Nytro Posted April 2, 2013 Report Posted April 2, 2013 Alert TA13-088A: DNS Amplification AttacksFrom: US-CERT Alerts <technical-alerts () us-cert gov> Date: Fri, 29 Mar 2013 16:16:20 -0400-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1National Cyber Awareness SystemTA13-088A: DNS Amplification AttacksOriginal release date: March 29, 2013Systems Affected * Domain Name System (DNS) serversOverviewA Domain Name Server (DNS) Amplification attack is a popular form ofDistributed Denial of Service (DDoS) that relies on the use ofpublically accessible open recursive DNS servers to overwhelm a victimsystem with DNS response traffic.DescriptionA Domain Name Server (DNS) Amplification attack is a popular form ofDistributed Denial of Service (DDoS) that relies on the use ofpublically accessible open recursive DNS servers to overwhelm a victimsystem with DNS response traffic. The basic attack technique consists ofan attacker sending a DNS name lookup request to an open recursive DNSserver with the source address spoofed to be the victims address. Whenthe DNS server sends the DNS record response, it is sent instead to thevictim. Because the size of the response is typically considerablylarger than the request, the attacker is able to amplify the volume oftraffic directed at the victim. By leveraging a botnet to performadditional spoofed DNS queries, an attacker can produce an overwhelmingamount of traffic with little effort. Additionally, because theresponses are legitimate data coming from valid servers, it isespecially difficult to block these types of attacks.While the attacks are difficult to prevent, network operators canimplement several possible mitigation strategies. The primary element inthe attack that is the focus of an effective long-term solution is thedetection and elimination of open recursive DNS resolvers. These systemsare typically legitimate DNS servers that have been improperlyconfigured to respond to recursive queries on behalf of any system,rather than restricting recursive responses only to requests from localor authorized clients. By identifying these systems, an organization ornetwork operator can reduce the number of potential resources that theattacker can employ in an attack.ImpactA misconfigured Domain Name System (DNS) server can be exploited toparticipate in a Distributed Denial of Service (DDoS) attack.SolutionDETECTIONSeveral organizations offer free, web-based scanning tools that willsearch a network for vulnerable open DNS resolvers. These tools willscan entire network ranges and list the address of any identified openresolvers.Open DNS Resolver Projecthttp://openresolverproject.orgThe Open DNS Resolver Project has compiled a list of DNS servers thatare known to serve as globally accessible open resolvers. The queryinterface allows network administrators to enter IP ranges in CIDRformat [1].The Measurement Factoryhttp://dns.measurement-factory.comLike the Open DNS Resolver Project, the Measurement Factory maintains alist of Internet accessible DNS servers and allows administrators tosearch for open recursive resolvers [2]. In addition, the MeasurementFactory offers a free tool to directly test an individual DNS resolverto determine if it allows open recursion. This will allow anadministrator to determine if configuration changes are necessary andverify that configuration changes have been effective [3]. Finally, thesite offers statistics showing the number of open resolvers detected onthe various Autonomous System (AS) networks, sorted by the highestnumber found [4].DNSInspecthttp://www.dnsinspect.comAnother freely available, web-based tool for testing DNS resolvers isDNSInspect. This site is similar to The Measurement Factorys ability totest a specific resolver for vulnerability, but offers the ability totest an entire DNS Zone for several other potential configuration andsecurity issues [5].IndicatorsIn a typical recursive DNS query, a client sends a query request to alocal DNS server requesting the resolution of a name or the reverseresolution of an IP address. The DNS server performs the necessaryqueries on behalf of the client and returns a response packet with therequested information or an error [6, page 21]. The specification doesnot allow for unsolicited responses. In a DNS amplification attack, thekey indicator is a query response without a matching request.MITIGATIONUnfortunately, due to the overwhelming traffic volume that can beproduced by one of these attacks, there is often little that the victimcan do to counter a large-scale DNS amplification-based distributeddenial-of-service attack. While the only effective means of eliminatingthis type of attack is to eliminate open recursive resolvers, thisrequires a large-scale effort by numerous parties. According to the OpenDNS Resolver Project, of the 27 million known DNS resolvers on theInternet, approximately 25 million pose a significant threat of beingused in an attack [1]. However, several possible techniques areavailable to reduce the overall effectiveness of such attacks to theInternet community as a whole. Where possible, configuration links havebeen provided to assist administrators with making the recommendedchanges. The configuration information has been limited to BIND9 andMicrosofts DNS Server, which are two widely deployed DNS servers. If youare running a different DNS server, please see your vendorsdocumentation for configuration details.Source IP VerificationBecause the DNS queries being sent by the attacker-controlled clientsmust have a source address spoofed to appear as the victims system, thefirst step to reducing the effectiveness of DNS amplification is forInternet Service Providers to deny any DNS traffic with spoofedaddresses. The Network Working Group of the Internet Engineering TaskForce released a Best Current Practice document in May 2000 thatdescribes how an Internet Service Provider can filter network traffic ontheir network to drop packets with source addresses not reachable viathe actual packets path [7]. This configuration change wouldconsiderably reduce the potential for most current types of DDoSattacks.Disabling Recursion on Authoritative Name ServersMany of the DNS servers currently deployed on the Internet areexclusively intended to provide name resolution for a single domain.These systems do not need to support resolution of other domains onbehalf of a client, and therefore should be configured with recursiondisabled.Bind9Add the following to the global options [8]:options { allow-query-cache { none; }; recursion no;};Microsoft DNS ServerIn the Microsoft DNS console tool [9]: * Right-click the DNS server andclick Properties. * Click the Advanced tab. * In Server options, select the Disable recursion check box, and thenclick OK.Limiting Recursion to Authorized ClientsFor DNS servers that are deployed within an organization or ISP tosupport name queries on behalf of a client, the resolver should beconfigured to only allow queries on behalf of authorized clients. Theserequests should typically only come from clients within theorganizations network address range.BIND9In the global options, add the following [10]:acl corpnets { 192.168.1.0/24; 192.168.2.0/24; };options { allow-query { corpnets; }; allow-recursion { corpnets; };};Microsoft DNS ServerIt is not currently possible to restrict recursive DNS requests to aspecific client address range in Microsoft DNS Server. The mosteffective means of approximating this functionality is to configure theinternal DNS server to forward queries to an external DNS server andrestrict DNS traffic in the firewall to restrict port 53 UDP traffic tothe internal server and the external forwarder [11].Rate Limiting Response of Recursive Name ServersThere is currently an experimental feature available as a set of patchesfor BIND9 that allows an administrator to restrict the number ofresponses per second being sent from the name server [12]. This isintended to reduce the effectiveness of DNS amplification attacks byreducing the volume of traffic coming from any single resolver.BIND9On BIND9 implementation running the RRL patches, add the following linesto the options block of the authoritative views [13]:rate-limit { responses-per-second 5; window 5;};Microsoft DNS ServerThis option is currently not available for Microsoft DNS Server.References * [1] Open DNS Resolver Project * [2] The Measurement Factory, "List Open Resolvers on Your Network" * [3] The Measurement Factory, "Open Resolver Test" * [4] The Measurement Factory, "Open Resolvers for Each AutonomousSystem" * [5] "DNSInspect," DNSInspect.com * [6] RFC 1034: DOMAIN NAMES - CONCEPTS AND FACILITIES * [7] BCP 38: Network Ingress Filtering: Defeating Denial of ServiceAttacks which employ IP Source Address Spoofing * [8] Chapter 3. Name Server Configuration * [9] Disable recursion on the DNS server * [10] Chapter 7. BIND 9 Security Considerations * [11] Configure a DNS Server to Use Forwarders * [12] DNS Response Rate Limiting (DNS RRL) * [13] Response Rate Limiting in the Domain Name System (DNS RRL)Revision History * March 29, 2013: Initial releaseRelevant URL(s):<http://openresolverproject.org/><http://dns.measurement-factory.com/cgi-bin/openresolverquery.pl><http://dns.measurement-factory.com/cgi-bin/openresolvercheck.pl><http://dns.measurement-factory.com/surveys/openresolvers/ASN-reports/latest.html><http://www.dnsinspect.com/><http://tools.ietf.org/html/rfc1034><http://tools.ietf.org/html/bcp38><http://ftp.isc.org/isc/bind9/cur/9.9/doc/arm/Bv9ARM.ch03.html#id2567992><http://technet.microsoft.com/en-us/library/cc787602.aspx><http://ftp.isc.org/isc/bind9/cur/9.9/doc/arm/Bv9ARM.ch07.html#Access_Control_Lists><http://technet.microsoft.com/en-us/library/cc754941.aspx><http://ss.vix.su/~vixie/isc-tn-2012-1.txt><http://www.redbarn.org/dns/ratelimits>____________________________________________________________________ Produced by US-CERT, a government organization.____________________________________________________________________This product is provided subject to this Notification: http://www.us-cert.gov/privacy/notification/Privacy & Use policy: http://www.us-cert.gov/privacy/This document can also be found athttp://www.us-cert.gov/ncas/alerts/TA13-088AFor instructions on subscribing to or unsubscribing from this mailing list, visit http://www.us-cert.gov/mailing-lists-and-feeds/-----BEGIN PGP SIGNATURE-----Version: GnuPG v1.4.5 (GNU/Linux)iQEVAwUBUVXuq3dnhE8Qi3ZhAQIBXAf+LICtxQHGu5j7x8NAFG+tTSWrjducZ37voWhQuSsXp9XjwAN1RdXOZRpX2Sbp5b1bVZ+FfjdPljoRVpoRksuBu5qOfzathZEP3aRA7O0Kffuk2ofCsn8I9nWOas7bZa9gO8hGan4ORjEJLt4OWFtPW+2aWfDKY72xlcky1Ms6Z1TGkCTgJLuoUXXmGg8JQJqvRfkc7VAY4ttpJV1/DtpMIZyf2Hbr4inpClnGYi64ukzu38kYkQ33u3oPKjYX8bwWKAZRnpQAcHO8ddswKre7Cz2Ar5tTNluY0/nzEAx6BVAKgntp5NUJ8y55ej+RyEQiCpBAkhE8xImmxAUPJ7AiMw===FVTl-----END PGP SIGNATURE-----Sursa: CERT: Alert TA13-088A: DNS Amplification Attacks Quote