I sent you a private reply, but also posting publicly…

On Apr 9, 2013, at 4:55 PM, "A. Pishdadi" <apishd...@gmail.com> wrote:

> In the last 2 weeks we have seen double the amount of ddos attacks, and way 
> bigger then normal. All of them being amplification attacks. I think the 
> media whoring done during the spamhaus debacle motivated more people to 
> invest time building up there openresolver list, since really no one has 
> disclosed attacks of that size and gave the blueprints of how to do it. Now 
> we know the attack has been around for awhile but no one really knew how big 
> they could take it until a couple weeks ago.. 
> 
> Now I know your openresolver DB is meant to get them closed but it would take 
> only a small amount of someones day to write a script to crawl your 
> database.. You go to fixedorbit.com or something of the sort, look up the 
> as's of the biggest hosting companies, plop there list of ip allocaitons in 
> to a text file, run the script and boom i now have the biggest open resolver 
> list to feed my botnet.. Maybe you should require some sort of CAPTCHA or 
> registration to view that database. While im sure people have other ways of 
> gathering up the open resolvers , you just took away all the work and handed 
> it to them on a silver platter. While i am and others surely are greatful for 
> the data, i think a little more thought should be put in how you are going to 
> deliver the data to who should have it, and that would be the network / AS 
> they are hanging off of.

Both systems that return a referral to root and that do full recursion are 
being abused in attacks.

Honestly, if you send 100kpps to 2^32 IPs it would take ~12 hours.  If you have 
10 hosts to scan at a lower rate and skip all the 'unused' space, e.g.: 0/8 
10/8 127/8 224/4 you cut down the time as well.

I won't say exactly how long my weekly process takes, but it doesn't take long 
if you wanted to replicate the data.

About 1:122 hosts responds in some fashion.

That means for any given /24, expect there to be about 2 responses.  While that 
may not be the case for some blocks, there's a good chance something is 
responding nearby.  At some point the lack of scoping your response will result 
in a real problem for the person being attacked.  Your hosts will get used in 
an attack.  It's not really an IF question anymore.

- jared

Reply via email to