Linked by Thom Holwerda on Thu 28th Mar 2013 00:36 UTC, submitted by MOS6510
Internet & Networking "The New York Times this morning published a story about the Spamhaus DDoS attack and how CloudFlare helped mitigate it and keep the site online. The Times calls the attack the largest known DDoS attack ever on the Internet. We wrote about the attack last week. At the time, it was a large attack, sending 85Gbps of traffic. Since then, the attack got much worse. Here are some of the technical details of what we've seen."
Permalink for comment 556961
To read all comments associated with this story, please click here.
Alfman
Member since:
2011-01-28

Laurence,

"I'd argue it's more a problem with the UDP datagram than DNS specifically. DNS just exposes that weakness of UDP. So if we just fix DNS then I'm sure someone will find another UDP service that can be exploited in the same way (possibly games servers?)"

I guess you could put it that way. It's true that UDP does nothing to confirm the sender IP, but to fix it at this level would mean converting UDP to a stateful protocol with a bidirectional handshake.

Between all the IP protocols already invented, we probably already have something that would work, but it does little good until these actually saw widespread support.


http://en.wikipedia.org/wiki/Reliable_User_Datagram_Protocol

http://en.wikipedia.org/wiki/Stream_Control_Transmission_Protocol

So, the easiest fix in this case is probably just running DNS over TCP.

Edited 2013-03-28 17:56 UTC

Reply Parent Score: 2