arming the defenseless an incentive based approach to dns
play

Arming the Defenseless: An Incentive-based Approach to DNS - PowerPoint PPT Presentation

Arming the Defenseless: An Incentive-based Approach to DNS Reflection Prevention Casey Deccio, Brigham Young University AIMS 2017 CAIDA, UCSD, La Jolla, CA March 1, 2017 Reflection/Amplification-based DDoS Attack Queries Responses


  1. Arming the Defenseless: An Incentive-based Approach to DNS Reflection Prevention Casey Deccio, Brigham Young University AIMS 2017 CAIDA, UCSD, La Jolla, CA March 1, 2017

  2. Reflection/Amplification-based DDoS Attack Queries Responses ((spoofed)A → B) (B → A) Victim Servers Attackers (Address A) (Globally distributed) (Address B)

  3. DNS Response Rate Limiting (RRL) RRL • Responses rate limited based on: • Frequency of incoming domain name/type/source IP • Responses are small – simply request retry over TCP • Legitimate clients still have a reasonable chance • Weaknesses: • Relies on a threshold • Deals with amplification, but not reflection

  4. DNS Cookies • Server sends cookie to client • Cookie must be included in subsequent requests • Server drops requests from clients that don’t have cookies • Effective for source IP address validation • Weaknesses: • Cannot be effectively enforced www.example.com (NOCOOKIE) COOKIE: 1234 www.example.com (COOKIE:1234) 192.0.2.1 DNS server DNS Client

  5. Source Address Filtering: Best Current Practice 38 (BCP38) • Filter IP packets whose source IP addresses don’t originate in-network • That’s it! Queries ((spoofed)A → B) Victim Servers Attackers (Address A) (Globally distributed) (Address B)

  6. Incentives Increase DNS RRL BCP38 Resources

  7. We either need to incentivize the parties capable of effective solutions or develop effective mechanisms that can be deployed by those with incentive

  8. Network Capability Assertion In a Nutshell • Server enforces source address validation mechanism • on demand; or • all the time • To enforce source address validation • a server performs a lookup of network capabilities; and • ignores requests that don’t validate

  9. Reflection with Enforcement of Source IP Address Validation Queries ((spoofed)A → B) Victim Servers Attackers (Address A) (Globally distributed) (Address B)

  10. Advertising and Detecting Network Capabilities – in the DNS • Publish and lookup in .arpa tree in the DNS arpa • Example: for 192.0.2.1, query the DNS for 2.0.192.in-addr.arpa • Network capabilities specified at 8-bit granularity in-addr • Child inherits default policy from parent 191 192 193 … … • Server assumes defaults until lookup completes 0 2

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend