Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Internet's root servers take hit in DDoS attack (Global DNS servers forced offline for hours)
The Register ^ | Dec 8, 2015 | Kieren McCarthy

Posted on 12/09/2015 7:32:50 PM PST by dayglored

The internet's root servers came under a concerted distributed denial of service (DDoS) attack last week that effectively knocked three of the 13 critical pillars of the internet offline for several hours.

The attack came just days before the Janet academic network received a similar DDoS attack.

According to a first analysis of the root server attack, published by the root server operators on Tuesday, the attack occurred on November 30, 2015 between 06:50 and 09:30 UTC and then again the next day for an hour.

Many, but not all, of the root servers received roughly five million queries per second, which was enough to flood network connections and cause timeouts on the B, C, G, and H root servers. The queries were valid DNS messages for a single domain name; the second day's attack used a different domain name than the first.

Ultimately, the operators affected by the attack used counter-measures, with some degree of success, but a proper analysis is now underway to discover exactly what form the attack took and where it originated.

Of perhaps most concern is the fact that even with the implementation of Anycast technology designed to help deal with such an attack, a number of the servers were still swamped.

The root servers themselves make up the pillars on which the internet's domain name system sits. They act as a sort of global directory for all the other parts of the internet.

Any attack on the DNS' infrastructure is taken very seriously and if the root servers went down for longer than a day, it would start causing significant problems globally.

(Excerpt) Read more at theregister.co.uk ...


TOPICS: Business/Economy; Computers/Internet; Hobbies
KEYWORDS: ddos; dns; rootservers; windowspinglist
Navigation: use the links below to view more comments.
first 1-2021-32 next last
This is a big deal, because even though (as intended by design) the internet's root servers as a group weathered this attack, two things are very troubling:
  1. It could happen again and bigger,
  2. They shouldn't have been that easy to knock offline.
So something needs attention, and soon.
1 posted on 12/09/2015 7:32:51 PM PST by dayglored
[ Post Reply | Private Reply | View Replies]

To: dayglored; Abby4116; afraidfortherepublic; aft_lizard; AF_Blue; Alas Babylon!; amigatec; ...
Internet's root servers vulnerable to DDoS? Uh-oh ... PING!

You can find all the Windows Ping list threads with FR search: just search on keyword "windowspinglist".

2 posted on 12/09/2015 7:33:45 PM PST by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored

GayMuzzie doesn’t like the Samizdat, wants the MSM monopoly back.


3 posted on 12/09/2015 7:34:40 PM PST by gaijin
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce; Swordmaker; ThunderSleeps

Guys, consider pinging, this might be somewhat esoteric for some users, but it has huge (”YUUUGE!”) potential consequences for all of us.


4 posted on 12/09/2015 7:35:26 PM PST by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 2 | View Replies]

To: dayglored

This is nothing compared to what’s going to happen when Obama gives the Internet to the United Nations


5 posted on 12/09/2015 7:36:01 PM PST by butlerweave
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored

‘So something needs attention, and soon. ‘

Yeah, the perps.
This is no different than blowing up a ‘brick and mortar’ utility.


6 posted on 12/09/2015 7:38:53 PM PST by mrsmith (Dumb sluts: Lifeblood of the Media, Backbone of the Democrat/RINO Party!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored

Yup. It is a big deal. 3 of out 13 is too many. We need to add more roots servers.


7 posted on 12/09/2015 7:39:50 PM PST by Alas Babylon! (As we say in the Air Force, "You know you're over the target when you start getting flak!")
[ Post Reply | Private Reply | To 1 | View Replies]

To: Alas Babylon!
Yup. It is a big deal. 3 of out 13 is too many. We need to add more roots servers.

It's kinda funny, because it wasn't really all that many years ago that some of the root servers were just sitting under someone's desk. I'd be interested in seeing what kind of hardware they are running most of the root domain servers on these days, and how big a network connection they have incoming.

8 posted on 12/09/2015 7:46:57 PM PST by zeugma (Last time I was sober, man I felt bad. Worst hangover I've ever had.)
[ Post Reply | Private Reply | To 7 | View Replies]

To: dayglored
Another article:

http://arstechnica.com/security/2015/12/attack-flooded-internet-root-servers-with-5-million-queries-a-second/

From that article:

A large botnet of infected computers or other Internet-connected devices is the most plausible explanation for such an attack. That would explain how the attack occurred, but it doesn't shed any light on why it was carried out. It has also renewed calls for networks to implement BCP 38, an Internet Engineering Task Force standard for defeating IP address spoofing. Many networks enforce it, but some still don't, and they're the ones making such attacks possible.

From that article's comments:

For anybody who was wondering, BCP 38 is a 15 year old proposal, and it's pretty straightforward to implement - in most cases it'd be a single firewall rule on an ISP's customer-facing router(s).

There's no justification for not implementing it basically everywhere.


9 posted on 12/09/2015 7:56:30 PM PST by TChad
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored

Oh, this is bad. We should turn control of the internet over to the UN so it can be more secure. /s


10 posted on 12/09/2015 8:02:39 PM PST by Jim Robinson (Resistance to tyrants is obedience to to God!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: TChad

Where are the root servers and who controls them?


11 posted on 12/09/2015 8:02:53 PM PST by Oldexpat
[ Post Reply | Private Reply | To 9 | View Replies]

To: dayglored

I blame climatey changey.


12 posted on 12/09/2015 8:04:56 PM PST by Dallas59 (Only a fool stumbles on things behind him.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Jim Robinson
> Oh, this is bad. We should turn control of the internet over to the UN so it can be more secure. /s

What's scary, Jim, is that an awful lot of people DO think that way, and they are gonna vote next November.

13 posted on 12/09/2015 8:13:05 PM PST by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 10 | View Replies]

To: Oldexpat
Where are the root servers and who controls them?

Most seem to be in the United States.

There is a map on the article I linked above showing some of the 13 root servers. They are labeled A to M.

A list of the organizations that manage the servers is here:

http://www.iana.org/domains/root/servers

This complicates the answer to your question:

(from https://www.apnic.net/community/support/root-servers)

The 13 root nameservers each have an identifying letter, from A-M. However, while only 13 names are used for the root namesevers, there are many more physical servers. Some exist in only one instance while others, such as C, F, I, J, K, L, and M servers all exist in multiple locations on different continents. These duplicates use anycast address announcements to provide a completely decentralized service.

Having multiple servers distributed around the world provides high performance DNS lookup independent of the user's location as the request does not have to be dealt with by a single remote instance of the nameserver.


14 posted on 12/09/2015 8:20:32 PM PST by TChad
[ Post Reply | Private Reply | To 11 | View Replies]

To: dayglored

I hadn’t heard about this. I’m no expert but I have had some professional networking training. I agree this is very serious but not at all unexpected. America is very, very dependent on the Internet these days.


15 posted on 12/09/2015 8:24:00 PM PST by CitizenUSA (Proverbs 14:34 Righteousness exalts a nation, but sin is a disgrace to any people.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: TChad

People have legitimate, non-malicious reasons for wanting to spoof an IP address.


16 posted on 12/09/2015 8:25:59 PM PST by CitizenUSA (Proverbs 14:34 Righteousness exalts a nation, but sin is a disgrace to any people.)
[ Post Reply | Private Reply | To 9 | View Replies]

To: CitizenUSA

What would a legitimate use for IP spoofing be? Spoofing <> anonymity.


17 posted on 12/09/2015 8:47:07 PM PST by Wayne07
[ Post Reply | Private Reply | To 16 | View Replies]

To: MrShoop

Privacy.


18 posted on 12/09/2015 8:51:05 PM PST by CitizenUSA (Proverbs 14:34 Righteousness exalts a nation, but sin is a disgrace to any people.)
[ Post Reply | Private Reply | To 17 | View Replies]

To: MrShoop

Ability to log into servers that block certain IPs.


19 posted on 12/09/2015 8:52:23 PM PST by CitizenUSA (Proverbs 14:34 Righteousness exalts a nation, but sin is a disgrace to any people.)
[ Post Reply | Private Reply | To 17 | View Replies]

To: CitizenUSA

That’s not what IP spoofing is - IP spoofing forges the return address, so you can send info (to crash servers) but it never comes back to you. It is a one way path, so you can’t use it, in your example, to anonymously log into a website. Basically not a useful mechanism for people who care about privacy. Tor or VPN is the solution for that.


20 posted on 12/09/2015 9:31:39 PM PST by Wayne07
[ Post Reply | Private Reply | To 19 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-32 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson