Community discussions

MikroTik App
 
jonmansey
Frequent Visitor
Frequent Visitor
Topic Author
Posts: 84
Joined: Sat Sep 18, 2004 3:43 am

DNS Amplification attack

Mon Jul 29, 2013 10:24 pm

I recommend dropping incoming DNS requests from the internet unless specifically required, there is huge active DNS amplification attacks going on and mikrotik is kinda vulnerable when it runs the dns proxy with "allow remote requests" checked.

Typical symptoms to look out for would be CPU pegged at 100% and higher than normal packet rates and outbound traffic on Internet links.

Here is the CERT alert http://www.us-cert.gov/ncas/alerts/TA13-088A

Jon
 
CelticComms
Forum Guru
Forum Guru
Posts: 1765
Joined: Wed May 02, 2012 5:48 am

Re: DNS Amplification attack

Tue Jul 30, 2013 2:34 pm

The problem is not configuring DNS with "allow remote requests" selected - the problem is not installing appropriate input filters!

If the device is internet facing and acting as a firewall then it should have drop all rules in both the input chain and forward chain thus should only be responding to externally sourced DNS requests if those requests have been explicitly permitted in the input chain.

If the filter settings are allowing the device to be vulnerable to DNS amplification attack then there is a good chance it has a host of other vulnerabilities too!
 
dinopio
just joined
Posts: 22
Joined: Tue Jul 24, 2012 11:04 pm

Re: DNS Amplification attack

Mon Aug 05, 2013 2:28 am

I have been trying to block this attack with no luck, as soon as I press allow remote requests for the DNS to work on the mikrotik the attack is back.

Can someone post a tested input chain for blocking all remote DNS requests without breaking local DNS resolution (im using googles DNS as the server on the mikrotik)
 
jonmansey
Frequent Visitor
Frequent Visitor
Topic Author
Posts: 84
Joined: Sat Sep 18, 2004 3:43 am

Re: DNS Amplification attack

Mon Aug 05, 2013 4:10 am

/ip fire add chain=input proto=udp dst-port=53 action=drop
 
rkau045
newbie
Posts: 45
Joined: Mon Jun 25, 2012 9:14 pm

Re: DNS Amplification attack

Mon Aug 05, 2013 6:00 am

You probably should add another identical to the above rule with proto=tcp as well since many implementations will respond to either protocol.
 
AlArenal
Member Candidate
Member Candidate
Posts: 131
Joined: Thu Aug 01, 2013 5:24 pm
Location: Iserlohn, Germany

Re: DNS Amplification attack

Mon Aug 05, 2013 9:13 am

So corrected version would look like this, if your wan interface is called wan-1. Don't forget to put specific deny rules before your allow rules in the chain.

/ip firewall filter add chain=input in-interface=wan-1 protocol=udp dst-port=53 action=drop
/ip firewall filter add chain=input in-interface=wan-1 protocol=tcp dst-port=53 action=drop