<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic DNS Amplification Attack in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/dns-amplification-attack/m-p/11256#M8275</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: navy; font-size: 10pt; font-family: Arial;"&gt;&lt;A href="http://dnsamplificationattacks.blogspot.com.es/" title="http://dnsamplificationattacks.blogspot.com.es/"&gt;http://dnsamplificationattacks.blogspot.com.es/&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: navy; font-size: 10pt; font-family: Arial;"&gt;&lt;A href="http://dnsamplificationattacks.blogspot.nl/2013/05/nl-188954825-as57172.html" title="http://dnsamplificationattacks.blogspot.nl/2013/05/nl-188954825-as57172.html"&gt;http://dnsamplificationattacks.blogspot.nl/2013/05/nl-188954825-as57172.html, &lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN id="result_box" lang="en"&gt;&lt;SPAN class="hps"&gt;In relation to&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;this attack&lt;/SPAN&gt;, which &lt;SPAN class="hps"&gt;is performed&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;a high volume of&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;requests&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;against the&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;DNS&lt;/SPAN&gt;, &lt;SPAN class="hps"&gt;it&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;detects&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;PaloAlto&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;under the signatures&lt;/SPAN&gt;:&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN class="hps"&gt;DNS&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;Queries&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;ANY&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;TWO&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;Brute&lt;/SPAN&gt;-force &lt;SPAN class="hps"&gt;Attack&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="hps"&gt;Microsoft&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;SMTP&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;Service&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;and Exchange&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;Routing&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;Engine&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;Buffer Overflow Vulnerability&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="hps"&gt;This&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;signature&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;function through&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;which&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;we have modified&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;thresholds&lt;/SPAN&gt;.&lt;BR /&gt;&lt;SPAN class="hps"&gt;Yet&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;we see that the&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;size of requests&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;is usually greater than&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;4000&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;bytes.&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;So we are&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;trying to&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;create a rule&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;that detects&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;UDP&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;requests&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;to port 53&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;to&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;a size greater than&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;4000&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;bytes&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;to lock&lt;/SPAN&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN class="hps"&gt;But&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;we do not see&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;how&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;you can create a&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;similar rule&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;or at least&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;detected&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;by the&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;packet size&lt;/SPAN&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN class="hps"&gt;Is there any&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;way to create&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;a similar rule&lt;/SPAN&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN class="hps"&gt;thanks&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="hps"&gt;Sorry for&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;the&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;google&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;translation&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 17 Jul 2013 09:51:21 GMT</pubDate>
    <dc:creator>noc_soc</dc:creator>
    <dc:date>2013-07-17T09:51:21Z</dc:date>
    <item>
      <title>DNS Amplification Attack</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-amplification-attack/m-p/11256#M8275</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: navy; font-size: 10pt; font-family: Arial;"&gt;&lt;A href="http://dnsamplificationattacks.blogspot.com.es/" title="http://dnsamplificationattacks.blogspot.com.es/"&gt;http://dnsamplificationattacks.blogspot.com.es/&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: navy; font-size: 10pt; font-family: Arial;"&gt;&lt;A href="http://dnsamplificationattacks.blogspot.nl/2013/05/nl-188954825-as57172.html" title="http://dnsamplificationattacks.blogspot.nl/2013/05/nl-188954825-as57172.html"&gt;http://dnsamplificationattacks.blogspot.nl/2013/05/nl-188954825-as57172.html, &lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN id="result_box" lang="en"&gt;&lt;SPAN class="hps"&gt;In relation to&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;this attack&lt;/SPAN&gt;, which &lt;SPAN class="hps"&gt;is performed&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;a high volume of&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;requests&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;against the&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;DNS&lt;/SPAN&gt;, &lt;SPAN class="hps"&gt;it&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;detects&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;PaloAlto&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;under the signatures&lt;/SPAN&gt;:&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN class="hps"&gt;DNS&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;Queries&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;ANY&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;TWO&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;Brute&lt;/SPAN&gt;-force &lt;SPAN class="hps"&gt;Attack&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="hps"&gt;Microsoft&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;SMTP&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;Service&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;and Exchange&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;Routing&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;Engine&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;Buffer Overflow Vulnerability&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="hps"&gt;This&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;signature&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;function through&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;which&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;we have modified&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;thresholds&lt;/SPAN&gt;.&lt;BR /&gt;&lt;SPAN class="hps"&gt;Yet&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;we see that the&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;size of requests&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;is usually greater than&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;4000&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;bytes.&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;So we are&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;trying to&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;create a rule&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;that detects&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;UDP&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;requests&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;to port 53&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;to&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;a size greater than&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;4000&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;bytes&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;to lock&lt;/SPAN&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN class="hps"&gt;But&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;we do not see&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;how&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;you can create a&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;similar rule&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;or at least&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;detected&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;by the&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;packet size&lt;/SPAN&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN class="hps"&gt;Is there any&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;way to create&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;a similar rule&lt;/SPAN&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN class="hps"&gt;thanks&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="hps"&gt;Sorry for&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;the&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;google&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;translation&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Jul 2013 09:51:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-amplification-attack/m-p/11256#M8275</guid>
      <dc:creator>noc_soc</dc:creator>
      <dc:date>2013-07-17T09:51:21Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Amplification Attack</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-amplification-attack/m-p/11257#M8276</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't think we can create a Rule or App based on packet-size.&lt;/P&gt;&lt;P&gt;Have you applied&amp;nbsp; Vulnerability and Anti-spyware profiles to the rule for&amp;nbsp; content inspection..&lt;/P&gt;&lt;P&gt;Are you positive about DNS requests greater than 4kbytes using UDP and not TCP ,as any DNS packet&amp;nbsp; over 512 B should use TCP.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Jul 2013 12:04:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-amplification-attack/m-p/11257#M8276</guid>
      <dc:creator>UhMayYeah</dc:creator>
      <dc:date>2013-07-17T12:04:36Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Amplification Attack</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-amplification-attack/m-p/11258#M8277</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nowadays you have EDNS which will bypass the old "use TCP if response is larger than 512 bytes".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is handy when more and more DNS traffic uses DNSSEC which in many cases will result in a response which is larger than 512 bytes. Without EDNS the flow would be:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;* Send query&lt;/P&gt;&lt;P&gt;* Get a nack in return (or whatever its called in DNS world)&lt;/P&gt;&lt;P&gt;* Send syn&lt;/P&gt;&lt;P&gt;* Get synack&lt;/P&gt;&lt;P&gt;* Send ack&lt;/P&gt;&lt;P&gt;* Send query again&lt;/P&gt;&lt;P&gt;* Get response &amp;gt;512 bytes in return&lt;/P&gt;&lt;P&gt;* Send finack&lt;/P&gt;&lt;P&gt;* Get ack&lt;/P&gt;&lt;P&gt;* Get finack&lt;/P&gt;&lt;P&gt;* Send ack&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Compared to (with EDNS):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;* Send query (with EDNS where you inform that you accept UDP at 1280 bytes or smaller (or whatever size you accept)).&lt;/P&gt;&lt;P&gt;* Get response &amp;gt;512 bytes in return&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The new "safe" sort of standard is 1280 bytes (which is also the lowest MTU a IPv6 link is forced to support).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is if you are using bind you can use something like this in your dns-servers:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;edns-udp-size 1280;&lt;/P&gt;&lt;P&gt;max-udp-size 1280;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But this will of course be a problem during DDoS specially when the udp can be easily spoofed (since no handshake takes place and there are too many ISPs out there who doesnt properly filter client connections regarding srcip's being used).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem is that the attacker spoofs the srcip but now adds a EDNS header informing the dns-server which is being bounced at that the (faked) srcip accepts a 4096 bytes reply (or whatever). Since MTU is often 1500 bytes on the internet this UDP response will of course be over several packets but the point here is that some large query is being performed (for example containing DNSSEC information) which will incorrectly flood the victim (the faked srcip).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Some sources:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://tools.ietf.org/html/draft-andrews-dnsext-udp-fragmentation-01"&gt;http://tools.ietf.org/html/draft-andrews-dnsext-udp-fragmentation-01&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;If the IPv6 stack does not support IPV6_USE_MIN_MTU, then steps&lt;/P&gt;&lt;P&gt;should be taken to prevent PMTUD occuring.&amp;nbsp; These include, but are&lt;/P&gt;&lt;P&gt;not limited to, setting the MTU of the interface the packets are&lt;/P&gt;&lt;P&gt;being sent over to the minimum IPv6 MTU (1280 bytes), or restricing&lt;/P&gt;&lt;P&gt;DNS/UDP packets to no more than 1280 bytes including IPv6 headers.&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.ietf.org/rfc/rfc2671.txt"&gt;http://www.ietf.org/rfc/rfc2671.txt&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;4.5.1.&lt;/P&gt;&lt;P&gt;Note that a 512-octet UDP payload requires a 576-octet IP&lt;/P&gt;&lt;P&gt;reassembly buffer.&amp;nbsp; Choosing 1280 on an Ethernet connected&lt;/P&gt;&lt;P&gt;requestor would be reasonable.&amp;nbsp; The consequence of choosing too&lt;/P&gt;&lt;P&gt;large a value may be an ICMP message from an intermediate&lt;/P&gt;&lt;P&gt;gateway, or even a silent drop of the response message.&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://tools.ietf.org/html/draft-ietf-dnsind-udp-size-02"&gt;http://tools.ietf.org/html/draft-ietf-dnsind-udp-size-02&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;1280 bytes of DNS data is chosen as the new default to provide a&lt;/P&gt;&lt;P&gt;generous allowance for IP headers and still be within the highly&lt;/P&gt;&lt;P&gt;prevalent approximately Ethernet size or larger MTU and buffering&lt;/P&gt;&lt;P&gt;generally available today.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;An IPv6 server should enable fragmentation on UDP replies.&amp;nbsp; While&lt;/P&gt;&lt;P&gt;fragmentation will not be frequent if the above guidelines are&lt;/P&gt;&lt;P&gt;followed, it may occur on occasion. In principle, IPv6 headers and&lt;/P&gt;&lt;P&gt;options could be huge, resulting in a very large UDP packet even&lt;/P&gt;&lt;P&gt;though the DNS payload is limited, but this should not occur in&lt;/P&gt;&lt;P&gt;practice.&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also take a look at &lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa83/asdm63/configuration_guide/ddns.html" title="http://www.cisco.com/en/US/docs/security/asa/asa83/asdm63/configuration_guide/ddns.html"&gt;Cisco ASA 5500 Series Configuration Guide using ASDM, 6.3 - Configuring Dynamic DNS&amp;nbsp; [Cisco Adaptive Security Device Manager] - Cisco Systems&lt;/A&gt; which summarizes which dns-server supports which size by default.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regarding if the threat profiles in PA can look at packetsize aswell I have no clue (at least I failed to locate such in the manuals) - but if you for example choose 1280 bytes as max udp-size for incoming dns packets then make sure that your resolvers are setup according to above edns-udp-size and max-udp-size.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Jul 2013 22:36:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-amplification-attack/m-p/11258#M8277</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-07-17T22:36:38Z</dc:date>
    </item>
  </channel>
</rss>

