isc.org provides attack mitigation
Some services respond to potentially spoofed udp packets.
MITIGATION for DNS servers.
Upgrade to bind 9.3.3b1 OR
MITIGATION for other udp services:
Disable or restrict access to UDP services that don't need to be open to the internet.
The basic issue here is very old. It was originally reported in 1999. The CVE number for it is CVE-1999-0103. http://nvd.nist.gov/nvd.cfm?cvename=CVE-1999-0103
"Echo and chargen, or other combinations of UDP services, can be used in tandem to flood the server, a.k.a. UDP bomb or UDP packet storm."
If you consider DNS to be one side of an "other combination" of UDP services this is not new. What is new is that this version of bind will not send FORMERR packets if the original packet came from the set of well known UDP ports listed above. ISC.ORG has added some code to mitigate attacks with well known spoofed source ports. I do not know of any other DNS software vendor that has added this capability.
7 years ago CERT and others warned us not to leave things like echo and chargen open.
However some OSes and network equipment vendors still ship products with those types of services enabled by default and open to the world. Those services haven't not been in common usage since the 1990's.
--- 9.3.3b1 released ---
<SNIP>
1951. [security] Drop queries from particular well known ports.
<SNIP>
Comments