the trial and error attack, where a resolver is hosed with a  
bulk of identical responses, while the identifiers are different.  To  
increase the success of such an attack, the expiry time of the current  
cached data for a chosen candidate can easily be measured.  An open  
resolver will promptly respond to probes for the expiry time of the  
current cached data.

Another type of attack is a simple Denial of Service attack against a  
resolver.  The BIND 8 nameserver does not implement a memory-usage  
maximum.  It is trivial to burst a set of qualified queries to a  
resolver, where the responses will contain records with high TTL  
values, in order to increase the memory footprint of a cache.  Once  
the size will near physical limitations of some form, the server will  
stall or worse, stop processing queries.

Using open resolvers as a DoS amplifier is another attack vector.  It  
is trivial to send a single query to a resolver.  It is trivial to  
send a bulk of identical queries to a bulk of open resolvers.    
Acquiring a set of IP addresses which host open resolvers is trivial  
as well.  Since DNS is UDP based, a scan of a single /16 (’class  
B’) network takes only minutes.  Using a large enough bulk of  
resolvers to query root or TLD servers for a single name can cause the  
respective domain to experience a significant performance degradation.

A new set of abusiveness is currently being developed that involves  
using a bulk of open resolvers and their cache as a way to store and  
transfer data, disguised as DNS data.  The data can take any form,  
from streaming media to bit-torrent seeds [Kami04].

Note that these open resolvers do not have to be recruited to be  
victimised.  They are there for the taking, they simply need to be  
found.  All this can be done within the boundaries of the
DNS-protocol.  The packets on the wire are solely DNS messages.

[Kami04] D. Kaminsky Black Ops of DNS Toorcon 2004, 
http://www.doxpara.com/dns_tc/Black_Ops_DNS_TC_files/v3_document.htm 
  2004

Roy


(paper)
http://www.dfn-cert.de/veranstaltungen/workshop/vortrage-vergangener-workshops/12.-workshop-2005/dfncert-ws2005-f7paper.pdf

(slides)
http://www.dfn-cert.de/veranstaltungen/workshop/vortrage-vergangener-workshops/12.-workshop-2005/dfncert-ws2005-f7.pdf


_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to