Get In Touch
A new kind of DDoS attack is currently stressing DNS infrastructure everywhere. Attackers gain access to DNS resolvers through home gateways with open DNS proxies. Proxies forward large bursts of queries with spoofed IP addresses to whatever resolver they are configured to use, usually an ISP resolver. With these attacks, the overwhelming majority of queries require recursion so resolvers in turn query authoritative servers to get answers.
A new variant of DNS amplification attack relies on home gateways with open DNS proxies to forward DNS queries to ISP resolvers. To launch this exploit attacker can deploy their exploit code anywhere on the Internet that allows address spoofing, a compromised server in a hosting facility for example. From there DNS queries can be targeted at any network with open home gateways. These queries enter ISP networks at border
Ten years ago everyone evaluating DNS solutions was always concerned about performance. Broadband networks were getting faster, providers were serving more users, and web pages and applications increasingly stressed the DNS. Viruses were a factor too as they could rapidly become the straw that broke the camel's back of a large ISP's DNS servers. The last thing a provider needed was a bottleneck, so DNS resolution speed became more and
Like any critical part of network infrastructure, securing recursive DNS requires a layered approach. All the points of entry into the system - the console(s), network, etc need to be protected.
Your new DNS infrastructure is up and running! Here's what to watch for, how to monitor, and tips for patches and upgrades.
The DNS is a critical component of ISP infrastructure. It's usually described in two forms, Authoritative and Caching.
The DNS has played an essential role since the earliest days of the Internet, resolving an IP address when given a domain name. Now it's being considered for security applications. There are many fundamental reasons why it makes sense: