SlideShare a Scribd company logo
1 of 27
Download to read offline
© 2014 ISC
Pseudo Random DNS Query
Attacks & Resolver
Mitigation Approaches
APRICOT 2015
© 2014 ISC
The attacks
§  Began in February
2014
§  Attack intent is to
DDoS DNS
authoritative
provider, but
incidentally
degrades ISP
resolvers
© 2014 ISC
The parties involved
Target of the DDOS
Authoritative provider
Initiator of
DDoS
traffic
•  Sometimes this is an
extortion attack
•  Frequently seems to
originate and terminate in
China
•  Target domain may be
hosted with many non-
targeted domains
•  Targets hop from provider
to provider
© 2014 ISC
Identifying the attack
high volume of queries for non-
existent sub-domains

<randomstring>.www.example.com

<anotherstring>.www.example.com


exists"does not exist"
© 2014 ISC
Attack begins
Target of the DDOS
Authoritative provider
ISP
resolvers
Insecure
Home
gateways
Initiator of
DDoS
traffic
2. Attempt to
resolve
1. Requests for
randomstring.www.example.com
Home users
are unaware
example.com
nothing
about this in
the cache
© 2014 ISC
Initially, the target responds
Target of the DDOS
Authoritative provider
ISP
resolvers
Insecure
Home
gateways
Initiator of
DDoS
traffic
3. Server
replies “no
such domain”
Home users
are unaware
4. Reply (NXDOMAIN)
example.com
© 2014 ISC
More requests flood in
Target of the DDOS
Authoritative provider
ISP
resolvers
Insecure
Home
gateways
Initiator of
DDoS
traffic
1. More requests for
randomstrings.www.example.com
Home users
are unaware
example.com
© 2014 ISC
Target is overwhelmed
Target of the DDOS
Authoritative provider
ISP
resolvers
Insecure
Home
gateways
Initiator of
DDoS
traffic
2. Attempt to
resolve
3. Server is
unresponsive
Home users
are unaware
example.com
© 2014 ISC
Resolver is degraded
Target of the DDOS
Authoritative provider
ISP
resolvers
Insecure
Home
gateways
Initiator of
DDoS
traffic
3. Server is
unresponsive
Home users
are unaware
example.com
Waiting for
responsesWaiting for
responsesWaiting for
responses
© 2014 ISC
Legitimate queries fail
Target of the DDOS
Authoritative provider
ISP
resolvers
Insecure
Home
gateways
Initiator of
DDoS
traffic
1. Request for www.example.com
Home users
are unaware
Waiting for
responsesWaiting for
responsesWaiting for
responses
© 2014 ISC
© 2014 ISC
MITIGATION TECHNIQUES
What can we do?

What has been tried in production?
© 2014 ISC
Option 1: “hair on fire”
© 2014 ISC
© 2014 ISC
Create a local answer
Ø  Make recursive server temporarily
authoritative for the target domain

§  Problem of false-positives (might need
white-lists if using scripted detection)
§  Manual configuration change
§  Need to undo the mitigation afterwards
© 2014 ISC
Create a local answer
Target of the DDOS
Authoritative provider
ISP
resolvers
Insecure
Home
gateways
Initiator of
DDoS
traffic
1. Requests for
randomstring.www.example.com
Home users
are unaware
Auth for
example.com
2. Reply (NXDOMAIN)
example.com
© 2014 ISC
Option 2: Consider
Automated filtering
(Near) Real Time Block
Lists
§  Detect ‘bad’ domain names
or just the problematic
queries & filter them at
ingress to the resolver
§  Nominum Vantio
§  BIND DNS-RPZ
§  There are usually fees
associated with feeds
© 2014 ISC
Option 3: Consider making
your resolvers smarter
Monitor
responses vs
timeouts
Throttle back
queries
Monitor
responses vs
timeouts
Adjust throttle
© 2014 ISC
Smarter Resolver
Target of the DDOS
Authoritative provider
ISP
resolvers
Insecure
Home
gateways
Initiator of
DDoS
traffic
2. Attempt to
resolve, less
frequently as
needed
1. Requests for
randomstring.www.example.com
Home users
are unaware
Detect &
adapt
4. Reply (NXDOMAIN or SERVFAIL)
example.com
3. Detect
when auth
server
returns to
health
© 2014 ISC
PERSERVER
PERZONE
© 2014 ISC
fetches-per-server
§  Per-server quota dynamically re-sizes
itself based on the ratio of timeouts
to successful responses
§  Completely non-responsive server
eventually scales down to fetches
quota of 2% of configured limit.
§  Similar in principle to what
NLNetLabs is doing in Unbound
© 2014 ISC
fetches-per-zone
§  Works with unique clients
§  Default 0 (no limit enforced)
§  Tune larger/smaller depending on
normal QPS to avoid impact on
popular domains
§  In practice, this has been the winner
so far for those using BIND
© 2014 ISC
Fetches-per-zone at Jazztel
Spanish triple-play ADSL carrier & ISP
Roberto Rodriguez Navio, Jazztel Networking Engineering
used with permission
© 2014 ISC
Still experimental
§  Some controversy about adaptive
approach vs blacklists
§  Whitelists may be needed
§  Per-server/zone settings
– Configurable override parameters for
fetch limits on a per zone or per server
basis
§  SERVFAIL cache (for client retries)
§  Improved reporting & statistics
© 2014 ISC
Options Summary
1)  Configure your resolver to LIE
answer authoritatively yourself
2)  Configure a BLACK LIST of
domains under attack
possibly subscribe to a feed for this
3)  Consider ADAPTIVE LIMITS

per server

per zone
© 2014 ISC
Ideally, close the open
resolvers!!
www.shadowserver.org
© 2014 ISC
GOOD LUCK!

More Related Content

What's hot

What's hot (20)

DDoS Mitigation Tools and Techniques
DDoS Mitigation Tools and TechniquesDDoS Mitigation Tools and Techniques
DDoS Mitigation Tools and Techniques
 
DDoS Attack Preparation and Mitigation
DDoS Attack Preparation and MitigationDDoS Attack Preparation and Mitigation
DDoS Attack Preparation and Mitigation
 
Ripe71 FastNetMon open source DoS / DDoS mitigation
Ripe71 FastNetMon open source DoS / DDoS mitigationRipe71 FastNetMon open source DoS / DDoS mitigation
Ripe71 FastNetMon open source DoS / DDoS mitigation
 
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruptionCNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
 
CNIT 40: 3: DNS vulnerabilities
CNIT 40: 3: DNS vulnerabilitiesCNIT 40: 3: DNS vulnerabilities
CNIT 40: 3: DNS vulnerabilities
 
Practical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacksPractical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacks
 
CNIT 40: 4: Monitoring and detecting security breaches
CNIT 40: 4: Monitoring and detecting security breachesCNIT 40: 4: Monitoring and detecting security breaches
CNIT 40: 4: Monitoring and detecting security breaches
 
CNIT 40: 1: The Importance of DNS Security
CNIT 40: 1: The Importance of DNS SecurityCNIT 40: 1: The Importance of DNS Security
CNIT 40: 1: The Importance of DNS Security
 
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruptionCNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
 
CNIT 40: 2: DNS Protocol and Architecture
CNIT 40: 2: DNS Protocol and ArchitectureCNIT 40: 2: DNS Protocol and Architecture
CNIT 40: 2: DNS Protocol and Architecture
 
DNS Vulnerabilities
DNS VulnerabilitiesDNS Vulnerabilities
DNS Vulnerabilities
 
CNIT 40: 6: DNSSEC and beyond
CNIT 40: 6: DNSSEC and beyondCNIT 40: 6: DNSSEC and beyond
CNIT 40: 6: DNSSEC and beyond
 
DDoS Open Threat Signaling (DOTS) Working Group Presentation on draft-ietf-do...
DDoS Open Threat Signaling (DOTS) Working Group Presentation on draft-ietf-do...DDoS Open Threat Signaling (DOTS) Working Group Presentation on draft-ietf-do...
DDoS Open Threat Signaling (DOTS) Working Group Presentation on draft-ietf-do...
 
NANOG32 - DNS Anomalies and Their Impacts on DNS Cache Servers
NANOG32 - DNS Anomalies and Their Impacts on DNS Cache ServersNANOG32 - DNS Anomalies and Their Impacts on DNS Cache Servers
NANOG32 - DNS Anomalies and Their Impacts on DNS Cache Servers
 
10 DDoS Mitigation Techniques
10 DDoS Mitigation Techniques10 DDoS Mitigation Techniques
10 DDoS Mitigation Techniques
 
CNIT 40: 4: Monitoring and detecting security breaches
CNIT 40: 4: Monitoring and detecting security breachesCNIT 40: 4: Monitoring and detecting security breaches
CNIT 40: 4: Monitoring and detecting security breaches
 
DNS Security
DNS SecurityDNS Security
DNS Security
 
Grey H@t - DNS Cache Poisoning
Grey H@t - DNS Cache PoisoningGrey H@t - DNS Cache Poisoning
Grey H@t - DNS Cache Poisoning
 
DNS Cache White Paper
DNS Cache White PaperDNS Cache White Paper
DNS Cache White Paper
 
DepenDNS Analysis
DepenDNS AnalysisDepenDNS Analysis
DepenDNS Analysis
 

Viewers also liked

Viewers also liked (9)

DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS AttacksDNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks
 
DNS Attacks
DNS AttacksDNS Attacks
DNS Attacks
 
Dns Amplification Zafiyeti
Dns Amplification ZafiyetiDns Amplification Zafiyeti
Dns Amplification Zafiyeti
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed
 
The DNS Tunneling Blindspot
The DNS Tunneling BlindspotThe DNS Tunneling Blindspot
The DNS Tunneling Blindspot
 
Network Security in 2016
Network Security in 2016Network Security in 2016
Network Security in 2016
 
Dns tunnelling its all in the name
Dns tunnelling its all in the nameDns tunnelling its all in the name
Dns tunnelling its all in the name
 
Network tunneling techniques
Network tunneling techniquesNetwork tunneling techniques
Network tunneling techniques
 
DDoS Attacks
DDoS AttacksDDoS Attacks
DDoS Attacks
 

Similar to Pseudo Random DNS Query Attacks and Resolver Mitigation Approaches

PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS ProtectionPLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PROIDEA
 
Cloudshield_DNS Tips_032014
Cloudshield_DNS Tips_032014Cloudshield_DNS Tips_032014
Cloudshield_DNS Tips_032014
Laura L. Adams
 

Similar to Pseudo Random DNS Query Attacks and Resolver Mitigation Approaches (20)

DNS spoofing/poisoning Attack Report (Word Document)
DNS spoofing/poisoning Attack Report (Word Document)DNS spoofing/poisoning Attack Report (Word Document)
DNS spoofing/poisoning Attack Report (Word Document)
 
Infoblox - turning DNS from security target to security tool
Infoblox - turning DNS from security target to security toolInfoblox - turning DNS from security target to security tool
Infoblox - turning DNS from security target to security tool
 
How DNS works and How to secure it: An Introduction
How DNS works and How to secure it: An IntroductionHow DNS works and How to secure it: An Introduction
How DNS works and How to secure it: An Introduction
 
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr WojciechowskiPLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
 
Automating DDoS Response in the Cloud - SID324 - re:Invent 2017
Automating DDoS Response in the Cloud - SID324 - re:Invent 2017Automating DDoS Response in the Cloud - SID324 - re:Invent 2017
Automating DDoS Response in the Cloud - SID324 - re:Invent 2017
 
(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks
 
IT Infrastrucutre Security
IT Infrastrucutre SecurityIT Infrastrucutre Security
IT Infrastrucutre Security
 
DNS in IR: Collection, Analysis and Response
DNS in IR: Collection, Analysis and ResponseDNS in IR: Collection, Analysis and Response
DNS in IR: Collection, Analysis and Response
 
Day 2 Dns Cert 4a Cache Poisoning
Day 2   Dns Cert 4a Cache PoisoningDay 2   Dns Cert 4a Cache Poisoning
Day 2 Dns Cert 4a Cache Poisoning
 
DNS Advanced Attacks and Analysis
DNS Advanced Attacks and AnalysisDNS Advanced Attacks and Analysis
DNS Advanced Attacks and Analysis
 
bdNOG 7 - Re-engineering the DNS - one resolver at a time
bdNOG 7 - Re-engineering the DNS - one resolver at a timebdNOG 7 - Re-engineering the DNS - one resolver at a time
bdNOG 7 - Re-engineering the DNS - one resolver at a time
 
Re-Engineering the DNS – One Resolver at a Time
Re-Engineering the DNS – One Resolver at a Time Re-Engineering the DNS – One Resolver at a Time
Re-Engineering the DNS – One Resolver at a Time
 
Domain Name System and Dynamic Host Configuration Protocol.pptx
Domain Name System and Dynamic Host Configuration Protocol.pptxDomain Name System and Dynamic Host Configuration Protocol.pptx
Domain Name System and Dynamic Host Configuration Protocol.pptx
 
Cyber-Security Product
Cyber-Security ProductCyber-Security Product
Cyber-Security Product
 
Windows 2012 and DNSSEC
Windows 2012 and DNSSECWindows 2012 and DNSSEC
Windows 2012 and DNSSEC
 
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS ProtectionPLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
 
Monitoring for DNS Security
Monitoring for DNS SecurityMonitoring for DNS Security
Monitoring for DNS Security
 
Cloudshield_DNS Tips_032014
Cloudshield_DNS Tips_032014Cloudshield_DNS Tips_032014
Cloudshield_DNS Tips_032014
 
DDoS Hurts Everyone
DDoS Hurts EveryoneDDoS Hurts Everyone
DDoS Hurts Everyone
 
Anatomy of DDoS - Builderscon Tokyo 2017
Anatomy of DDoS - Builderscon Tokyo 2017Anatomy of DDoS - Builderscon Tokyo 2017
Anatomy of DDoS - Builderscon Tokyo 2017
 

More from APNIC

More from APNIC (20)

APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet development
 

Recently uploaded

( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
nilamkumrai
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Chandigarh Call girls 9053900678 Call girls in Chandigarh
 
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
nirzagarg
 

Recently uploaded (20)

Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceReal Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 

Pseudo Random DNS Query Attacks and Resolver Mitigation Approaches

  • 1. © 2014 ISC Pseudo Random DNS Query Attacks & Resolver Mitigation Approaches APRICOT 2015
  • 2. © 2014 ISC The attacks §  Began in February 2014 §  Attack intent is to DDoS DNS authoritative provider, but incidentally degrades ISP resolvers
  • 3. © 2014 ISC The parties involved Target of the DDOS Authoritative provider Initiator of DDoS traffic •  Sometimes this is an extortion attack •  Frequently seems to originate and terminate in China •  Target domain may be hosted with many non- targeted domains •  Targets hop from provider to provider
  • 4. © 2014 ISC Identifying the attack high volume of queries for non- existent sub-domains <randomstring>.www.example.com
 <anotherstring>.www.example.com
 exists"does not exist"
  • 5. © 2014 ISC Attack begins Target of the DDOS Authoritative provider ISP resolvers Insecure Home gateways Initiator of DDoS traffic 2. Attempt to resolve 1. Requests for randomstring.www.example.com Home users are unaware example.com nothing about this in the cache
  • 6. © 2014 ISC Initially, the target responds Target of the DDOS Authoritative provider ISP resolvers Insecure Home gateways Initiator of DDoS traffic 3. Server replies “no such domain” Home users are unaware 4. Reply (NXDOMAIN) example.com
  • 7. © 2014 ISC More requests flood in Target of the DDOS Authoritative provider ISP resolvers Insecure Home gateways Initiator of DDoS traffic 1. More requests for randomstrings.www.example.com Home users are unaware example.com
  • 8. © 2014 ISC Target is overwhelmed Target of the DDOS Authoritative provider ISP resolvers Insecure Home gateways Initiator of DDoS traffic 2. Attempt to resolve 3. Server is unresponsive Home users are unaware example.com
  • 9. © 2014 ISC Resolver is degraded Target of the DDOS Authoritative provider ISP resolvers Insecure Home gateways Initiator of DDoS traffic 3. Server is unresponsive Home users are unaware example.com Waiting for responsesWaiting for responsesWaiting for responses
  • 10. © 2014 ISC Legitimate queries fail Target of the DDOS Authoritative provider ISP resolvers Insecure Home gateways Initiator of DDoS traffic 1. Request for www.example.com Home users are unaware Waiting for responsesWaiting for responsesWaiting for responses
  • 12. © 2014 ISC MITIGATION TECHNIQUES What can we do? What has been tried in production?
  • 13. © 2014 ISC Option 1: “hair on fire”
  • 15. © 2014 ISC Create a local answer Ø  Make recursive server temporarily authoritative for the target domain §  Problem of false-positives (might need white-lists if using scripted detection) §  Manual configuration change §  Need to undo the mitigation afterwards
  • 16. © 2014 ISC Create a local answer Target of the DDOS Authoritative provider ISP resolvers Insecure Home gateways Initiator of DDoS traffic 1. Requests for randomstring.www.example.com Home users are unaware Auth for example.com 2. Reply (NXDOMAIN) example.com
  • 17. © 2014 ISC Option 2: Consider Automated filtering (Near) Real Time Block Lists §  Detect ‘bad’ domain names or just the problematic queries & filter them at ingress to the resolver §  Nominum Vantio §  BIND DNS-RPZ §  There are usually fees associated with feeds
  • 18. © 2014 ISC Option 3: Consider making your resolvers smarter Monitor responses vs timeouts Throttle back queries Monitor responses vs timeouts Adjust throttle
  • 19. © 2014 ISC Smarter Resolver Target of the DDOS Authoritative provider ISP resolvers Insecure Home gateways Initiator of DDoS traffic 2. Attempt to resolve, less frequently as needed 1. Requests for randomstring.www.example.com Home users are unaware Detect & adapt 4. Reply (NXDOMAIN or SERVFAIL) example.com 3. Detect when auth server returns to health
  • 21. © 2014 ISC fetches-per-server §  Per-server quota dynamically re-sizes itself based on the ratio of timeouts to successful responses §  Completely non-responsive server eventually scales down to fetches quota of 2% of configured limit. §  Similar in principle to what NLNetLabs is doing in Unbound
  • 22. © 2014 ISC fetches-per-zone §  Works with unique clients §  Default 0 (no limit enforced) §  Tune larger/smaller depending on normal QPS to avoid impact on popular domains §  In practice, this has been the winner so far for those using BIND
  • 23. © 2014 ISC Fetches-per-zone at Jazztel Spanish triple-play ADSL carrier & ISP Roberto Rodriguez Navio, Jazztel Networking Engineering used with permission
  • 24. © 2014 ISC Still experimental §  Some controversy about adaptive approach vs blacklists §  Whitelists may be needed §  Per-server/zone settings – Configurable override parameters for fetch limits on a per zone or per server basis §  SERVFAIL cache (for client retries) §  Improved reporting & statistics
  • 25. © 2014 ISC Options Summary 1)  Configure your resolver to LIE answer authoritatively yourself 2)  Configure a BLACK LIST of domains under attack possibly subscribe to a feed for this 3)  Consider ADAPTIVE LIMITS per server per zone
  • 26. © 2014 ISC Ideally, close the open resolvers!! www.shadowserver.org