ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Pi-hole server involved in a 'DNS Amplification' DDOS Attack

    IT Discussion
    pi-hole pihole ddos dns amplification
    9
    69
    7.3k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • scottalanmillerS
      scottalanmiller @JaredBusch
      last edited by

      @JaredBusch said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

      I never got htis obsession with making public Pi-Hole systems.
      No one is going to go to all the trouble to override their cellular settings to use the Pi-Hole when roaming.

      Just setup something at home and move on.

      I do 🙂

      DustinB3403D 1 Reply Last reply Reply Quote 0
      • scottalanmillerS
        scottalanmiller @DustinB3403
        last edited by

        @DustinB3403 said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

        @JaredBusch that was kind of my point.

        How much value is there in doing this, really?

        Why do it at all then? I mean sure, we are at home "most" of the time. But you still want it when not at home.

        JaredBuschJ 1 Reply Last reply Reply Quote 0
        • DustinB3403D
          DustinB3403 @scottalanmiller
          last edited by

          @scottalanmiller said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

          @JaredBusch said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

          I never got htis obsession with making public Pi-Hole systems.
          No one is going to go to all the trouble to override their cellular settings to use the Pi-Hole when roaming.

          Just setup something at home and move on.

          I do 🙂

          You aren't the majority.

          @scottalanmiller said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

          @DustinB3403 said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

          @JaredBusch that was kind of my point.

          How much value is there in doing this, really?

          Why do it at all then? I mean sure, we are at home "most" of the time. But you still want it when not at home.

          Because this would be comparable to doing it for a business. Run your house like you would run a business.

          PiHole is designed with the intention of being used on a LAN. Not as a public DNS server. . .

          1 Reply Last reply Reply Quote 0
          • DustinB3403D
            DustinB3403
            last edited by

            Although I do wonder how Google manages. . . .

            scottalanmillerS 1 Reply Last reply Reply Quote 0
            • scottalanmillerS
              scottalanmiller @DustinB3403
              last edited by

              @DustinB3403 said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

              Although I do wonder how Google manages. . . .

              How does Cloudflare mitigate DNS amplification attacks?

              With a properly configured firewall and sufficient network capacity (which isn't always easy to come by unless you are the size of Cloudflare), it's trivial to block reflection attacks such as DNS amplification attacks. Although the attack will target a single IP address, our Anycast network will scatter all attack traffic to the point where it is no longer disruptive. Cloudflare is able to use our advantage of scale to distribute the weight of the attack across many Data Centers, balancing the load so that service is never interrupted and the attack never overwhelms the targeted server’s infrastructure. During a recent six month window our DDoS mitigation system "Gatebot" detected 6,329 simple reflection attacks (that's one every 40 minutes), and the network successfully mitigated all of them. Learn more about Cloudflare's advanced DDoS Protection.

              Source: https://www.cloudflare.com/learning/ddos/dns-amplification-ddos-attack/

              1 Reply Last reply Reply Quote 2
              • scottalanmillerS
                scottalanmiller
                last edited by

                Source IP verification – stop spoofed packets leaving network

                Because the UDP requests being sent by the attacker’s botnet must have a source IP address spoofed to the victim’s IP address, a key component in reducing the effectiveness of UDP-based amplification attacks is for Internet service providers (ISPs) to reject any internal traffic with spoofed IP addresses. If a packet is being sent from inside the network with a source address that makes it appear like it originated outside the network, it’s likely a spoofed packet and can be dropped. Cloudflare highly recommends that all providers implement ingress filtering, and at times will reach out to ISPs who are unknowingly taking part in DDoS attacks and help them realize their vulnerability.

                DashrenderD 1 Reply Last reply Reply Quote 0
                • JaredBuschJ
                  JaredBusch @scottalanmiller
                  last edited by

                  @scottalanmiller said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

                  But you still want it when not at home.

                  Not worth the effort.

                  DashrenderD 1 Reply Last reply Reply Quote 0
                  • DashrenderD
                    Dashrender @JaredBusch
                    last edited by

                    @JaredBusch said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

                    @scottalanmiller said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

                    But you still want it when not at home.

                    Not worth the effort.

                    I agree with this mostly because it will break and portal based open wifi someone tries to use.

                    But if a user is using their own cellphone/mifi, etc to get online while away from home - it could be worth it.

                    1 Reply Last reply Reply Quote 0
                    • DashrenderD
                      Dashrender @scottalanmiller
                      last edited by

                      @scottalanmiller said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

                      Source IP verification – stop spoofed packets leaving network

                      Because the UDP requests being sent by the attacker’s botnet must have a source IP address spoofed to the victim’s IP address, a key component in reducing the effectiveness of UDP-based amplification attacks is for Internet service providers (ISPs) to reject any internal traffic with spoofed IP addresses. If a packet is being sent from inside the network with a source address that makes it appear like it originated outside the network, it’s likely a spoofed packet and can be dropped. Cloudflare highly recommends that all providers implement ingress filtering, and at times will reach out to ISPs who are unknowingly taking part in DDoS attacks and help them realize their vulnerability.

                      hmm... I think someone posted something like this higher in the thread. 😉

                      DustinB3403D 1 Reply Last reply Reply Quote 0
                      • DustinB3403D
                        DustinB3403 @Dashrender
                        last edited by

                        @Dashrender yeah it was me who said it around post 20.

                        1 Reply Last reply Reply Quote 0
                        • B
                          bnrstnr
                          last edited by

                          @DustinB3403 didn't you say the method above would only work for devices on the Pi-Hole's LAN?

                          1 Reply Last reply Reply Quote 0
                          • DustinB3403D
                            DustinB3403
                            last edited by

                            @bnrstnr said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

                            @DustinB3403 didn't you say the method above would only work for devices on the Pi-Hole's LAN?

                            The method linked by someone else would, yes. As it's impractical to try to do said linked approach for the open internet.

                            Again, it's what you would do, but isn't practical because of your scale.

                            Post 18.

                            @DustinB3403 said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

                            But the reported issue is that these request appear to come from your devices. IE they are spoofed or are legitimately coming from your trusted network.

                            Can you setup ingress filtering for this?

                            This is the approach proposed by Curtis.

                            @Curtis said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

                            https://freek.ws/2017/03/18/blocking-dns-amplification-attacks-using-iptables/

                            1 Reply Last reply Reply Quote 0
                            • 1
                            • 2
                            • 3
                            • 4
                            • 4 / 4
                            • First post
                              Last post