2024年5月17日发(作者:4399的经典小游戏)
DNS Amplification Attack
Posted on March 28th, 2006 in Admin, HowTo, Network, Security, Technology
Recently a new type of DNS attack have been discovered. Attackers are exploiting the
recursive name servers to amplify the DDoS attacks by utilizing IP spoofing. If you
want to know the very details of how this attack works then you must read DNS
Amplification Attacks (pdf) by Randal Vaughn and Gadi Evron where they analyze 3
real attacks. Also this Cnet news article have some details about the attack.
At the heart of this attack is the recursive function of DNS servers. This is a very
serious threat because The Measurement Factory in recent survey found that:
“
There are an estimated 7.5 million external DNS servers on the public Internet.
Over 75% of domain name servers (of roughly 1.3 million sampled) allow recursive
name service to arbitrary queriers. This opens a name server to both cache poisoning
and attacks.
Here I’ve drawn the diagrams to explain what is Recursive DNS Query and how DNS
Amplification Attacks work.
Normal DNS query (Recursive)
Step 1: The User’s PC with ip address "My IP Address" makes a DNS query to the
Primary DNS Server configured in it’s TCP/IP properties, asking to resolve the ip
address for .
Step 2 to Step 7 (Recursive Query): User’s Primary DNS Server is not authoritative
for the domain . So, it asks the Root Servers which then points it
to .com Namespace from where it learns about the Primary DNS Server of
, which replies with the IP Address of .
Step 8: The IP Address of is cached in the User’s Primary DNS
Server and it replies to the User’s PC with the IP Address for .
Step 1: The attacker sends a signal to the compromised PCs to start DNS queries.
Step 2: All compromised PCs with spoofed ip address "Victim IP Address" make a
DNS query to the Primary DNS Servers configured in their TCP/IP properties, asking
to resolve the ip address for .
Step 3 to Step 8 (Recursive Query): User’s Primary DNS Servers are not
authoritative for the domain . So, they ask the Root Servers
which then points them to .com Namespace from where they learn about the Primary
DNS Server of , which replies with the IP Address of
.
Step 9: The IP Address of is cached in the User’s Primary DNS
Servers and they reply to the Victim’s Server (Victim IP Address) with the IP Address
for . The reply goes to Victim’s Server because the attacker has
used this Spoofed Source IP address. The matter is made worse because this reply can
be amplified up to factor of 73.
This is how the DNS amplification occurs according to DNS Amplification Attacks:
“
DNS amplification occurs due to the response packet being significantly larger than
that of the query. If an Open Resolver receives an EDNS (RFC 2671) query
containing a large buffer advertisement, its reply to the possibly-spoofed requesting IP
address can be quite large. A DNS query consisting of a 60 byte request can be
answered with responses of over 4000 bytes amplifying the response packet by a
factor of 60.
If, for example, the response consists of a 122 byte A type response, a 4000 byte TXT
response, and a 222 byte SOA response, the total response consists of 4320 bytes.
This yields an amplification factor of 73
Solution:
1. Disable the Recursive functionality of DNS Servers or limit it to the clients in your
network.
2. Separate the DNS Servers that are authoritative to some domains and the ones used
by internal users to resolve the names.
3. Implement some sort of spoofing counter-measures such as those suggested in BCP
38
发布者:admin,转转请注明出处:http://www.yc00.com/xitong/1715887980a2687149.html
评论列表(0条)