Amplification DDoS Attacks – Defenses for Vulnerable Protocols Christian Rossow VU University Amsterdam / Ruhr-University Bochum RIPE 68, May 2014, Warsaw Amplifica)on DDoS A/acks Attacker Amplifier C.Rossow – Amplification DDoS Attacks: Defenses for Vulnerable Protocols Victim 2 Amplifica)on A/acks in Prac)ce Cloudflare Blog post, February 2014 Cloudflare Blog post, March 2013 C.Rossow – Amplification DDoS Attacks: Defenses for Vulnerable Protocols 3 A/ack 14 Network Protocols Vulnerable to Amplifica)oon ‘87 ’90 ‘83 2001 ‘99 ‘83 2002 2003 ‘88 ‘87 ‘99 C.Rossow – Amplification DDoS Attacks: Defenses for Vulnerable Protocols 5 Measuring Amplifica)on Rates (1/2) } Bandwidth AmplificaBon Factor (BAF) UDP payload bytes at victim UDP payload bytes from attacker } Packet AmplificaBon Factor (PAF) # of IP packets at victim # of IP packets from attacker C.Rossow – Amplification DDoS Attacks: Defenses for Vulnerable Protocols 6 Measuring Amplifica)on Rates (2/2) 1 SNMP NTP DNS-‐NS DNS-‐OR NetBios SSDP CharGen QOTD BitTorrent Kad Quake 3 Steam ZAv2 Sality Gameover 10 100 1000 10000 4670x 10x 15x C.Rossow – Amplification DDoS Attacks: Defenses for Vulnerable Protocols 7 Number of Amplifiers C.Rossow – Amplification DDoS Attacks: Defenses for Vulnerable Protocols 8 Defense Let’s Play Defense } Defensive Countermeasures } } } } ATack DetecBon ATack Filtering Hardening Protocols etc. C.Rossow – Amplification DDoS Attacks: Defenses for Vulnerable Protocols 10 Further Countermeasures } S.A.V.E. – Source Address VerificaBon Everywhere } } a.k.a. BCP38 Spoofing is the root cause for amplificaBon aTack } Implement proper handshakes in protocols } } Switch to TCP Re-‐implement such a handshake in UDP } Rate limiBng (with limited success) C.Rossow – Amplification DDoS Attacks: Defenses for Vulnerable Protocols A/ack Detec)on at the Amplifier / Vic)m C.Rossow – Amplification DDoS Attacks: Defenses for Vulnerable Protocols 12 Protocol Hardening: DNS } } Secure your open recursive resolvers } Restrict resolver access to your customers } See: hTp://www.team-‐cymru.org/Services/Resolvers/instrucBons.html } Check your network(s) at hTp://openresolverproject.org/ Rate-‐limit at authoritaBve name servers } Response Rate LimiBng (RRL) – now also in bind. See: hTp://www.redbarn.org/dns/ratelimits C.Rossow – Amplification DDoS Attacks: Defenses for Vulnerable Protocols 13 Protocol Hardening: NTP } } Disable monlist at your NTP servers } Add to your ntp.conf: restrict } monlist is opBonal and not necessary for Bme sync } Check your network(s) at hTp://openntpproject.org/ default noquery Filter monlist response packets } UDP source port 123 with IP packet length 468 } Only very few (non-‐killer) monlist legiBmate use cases C.Rossow – Amplification DDoS Attacks: Defenses for Vulnerable Protocols 14 Conclusion Conclusion } 14+ UDP-‐based protocols are vulnerable to ampl. } We can miBgate individual amplificaBon vectors } NTP: Down to 8% of vulnerable servers in 7 weeks } DNS: SBll 25M open resolvers – let’s close them! C.Rossow – Amplification DDoS Attacks: Defenses for Vulnerable Protocols 16 Amplification DDoS Attacks – Defenses for Vulnerable Protocols Christian Rossow VU University Amsterdam / Ruhr-University Bochum RIPE 68, May 2014, Warsaw More Slides Detailed BAF and PAF per Protocol C.Rossow – Amplification DDoS Attacks: Defenses for Vulnerable Protocols Measuring Amplifica)on Rates (2/2) C.Rossow – Amplification DDoS Attacks: Defenses for Vulnerable Protocols 20
© Copyright 2024