TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

A Deep Dive into DNS Packet Sizes

68 pointsby thedgabout 9 years ago

7 comments

huevingabout 9 years ago
It's sort of pathetic that our answer to trying to stop DDoS amplification attacks is to cripple public UDP services. It shouldn't be acceptable for an ISP to originate spoofed packets. There is absolutely no excuse for it, yet we continue to accept it as some kind of inevitability and treat symptom after symptom of the same root cause.
评论 #11226134 未加载
评论 #11226401 未加载
评论 #11228500 未加载
评论 #11227057 未加载
StreamBrightabout 9 years ago
It is kind of epic how DJB predicted this.<p>&quot;Domains with DNSSEC, because of the size of some responses, are usually ripe for this type of abuse, and many DNS providers struggle to combat DNSSEC-based DDoS attacks. Just last month, Akamai published a report on attacks using DNS lookups against their DNSSEC-signed .gov domains to DDoS other domains. They say they have seen 400 of these attacks since November.&quot;<p><a href="https:&#x2F;&#x2F;cr.yp.to&#x2F;djbdns&#x2F;forgery.html" rel="nofollow">https:&#x2F;&#x2F;cr.yp.to&#x2F;djbdns&#x2F;forgery.html</a>
评论 #11226804 未加载
评论 #11226820 未加载
ge0rgabout 9 years ago
<i>By implementing ECDSA natively in assembler, he was able to speed up signing by 21x.</i><p>Let&#x27;s hope it is resistant to side-channel attacks[0] ;)<p>[0] <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=11223266" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=11223266</a>
评论 #11226384 未加载
评论 #11227704 未加载
jedisct1about 9 years ago
Resolvers obviously can&#x27;t generate signatures for synthesized responses to ANY queries.<p>So when the DO bit was set, the draft suggests returning unsigned records, because the initiator can then explicitly ask for HINFO and get a signed response.<p>However, resolvers just return SERVFAIL if the response doesn&#x27;t validate. Will Qmail retry with more specific records after a SERVFAIL response code?
axaxsabout 9 years ago
While ECDSA size is nice comparatively, the screenshot is a little misleading if strictly comparing algo sizes. It&#x27;s not showing cloudflare&#x27;s ksk, and cloudflare doesn&#x27;t sign its own KSK (though there&#x27;s no reason to really, but the other domain appears to).
CyberDildonicsabout 9 years ago
It seems like one solution might be to simply not send more data from the DNS server than it has received from the IP it is sending to. You could still spoof an IP and bounce traffic, but then you couldn&#x27;t amplify it.
CyberDildonicsabout 9 years ago
Are there any other protocols that work over UDP and amplify traffic?
评论 #11229181 未加载
评论 #11228979 未加载