isc.org provides attack mitigation
Some services respond to potentially  spoofed udp packets.
MITIGATION for DNS servers.
Upgrade to bind 9.3.3b1 OR
MITIGATION for other udp services:
Disable or restrict access to UDP  services that don't need to be open to the internet. 
The basic issue here is very old. It  was originally reported in 1999. The CVE number for it is CVE-1999-0103. http://nvd.nist.gov/nvd.cfm?cvename=CVE-1999-0103
"Echo and chargen, or other  combinations of UDP services, can be used in tandem to flood the server, a.k.a.  UDP bomb or UDP packet storm." 
If you consider DNS to be one side  of an "other combination" of UDP services this is not new. What is new is that  this version of bind will not send FORMERR packets if the original packet came  from the set of well known UDP ports listed above. ISC.ORG has added some code to  mitigate attacks with well known spoofed source ports. I do not know of any  other DNS software vendor that has added this capability.
7 years ago CERT and others warned  us not to leave things like echo and chargen open.
However some OSes and network  equipment vendors still ship products with those types of services enabled by  default and open to the world. Those services haven't not been in common usage  since the 1990's. 
--- 9.3.3b1 released ---
<SNIP>
1951.    [security]           Drop  queries from particular well known ports.
<SNIP>
 
              
Comments