Top Banner
Avoiding DNS amplification attacks
7

Avoiding dns amplification attacks

Jan 23, 2018

Download

Technology

Lucas Kauffman
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Avoiding dns amplification attacks

Avoiding DNS amplification attacks

Page 2: Avoiding dns amplification attacks

Who am I?

@deassain

Security Advisor at a Big 4 company

security.stackexchange.com contributor

cloud101.eu

Page 3: Avoiding dns amplification attacks

What is DNS amplification?

Distributed Denial of Service Attack

Abusing flaw in the DNS protocol's architecture

Spamhaus 300 Gbit/s

Page 4: Avoiding dns amplification attacks

Reasons

DNS request vs DNS response (UDP)

Open resolving name servers

No implementation of BCP38

Page 5: Avoiding dns amplification attacks

DNS Request vs Response Size

30 byte request → up to 500 byte response

1 Mbit on your machine → 17 Mbit at the target machine

Amplification

Page 6: Avoiding dns amplification attacks

Open resolvers

Resolves DNS queries for any host

Spoof UDP source to target IP address

Tons of DNS responses end up at the target

Get your machines and disable recursion from the internet! (or the crypto bear will kick your ass )

Page 7: Avoiding dns amplification attacks

BCP38: Ingres Filtering

Works for IPv4

http://tools.ietf.org/html/rfc2827

Upstream providers only allow traffic for IP blocks for which their clients are configured

Cooperation between ISPs