ðòïåëôù 


  áòèé÷ 


Apache-Talk @lexa.ru 

Inet-Admins @info.east.ru 

Filmscanners @halftone.co.uk 

Security-alerts @yandex-team.ru 

nginx-ru @sysoev.ru 

  óôáôøé 


  ðåòóïîáìøîïå 


  ðòïçòáííù 



ðéûéôå
ðéóøíá














     áòèé÷ :: Security-alerts
Security-Alerts mailing list archive (security-alerts@yandex-team.ru)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[security-alerts] DNS query as DOS amplifier




> -----Original Message-----
> From: Florian Weimer [mailto:fw@xxxxxxxxxxxxx] 
> Sent: Tuesday, November 29, 2005 7:43 PM
> To: Piotr Kamisiski
> Cc: bugtraq@xxxxxxxxxxxxxxxxx
> Subject: Re: DNS query spam
> 
> * Piotr Kamisiski:
> 
> > 23:05:40.241026 IP 204.92.73.10.40760 > xx.xx.xx.xx.53:  
> 38545+ [1au] ANY ANY? e.mpisi.com. (40)
> 
> 
> 204.92.73.10 is one of the IP addresses for irc.efnet.ca.  Someone is
> spoofing the source addresses, in the hope that DNS servers will
> return a large record set.
> 
> Could you check if the packets contain OPT records (e.g. using
> "tcpdump -s 0 -v")?  This protocol extension is described in the RFC
> for ENDS0 (RFC 2671).  EDNS0-capable DNS resolvers can send fragmented
> UDP packets, exceeding the traditional 512 byte limit of DNS UDP
> replies.  The BIND 9 default maximum response size is 4096, for
> example.
> 
> If the spoofed requests contain OPT records , you typically get an
> amplification factor of about 60 in terms of bandwidth, and 5 in terms
> of packet rate, but actual numbers may vary.
> 
> Yet another reason to restrict access to your recursive resolvers to
> customers only.
> 




 




Copyright © Lexa Software, 1996-2009.