Subscribe to RSS News Feed
About Spamhaus  |  Press Office  |  FAQs   

2014-02-26 04:01:23 UTC, by Chris Thompson
Recent News Articles

Network Hijacking on the Rise

Subscription Bombing: COI, CAPTCHA, and the Next Generation of Mail Bombs

More Domain Stats: The 10 Most Abused Registrars

SBL/ZEN DNS lookups to return DROP/eDROP status

Spamhaus Presents: The World's Worst Top Level Domains

Verizon Routing Millions of IP Addresses for Cybercrime Gangs

Brazilian internet users suffer SoftLayer's security fail

Network under attack? You might be surprised where that's coming from!

Older News Articles:
Spamhaus News INDEX

ICANN's Security and Stability Advisory Committee (SSAC) document Advisory on DDoS Attacks Leveraging DNS Infrastructure, published this week, provides a much-needed touchstone for the Internet in its current state. DDoS attacks, such as the one directed at Spamhaus last spring, continue to grow in size. Their magnitude poses a threat to the very fabric of the Internet and limits hosting choices among the Internet business community to a very small set of service providers, which is not healthy for either the 'net or for businesses. That doesn't even consider the immense damage to sites taken offline by such criminal acts, and DDoS is often accompanied by further criminal extortion attempts. When potential state actors are factored in alongside vandals and criminals, the risk of severe Internet instability due to DDoS is untenably high.

Notable in the ICANN SSAC report are the suggestions regarding BCP 38 (also RFC 2827) on pages 12-14. BCP 38, published in 2000, is still the best current practice of ingress traffic filtering at the periphery of Internet connected networks in order to reduce the effectiveness of source address spoofing in denial of service attacks, and proper implementation of those practices effectively stops the reflection attack vectors which are so common these days. While full implementation of BCP 38 at all nodes on all networks is a lofty goal, not easily achievable, there are networks on the Internet which so badly fail to do any implementation of BCP 38 that they are well known by the bad actors and widely used as platforms to launch their attacks. Adoption of BCP 38 by those networks is a low hanging fruit in the goal of DDoS risk abatement.

That ICANN SSAC report focuses on the open DNS resolver problem, and it's a big problem. According to the Open Resolver Project there are about 28 million DNS resolvers on the Internet which presently are configured in such a way that they pose a threat to the rest of the 'net at large. While that's a whole lot of machines which need reconfiguration, the problem is not unsolvable. New DNS servers should default to a secure configuration, and education and awareness efforts can bring many existing machines into compliance. Still, open resolvers are a present and persistent DDoS threat for years to come.

The report doesn't cover NTP servers, another common vector of DDoS popular with miscreants over the past year. The Open NTP Project is amassing information about open NTP servers and ways to secure them. (Hint: it's easy for most system admins to fix!) There are still other protocols which can also be abused in reflected DDoS attacks, so just fixing one set of problems won't make all DDoS stop, but each server secured is one less source of attack ammunition for the bad guys.

Spamhaus thanks ICANN SSAC for that report, encourages all network admins and operators to read up on it and secure their servers, and strongly supports all efforts to implement BCP 38.

Additional reading: - BCP 84, RFC 3704 - Ingress Filtering for Multihomed Networks - Modeling Internet-Scale Policies for Cleaning up Malware!-is-regulation-the-answer/d/d-id/1114050 - DDoS Attack! Is Regulation The Answer? - ALERT: NTP-Based Distributed Denial of Service Attacks Prevent your institution from being an unwitting partner in these attacks - The biggest DDoS attack in history, all due to DNS - Comcast/Xfinity: Preventing Network Spoofing

Spamhaus Information

Press Office
Spamhaus News Index
Spamhaus in the media
About Spamhaus
Spamhaus Official Statements
Article Information

Permanent link to this news article:

Subscribe to RSS News Feed
Spamhaus News Quotes

Permission to quote from or reproduce Spamhaus News articles is granted automatically providing you state the source as Spamhaus and link to the news record.
© 1998-2016 The Spamhaus Project Ltd. All rights reserved.
Legal  |  Privacy