Misconfigured Open DNS Resolvers Key To Massive DDoS Attacks 179
msm1267 writes with an excerpt From Threat Post: "While the big traffic numbers and the spat between Spamhaus and illicit webhost Cyberbunker are grabbing big headlines, the underlying and percolating issue at play here has to do with the open DNS resolvers being used to DDoS the spam-fighters from Switzerland. Open resolvers do not authenticate a packet-sender's IP address before a DNS reply is sent back. Therefore, an attacker that is able to spoof a victim's IP address can have a DNS request bombard the victim with a 100-to-1 ratio of traffic coming back to them versus what was requested. DNS amplification attacks such as these have been used lately by hacktivists, extortionists and blacklisted webhosts to great success."
Running an open DNS resolver isn't itself always a problem, but it looks like people are enabling neither source address verification nor rate limiting.
First post (Score:5, Funny)
In before the fight between those two guys and their walls of text...
Re:First post (Score:5, Funny)
Re:Why are people not being alerted? (Score:5, Funny)
There are over 25 million known open DNS resolvers [openresolverproject.org] that can be used in DNS amplification attacks. Directly contacting the administrators of all the servers used in the attack is not a tractable problem
It sounds like the solution is to send out a huge amount of unsolicited email.
Oh, wait ...
Re:Why are people not being alerted? (Score:5, Funny)
There are over 25 million known open DNS resolvers [openresolverproject.org] that can be used in DNS amplification attacks. Directly contacting the administrators of all the servers used in the attack is not a tractable problem
It sounds like the solution is to send out a huge amount of unsolicited email.
Oh, wait ...
Well we could do a kickstarter, and hire our friends at Cyberbunker to host the email sending...