[SOC] FW:RE: [QSL-Net] WebSite Access
[email protected]
[email protected]
Mon, 18 Nov 2002 12:41:57 +0100 (MET)
Hello Zeveribudi,
A bit more info abt QTH/QSL.NET overload, FYI :
<<
From: "Alan L. Waller" <[email protected]>
Subject: RE: [QSL-Net] WebSite Access
Cc: [email protected]
Date: Fri, 15 Nov 2002 12:27:57 -0500
Dick,
It's pretty complex but essentially we were flooded with requests on the
QTH.NET DNS server for domains we are not authoritative for and the resulting
bandwidth consumption slowed the lists down to where the queues were filling
and not flushing so the server loads went sky high and nothing seemed to work.
Took a while to find it and block the offending systems. I probably do not have
them all but I have a script that will report them to me for extermination if
this starts again.
This is what CERT says about the DOS:
Description
We are receiving an increasing number of reports of intruders using nameservers
to execute packet flooding denial of service attacks.
The most common method we have seen involves an intruder sending a large number
of UDP-based DNS requests to a nameserver using a spoofed source IP address.
Any nameserver response is sent back to the spoofed IP address as the
destination. In this scenario, the spoofed IP address represents the victim of
the denial of service attack. The nameserver is an intermediate party in the
attack. The true source of the attack is difficult for an intermediate or a
victim site to determine due to the use of spoofed source addresses.
Because nameserver responses can be significantly larger than DNS requests,
there is potential for bandwidth amplification. In other words, the responses
may consume more bandwidth than the requests. We have seen intruders utilize
multiple nameservers on diverse networks in this type of an attack to achieve a
distributed denial of service attack against victim sites.
In incidents we have seen as of the date of publication, the queries are
usually crafted to request the same valid DNS resource record from multiple
nameservers. The result is many nameservers receiving queries for resources
records in zones for which the nameserver is not authoritative.
73, Al
>>
72!
Claude