|
Click to Enlarge / Download PDFIt has been another busy quarter for the team that works on our DDoS Protection Services here at Verisign. As detailed in the recent release of our Q2 2014 DDoS Trends Report, from April to June of this year, we not only saw a jump in frequency and size of attacks against our customers, we witnessed the largest DDoS attack we’ve ever observed and mitigated—an attack over 300 Gbps against one of our Media and Entertainment customers.
This attack is significant for a number of reasons and I encourage you to read a detailed recounting of the attack timeline as well as the various trends we track in the report.
Here are a few highlights:
If you’d like to read about what we saw in Q1, you can access that report here.
Sponsored byIPv4.Global
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byRadix
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byCSC
http://www.verisigninc.com/assets/VRSN_DDoS_TR_Q1_201405-web.pdf
Trying to resolve that URL, we need:
dig http://www.verisigninc.com ns @a1.verisigndns.com. +edns +norecur
...
http://www.verisigninc.com. 600 IN NS gslb.shared-fo.brn1.verisign.com.
dig http://www.verisigninc.com a @gslb.shared-fo.brn1.verisign.com. +edns +norecur
...
http://www.verisigninc.com. 30 IN A 69.58.187.40
dig http://www.verisigninc.com ns @gslb.shared-fo.brn1.verisign.com. +edns +norecur
...
;; ->>HEADER<
<- opcode: QUERY, status: NXDOMAIN, id: 48652
dig
http://www.verisigninc.com a @gslb.shared-fo.brn1.verisign.com. +edns +norecur +nsid
...
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 338
The load balancer at gslb.shared-fo.brn1.verisign.com does not know about NS records, and it chokes on edns options. See rfc5001 from 2007. One might think that verisign could handle an option that was standardized 7 years ago.