Distributed denial of service attacks on root nameservers

From Wikipedia, the free encyclopedia
Jump to: navigation, search

Distributed denial of service attacks on root nameservers are Internet events in which distributed denial-of-service attacks target one or more of the thirteen Domain Name System root nameserver clusters. The root nameservers are critical infrastructure components of the Internet, mapping domain names to Internet Protocol (IP) addresses and other resource record (RR) data.

Attacks against the root nameservers could, in theory, impact operation of the entire global Domain Name System, and thus all Internet services that use the global DNS, rather than just specific websites. However, in practice, the root nameserver infrastructure is highly resilient and distributed, using both the inherent features of DNS (result caching, retries, and multiple servers for the same zone with fallback if one or more fail), and, in recent years, a combination of anycast and load balancer techniques used to implement most of the thirteen nominal individual root servers as globally distributed clusters of servers in multiple data centers.

In particular, the caching and redundancy features of DNS mean that it would require a sustained outage of all the major root servers for many days before any serious problems were created for most Internet users, and even then there are still numerous ways in which ISPs could set their systems up during that period to mitigate even a total loss of all root servers for an extended period of time: for example by installing their own copies of the global DNS root zone data on nameservers within their network, and redirecting traffic to the root server IP addresses to those servers. Nevertheless, DDoS attacks on the root zone are taken seriously as a risk by the operators of the root nameservers, and they continue to upgrade the capacity and DDoS mitigation capabilities of their infrastructure to resist any future attacks.

An effective attack against DNS might involve targeting top-level domain servers (such as those servicing the .com domain) instead of root name servers. Alternatively, a man-in-the-middle attack or DNS poisoning attack could be used, though they would be more difficult to carry out.

Attacks[edit]

October 21, 2002[edit]

On October 21, 2002 an attack lasting for approximately one hour was targeted at all 13 DNS root name servers.[1] The attackers sent many ICMP pings using a botnet to each of the servers. However, because the servers were protected by packet filters which were configured to block all ICMP pings, they did not sustain much damage and there was little to no impact on Internet users. [2]

February 6, 2007[edit]

On February 6, 2007 an attack began at 10 AM UTC and lasted twenty-four hours. At least two of the root servers (G-ROOT and L-ROOT) reportedly "suffered badly" while two others (F-ROOT and M-ROOT) "experienced heavy traffic". The latter two servers largely contained the damage by distributing requests to other root server instances with anycast addressing. ICANN published a formal analysis shortly after the event.[3]

Due to a lack of detail, speculation about the incident proliferated in the press until details were released.[4]

On February 8, 2007 it was announced by Network World that "if the United States found itself under a major cyberattack aimed at undermining the nation's critical information infrastructure, the Department of Defense is prepared, based on the authority of the President, to launch an actual bombing of an attack source or a cyber counterattack."[5]

Threats[edit]

Operation Global Blackout 2012[edit]

On February 12, 2012, a statement was posted on Pastebin cited to be from Anonymous, threatening an attack on the root servers on March 31, 2012.[6]

"To protest SOPA, Wallstreet, our irresponsible leaders and the beloved bankers who are starving the world for their own selfish needs out of sheer sadistic fun, On March 31, anonymous will shut the Internet down," reads the statement. "Remember, this is a protest, we are not trying to ‘kill' the Internet, we are only temporarily shutting it down where it hurts the most…It may only last one hour, maybe more, maybe even a few days. No matter what, it will be global. It will be known."[7]

References[edit]

  1. ^ Vixie, Paul; Gerry Sneeringer; Mark Schleifer (2002-11-24). "Events of 21-Oct-2002". Retrieved 2008-07-11. 
  2. ^ Kurose, James F. (Feb. 24 2012). "2". Computer Networking: A Top-Down Approach (6th Edition). p. 143. ISBN 0132856204. 
  3. ^ "Factsheet – Root server attack on 6 February 2007". ICANN. 2007-03-01. Retrieved 2013-09-23. 
  4. ^ Kristoff, John (2007-07-27). "Root DDoS Attack Analysis". DNS-OARC. Retrieved 2009-09-09. 
  5. ^ Messmer, Ellen (2007-02-08). "U.S. cyber counterattack: Bomb 'em one way or the other". Network World, Inc. Retrieved 2008-07-11. 
  6. ^ "Untitled". pastebin.com. 2012-02-12. Retrieved 2012-02-19. 
  7. ^ Greenberg, Andy (2012-02-16). "Anonymous Plans To Take Down The Internet? We're Being Trolled". Forbes. Retrieved 2012-02-19. 

External links[edit]