Re: [dns-operations] Recently closed open resolver and reflection attacks

2013-03-08 Thread Lutz Donnerhacke
* wbr...@e1b.org wrote: > Any idea how long it takes before the formerly abusable server gets taken > off the lists of open recursive servers? About a week. Then the attacks calm down. ___ dns-operations mailing list dns-operations@lists.dns-oarc.net ht

Re: [dns-operations] Recently closed open resolver and reflection attacks

2013-03-08 Thread WBrown
Mark Andrews wrote on 03/06/2013 07:20:58 PM: > It is still polite. Delegations to servers not configured for a > zone happen all the time. Go look at the logs of any recursive > server that reports these. Any idea how long it takes before the formerly abusable server gets taken off the list

Re: [dns-operations] Recently closed open resolver and reflection attacks

2013-03-07 Thread nudge
On Thu, Mar 7, 2013, at 09:29 AM, nudge wrote: > On Wed, Mar 6, 2013 Vernon Schryver wrote: > ... > > I know of no way to use authentication on end user computers except > > by something like installing a forwarding, caching DNS server on every > > end user computer. > > What would be the effect

Re: [dns-operations] Recently closed open resolver and reflection attacks

2013-03-07 Thread Dobbins, Roland
On Mar 7, 2013, at 12:02 AM, Joe Abley wrote: > I don't think this is a necessarily harmful approach. It isn't harmful - on the contrary, it's beneficial, because it keeps out-of-bailiwick queries off the nameservers themselves in the first place It is a BCP.

Re: [dns-operations] Recently closed open resolver and reflection attacks

2013-03-07 Thread Roy Arends
Thanks Mark, much appreciated! Roy On Mar 7, 2013, at 4:28 PM, Mark Andrews wrote: > > In message , Roy Arends writes: >> [1] BIND responds with SERVFAIL to a query where the QNAME is longer than >> 255 bytes. When all the servers for a domain are BIND, th >> is often leads to a burst of requ

Re: [dns-operations] Recently closed open resolver and reflection attacks

2013-03-07 Thread Mark Andrews
In message , Roy Arends writes: > [1] BIND responds with SERVFAIL to a query where the QNAME is longer than 255 > bytes. When all the servers for a domain are BIND, th > is often leads to a burst of requests, striped over all the authoritative > servers for that domain. Naturally, a resolver sho

Re: [dns-operations] Recently closed open resolver and reflection attacks

2013-03-07 Thread Roy Arends
On Mar 7, 2013, at 7:06 AM, Edward Lewis wrote: > > On Mar 6, 2013, at 20:33, Paul Vixie wrote: >> if the authority server in question is configured to be a primary or >> secondary server for a zone which is at or above the qname, then the correct >> answer is either authoritative-positive, au

Re: [dns-operations] Recently closed open resolver and reflection attacks

2013-03-07 Thread Vernon Schryver
> From: Edward Lewis > We chose SERVFAIL instead of REFUSED for that - in the sense that the = > service failed by sending the querier to the wrong place. I don't think = > either is better than the other, just saying this because it's not = > always clear what's the right RCODE. It seems at be

Re: [dns-operations] Recently closed open resolver and reflection attacks

2013-03-07 Thread Edward Lewis
On Mar 6, 2013, at 20:33, Paul Vixie wrote: > if the authority server in question is configured to be a primary or > secondary server for a zone which is at or above the qname, then the correct > answer is either authoritative-positive, authoritative-negative, or servfail. Or a non-authoritativ

Re: [dns-operations] Recently closed open resolver and reflection attacks

2013-03-07 Thread nudge
On Wed, Mar 6, 2013 Vernon Schryver wrote: ... > A few recursive servers such as those at 8.8.8.8 apparently want to > attract requests from the whole Internet. I agree that most recursive > servers should know their client bases by IP address or authenticating > token, but in practice that has pr

Re: [dns-operations] Recently closed open resolver and reflection attacks

2013-03-06 Thread Paul Vixie
Scott Brynen wrote: > if you're not using the absolute latest bind, you can do a quick and nasty > using IPTABLES. likewise ipfw. however, these would be request-based thresholds, which has an unacceptably high rate of both false positive and false negative. i strongly recommend against this ap

Re: [dns-operations] Recently closed open resolver and reflection attacks

2013-03-06 Thread Paul Vixie
... wbr...@e1b.org wrote: > I mistakenly wrote on 03/06/2013 11:36:20 AM: > >> Given that no properly configured server should be querying this > recursive >> name server for isc.org, > > I meant to describe it as an authoritative server. Duh. I'm having one of > those days > > Sorry for

Re: [dns-operations] Recently closed open resolver and reflection attacks

2013-03-06 Thread Mark Andrews
In message , wbr...@e1b.org writes: > I recently help close down an open recursive resolver. It is still > getting a lot of queries for isc.org/ANY which get a refused response > (unless slipped/dropped by RRL). Granted, this doesn't amplify the attack > since REFUSED is a fairly small packe

Re: [dns-operations] Recently closed open resolver and reflection attacks

2013-03-06 Thread Casey Deccio
On Wed, Mar 6, 2013 at 10:12 AM, Vernon Schryver wrote: > > From: Casey Deccio > > > > Seems like a REFUSED response fits into its own RRL category. Is there > any > > reason why name servers wouldn't simply drop them if they exceed the > > configured RRL threshold--or even perhaps a lower thre

Re: [dns-operations] Recently closed open resolver and reflection attacks

2013-03-06 Thread WBrown
Joe Abley wrote on 03/06/2013 12:49:22 PM: > On 2013-03-06, at 12:36, wbr...@e1b.org wrote: > > > Is there any reason why recursive queries to an authoritative server that > > would normally get a REFUSED reply shouldn't be dropped instead of getting > > an answer? > > There's no amplificat

Re: [dns-operations] Recently closed open resolver and reflection attacks

2013-03-06 Thread Vernon Schryver
> From: Casey Deccio > On Wed, Mar 6, 2013 at 8:36 AM, wrote: > > (unless slipped/dropped by RRL). Granted, this doesn't amplify the attack > > since REFUSED is a fairly small packet, but it is still traffic to the > > attacked site. > Seems like a REFUSED response fits into its own RRL categ

Re: [dns-operations] Recently closed open resolver and reflection attacks

2013-03-06 Thread Scott Brynen
if you're not using the absolute latest bind, you can do a quick and nasty using IPTABLES. Basically; if you get more than 12 hits in 75 seconds from the same IP, start dropping them. There are few DNS situations where a client would make that many requests back to back to back, and even if yo

Re: [dns-operations] Recently closed open resolver and reflection attacks

2013-03-06 Thread WBrown
I mistakenly wrote on 03/06/2013 11:36:20 AM: > Given that no properly configured server should be querying this recursive > name server for isc.org, I meant to describe it as an authoritative server. Duh. I'm having one of those days Sorry for the confusion. So to rephrase the questio

Re: [dns-operations] Recently closed open resolver and reflection attacks

2013-03-06 Thread WBrown
Jo Rhett wrote on 03/06/2013 12:18:26 PM: > > I don't see these recursive requests as much different than spam > > In the case of DNS requests I agree that dropping requests that are > improper makes sense. There's no human sitting there wondering why > they didn't get a response. So how do

Re: [dns-operations] Recently closed open resolver and reflection attacks

2013-03-06 Thread Joe Abley
On 2013-03-06, at 12:36, wbr...@e1b.org wrote: > Is there any reason why recursive queries to an authoritative server that > would normally get a REFUSED reply shouldn't be dropped instead of getting > an answer? > > Maybe now that I've had lunch the brain will work better. There's no amplifi

Re: [dns-operations] Recently closed open resolver and reflection attacks

2013-03-06 Thread Jo Rhett
On Mar 6, 2013, at 8:36 AM, wbr...@e1b.org wrote: > The RFCs state we should either reject during SMTP or if we > accept a message, we should either deliver or generate a delivery failure. Yes. > Now we filter and drop spam on the floor. So you stopped caring about e-mail delivery, huh? Glad

Re: [dns-operations] Recently closed open resolver and reflection attacks

2013-03-06 Thread Joe Abley
On 2013-03-06, at 11:36, wbr...@e1b.org wrote: > I recently help close down an open recursive resolver. It is still > getting a lot of queries for isc.org/ANY which get a refused response > (unless slipped/dropped by RRL). Granted, this doesn't amplify the attack > since REFUSED is a fairly

Re: [dns-operations] Recently closed open resolver and reflection attacks

2013-03-06 Thread Casey Deccio
On Wed, Mar 6, 2013 at 8:36 AM, wrote: > I recently help close down an open recursive resolver. It is still > getting a lot of queries for isc.org/ANY which get a refused response > (unless slipped/dropped by RRL). Granted, this doesn't amplify the attack > since REFUSED is a fairly small packe

[dns-operations] Recently closed open resolver and reflection attacks

2013-03-06 Thread WBrown
I recently help close down an open recursive resolver. It is still getting a lot of queries for isc.org/ANY which get a refused response (unless slipped/dropped by RRL). Granted, this doesn't amplify the attack since REFUSED is a fairly small packet, but it is still traffic to the attacked si