Nobody knows who organized the attack. It might have come from an angry gamer, or from a rogue spy, or, perhaps, an angry rogue spy playing games. The program hijacked many cameras and home devices, and redirected them to engineer a series of distributed denial of server (DDOS) attacks on a few hours apart, all on October 21, 2016. By executing this novel and rather clever hijack of many devices for a DDOS attack, the attack exposed an important vulnerability in today’s internet.
The attack contains one other element. It aimed at Dyn, who acts as a name-resolver. Dyn enables Internet traffic by translating the site’s domain name (URL) into the IP address where the server behind that domain is to be found. During the later phases of the attack, Dyn servers were unable to process users’ requests, and as a result, users lost access to web domains contracting with Dyn, such as Netflix, CNBC, and Twitter. Other well-known firms also were disabled, such as Airbnb, Etsy, Play Station Network, and Wikia.
Today’s column focuses on the aftermath of this event, which did not get headlines, but illustrates an important features of the situation. Specifically, how did users react? User behavior tells us something about the challenges facing suppliers, and in this case, it tells us about a basic challenge in network security today. It will take a bit of work to appreciate the lesson, and, let me tip my hand, the news is not good.
The column provides a summary of a longer study done by a group of my colleagues and myself. See the reference at the end of the column.
What happened?
Start with the basics. A website owner can set up its own name resolver, or hire somebody to do it for them. Many years ago most firms did it themselves. Like a lot of things on the internet, over time a set of professional firms emerged, while many technically sophisticated firms still perform this function for themselves.
What do name resolvers do? Start with the basics. It’s a mouthful, but we need to understand it to understand what happened to Dyn.
When an application (such as a web browser) wants to access a page or resource located at a known domain name, it can access DNS records and a corresponding IP address. In principle, the application submits a request to a DNS “resolver” asking for the IP address corresponding to a given domain name. The resolver queries a root nameserver, which replies with the corresponding to the TLD nameserver specified by the domain name (e.g., “.com”). The resolver then queries that TLD nameserver with the second component of the domain name (e.g., “google”). The TLD nameserver retrieves that domain’s authoritative nameservers (e.g., “ns1.google.com”) and returns them to the resolver. Finally, the resolver queries one of the authoritative nameservers and receives a usable IP address for the domain. The IP address is passed back to the original application, which can use it to connect to the desired host. This entire process generally takes just milliseconds.
In practice, many users request the same thing repeatedly, so it is possible to cache the answers to many of the intermediate steps, and that can speed up the resolution even more. More to the point, caching across many servers acts as a quasi-buffer against a DDOS attack, especially if the attack can be rebuffed in a short time.
The emergence of numerous lessons and automated standard practices has gone hand-in-hand with the emergence of professional firms. Such firms know how to provide services at scale. In turn, and as with many other professional markets, some of them became good at their service, and that performance attracted many customers.
Thus emerged an ironic outcome. While the internet contains many points of resiliency, the increasing concentration of services in a small number of providers has created concentrated points of failure. To say it another way, Dyn performed approximately ten percent of nameserver services in the US (prior to the attack), so bringing it down could bring down ten percent of the internet’s servers. Since name resolution also supports a range of other communications, such as email, it could also cripple communications at many firms. That is a big deal.
As should be obvious, the potential economic losses could be enormous. Many businesses, especially internet businesses, lose a lot of revenue from being down for a day.
That motivates a basic question: after this attack, what did users do? It did not take much professional experience to understand the vulnerability or the lessons. Businesses were vulnerable to a single point of failure. A website could construct a form of insurance by performing a simple act: maintaining multiple name servers with multi-homing.
We set out to find out two things: first, how many firms maintain multi-homing? Second, how did the use of resolvers change after the Dyn attack? The Figure, which is taken from Figure 7 of our study, tells a big part of the answer we found. This figure shows the market shares for the largest providers of nameservers between late 2011 and the middle of 2017.
Figure: Market share for largest name servers
What did firms do?
The Figure shows that, long before the Dyn attack, name servers had embarked on a general trend towards more concentration. The growth of three firms – Dyn, AWS, and Cloudflare – drove this trend. Dyn’s growth had already begun to level off by 2014, while AWS and Cloudflare have continued to grow unabated throughout the time period.
The figure actually does not tell the entire story. We did a little investigation, and found that both AWS and Cloudfare attract a high fraction of the contracts from newly founded firms. Older firms tend to use others.
We also found that, as expected, over time an increasing fraction of users contracted with providers instead of doing it themselves. Close to sixty percent do it themselves in 2011, while close to thirty percent do it in 2017. In other words, the market shares rise during a time when the number of customers practically doubled.
The figure also illustrates the big surprise. The attack on Dyn had consequences for its commercial success. Many of its users seem to have blamed Dyn for the downtime, and shifted to another provider. Within a couple months Dyn lost a quarter of its customers. Ouch.
But wait, that is not the only surprise. It is also important to notice what did not happen: We did not find much multi-homing after the Dyn attack. Around eleven percent of existing domains multi-homed prior to the Dyn attack, and about eighteen percent did so after the attack. New domains multi-homed at a rate of less than five percent prior to the attack, and after the attack about eight percent did. In short, there was an uptick in multi-homing, but the vast majority of sites continued to use a single provider.
Why does that matter? The least expensive insurance against another attack is multi-homing with more than one resolver. Let’s be clear about it: It is not expensive. It is just a minor hassle to maintain multiple suppliers. (And, moreover, many aspects of web administration are no worse a hassle. That is the job, after all.)
Not illustrated in the figure are minutia of market shares. In case you were wondering, most of the multi-homing among existing websites came from customers of Dyn and somewhat from Neustar (another large provider). No other provider saw a big change.
You might reasonably reply that Cloudflare’s security model makes it difficult to multi-home, but does protect against this type of attack. Which is true. But what accounts for so little with all the others? Most users act as if they do not care.
Conclusion
Let’s summarize. There was a DDOS attack on Dyn. It demonstrated a new vulnerability, and we are still vulnerable to another similar attack. In fact, we may be more vulnerable now that bad actors have watched the prior demonstration.
How did the user community act? The two big headlines are (1) A fraction of customers acted as if they blamed Dyn, and took precautions; (2) All but a small fraction of non-Dyn customers did not act as if they learned any lesson.
I do not know about you, but I do not feel any safer. Sigh.
Reference:
Samantha Bates, John Bowers, Shane Greenstein, Jordi Weinstock, and Jonathan Zittrain, 2018 “In support of Internet Entropy: Mitigating an increasingly Dangerous Lack of Redundancy in DNS Resolution by Major Websites and services.” NBER Working paper 24317. Available at SSRN: https://ssrn.com/abstract=3241740.
Copyright held by IEEE.
To view the original essay click here (currently behind a subscriber wall).
The preceding is republished on TAP with permission by its author, Professor Shane Greenstein, Harvard Business School. “The Aftermath of the Dyn DDOS Attack” was published on Digitopoly on September 12, 2019. The original article this post is taken from was published with the same title in IEEE Micro July - August 2019 (Vol. 39, Issue 4, Page 66-68). IEEE holds the copyright.