giza: Giza White Mage (Default)
[personal profile] giza
So, I run a few hobbyist/non-profit domains, and I've been using the DNS services of EveryDns.net.

At 3:45 PM EST today, all 4 of everydns's nameservers stopped responding. All 4 servers are on seperate networks and in seperate physical locations.

This has "DDoS attack" written all over it.

The following domains are currently having interruptions in service:

- anthrocon.org
- claws-and-paws.com (including pafurry.claws-and-paws.com and lists.claws-and-paws.com)
- jbadger.org
- saveardmorecoalition.org

Not much we can do, other than to wait things out. Unless this DDoS lasts for more than 48 hours (typical time to propagate new NS records for domains), switching DNS providers probably won't help.

"What is DNS?"

DNS is the service that maps machine names to network addresses. That way, if you move a website onto a new machine, you simple need to update the DNS entry with the new address. Think of it like a phonebook.

"So the websites themselves are not affected?"

Correct. The websites and the machines they are running on are just fine. Though they aren't processing much traffic right now. :-P

"So, who is responsible for this?"

I don't know.

"How long will this continue?"

I don't know.

"How is this even possible?"

The main tactic for DDoS attacks these days seems to involved 0wned Windows boxes that are used as zombies. Thousands of 0wned boxes will be "commanded" at the same time to flood a specific host (or hosts in this case) with traffic. Since the traffic is coming from computers all over the world, it's non trivial to filter out, especially if it is disguisedto look like normal HTTP or DNS traffic.

Boxes typically get owned through spyware, viruses, and/or worms introduced through trojan horses.

"Are there any preventative measures we can take?"

Yes, if you own a Windows box, make sure it is kept up to date. Also, make sure that you are running both anti-spyware and anti-virus software. Having Internet access is a wonderful thing, but certain responsibilities come with that. If you don't know how to keep your machine up to date, find someone to help you out.

[Edit: Things are back to normal now.]

(no subject)

Date: 2006-12-01 10:51 pm (UTC)
From: [identity profile] giza.livejournal.com

Yes. If this keeps up when I get home tonight, I'm going to throw the switch for a temporary solution.

(no subject)

Date: 2006-12-01 10:56 pm (UTC)
From: [identity profile] sr-foxley.livejournal.com
Excellent! And do give a shout out if you want an extra DNS slave server in the registration list, eh.

(no subject)

Date: 2006-12-01 11:01 pm (UTC)
From: [identity profile] giza.livejournal.com

Thanks for the offer. I might look at that as a potential longer term solution.

Are you running DJB's DNS server by any chance? :-)

(no subject)

Date: 2006-12-02 12:04 am (UTC)
From: [identity profile] sr-foxley.livejournal.com
Nope, just a chrooted ISC BIND 9. :)

I've not actually futzed with DJB's DNS... is it decent?

(no subject)

Date: 2006-12-02 12:08 am (UTC)
From: [identity profile] giza.livejournal.com
Oh yeah. It's fairly simple, and security is a big goal. Zone transfers are just done via ssh, for example.

I got away from BIND and Sendmail years ago because of all of the security issues that they were having. DBJ's qmail is pretty awsome, too. When I test a new build, I can just start the binary from the command line and initiate an SMTP conversation right there.

(no subject)

Date: 2006-12-02 12:32 am (UTC)
From: [identity profile] kreggan.livejournal.com
Bind 9 is a complete rewrite. Where bind 4 and 8 shared the same codebase written in the early days of the 'net when security wasn't a consideration, bind 9 was written just recently ('99) with security in mind from the beginning. It does all the right things, like trap overflows, check inputs and outputs, and if there's an assertion failure, it shuts down instead of giving the user any sort of access to the box it's running on. With the exception of a buffer overflow in a linked library (openssl), the only vulnerabilities in bind 9 have been DoS attacks - The server shut itself down rather than allowing itself to be compromised.

(no subject)

Date: 2006-12-02 12:49 am (UTC)
From: [identity profile] giza.livejournal.com
I stand corrected. Thank you for pointing that out.

Most of my experience with Bind was Bind 8 (8.3.3, I think), and I only used Bind 9 for a few months before I ended up switching to UltraDNS, and eventually to EveryDNS.

(no subject)

Date: 2006-12-02 07:09 am (UTC)
From: [identity profile] bigtig.livejournal.com
Perhaps the actual server could itself, be DNS backup.

Bind takes very little overhead for AC's traffic and could easily be slaved to EveryDNS's main server for the site.

Mussing about with the TTL or snapshotting an AXFR would give you the ability to live if this goes again.

Probably something handy to do for your own sites as well.

Oh. I'm more than willing to do redundant DNS for AC and your own sites to give it some geographical redundancy and health. My stuff is currently hosted in Toronto.

(no subject)

Date: 2006-12-02 08:13 am (UTC)
From: [identity profile] giza.livejournal.com
My only concern is the RAM on our box. It's already pretty scarce.

I did manage to find another DNS provider, though. I set up the records and I'm going to throw the switch when I get up in the morning.

(no subject)

Date: 2006-12-04 11:52 pm (UTC)
From: [identity profile] sr-foxley.livejournal.com
Cool-- Glad to hear you were able to get things worked out there. Let me know if you ever want another DNS slave in the mix in any case, eh. (And yes-- with Bind 9, it'd probably be easiest just to set things up with AXFR (assuming, of course that that works between djbdns and bind-- there seems to be a lot of ranting about bind on the djbdns site...))

Profile

giza: Giza White Mage (Default)
Douglas Muth

April 2012

S M T W T F S
1234567
891011121314
15161718192021
22232425262728
2930     

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags