Tom Paseka
The curse of the Open Recursor
     Network Engineer
                                  tom@cloudflare.com
Recursors

Why?
  •  Exist to aggregate and cache queries
       •  Not every computer run its own recursive resolver.
  •  ISPs, Large Enterprises run these
  •  Query through the root servers and DNS tree to resolve
     domains
  •  Cache results
  •  Deliver cached results to clients.
  




www.cloudflare.com                                              2
Recursors

The Problem!




  •  Example of DNS Based reflection attack from a Peer in
     Hong Kong.




www.cloudflare.com                                          3
Recursors

Open / Unsecured Recursors ? 

  •  DNS server set up for recursion
       •  ie. non-authoritative
       •  Will answer for zones it is not authoritative for
       •  Recursive lookups
       •  Will answer queries for anyone
  •  Some Public Services: 

          
          
Google, OpenDNS, Level 3, etc. 
       •  These are “special” set-ups and secured.



www.cloudflare.com                                             4
Recursors

Say Again?

  •  There are hundreds of thousands of DNS Recursors.
  •  Many of these are not secured.
  •  Non secured DNS Recursors can and will be abused
  •  CloudFlare has seen DNS reflection attacks hit 100Gbit
     traffic globally. 




www.cloudflare.com                                           5
What is a Reflection Attack?
Reflection Attack
  •  UDP Query
  •  Spoofed source
       •  Using the address of the person you want to attack
       •  DNS Server used to attack the victim (sourced address)


  •  Amplification used
       •  Querying domains like ripe.net or isc.org
       •  ~64 byte query (from attacker)
       •  ~3233 byte reply (from unsecured DNS Server) 
       •  50x amplification!


  •  Running an unsecured DNS server helps attackers!

www.cloudflare.com                                                  7
Reflection Attack


                       Attacker	

                  Attack Target	

                                       ANY
                                        ANY
                                      ANY
                                      isc.org	

                                       isc.org	

                                     isc.org	





                     Large                                              Large
                                                                         Large
                      Large
                       Large                                              Large
                                                                        Reply	

                     Reply	

                      Reply	

                                           Reply	

                                                                          Reply	

                       Reply	

               Unsecured DNS                                         Unsecured DNS
                  Recursors	

                                         Recursors	

                                             Large
                                              Large
              	

                                              	

                                               Large
                                             Reply	

                                              Reply	

                                               Reply	

                                     Unsecured DNS
www.cloudflare.com                                                                    8
                                       Recursors
Reflection Attack
•  With 50x amplification:
     •  1Gbit uplink from attacker (eg: Dedicated Servers)
     •  50Gbit attack
     •  Enough to bring most services offline!


•  Prevention is the best remedy.


•  In recent attacks, we’ve seen around 80,000 open/
   unsecured DNS Resolvers being used.
•  At just 1Mbit each, that’s 80Gbit!
     •  1mbit of traffic may not be noticed by most operators.
     •  80Gbit at target is easily noticed!

www.cloudflare.com                                              9
Where are they coming from?
Where are the open Recursors?

                               
                     • Nearly Everywhere!



  •  CloudFlare has seen DNS Reflected attack traffic from:
       •  27 out of 56 Economies in APNIC Region
       •  More attacks from higher populated economies. 




www.cloudflare.com                                          11
Where are the open Recursors?




www.cloudflare.com               12
Where are the open Recursors?




www.cloudflare.com               13
Where are the open Recursors?

                     
       




www.cloudflare.com               14
Where are the open Recursors?

                     
       




www.cloudflare.com               15
Where are the open Recursors?

                     
       




www.cloudflare.com               16
Where are the open Recursors?

                     
       




www.cloudflare.com               17
Where are the open Recursors?
                       Open                            Open
    Country	
                          Country	
  
                     Recursors	
                     Recursors	
  
      Japan             4625          Bangladesh         103
      China             3123         New Zealand         98
      Taiwan            3074           Cambodia          13
  South Korea           1410           Sri Lanka          7
       India            1119             Nepal            7
    Pakistan            1099           Mongolia           5
    Australia            761             Laos             4
    Thailand             656            Bhutan            2
    Malaysia             529         New Caledonia        2
  Hong Kong              435              Fiji            2
    Indonesia            349           Maldives           2
                                      Papua New
     Vietnam             342            Guinea            1
   Philippines           151          Afghanistan         1
   Singapore             118
www.cloudflare.com                                              18
Where are the open Recursors?
Some Networks:
                                                                          Open
Country       ASN                      Network Name
                                                                        Recursors

  TW          3462        HINET Data Communication Business Group         2416

  CN          9394         CRNET CHINA RAILWAY Internet(CRNET)            1052

  JP          4713          OCN NTT Communications Corporation            1044

  PK         45595   PKTELECOM-AS-PK Pakistan Telecom Company Limited     1030

  CN          4134       CHINANET-BACKBONE No.31,Jin-rong Street          851

  JP          2514        INFOSPHERE NTT PC Communications, Inc.          542
  JP         17506                  UCOM UCOM Corp.                       378


www.cloudflare.com                                                          19
Where are the open Recursors?
  •       Where are they running?
                                  
                          Mostly on Servers.

                                     

           
~11,000   
Servers profiled from Asia-Pac Networks.
           
~7,500    
BIND
           
~1600     
unknown / undetermined
           
~900 
    
Microsoft DNS Server
           
~500 
    
dnsmasq
           
~200 
    
ZyWALL DNS (a consumer internet router)

  

  


www.cloudflare.com                                                20
How to fix this?
Fixing this?
                         Preventative Measures!

  •  BCP-38
       •  Source Filtering.
       •  You shouldn’t be able to spoof addresses.
       •  Needs to be done in hosting and ISP environments.
       •  If the victim’s IP can’t be spoofed the attack will stop
       •  Will also help stop other attack types 
          •  (eg: Spoofed Syn Flood).




www.cloudflare.com                                                    22
Fixing this?
                   Preventative Measures!
  •  DNS Server Maintenance

     
       •  Secure the servers!
          •  Lock down recursion to your own IP addresses 

             
       •  Disable recursion
          •  If the servers only purpose is authoritative DNS, disable
             recursion

       •  Turn them off! 
          •  Some Packages (eg, Plesk, cPanel) have included a
             recursive DNS server on by default.

www.cloudflare.com                                                       23
Fixing this?
                     Consumer Internet Routers / Modems
                                       
  •  Update firmware.
       •  Some older firmware has security bugs
          •  Allows administration from WAN (including DNS, SNMP)

  •  Does the feature need to be on? 
          •  Make sure its set up properly




www.cloudflare.com                                                   24
Fixing this?
                           Information

  •  BCP-38: 
  http://tools.ietf.org/html/bcp38

  
  •  BIND:

      
  http://www.team-cymru.org/Services/Resolvers/
  instructions.html

  
  •  Microsoft:
  http://technet.microsoft.com/en-us/library/cc770432.aspx
  

www.cloudflare.com                                            25
26




Questions?
27




Thank You

More Related Content

PDF
Spoofing and Denial of Service: A risk to the decentralized Internet
PDF
HKNOG 1.0 - DDoS attacks in an IPv6 World
PDF
CloudFlare / ISOC - Are You Ready for IPv6 - Bridging the IPv6 gap
PDF
Routing for an Anycast CDN
PDF
More specific announcments in BGP
PDF
Zombie DNS
PPTX
IPv6 deployment at APNIC
PPTX
APRICOT 2015 - NetConf for Peering Automation
Spoofing and Denial of Service: A risk to the decentralized Internet
HKNOG 1.0 - DDoS attacks in an IPv6 World
CloudFlare / ISOC - Are You Ready for IPv6 - Bridging the IPv6 gap
Routing for an Anycast CDN
More specific announcments in BGP
Zombie DNS
IPv6 deployment at APNIC
APRICOT 2015 - NetConf for Peering Automation

What's hot (20)

PDF
DDOS Mitigation Experience from IP ServerOne by CL Lee
PDF
Welcome to the APNIC Member Gathering, Mongolia
PDF
The Stakes Have Changed – The Changing Security Landscape by Tony Teo
PDF
Combating DDoS and why peering is important in Asia
PDF
Netflix CDN and Open Source
PPTX
IPv6 Deployment Architecture for Broadband Access Networks
PPTX
Abitcool - A vast array of small-scale service providers with gigabit access,...
PDF
PLNOG 7: Grzegorz Janoszka - Memoirs from an IPv6 deployment in the hosting n...
PDF
CDN_Netflix_analysis
PDF
Internet Noise (A Story About Two Little Subnets - Tom Paseka
PPTX
Interconnection in Regional Markets
PDF
DDoS Mitigation using BGP Flowspec
PDF
Open Connect Appliances - Jocelyn Ooi
PDF
Encryption with DANE, NZNOG 2017
PDF
Actual Condition Survey of Malware Download Sites for A Long Period
PPTX
PLNOG16: Netflix Open Connect is the Netflix proprietary CDN, Nina Bargisen
PDF
Broadband India Forum Session on IPv6: The Post-IPocalypse Internet
PPTX
Henrik Strøm - IPv6 from the attacker's perspective
PDF
NANOG 84: DNS Openness
PDF
DDoS Threats Landscape : Countering Large-scale DDoS attacks
DDOS Mitigation Experience from IP ServerOne by CL Lee
Welcome to the APNIC Member Gathering, Mongolia
The Stakes Have Changed – The Changing Security Landscape by Tony Teo
Combating DDoS and why peering is important in Asia
Netflix CDN and Open Source
IPv6 Deployment Architecture for Broadband Access Networks
Abitcool - A vast array of small-scale service providers with gigabit access,...
PLNOG 7: Grzegorz Janoszka - Memoirs from an IPv6 deployment in the hosting n...
CDN_Netflix_analysis
Internet Noise (A Story About Two Little Subnets - Tom Paseka
Interconnection in Regional Markets
DDoS Mitigation using BGP Flowspec
Open Connect Appliances - Jocelyn Ooi
Encryption with DANE, NZNOG 2017
Actual Condition Survey of Malware Download Sites for A Long Period
PLNOG16: Netflix Open Connect is the Netflix proprietary CDN, Nina Bargisen
Broadband India Forum Session on IPv6: The Post-IPocalypse Internet
Henrik Strøm - IPv6 from the attacker's perspective
NANOG 84: DNS Openness
DDoS Threats Landscape : Countering Large-scale DDoS attacks
Ad

Viewers also liked (8)

PDF
set & logo
PPTX
Impresa italia bari
PDF
Global Health Symposium Poster
PPTX
Searching services in cities of italy
PDF
AsesorAmiento en el diseño de núcleos básicos de vivienda en poblaciones vuln...
DOC
Proyecto de responsabilidad social vii
PPTX
Holography & its applications
PPTX
Importancia de una estrategia nacional de turismo por manuel figuerola
set & logo
Impresa italia bari
Global Health Symposium Poster
Searching services in cities of italy
AsesorAmiento en el diseño de núcleos básicos de vivienda en poblaciones vuln...
Proyecto de responsabilidad social vii
Holography & its applications
Importancia de una estrategia nacional de turismo por manuel figuerola
Ad

Similar to The curse of the open recursor (20)

PDF
DNS in IR: Collection, Analysis and Response
PPTX
bdNOG 7 - Re-engineering the DNS - one resolver at a time
PPTX
Re-Engineering the DNS – One Resolver at a Time
PDF
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
PDF
DNS & DNSSEC operational best practices - Sleep better at night with KINDNS i...
PDF
DNS & DNSSEC operational best practices - Sleep better at night with KINDNS i...
PDF
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
PDF
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
PPTX
Infoblox - turning DNS from security target to security tool
PPTX
ExEC: Elastic Extensible Edge Cloud
PPTX
Grey H@t - DNS Cache Poisoning
PPTX
Integrating OpenStack To Existing Infrastructure
PDF
DNS Openness
PPTX
C* Summit 2013: Netflix Open Source Tools and Benchmarks for Cassandra by Adr...
PPT
DNS Response Policy Zone dss(DNSRPZ).ppt
ODP
BSides Rochester 2018: Chris Partridge: Turning Domain Data Into Domain Intel...
PDF
OpenDNS Whitepaper: Platform Technology
PDF
2 technical-dns-workshop-day1
PDF
FreeSWITCH as a Microservice
PPT
Cdn cs6740
DNS in IR: Collection, Analysis and Response
bdNOG 7 - Re-engineering the DNS - one resolver at a time
Re-Engineering the DNS – One Resolver at a Time
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS & DNSSEC operational best practices - Sleep better at night with KINDNS i...
DNS & DNSSEC operational best practices - Sleep better at night with KINDNS i...
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Infoblox - turning DNS from security target to security tool
ExEC: Elastic Extensible Edge Cloud
Grey H@t - DNS Cache Poisoning
Integrating OpenStack To Existing Infrastructure
DNS Openness
C* Summit 2013: Netflix Open Source Tools and Benchmarks for Cassandra by Adr...
DNS Response Policy Zone dss(DNSRPZ).ppt
BSides Rochester 2018: Chris Partridge: Turning Domain Data Into Domain Intel...
OpenDNS Whitepaper: Platform Technology
2 technical-dns-workshop-day1
FreeSWITCH as a Microservice
Cdn cs6740

More from Tom Paseka (12)

PDF
Peering Asia 2.0: Security in Peering
PDF
The New Edge of the Network
PDF
HKNOG 6.0 Next Generation Networks - will automation put us out of jobs?
PDF
Detecting spoofing at IxP's
PPTX
Interconnection landscape in Asia - TPIX Peering Forum 2017
PDF
DDoS And Spoofing, a risk to the decentralized internet
PPTX
KINX Peering Forum - A Brief Overview of Regulation of Interconnection
PDF
BBIX Asia Internet
PPTX
New Zealand and the world as a CDN
PPT
flowspec @ APF 2013
PPT
nanog
PPTX
Unicast vs Anycast
Peering Asia 2.0: Security in Peering
The New Edge of the Network
HKNOG 6.0 Next Generation Networks - will automation put us out of jobs?
Detecting spoofing at IxP's
Interconnection landscape in Asia - TPIX Peering Forum 2017
DDoS And Spoofing, a risk to the decentralized internet
KINX Peering Forum - A Brief Overview of Regulation of Interconnection
BBIX Asia Internet
New Zealand and the world as a CDN
flowspec @ APF 2013
nanog
Unicast vs Anycast

Recently uploaded (20)

PPTX
The various Industrial Revolutions .pptx
PDF
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
PPTX
2018-HIPAA-Renewal-Training for executives
PPTX
Chapter 5: Probability Theory and Statistics
PDF
UiPath Agentic Automation session 1: RPA to Agents
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PPTX
Build Your First AI Agent with UiPath.pptx
PDF
Architecture types and enterprise applications.pdf
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PPTX
TEXTILE technology diploma scope and career opportunities
PDF
Comparative analysis of machine learning models for fake news detection in so...
PDF
Getting started with AI Agents and Multi-Agent Systems
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PDF
Flame analysis and combustion estimation using large language and vision assi...
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PPTX
Modernising the Digital Integration Hub
PDF
Zenith AI: Advanced Artificial Intelligence
The various Industrial Revolutions .pptx
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
2018-HIPAA-Renewal-Training for executives
Chapter 5: Probability Theory and Statistics
UiPath Agentic Automation session 1: RPA to Agents
sustainability-14-14877-v2.pddhzftheheeeee
Consumable AI The What, Why & How for Small Teams.pdf
Build Your First AI Agent with UiPath.pptx
Architecture types and enterprise applications.pdf
OpenACC and Open Hackathons Monthly Highlights July 2025
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
TEXTILE technology diploma scope and career opportunities
Comparative analysis of machine learning models for fake news detection in so...
Getting started with AI Agents and Multi-Agent Systems
Custom Battery Pack Design Considerations for Performance and Safety
Flame analysis and combustion estimation using large language and vision assi...
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
A proposed approach for plagiarism detection in Myanmar Unicode text
Modernising the Digital Integration Hub
Zenith AI: Advanced Artificial Intelligence

The curse of the open recursor

  • 1. Tom Paseka The curse of the Open Recursor Network Engineer tom@cloudflare.com
  • 2. Recursors Why? •  Exist to aggregate and cache queries •  Not every computer run its own recursive resolver. •  ISPs, Large Enterprises run these •  Query through the root servers and DNS tree to resolve domains •  Cache results •  Deliver cached results to clients. www.cloudflare.com 2
  • 3. Recursors The Problem! •  Example of DNS Based reflection attack from a Peer in Hong Kong. www.cloudflare.com 3
  • 4. Recursors Open / Unsecured Recursors ? •  DNS server set up for recursion •  ie. non-authoritative •  Will answer for zones it is not authoritative for •  Recursive lookups •  Will answer queries for anyone •  Some Public Services: 
 Google, OpenDNS, Level 3, etc. •  These are “special” set-ups and secured. www.cloudflare.com 4
  • 5. Recursors Say Again? •  There are hundreds of thousands of DNS Recursors. •  Many of these are not secured. •  Non secured DNS Recursors can and will be abused •  CloudFlare has seen DNS reflection attacks hit 100Gbit traffic globally. www.cloudflare.com 5
  • 6. What is a Reflection Attack?
  • 7. Reflection Attack •  UDP Query •  Spoofed source •  Using the address of the person you want to attack •  DNS Server used to attack the victim (sourced address) •  Amplification used •  Querying domains like ripe.net or isc.org •  ~64 byte query (from attacker) •  ~3233 byte reply (from unsecured DNS Server) •  50x amplification! •  Running an unsecured DNS server helps attackers! www.cloudflare.com 7
  • 8. Reflection Attack Attacker Attack Target ANY ANY ANY isc.org isc.org isc.org Large Large Large Large Large Large Reply Reply Reply Reply Reply Reply Unsecured DNS Unsecured DNS Recursors Recursors Large Large Large Reply Reply Reply Unsecured DNS www.cloudflare.com 8 Recursors
  • 9. Reflection Attack •  With 50x amplification: •  1Gbit uplink from attacker (eg: Dedicated Servers) •  50Gbit attack •  Enough to bring most services offline! •  Prevention is the best remedy. •  In recent attacks, we’ve seen around 80,000 open/ unsecured DNS Resolvers being used. •  At just 1Mbit each, that’s 80Gbit! •  1mbit of traffic may not be noticed by most operators. •  80Gbit at target is easily noticed! www.cloudflare.com 9
  • 10. Where are they coming from?
  • 11. Where are the open Recursors? • Nearly Everywhere! •  CloudFlare has seen DNS Reflected attack traffic from: •  27 out of 56 Economies in APNIC Region •  More attacks from higher populated economies. www.cloudflare.com 11
  • 12. Where are the open Recursors? www.cloudflare.com 12
  • 13. Where are the open Recursors? www.cloudflare.com 13
  • 14. Where are the open Recursors? www.cloudflare.com 14
  • 15. Where are the open Recursors? www.cloudflare.com 15
  • 16. Where are the open Recursors? www.cloudflare.com 16
  • 17. Where are the open Recursors? www.cloudflare.com 17
  • 18. Where are the open Recursors? Open Open Country   Country   Recursors   Recursors   Japan 4625 Bangladesh 103 China 3123 New Zealand 98 Taiwan 3074 Cambodia 13 South Korea 1410 Sri Lanka 7 India 1119 Nepal 7 Pakistan 1099 Mongolia 5 Australia 761 Laos 4 Thailand 656 Bhutan 2 Malaysia 529 New Caledonia 2 Hong Kong 435 Fiji 2 Indonesia 349 Maldives 2 Papua New Vietnam 342 Guinea 1 Philippines 151 Afghanistan 1 Singapore 118 www.cloudflare.com 18
  • 19. Where are the open Recursors? Some Networks: Open Country ASN Network Name Recursors TW 3462 HINET Data Communication Business Group 2416 CN 9394 CRNET CHINA RAILWAY Internet(CRNET) 1052 JP 4713 OCN NTT Communications Corporation 1044 PK 45595 PKTELECOM-AS-PK Pakistan Telecom Company Limited 1030 CN 4134 CHINANET-BACKBONE No.31,Jin-rong Street 851 JP 2514 INFOSPHERE NTT PC Communications, Inc. 542 JP 17506 UCOM UCOM Corp. 378 www.cloudflare.com 19
  • 20. Where are the open Recursors? •  Where are they running? Mostly on Servers.
 ~11,000 Servers profiled from Asia-Pac Networks. ~7,500 BIND ~1600 unknown / undetermined ~900 Microsoft DNS Server ~500 dnsmasq ~200 ZyWALL DNS (a consumer internet router)
 
 www.cloudflare.com 20
  • 21. How to fix this?
  • 22. Fixing this? Preventative Measures! •  BCP-38 •  Source Filtering. •  You shouldn’t be able to spoof addresses. •  Needs to be done in hosting and ISP environments. •  If the victim’s IP can’t be spoofed the attack will stop •  Will also help stop other attack types •  (eg: Spoofed Syn Flood). www.cloudflare.com 22
  • 23. Fixing this? Preventative Measures! •  DNS Server Maintenance
 •  Secure the servers! •  Lock down recursion to your own IP addresses 
 •  Disable recursion •  If the servers only purpose is authoritative DNS, disable recursion •  Turn them off! •  Some Packages (eg, Plesk, cPanel) have included a recursive DNS server on by default. www.cloudflare.com 23
  • 24. Fixing this? Consumer Internet Routers / Modems •  Update firmware. •  Some older firmware has security bugs •  Allows administration from WAN (including DNS, SNMP) •  Does the feature need to be on? •  Make sure its set up properly www.cloudflare.com 24
  • 25. Fixing this? Information •  BCP-38: http://tools.ietf.org/html/bcp38
 •  BIND:
 http://www.team-cymru.org/Services/Resolvers/ instructions.html
 •  Microsoft: http://technet.microsoft.com/en-us/library/cc770432.aspx www.cloudflare.com 25