[Infowarrior] - DNS Problem Linked to DDoS Attacks Gets Worse

Richard Forno rforno at infowarrior.org
Sat Nov 14 05:06:07 UTC 2009


DNS Problem Linked to DDoS Attacks Gets Worse
By Robert McMillan, IDG News Service - Fri Nov 13, 2009 4:20PM EST

http://tech.yahoo.com/news/pcworld/20091113/tc_pcworld/dnsproblemlinkedtoddosattacksgetsworse

Internet security experts say that misconfigured DSL and cable modems  
are worsening a well-known problem with the Internet's DNS (domain  
name system), making it easier for hackers to launch distributed  
denial-of-service (DDoS) attacks against their victims.
According to research set to be released in the next few days, part of  
the problem is blamed on the growing number of consumer devices on the  
Internet that are configured to accept DNS queries from anywhere, what  
networking experts call an "open recursive" or "open resolver" system.  
As more consumers demand broadband Internet, service providers are  
rolling out modems configured this way to their customers said Cricket  
Liu, vice president of architecture with Infoblox, the DNS appliance  
company that sponsored the research. "The two leading culprits we  
found were Telefonica and France Telecom," he said.

In fact, the percentage of DNS systems on the Internet that are  
configured this way has jumped from around 50 percent in 2007, to  
nearly 80 percent this year, according to Liu.

Though he hasn't seen the Infoblox data, Georgia Tech Researcher David  
Dagon agreed that open recursive systems are on the rise, in part  
because of "the increase in home network appliances that allow  
multiple computers on the Internet."

"Almost all ISPs distribute a home DSL/cable device," he said in an e- 
mail interview. "Many of the devices have built-in DNS servers. These  
can sometimes ship in 'open by default' states."

Because modems configured as open recursive servers will answer DNS  
queries from anyone on the Internet, they can be used in what's known  
as a DNS amplification attack.

In this attack, hackers send spoofed DNS query messages to the  
recursive server, tricking it into replying to a victim's computer. If  
the bad guys know what they're doing, they can send a small 50 byte  
message to a system that will respond by sending the victim as much as  
4 kilobytes of data. By barraging several DNS servers with these  
spoofed queries, attackers can overwhelm their victims and effectively  
knock them offline.

DNS experts have known about the open recursive configuration problem  
for years, so it's surprising that the numbers are jumping up.

However, according to Dagon, a more important issue is the fact that  
many of these devices do not include patches for a widely publicized  
DNS flaw discovered by researcher Dan Kaminsky last year. That flaw  
could be used to trick the owners of these devices into using Internet  
servers controlled by hackers without ever realizing that they've been  
duped.

Infoblox estimates that 10 percent of the open recursive servers on  
the Internet have not been patched.

The Infoblox survey was conducted by The Measurement Factory, which  
gets its data by scanning about 5 percent of the IP addresses on the  
Internet. The data will be posted here in the next few days.

According to Measurement Factory President Duane Wessels, DNS  
amplification attacks do occur, but they're not the most common form  
of DDoS attack. "Those of us that track these and are aware of it tend  
to be a little bit surprised that we don't see more attacks that use  
open resolvers," he said. "It's kind of a puzzle."

Wessels believes that the move toward the next-generation IPv6  
standard may be inadvertently contributing to the problem. Some of the  
modems are configured to use DNS server software called Trick or Tread  
Daemon (TOTd) -- which converts addresses between IPv4 and IPv6  
formats. Often this software is configured as an open resolver,  
Wessels said.


More information about the Infowarrior mailing list