[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Spoofing ASNs (Re: SNMP DDoS: the vulnerability you might not know you have)
- Subject: Spoofing ASNs (Re: SNMP DDoS: the vulnerability you might not know you have)
- From: hschiller at google.com (Heather Schiller)
- Date: Thu, 22 Aug 2013 15:28:04 -0700
- In-reply-to: <[email protected]>
- References: <CAJvB4t=MFhVNpmBwKdMrcc5ZCQkO1LSpNbsqtJu27WjQd=cpJA@mail.gmail.com> <CE1EA166.16075%[email protected]> <CAJvB4tngwy0rMwvnUSMkEYGPevE8wRBxZBGfKF8vjGA1JpEOHA@mail.gmail.com> <CA+2UFhksZz9Kb0LRO29STMzj-KZchD94ZxvqibMW=R8tAV_ufw@mail.gmail.com> <[email protected]> <CAJvB4tk2S=D+z_kn_6_tEpGiB2feYGbXTBhimtgZfZ5ikTB7yg@mail.gmail.com> <CAAAwwbWCSsp1a7U43NLU=fwMeGXrSUGZEm0ZVwSkiaEmRDKgXg@mail.gmail.com> <CA+2UFhntL-iKdGc7Ev9UbPB-y5QkO5eA=nxFfsmNMq50ZUkPqA@mail.gmail.com> <[email protected]> <[email protected]> <CAEmG1=o_E5K3n8MjmovCE7c2GsYELHX1fb_bsgKQZHFYt_E1oQ@mail.gmail.com> <[email protected]> <[email protected]>
This is the RFC that is being violated:
http://tools.ietf.org/html/rfc5625#section-6.2
6.2 <http://tools.ietf.org/html/rfc5625#section-6.2>. Interface Binding
Some gateways have been observed to have their DNS proxy listening on
both internal (LAN) and external (WAN) interfaces. In this
configuration, it is possible for the proxy to be used to mount
reflector attacks as described in [RFC5358
<http://tools.ietf.org/html/rfc5358>].
The DNS proxy in a gateway SHOULD NOT, by default, be accessible from
the WAN interfaces of the device.
Implemented correctly, CPE receives DNS request and proxies the request
internally. Usually they are only listening on the LAN side. Sometimes
they take DNS requests from the WAN side. When a local DNS cache is not
defined, these requests can leak out to whatever cache is defined. In some
cases, the CPE retains the IP address that originally sourced the packet.
So you end up with external caches responding to requests from 3rd
parties. Add to that spoofing the original packets to the bad CPE and you
have that CPE proxying your DNS amplification attack to other caches.
Don't blame the cache. The attacker was intending that the CPE amp
directly.
Fix:
CPE should disable DNS proxying by default and require a restricted list of
sources (LAN, vpn, etc) when enabled. Also/alternatively require cache to
be local.
--Heather
On Sun, Aug 11, 2013 at 5:45 AM, Florian Weimer <fw at deneb.enyo.de> wrote:
> * Jared Mauch:
>
> > Number of unique IPs that spoofed a packet to me. (eg: I sent a
> > packet to 1.2.3.4 and 5.6.7.8 responded).
>
> That's not necessarily proof of spoofing, isn't it? The system in
> question might legitimately own IP addresses from very different
> networks. If the system is a router and the service you're pinging is
> not correctly implemented and it picks up the IP address of the
> outgoing interface instead of the source address of the request,
> that's totally expected.
>
> I'm not saying that BCP 38 is widely implement (it's not, unless
> operators have configured exceptions for ICMP traffic from private
> address, which I very much doubt). I just think you aren't actually
> measuring spoofing capabilities.
>
>