El mié, 17-04-2019 a las 07:28 -0400, Jose Joaquin Ruiz Silva escribió: > Hola amigos de la lista mira tengo este problema que me esta diciendo > en > el log. Segun el administrador de mi red nacional dice que la Osri > le > dijo que eso es un virus > > 01-Jun-2018 22:22:53.646 edns-disabled: info: success resolving > 'tar.kziu0tpofwf.club/A' (in 'club'?) after disabling EDNS > > Pero yo escaneo la maquina y no encuentra nada > > Tengo el servidor de dominio con samba4 y bind9 compilados en debian > 9 > pero el servidor que esta haciendo esa peticion es en Windows Server > 2008 R2 porque es el servidor del versat. Como pudiera resilver esto. > > Saludos. > > > 01-Jun-2018 21:59:34.190 update: info: client @0x7f8eac0a8aa0 > 172.17.9.39#51167/key LENOVO\$\@FAG.REDUIM.CU: updating zone > 'fag.reduim.cu/NONE': update failed: rejected by secure update > (REFUSED) > 01-Jun-2018 21:59:34.190 database: info: samba_dlz: cancelling > transaction on zone fag.reduim.cu > 01-Jun-2018 22:00:30.116 edns-disabled: info: success resolving > '157.9.141.220.in-addr.arpa/PTR' (in '220.in-addr.arpa'?) after > disabling EDNS > 01-Jun-2018 22:02:47.833 edns-disabled: info: success resolving > '211.5.104.112.in-addr.arpa/PTR' (in 'in-addr.arpa'?) after disabling > EDNS > 01-Jun-2018 22:03:02.961 edns-disabled: info: success resolving > '211.110.115.59.in-addr.arpa/PTR' (in 'in-addr.arpa'?) after > disabling EDNS > 01-Jun-2018 22:03:20.881 edns-disabled: info: success resolving > '58.121.166.218.in-addr.arpa/PTR' (in 'in-addr.arpa'?) after > disabling EDNS > 01-Jun-2018 22:05:07.166 edns-disabled: info: success resolving > '135.76.105.112.in-addr.arpa/PTR' (in 'in-addr.arpa'?) after > disabling EDNS > 01-Jun-2018 22:07:48.280 edns-disabled: info: success resolving > '114.104.19.81.in-addr.arpa/PTR' (in 'in-addr.arpa'?) after disabling > EDNS > 01-Jun-2018 22:07:48.375 edns-disabled: info: success resolving > '117.104.19.81.in-addr.arpa/PTR' (in 'in-addr.arpa'?) after disabling > EDNS > 01-Jun-2018 22:10:13.181 edns-disabled: info: success resolving > 'redirect.geo.kaspersky.com/A' (in 'geo.kaspersky.com'?) after > disabling > EDNS > 01-Jun-2018 22:15:35.428 edns-disabled: info: success resolving > '1.31.236.200.in-addr.arpa/PTR' (in 'in-addr.arpa'?) after disabling > EDNS > 01-Jun-2018 22:17:51.565 edns-disabled: info: success resolving > '152.226.216.52.in-addr.arpa/PTR' (in '52.in-addr.arpa'?) after > disabling EDNS > 01-Jun-2018 22:21:44.083 edns-disabled: info: success resolving > '27.84.37.114.in-addr.arpa/PTR' (in 'in-addr.arpa'?) after disabling > EDNS > 01-Jun-2018 22:22:40.223 edns-disabled: info: success resolving > '189.50.55.65.in-addr.arpa/PTR' (in 'in-addr.arpa'?) after disabling > EDNS > 01-Jun-2018 22:22:53.646 edns-disabled: info: success resolving > 'tar.kziu0tpofwf.club/A' (in 'club'?) after disabling EDNS > 01-Jun-2018 22:24:10.634 edns-disabled: info: success resolving > '114.104.19.81.in-addr.arpa/PTR' (in 'in-addr.arpa'?) after disabling > EDNS > 01-Jun-2018 22:24:34.495 edns-disabled: info: success resolving > '211.30.12.85.in-addr.arpa/PTR' (in 'in-addr.arpa'?) after disabling > EDNS > 01-Jun-2018 22:24:35.212 edns-disabled: info: success resolving > '114.114.231.54.in-addr.arpa/PTR' (in '54.in-addr.arpa'?) after > disabling EDNS > 01-Jun-2018 22:26:57.610 edns-disabled: info: success resolving > '213.96.104.112.in-addr.arpa/PTR' (in 'in-addr.arpa'?) after > disabling EDNS > 01-Jun-2018 22:27:40.336 edns-disabled: info: success resolving > '4.104.121.158.in-addr.arpa/PTR' (in 'in-addr.arpa'?) after disabling > EDNS > 01-Jun-2018 22:28:00.121 database: info: samba_dlz: starting > transaction > on zone fag.reduim.cu > > _______________________________________________ > Dentro de mi súper limitado alcance en estos temas, no se trata de virus. (Doy por descontado que esa máquina Windows tiene puesto un antivirus) sino de una dificultad con el tamaño de los paquetes UDP del DNS. O el cortafuegos no deja pasar paquetes más grandes que 512 bytes. O el Server 2008 RC2 no acepta el tipo de paquetes que manda el BIND y el BIND pasa a mandar paquetes reducidos (porque tu Bind estoy seguro de que es más nuevo que ese server...).
Podrías probar a poner una directiva server como se indica en estas documentaciones que te cito más abajo. Esta documentación te dará (espero) más detalles. perdona que esté en inglés. Te la traduciría si tuviera tiempo, pero estoy "cogido" con el tiempo. ************************* It is possible to disable sending the EDNS Cookie option by creating a server { } directive in your named.conf file with send-cookie no; See also https://ednscomp.isc.org/ where there's more information about EDNS (non-)compliance and a compliance testing tool. **************** Things I never knew about DNS – EDNS We run a few internal and external DNS servers in the company I work for. Keeping them up to date is something we must do each year to keep one step ahead of any exploits discovered. I find that upgrading each version of BIND I learn something new about it. The documentation is not impressive to say the least! One new thing I learned was EDNS – Extended Mechanisms for DNS. I discovered this new (to me) option as I finished installing and configuring BIND, I enabled verbose logging to test some DNS queries. I found that some queries were abit slow to begin with. I checked the log file for messages and discovered plenty of these messages: edns-disabled: info: success resolving 'ns6.netnorth.net/AAAA' (in 'netnorth.net'?) after reducing the advertised EDNS UDP packet size to 512 octets So what is EDNS? Well first I have to tell you about ordinary DNS. Typical DNS UDP packets come with a maximum 512 octets in size. Anything more than that will be rejected or fragmented depending on your firewall. But EDNS on the otherhand carries more information and allows for a packet size up to 4026 octets. The reason for this (in RFC2671) is: “Many of DNS’s protocol limits are too small for uses which are or which are desired to become common. There is no way for implementations to advertise their capabilities.” So new versions of BIND and whatever DNS software you use will support EDNS. What will happen is that when we send a DNS request to a DNS server by default the label type will be set to ’01′ which means “extended label type”. The DNS server recieves this request and replies with either a normal 512 octet packet if it does not support EDNS yet or replies with an EDNS packet of up to 4096 octets. The problem we saw was that our firewall only accepted DNS packets of size 512 octets. Anything above that was discarded or attempted to fragment. To resolve this instead of turning off EDNS on our server I asked our network engineers to allow DNS packets through the network of up to 4096 octets in size. As soon as this was implemented the messages disappeared from the log file and DNS resolving was much faster. Some handy links: RFC: http://tools.ietf.org/html/rfc2671 BIND: http://www.bind9.net/manual/bind/9.3.2/Bv9ARM.ch06.html edns-udp-size edns-udp-size sets the advertised EDNS UDP buffer size. Valid values are 512 to 4096 (values outside this range will be silently adjusted). The default value is 4096. The usual reason for setting edns-udp-size to a non default value it to get UDP answers to pass through broken firewalls that block fragmented packets and/or block UDP packets that are greater than 512 bytes.” -- M.Sc. Alberto García Fumero Usuario Linux 97 138, registrado 10/12/1998 http://interese.cubava.cu No son las horas que pones en tu trabajo lo que cuenta, sino el trabajo que pones en esas horas. _______________________________________________ Gutl-l mailing list -- gutl-l@listas.jovenclub.cu To unsubscribe send an email to gutl-l-le...@listas.jovenclub.cu