TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

IT Pro confession: I contributed to the DDOS attack against Spamhaus

79 点作者 esalazar大约 12 年前

9 条评论

sciurus大约 12 年前
"""Let's say that you leave your recursive server open to the internet. Now not only can you ask your DNS server for information about other DNS servers on the internet, so can anyone else. If someone asks your server "where is www.google.com" a whole bunch of times then your server starts flooding google.com's DNS servers. For every 1 byte of data sent to your DNS server 50 bytes of traffic end up directed at the target."""<p>This explanation is skipping a key component of a DNS reflection attack. When the attacker makes a DNS request, they spoof their source address so it is the address of the host they want to attack. Thus they send a small request to your DNS server, and your DNS server returns a large response not to them, but to the host they're attacking.
评论 #5455877 未加载
评论 #5456274 未加载
评论 #5455660 未加载
评论 #5456815 未加载
brokentone大约 12 年前
The post slug is the best part of this article by far: "i_accidentally_the_internet" Full current URL in case it gets updated: <a href="http://www.theregister.co.uk/2013/03/28/i_accidentally_the_internet/" rel="nofollow">http://www.theregister.co.uk/2013/03/28/i_accidentally_the_i...</a>
评论 #5457422 未加载
laumars大约 12 年前
I have a couple of name servers I've inherited since starting my job. How would I go about testing these servers to see if they're set up correctly (obviously I'm not interested in the forged UDP packets side of things, only testing to make sure that recursive look ups are disabled).
评论 #5457232 未加载
评论 #5456460 未加载
mindstab大约 12 年前
Whats a simple way to confirm by test your DNS server isn't doing recursion?
评论 #5455944 未加载
评论 #5455759 未加载
metalruler大约 12 年前
I don't understand why it's <i>necessary</i> for the server to be open, and have recursion enabled. I run a couple of authoritative name servers and have seen them used for amplification attacks. Sure, it's not as easy as querying every open recursive DNS server you can find for &#60;single_domain_with_huge_sized_reply&#62;.com, but there's still (literally) billions of unique hostnames on the internet which can be resolved "legitimately" via their authoritative name servers. There is no magical config option to prevent this; the only way to block this type of activity is to analyze traffic to find IPs that are repeatedly sending the same [spoofed] request.
unethical_ban大约 12 年前
Some have suggested that DNS move to TCP, but I don't think that's proper. The nature of DNS lends itself to connectionless, lightweight communication. That said, could the next iteration of DNS implement application-level handshaking?<p>The reason not to do this at layer 4 is because I, in the several minutes of pondering it, think it could break lots of security devices that track connection state across lots of computers in a network. Make some kind of<p><pre><code> C -&#62; S request C &#60;- S ack C -&#62; S yes C &#60;- S lots of data done C -&#62; S request C &#60;- S ack C -&#62; S no done</code></pre>
评论 #5458332 未加载
ajross大约 12 年前
This really is a real issue. My home machine was an open recursor for a while too. I set up a dnsmasq installation and forgot to set an "except-interface" to restrict it to the internal network.<p>I even like to think I know this stuff well, but still got burned. I'm sure at the time my security analysis (if I even thought of the externally-facing issue) was "who cares if I expose a caching nameserver with no sensitive content to the rest of the internet?".
SageRaven大约 12 年前
How disappointing. I thought it was going to be the story of a fed-up email admin breaking down and DoS'ing one of the scourges of the internet.<p>Blacklists are pure evil, and nothing will ever change my opinion of that. They cause far more problems than they solve. Granted, it's usually by idiot, over-zealous mail admins who block on merely being listed anywhere, rather than by weighted score.
评论 #5456116 未加载
评论 #5456062 未加载
sunyc大约 12 年前
one of my server got exposed too, it was being queried for ripe.net