Funny you should mention this. It just occurred to me, although it also apparently occurred to one other soul on the dnsrpz mailing list, you can use RPZ to audit and to some extent contain leakage.

Assuming you own example.com, I'm speaking about entries akin to the following:

*.example.example.com CNAME .
*.com.example.com CNAME .
*.net.example.com CNAME .

Entries like the foregoing will return NXDOMAIN for, for example,
dolphin2.com.example.com. ;-) It's also possible to log or direct the querant to a honeypot. Granted, most likely the stub resolver is trying dolphin2.com.example.com because it already tried dolphin2 and dolphin2.com and both of those failed, but at least you know.

You can also see just how good your passive DNS provider's data is, by looking for things which resolved to 127.0.53.53. (This is a really good way for the casual reader to understand the scope of this problem, by the way.)

Running your own caching resolver and dumping the cache and looking for stuff is also occasionally advisable; I suspect most of the people on this list would know this.

--

Fred Morris

On Mon, 25 Nov 2019, Florian Weimer wrote:

Is it because of the incoming data is interesting?

Define interesting.

The data could have monetary value.  Passwords that are otherwise
difficult to come by might be leaking.
_______________________________________________
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations

Reply via email to