.tr DDoS Attack December 2015 Attila zgit .tr ccTLD Manager Dec, - - PowerPoint PPT Presentation

tr ddos attack
SMART_READER_LITE
LIVE PREVIEW

.tr DDoS Attack December 2015 Attila zgit .tr ccTLD Manager Dec, - - PowerPoint PPT Presentation

.tr DDoS Attack December 2015 Attila zgit .tr ccTLD Manager Dec, 2015 .tr DDoS Attack A Summary of a 3 weeks long experience 2016-03-07 Dec 2015 DDoS Attack on .TR 2 Before DDoS q Infrequent Small scale DoS and DDos Attacks Few


slide-1
SLIDE 1

.tr DDoS Attack

December 2015

Attila Özgit

.tr ccTLD Manager

slide-2
SLIDE 2

2016-03-07 Dec 2015 DDoS Attack on .TR 2

A Summary of a 3 weeks long experience …

Dec, 2015 .tr DDoS Attack

slide-3
SLIDE 3

Before DDoS

q Infrequent Small scale DoS and DDos Attacks

§ Few times every year § 5-30 mins. each § Mostly to our registry services

² www.nic.tr

q 6 NS at 5 different locations

§ All open source

² Linux, Bind, NSD

§ Average Bandwidth: 1.5 Mbps per server § 1.250 QPS per server

2016-03-07 Dec 2015 DDoS Attack on .TR 3

slide-4
SLIDE 4

Communication Infrastructure

q 3 major ISPs serving TR Internet

§ Each connected to Tier-1 at various locations

² No topology info on our side

§ Abstraction: 3 major pipes to TR

q 4 NSs downstream of ISP-A q 1 NS downstream of ISP-B q 1 NS @Europe

2016-03-07 Dec 2015 DDoS Attack on .TR 4

slide-5
SLIDE 5

Anatomy of the DDoS

2016-03-07 Dec 2015 DDoS Attack on .TR 5

slide-6
SLIDE 6

DDoS Attack

q Started at 14 December 2015 10:20

§ Went on nearly for 3 weeks § Towards the end, changed its target to Finance and Government sectors

q Basically a “DNS (UDP) Amplification Attack”

§ Botnets sending spoofed query packets to

² Open DNS resolvers ² Authoritative DNS servers (no rate limiting)

§ Amplified by 10-150 times by victims § %25 of victims are from TR IPs § Targets 6 NS Servers § Secondary target was our registry services (Web)

2016-03-07 Dec 2015 DDoS Attack on .TR 6

slide-7
SLIDE 7

During the Attack …

q Mainly between 09:00-17:00

§ Working hours! (1st shift) § 185.000 QPS per server

q Reduced rate and different nature of attack during 2nd

and 3rd shift

q All NSs were almost always up

§ Reachability and delay problems due to overloaded pipes

q Volume

§ One ISP reported 220 Gbps attack bandwidth § No synchronized picture of attack history

q Might be one of the largest DDoS attack observed at

the time

2016-03-07 Dec 2015 DDoS Attack on .TR 7

slide-8
SLIDE 8

Basic Defense Mechanisms

q Make the surface to be attacked wider

§ Increasing the # of NSs

q Analyze traffic

§ Figure out drop rules to be used

q Adaptively react by reconfiguring mitigation

services and devices

§ Attackers were highly adaptive to our defence

2016-03-07 Dec 2015 DDoS Attack on .TR 8

slide-9
SLIDE 9

Observations

q Major attack classes

§ UDP flooding § Spoofed packets

² Source Port 53, Destination Port 53 ² … ² Almost all known attack patterns q Other attacks

§ Application attacks

² TCP based q No Ingress/Egress filtering in subnets q 8% of registered NSs in our registry DB are “Open

Resolvers”

2016-03-07 Dec 2015 DDoS Attack on .TR 9

slide-10
SLIDE 10

Observations and Lessons

q Importance of quick RZM mechanisms

§ Updates were not quick enough

² DOC Checks (Not Anymore) q Effective communication mechanisms

§ Within the registry tech team

² Use of Near Real Time technologies (Chat, etc.)

§ Between Registry and Upstream Operator

² Tech team correspondance

§ Critical communication should be in written form

² Rules to be coded

§ All critical communication should be tolerant to DNS failures

2016-03-07 Dec 2015 DDoS Attack on .TR 10

slide-11
SLIDE 11

Observations and Lessons

q Effective (and concurrent) communication

with

§ IANA/ICANN § Other ccTLDs § Other organizations within the country

² National CERT

§ Press (Media) § Upstream operators

2016-03-07 Dec 2015 DDoS Attack on .TR 11

slide-12
SLIDE 12

After the Attack

q Infrequent, relatively light, 5-10 minutes DDoS

Attacks are still coming in

q Administrative measures

§ List of critical domain names (Gov, Banks, etc.) expanded

² 100 à 600 à 1.000+

q Temporarily

§ Zone Updates are done 3 times per day § Manual inspection of zone updates

2016-03-07 Dec 2015 DDoS Attack on .TR 12

slide-13
SLIDE 13

Current DNS infrastructure

q 8 ns for tr.

§ 2 of 8 are ANYCAST (DynDNS)

q 12 ns for second level (com.tr , gov.tr etc…)

§ 3 of 12 are ANYCAST (DynDNS, PCH)

q With ANYCAST 100+ DNS servers q Isolated zone creation

§ Locked critical names § Automated security checks § Security checks by humans

q Multiple hidden master servers

2016-03-07 Dec 2015 DDoS Attack on .TR 13

slide-14
SLIDE 14

Thank You

2016-03-07 Dec 2015 DDoS Attack on .TR 14

J