DNS AMPLIFICATION LIMITS AND SOLUTIONS - DNSCURVER ALTERNATE TO DNSSEC
What is DNS Amplification Attack ?
Before we understand the DNS Amplification Attack, lets learn about DDoS first. Distributed denial-of-service Attack (DDoS), is a cyber threat looming large on Organizations. It adversely affects the online productivity of individuals too. Anyone who relies on their Internet presence to generate revenue can be a target.
The Security tangent comes in question here. First, let us understand what DoS attack is. A denial of service (DoS) attack is a malicious attempt to make a server or a network resource unavailable to users. This is usually performed by interrupting or suspending the services of a host connected to the Internet.
Distributed DoS (DDoS) attacks are DoS attacks launched from multiple hosts simultaneously. The flood of incoming messages to the target system forces it to shut down or choke bandwidth. Hence, denying service to the legitimate users.
The domain name system (DNS) is one of the most critical service that keep the Internet working. However, it’s also been the most popular target for attackers. A DNS amplification attack is a form of distributed denial of service (DDos) attack that takes benefit from a much larger response generated by a small DNS query. When combined with source address spoofing, an attacker can direct a large volume of network traffic to the target system by initiating relatively small DNS queries.
DNS Amplification Attack, as the name suggests, is a way for an attacker to magnify the bandwidth for targeting a potential victim. By leveraging a botnet to produce a large number of spoofed DNS queries, an attacker can create an immense amount of traffic with little effort. Additionally, because the responses are legitimate data coming from valid servers, it is extremely difficult to prevent these types of attacks. While the attacks are difficult to stop, network operators can apply several possible mitigation strategies.
DNS Amplification Attack: The Scenario
An attacker builds up his army of attack sources (the botnet). He writes large amplification records (e.g., a 4000 byte DNS TXT resource record) in the zone file of the name server he has compromised. Then, the attacker attacks the targeted name server via open recursive servers.
In the image below, the attacker targets a name server at the IP address 10.10.1.1. At the attacker’s signal, all the zombies, the botnets, issue DNS request messages asking for the amplification of records through open recursive servers. The botnet hosts the spoof to the targeted name server by writing 10.10.1.1 in the source IP address field of the IP packets containing their DNS request messages.
In reality, the targeted name server at 10.10.1.1 never issues any DNS request messages. But, it now receives a flurry of responses. The responses contain a 4000 byte DNS TXT record. A message of this size exceeds the maximum (Ethernet) transmission unit. Hence, it is broken into multiple IP packets. This forces reassembly at the destination and increases the processing load at the target and enhances the deception.
The response spans several IP fragments and only the first fragment contains UDP header. The target may not immediately recognize that the attack is DNS-based.
- System Compromise – An attacker doesn’t want to use his own system for performing attacks on other systems. Hence, he launches the attack from systems on which he has gained unauthorized administrative control. The attacker can remotely control and direct the compromised system to initiate a DoS attack.
- Amplification – Amplification, as the name suggests, increases the traffic volume in an attack. In the DNS attack, the attacker uses an extension to the DNS protocol (EDNS0) that enables large DNS messages. The attacker composes a DNS request message of approximately 60 bytes to trigger delivery of a response message of approximately 4000 bytes to the target.
- Impersonation – The IP addresses are impersonated or copied to launch attacks. In the DNS attack, each attacking host uses the targeted name server’s IP address as its source IP address rather than its own. The effect of spoofing /impersonating IP addresses is that the responses to DNS requests is returned to the target rather than the spoofing hosts.
- Recursion- It is a method of processing a DNS request in which a name server performs the request for a client by asking the authoritative name server for the name record.
DNS Amplification Attack Techniques
DNS amplification works on the concept of amplifying the response data to a target server via impersonating the IP address by an attacker. Some of the techniques which can be used for mitigating such attacks are:-
- Source IP Verification: In this process, the Internet Service Provider target filtering on the basis of spoofed IP addresses. The filters are placed on the basis of the routers determining whether the victim’s IP address is reachable via the interface from where the packet is originated. If not, then the packet is rejected. This is termed as Network Ingress Filtering.
- Recursion disabling and restriction on Authoritative name servers: Recursion disabling should be employed on the basis of the domain that the name server caters to. For requests on other domains, the authoritative name server should not perform recursion. As for restrictions, it should be employed for DNS servers present inside an organization’s network so that they perform recursion for authorized clients only.
- Removal of unsecured recursive resolvers: This is deemed as the best way to mitigate such threats. But, due to abundance of open DNS resolvers on the internet, this process is practically infeasible.
- Response Rate Limiting: There is currently an experimental feature available as a set of patches for BIND9 that allows an administrator to limit the maximum number of responses per second being sent to one client from the name server. This functionality is intended to be used on authoritative domain name servers only as it will affect performance on recursive resolvers.
What is a DNS amplification DDoS attack?This technique consists of an attacker sending a DNS name lookup request to an open DNS resolver with the source address spoofed to be the victim’s address. When the DNS server sends the DNS record response, it is sent to the victim (the source address that was used in the spoofed request). Because the size of the response is typically considerably larger than the request, the attacker is able to amplify the volume of traffic directed at the victim (and ironically the introduction of DNSSEC increased the potential amplification factor).
- Apply proper ingress filtering on your network.
- Follow security best practices for configuring DNS and limit recursion.
Correctly designing and configuring your DNS setup actually prevents that someone can abuse your name servers.
Security best practices for configuring DNS and limit recursionLimiting DNS recursion can be done in two places.
First you will have to configure your name server to do only allow recursion for a list of authorized clients.
Secondly we suggest that you apply proper filtering on your firewall. Do not block *all* the DNS queries as this will prevent your clients from using the internet properly. Possibly you can block all the queries except those that are coming from your designated internal recursive name servers. You can also configure your client to use the recursive name servers of your ISP and then only allow the DNS queries related to these servers.
If order to facilitate the ease of this setup we strongly advise you to split your authoritative and recursive name servers. This will prevent configuration errors and makes administration far easier.
There’s no immediate danger involved if you leave your authoritative name servers publicly available on the internet as their replies are typically much smaller.
THE DNS SEC WILL INCREASE THE ATTACK FURTHER AS IT WILL REPLY WITH MORE DATA....
ANSWER FOR DNSSEC LIMITATION IS
DNSCurve: an alternative to DNSSEC
A massive 300Gbps was thrown against Internet blacklist maintainer Spamhaus’ website but the anti-spam organisation , CloudFlare was able to recover from the attack and get its core services back up and running.
Spamhaus, a group based in both London and Geneva, is a non-profit organisation that aims to help email providers filter out spam and other unwanted content. Spamhaus is pretty resilient, as its own network is distributed across many countries, but the attack was still enough to knock its site offline.
The high attack bandwidth was made possible because attackers used misconfigured domain-name service (DNS) servers known as open recursive resolvers or open recursors to amplify a much smaller attack into a larger data flood. Known as DNS reflection, the technique used requests for a relatively large zone file that appeared to be sent from the intended victim’s network.
According to CloudFlare, it initially recorded over 30,000 DNS resolvers that were tricked into participating in the attack. There are as many as 25 million of these open recursive resolvers at the disposal of attackers. The attack was devised by a Dutch hosting company called CyberBunker.