ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Pi-hole server involved in a 'DNS Amplification' DDOS Attack

    IT Discussion
    pi-hole pihole ddos dns amplification
    9
    69
    7.3k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B
      bnrstnr @Dashrender
      last edited by

      @Dashrender said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

      The occasional complaint is nothing something I would worry about - especially when you're doing nothing wrong - I wouldn't change anything from what you have today. it's way to flexible and low cost to worry about changing.,

      That's the way I'm leaning, too. I might try to do some geo-blocking, but I doubt I'll ever get to it. Especially since nobody here has seen this before on their piholes.

      DustinB3403D 1 Reply Last reply Reply Quote 0
      • DustinB3403D
        DustinB3403 @bnrstnr
        last edited by

        @bnrstnr said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

        @Dashrender said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

        The occasional complaint is nothing something I would worry about - especially when you're doing nothing wrong - I wouldn't change anything from what you have today.  it's way to flexible and low cost to worry about changing.,
        

        That's the way I'm leaning, too. I might try to do some geo-blocking, but I doubt I'll ever get to it. Especially since nobody here has seen this before on their piholes.

        I don't think anyone else here is using PiHole as a public DNS. . .

        scottalanmillerS 1 Reply Last reply Reply Quote 0
        • scottalanmillerS
          scottalanmiller @DustinB3403
          last edited by

          @DustinB3403 said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

          @bnrstnr said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

          @Dashrender said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

          The occasional complaint is nothing something I would worry about - especially when you're doing nothing wrong - I wouldn't change anything from what you have today.  it's way to flexible and low cost to worry about changing.,
          

          That's the way I'm leaning, too. I might try to do some geo-blocking, but I doubt I'll ever get to it. Especially since nobody here has seen this before on their piholes.

          I don't think anyone else here is using PiHole as a public DNS. . .

          I am.

          1 Reply Last reply Reply Quote 0
          • scottalanmillerS
            scottalanmiller @DustinB3403
            last edited by

            @DustinB3403 said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

            @bnrstnr Dash beat me to the answer.

            But yeah, you'd setup a Pi in each person's network and then configure their local DNS to use the PiHole.

            That's non-trivial for home users or really small SMBs. You need somewhere to run that and most people don't have servers.

            1 Reply Last reply Reply Quote 0
            • gjacobseG
              gjacobse
              last edited by

              Had the same thing happen to my Vultr Pi-Hole.. I deleted the server for the time being.. and may not rebuild.

              scottalanmillerS 1 Reply Last reply Reply Quote 0
              • scottalanmillerS
                scottalanmiller @gjacobse
                last edited by

                @gjacobse said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

                Had the same thing happen to my Vultr Pi-Hole.. I deleted the server for the time being.. and may not rebuild.

                I thought you had a WARNING that it COULD happen, not that it DID happen.

                gjacobseG 1 Reply Last reply Reply Quote 0
                • gjacobseG
                  gjacobse @scottalanmiller
                  last edited by

                  @scottalanmiller said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

                  @gjacobse said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

                  Had the same thing happen to my Vultr Pi-Hole.. I deleted the server for the time being.. and may not rebuild.

                  I thought you had a WARNING that it COULD happen, not that it DID happen.

                  Correct.. the notice came in over the weekend.

                  scottalanmillerS dbeatoD 2 Replies Last reply Reply Quote 0
                  • scottalanmillerS
                    scottalanmiller @gjacobse
                    last edited by scottalanmiller

                    @gjacobse said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

                    @scottalanmiller said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

                    @gjacobse said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

                    Had the same thing happen to my Vultr Pi-Hole.. I deleted the server for the time being.. and may not rebuild.

                    I thought you had a WARNING that it COULD happen, not that it DID happen.

                    Correct.. the notice came in over the weekend.

                    Right, totally different. One is being told you have an open port, which is essentially guaranteed to happen as Vultr does that every few days. The other is very unlikely, an actual attack.

                    Everyone on Vultr gets the one. When we said that no one else has had this happen, you didn't have it happen either.

                    gjacobseG 1 Reply Last reply Reply Quote 0
                    • dbeatoD
                      dbeato @gjacobse
                      last edited by

                      @gjacobse said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

                      @scottalanmiller said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

                      @gjacobse said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

                      Had the same thing happen to my Vultr Pi-Hole.. I deleted the server for the time being.. and may not rebuild.

                      I thought you had a WARNING that it COULD happen, not that it DID happen.

                      Correct.. the notice came in over the weekend.

                      You can limit the access to port 53 to the locations (Homes and offices) that use your Pi-Hole in Vultr. That is how I had it on Google DNS.

                      1 Reply Last reply Reply Quote 0
                      • gjacobseG
                        gjacobse @scottalanmiller
                        last edited by

                        @scottalanmiller said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

                        @gjacobse said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

                        @scottalanmiller said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

                        @gjacobse said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

                        Had the same thing happen to my Vultr Pi-Hole.. I deleted the server for the time being.. and may not rebuild.

                        I thought you had a WARNING that it COULD happen, not that it DID happen.

                        Correct.. the notice came in over the weekend.

                        Right, totally different. One is being told you have an open port, which is essentially guaranteed to happen as Vultr does that every few days. The other is very unlikely, an actual attack.

                        Everyone on Vultr gets the one. When we said that no one else has had this happen, you didn't have it happen either.

                        This is what I received:

                        Dear Customer,
                        
                        This abuse ticket requires your immediate attention.  Please correct the matter and reply to 
                        this ticket with resolution within the next 48 hours to ensure uninterrupted service. 
                        Overwhelming evidence of violation/compromise may result in VPS suspension prior to the 48 hour deadline to protect system and additional customer resources.
                        
                        -- Complaint Response Team --
                        
                        To update or check the progress of your ticket, please reply directly to this e-mail or visit:
                        DustinB3403D scottalanmillerS 2 Replies Last reply Reply Quote 0
                        • DustinB3403D
                          DustinB3403 @gjacobse
                          last edited by

                          @gjacobse Vultr is seeing the traffic spike on your instance, to levels way beyond what is normal and likely for a sustained amount of time.

                          Thus they are telling you to fix whatever is wrong or they are shutting you down.

                          1 Reply Last reply Reply Quote 0
                          • JaredBuschJ
                            JaredBusch
                            last edited by

                            I never got htis obsession with making public Pi-Hole systems.
                            No one is going to go to all the trouble to override their cellular settings to use the Pi-Hole when roaming.

                            Just setup something at home and move on.

                            DustinB3403D scottalanmillerS 2 Replies Last reply Reply Quote 0
                            • DustinB3403D
                              DustinB3403 @JaredBusch
                              last edited by

                              @JaredBusch that was kind of my point.

                              How much value is there in doing this, really?

                              scottalanmillerS 1 Reply Last reply Reply Quote 0
                              • scottalanmillerS
                                scottalanmiller @gjacobse
                                last edited by

                                @gjacobse said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

                                @scottalanmiller said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

                                @gjacobse said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

                                @scottalanmiller said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

                                @gjacobse said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

                                Had the same thing happen to my Vultr Pi-Hole.. I deleted the server for the time being.. and may not rebuild.

                                I thought you had a WARNING that it COULD happen, not that it DID happen.

                                Correct.. the notice came in over the weekend.

                                Right, totally different. One is being told you have an open port, which is essentially guaranteed to happen as Vultr does that every few days. The other is very unlikely, an actual attack.

                                Everyone on Vultr gets the one. When we said that no one else has had this happen, you didn't have it happen either.

                                This is what I received:

                                Dear Customer,
                                
                                This abuse ticket requires your immediate attention.  Please correct the matter and reply to 
                                this ticket with resolution within the next 48 hours to ensure uninterrupted service. 
                                Overwhelming evidence of violation/compromise may result in VPS suspension prior to the 48 hour deadline to protect system and additional customer resources.
                                
                                -- Complaint Response Team --
                                
                                To update or check the progress of your ticket, please reply directly to this e-mail or visit:
                                

                                That's what everyone gets. That doesn't apply to this thread.

                                1 Reply Last reply Reply Quote 0
                                • scottalanmillerS
                                  scottalanmiller @JaredBusch
                                  last edited by

                                  @JaredBusch said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

                                  I never got htis obsession with making public Pi-Hole systems.
                                  No one is going to go to all the trouble to override their cellular settings to use the Pi-Hole when roaming.

                                  Just setup something at home and move on.

                                  I do 🙂

                                  DustinB3403D 1 Reply Last reply Reply Quote 0
                                  • scottalanmillerS
                                    scottalanmiller @DustinB3403
                                    last edited by

                                    @DustinB3403 said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

                                    @JaredBusch that was kind of my point.

                                    How much value is there in doing this, really?

                                    Why do it at all then? I mean sure, we are at home "most" of the time. But you still want it when not at home.

                                    JaredBuschJ 1 Reply Last reply Reply Quote 0
                                    • DustinB3403D
                                      DustinB3403 @scottalanmiller
                                      last edited by

                                      @scottalanmiller said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

                                      @JaredBusch said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

                                      I never got htis obsession with making public Pi-Hole systems.
                                      No one is going to go to all the trouble to override their cellular settings to use the Pi-Hole when roaming.

                                      Just setup something at home and move on.

                                      I do 🙂

                                      You aren't the majority.

                                      @scottalanmiller said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

                                      @DustinB3403 said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

                                      @JaredBusch that was kind of my point.

                                      How much value is there in doing this, really?

                                      Why do it at all then? I mean sure, we are at home "most" of the time. But you still want it when not at home.

                                      Because this would be comparable to doing it for a business. Run your house like you would run a business.

                                      PiHole is designed with the intention of being used on a LAN. Not as a public DNS server. . .

                                      1 Reply Last reply Reply Quote 0
                                      • DustinB3403D
                                        DustinB3403
                                        last edited by

                                        Although I do wonder how Google manages. . . .

                                        scottalanmillerS 1 Reply Last reply Reply Quote 0
                                        • scottalanmillerS
                                          scottalanmiller @DustinB3403
                                          last edited by

                                          @DustinB3403 said in Pi-hole server involved in a 'DNS Amplification' DDOS Attack:

                                          Although I do wonder how Google manages. . . .

                                          How does Cloudflare mitigate DNS amplification attacks?

                                          With a properly configured firewall and sufficient network capacity (which isn't always easy to come by unless you are the size of Cloudflare), it's trivial to block reflection attacks such as DNS amplification attacks. Although the attack will target a single IP address, our Anycast network will scatter all attack traffic to the point where it is no longer disruptive. Cloudflare is able to use our advantage of scale to distribute the weight of the attack across many Data Centers, balancing the load so that service is never interrupted and the attack never overwhelms the targeted server’s infrastructure. During a recent six month window our DDoS mitigation system "Gatebot" detected 6,329 simple reflection attacks (that's one every 40 minutes), and the network successfully mitigated all of them. Learn more about Cloudflare's advanced DDoS Protection.

                                          Source: https://www.cloudflare.com/learning/ddos/dns-amplification-ddos-attack/

                                          1 Reply Last reply Reply Quote 2
                                          • scottalanmillerS
                                            scottalanmiller
                                            last edited by

                                            Source IP verification – stop spoofed packets leaving network

                                            Because the UDP requests being sent by the attacker’s botnet must have a source IP address spoofed to the victim’s IP address, a key component in reducing the effectiveness of UDP-based amplification attacks is for Internet service providers (ISPs) to reject any internal traffic with spoofed IP addresses. If a packet is being sent from inside the network with a source address that makes it appear like it originated outside the network, it’s likely a spoofed packet and can be dropped. Cloudflare highly recommends that all providers implement ingress filtering, and at times will reach out to ISPs who are unknowingly taking part in DDoS attacks and help them realize their vulnerability.

                                            DashrenderD 1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 3
                                            • 4
                                            • 4 / 4
                                            • First post
                                              Last post