On 10/1/16 8:36 AM, A. Schulze wrote:
> Hello,
>
> a nsd user posted an interesting question:
> https://open.nlnetlabs.nl/pipermail/nsd-users/2016-September/002364.html
>
>> Could we eliminate the DDoS threat by just turning off UDP?
>>
>> Recursive servers I understand probably have to keep accepting them,
>> but authoritative servers are only intended for recursive servers to
>> query, so would it be safe to just drop port 53 UDP requests?
>
> are there any experiences/opinions on that?
> Andreas
Recursing resolvers expect to be able to contact an authoritative
nameserver on udp 53, so if you just drop that in a hole that is going
to be kinda of a problem because they're going to time out.

There is a bit of an art to protecting servers from packets that they
shouldn't be recieving. just because it has to listen on udp 53 does no
mean it has to be able to recieve udp traffic for all other dports.it's
own queries for example could be done with a different source ip.

Once you get beyond (dns / ntp) reflection though theres no particular
reasion why a volumetric dos attack needs to use the UDP header. For
that matter the traffic doesn't even need to splash on the target host
to be effective if the goal is bandwidth consumption.

>
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
>


Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to