ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Pi-hole server involved in a 'DNS Amplification' DDOS Attack

    IT Discussion
    pi-hole pihole ddos dns amplification
    9
    69
    7.3k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DustinB3403D
      DustinB3403
      last edited by

      Although I do wonder how Google manages. . . .

      scottalanmillerS 1 Reply Last reply Reply Quote 0
      • scottalanmillerS
        scottalanmiller @DustinB3403
        last edited by

        @DustinB3403 said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

        Although I do wonder how Google manages. . . .

        How does Cloudflare mitigate DNS amplification attacks?

        With a properly configured firewall and sufficient network capacity (which isn't always easy to come by unless you are the size of Cloudflare), it's trivial to block reflection attacks such as DNS amplification attacks. Although the attack will target a single IP address, our Anycast network will scatter all attack traffic to the point where it is no longer disruptive. Cloudflare is able to use our advantage of scale to distribute the weight of the attack across many Data Centers, balancing the load so that service is never interrupted and the attack never overwhelms the targeted server’s infrastructure. During a recent six month window our DDoS mitigation system "Gatebot" detected 6,329 simple reflection attacks (that's one every 40 minutes), and the network successfully mitigated all of them. Learn more about Cloudflare's advanced DDoS Protection.

        Source: https://www.cloudflare.com/learning/ddos/dns-amplification-ddos-attack/

        1 Reply Last reply Reply Quote 2
        • scottalanmillerS
          scottalanmiller
          last edited by

          Source IP verification – stop spoofed packets leaving network

          Because the UDP requests being sent by the attacker’s botnet must have a source IP address spoofed to the victim’s IP address, a key component in reducing the effectiveness of UDP-based amplification attacks is for Internet service providers (ISPs) to reject any internal traffic with spoofed IP addresses. If a packet is being sent from inside the network with a source address that makes it appear like it originated outside the network, it’s likely a spoofed packet and can be dropped. Cloudflare highly recommends that all providers implement ingress filtering, and at times will reach out to ISPs who are unknowingly taking part in DDoS attacks and help them realize their vulnerability.

          DashrenderD 1 Reply Last reply Reply Quote 0
          • JaredBuschJ
            JaredBusch @scottalanmiller
            last edited by

            @scottalanmiller said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

            But you still want it when not at home.

            Not worth the effort.

            DashrenderD 1 Reply Last reply Reply Quote 0
            • DashrenderD
              Dashrender @JaredBusch
              last edited by

              @JaredBusch said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

              @scottalanmiller said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

              But you still want it when not at home.

              Not worth the effort.

              I agree with this mostly because it will break and portal based open wifi someone tries to use.

              But if a user is using their own cellphone/mifi, etc to get online while away from home - it could be worth it.

              1 Reply Last reply Reply Quote 0
              • DashrenderD
                Dashrender @scottalanmiller
                last edited by

                @scottalanmiller said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

                Source IP verification – stop spoofed packets leaving network

                Because the UDP requests being sent by the attacker’s botnet must have a source IP address spoofed to the victim’s IP address, a key component in reducing the effectiveness of UDP-based amplification attacks is for Internet service providers (ISPs) to reject any internal traffic with spoofed IP addresses. If a packet is being sent from inside the network with a source address that makes it appear like it originated outside the network, it’s likely a spoofed packet and can be dropped. Cloudflare highly recommends that all providers implement ingress filtering, and at times will reach out to ISPs who are unknowingly taking part in DDoS attacks and help them realize their vulnerability.

                hmm... I think someone posted something like this higher in the thread. 😉

                DustinB3403D 1 Reply Last reply Reply Quote 0
                • DustinB3403D
                  DustinB3403 @Dashrender
                  last edited by

                  @Dashrender yeah it was me who said it around post 20.

                  1 Reply Last reply Reply Quote 0
                  • B
                    bnrstnr
                    last edited by

                    @DustinB3403 didn't you say the method above would only work for devices on the Pi-Hole's LAN?

                    1 Reply Last reply Reply Quote 0
                    • DustinB3403D
                      DustinB3403
                      last edited by

                      @bnrstnr said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

                      @DustinB3403 didn't you say the method above would only work for devices on the Pi-Hole's LAN?

                      The method linked by someone else would, yes. As it's impractical to try to do said linked approach for the open internet.

                      Again, it's what you would do, but isn't practical because of your scale.

                      Post 18.

                      @DustinB3403 said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

                      But the reported issue is that these request appear to come from your devices. IE they are spoofed or are legitimately coming from your trusted network.

                      Can you setup ingress filtering for this?

                      This is the approach proposed by Curtis.

                      @Curtis said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

                      https://freek.ws/2017/03/18/blocking-dns-amplification-attacks-using-iptables/

                      1 Reply Last reply Reply Quote 0
                      • 1
                      • 2
                      • 3
                      • 4
                      • 4 / 4
                      • First post
                        Last post