Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
iva
Explorer

DNS Data Overflow causing high CPU and IPS Bypass

We are running R81.10 JHF 132 on Quantum 6600 appliances. We are hosting DNS services for the public internet in a DMZ on TCP/UDP 53. Some time ago, our IPS started preventing DNS Data Overflow (Response packet too long, potential buffer overflow) attacks on TCP/53. In combination with these attacks, IPS bypass is activated and CPU Load increases to >80%. The appliance stops responding for some time, causing outages.

The traffic pattern usually includes a relatively low numer of connections from distributed source IPs. To me if looks like a OS vulnerability exploited by attackers.

To prevent this, we have contacted CheckPoint support, and activated DoS features such as rate limiting and penalty box. However, due to the traffic pattern mentioned above, these mitigations are not completely effective. 

I am contacting the community, hoping to some more input on alternative mitigation methods regarding this specific attack. Maybe somebody has experienced the same type of attack and managed to find a solution?

0 Kudos
5 Replies
Chris_Atkinson
Employee Employee
Employee

Is the traffic accepted by implied rules or specific rules you have configured?

As a side how is the memory utilization throughout and do your UDP DNS (domain-udp) service objects in the policy use the default timeout values?

CCSM R77/R80/ELITE
0 Kudos
iva
Explorer

Hi, thanks for your input! Traffic is accepted by specific rules that were configured, and and memory usage does not show a noteable increase while CPU usage is high. We do use custom service objects for TCP/53 and UDP/53, but they use default timeout values. The only difference is that "Match for Any" in the custom object is checked...to my understanding this is not relevant.

0 Kudos
PhoneBoy
Admin
Admin

DDoS attacks can have both a "volume" element and an application-specific element.
The DDoS Mitigation features can definitely help with traffic volume portions of a DDoS, though it sounds like this is targeting something specific to your DNS implementation.
Check Point does offer DDoS Protector appliances that are more geared towards addressing these challenges.

0 Kudos
Timothy_Hall
Legend Legend
Legend

Are you using a cluster?  DNS is notorious for causing a very high amount of state sync traffic which can drive up the CPU.  On the Advanced setting of your services matching DNS, uncheck "Synchronize connections...". 

There is a relatively new setting on the cluster object that only syncs connections/sessions that have lasted more than 3 seconds, but because UDP is stateless and the UDP session timeout is 40 seconds by default, these UDP DNS sessions always get synced and hang around for awhile.  

If this doesn't help next step is setting Aggressive Aging and possibly lowering the more aggressive UDP timeout from its default of 15 seconds.

Gateway Performance Optimization R81.20 Course
now available at maxpowerfirewalls.com
0 Kudos
iva
Explorer

Thanks for your reply. I changed the parameters you suggested and will observe @PhoneBoy  Thanks, I agree... something application-specific is being targeted. We have DDoS mitigation service we can activate during an attack, but not running permanently. 

0 Kudos

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events