Re: "Recursive no;" implications?

2014-01-22 Thread Steven Carr
On 22 January 2014 05:29, LuKreme  wrote:
> OK, so in order to lock down your server agains DDOS DNS attacks you need to 
> restrict the access to the recursive lookup, yes? But if you set 'recursion 
> no;' then your own servers will not lookup IP addresses for, for example, you 
> mail server to check reject_unknown_reverse_client_hostname or related.
> Looking at that, if I am reading it correctly, I should have
> allow-recursion { "localnets"; }

So yes that is an option to restrict which IPs can perform recursion
by using an ACL. A better option (and better overall design) would be
to split your DNS servers, leave the current DNS servers as
authoritative only and install a second set of DNS servers as a
caching layer allowing recursion and do not have any direct inbound
access from the Internet. All internal clients point to the caching
layer.

> in the options on the master and slave DNS servers (along with any other 
> specific IPs that I want to/need to allow). Given the risks in allowing 
> recursion for the wilds of the Internet, how are companies like Google able 
> to allow access to 8.8.8.8 and 8.8.4.4 without being used for these DDOS 
> attacks?

Well they probably are being subjected to DDoS all the time, but
Google uses their own DNS implementation so more than likely they have
written in functionality to rate-limit and block specific
clients/requests. They also have a lot of bandwidth and they have a
lot of servers, using Anycast for distribution.
http://en.wikipedia.org/wiki/Google_Public_DNS
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Non-responsive name servers when started during boot on OS X Mavericks 10.9

2014-01-22 Thread Larry Stone

On Jan 21, 2014, at 11:38 PM, LuKreme  wrote:

> 
> On 18 Jan 2014, at 06:52 , Larry Stone  wrote:
> 
>> That is not the problem. 
> 
> In the launchd plist do you have something like
> 
> 
>  NetworkState
>  
> 
> 
> or maybe
> 
> inetdCompatibility
> 
>  Wait
>  
> 
> 
> to tell the system not to start bind until after the network is up?

No, but neither does Apple. My launched plist is the same as what Apple 
provided with OS X 10.8 as well as being the one at 
http://opensource.apple.com/source/bind9/bind9-45.100/org.isc.named.plist 
modified only for the slightly different file specs. Note that per the 
launchd.plist man page, NetworkState is an option to the KeepAlive key and does 
not stand alone in a plist.


http://www.apple.com/DTDs/PropertyList-1.0.dtd";>


Disabled

EnableTransactions

Label
org.isc.named
OnDemand

ProgramArguments

/usr/local/sbin/named
-f
-c
/usr/local/etc/named.conf

ServiceIPC




But another good area for experimentation when I have a chance (yesterday’s 
surprise announcement that Logmein is discontinuing their Free product 
effective immediately shuffled the priorities :-( ).

-- 
Larry Stone
lston...@stonejongleux.com
http://www.stonejongleux.com/





smime.p7s
Description: S/MIME cryptographic signature
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: "Recursive no;" implications?

2014-01-22 Thread Alan Clegg

On Jan 22, 2014, at 3:43 AM, Steven Carr  wrote:

> On 22 January 2014 05:29, LuKreme  wrote:

>> in the options on the master and slave DNS servers (along with any other 
>> specific IPs that I want to/need to allow). Given the risks in allowing 
>> recursion for the wilds of the Internet, how are companies like Google able 
>> to allow access to 8.8.8.8 and 8.8.4.4 without being used for these DDOS 
>> attacks?
> 
> Well they probably are being subjected to DDoS all the time, but
> Google uses their own DNS implementation so more than likely they have
> written in functionality to rate-limit and block specific
> clients/requests. They also have a lot of bandwidth and they have a
> lot of servers, using Anycast for distribution.
> http://en.wikipedia.org/wiki/Google_Public_DNS

In addition to being rate-limited, blocking, etc., I'm sure the Google servers 
are instrumented as data collection devices and are providing data back to 
someone regarding what DNS is actually doing and being used for.

Why else would they do it?   8-)

AlanC
-- 
Alan Clegg | +1-919-355-8851 | a...@clegg.com



signature.asc
Description: Message signed with OpenPGP using GPGMail
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: "Recursive no;" implications?

2014-01-22 Thread Phil Mayers
Alan Clegg  wrote:
>
>In addition to being rate-limited, blocking, etc., I'm sure the Google
>servers are instrumented as data collection devices and are providing
>data back to someone regarding what DNS is actually doing and being
>used for.
>
>Why else would they do it?   8-)
>
>AlanC

Google have argued that good, fast and reliable dns is a needed service. I know 
from experience that, sadly, many isps under provision their recursive 
resolvers and most people can't run their own (the "resolvers" in most CPE 
being a bad joke). So a 3rd party is a logical solution.

I'm sure the data mining is an added benefit however...
-- 
Sent from my phone with, please excuse brevity and typos
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: "Recursive no;" implications?

2014-01-22 Thread Barry Margolin
In article ,
 Phil Mayers  wrote:

> Alan Clegg  wrote:
> >
> >In addition to being rate-limited, blocking, etc., I'm sure the Google
> >servers are instrumented as data collection devices and are providing
> >data back to someone regarding what DNS is actually doing and being
> >used for.
> >
> >Why else would they do it?   8-)
> >
> >AlanC
> 
> Google have argued that good, fast and reliable dns is a needed service. I 
> know from experience that, sadly, many isps under provision their recursive 
> resolvers and most people can't run their own (the "resolvers" in most CPE 
> being a bad joke). So a 3rd party is a logical solution.
> 
> I'm sure the data mining is an added benefit however...

Similar to why they're building their own fiber networks. If they make 
the infrastructure better, they expect to get more usage of their 
value-added services.

-- 
Barry Margolin
Arlington, MA
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Non-responsive name servers when started during boot on OS X Mavericks 10.9

2014-01-22 Thread LuKreme

On 22 Jan 2014, at 05:37 , Larry Stone  wrote:

> 
> On Jan 21, 2014, at 11:38 PM, LuKreme  wrote:
> 
>> 
>> On 18 Jan 2014, at 06:52 , Larry Stone  wrote:
>> 
>>> That is not the problem. 
>> 
>> In the launchd plist do you have something like
>> 
>> 
>> NetworkState
>> 
>> 
>> 
>> or maybe
>> 
>> inetdCompatibility
>> 
>> Wait
>> 
>> 
>> 
>> to tell the system not to start bind until after the network is up?
> 
> No, but neither does Apple.

Right, but Apple did this by having their compile of bind start listening on 
127.0.0.1 and then prodding it once the network was up and the IP address was 
available. Since Apple doesn't take this extra step, you'd need to tell launchd 
to wait for the Network, or you'd have to duplicate Apple's solution (probably 
by sending need a SIGHUP when the network is live).

> My launched plist is the same as what Apple provided with OS X 10.8

Right, but bind was included with the base OS X client in 10.8.

> But another good area for experimentation when I have a chance (yesterday’s 
> surprise announcement that Logmein is discontinuing their Free product 
> effective immediately shuffled the priorities :-( ).

Yes, that rather pissed me off as well. It's one thing to discontinue a free 
service, it is something else entirely to cut it off with no warning. Oh well.

-- 
'Winners never talk about glorious victories. That's because they're the
ones who see what the battlefield looks like afterwards. It's only the
losers who have glorious victories.' --Small Gods

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: "Recursive no;" implications?

2014-01-22 Thread LuKreme

On 22 Jan 2014, at 01:43 , Steven Carr  wrote:

> A better option (and better overall design) would be
> to split your DNS servers, leave the current DNS servers as
> authoritative only and install a second set of DNS servers as a
> caching layer allowing recursion and do not have any direct inbound
> access from the Internet. All internal clients point to the caching
> layer.

Ah, well, that's an idea. I could even run the caching dns on the nail server.

-- 
And I'm nor insane, my mother had me tested.

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: "Recursive no;" implications?

2014-01-22 Thread Dave Warren

On 2014-01-22 00:43, Steven Carr wrote:

Well they probably are being subjected to DDoS all the time, but
Google uses their own DNS implementation so more than likely they have
written in functionality to rate-limit and block specific
clients/requests. They also have a lot of bandwidth and they have a
lot of servers, using Anycast for distribution.
http://en.wikipedia.org/wiki/Google_Public_DNS


The fact that they're using anycast possibly helps their code detect 
DDoS attempts too; if their anycast farm in India receives a request 
"from" an IP in the US with half a dozen closer anycast farms/points, it 
can potentially assume that that query is part of an attack and rate 
limit much more drastically than is normally done.


--
Dave Warren
http://www.hireahit.com/
http://ca.linkedin.com/in/davejwarren

The cigarette does the smoking, you're just the sucker.


___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Non-responsive name servers when started during boot on OS X Mavericks 10.9

2014-01-22 Thread Larry Stone

On Wed, 22 Jan 2014, LuKreme wrote:

Right, but Apple did this by having their compile of bind start 
listening on 127.0.0.1 and then prodding it once the network was up and 
the IP address was available. Since Apple doesn't take this extra step, 
you'd need to tell launchd to wait for the Network, or you'd have to 
duplicate Apple's solution (probably by sending need a SIGHUP when the 
network is live).


This discussion is going full circle (although part of it may have been a 
couple of private emails I was sent). I speculated that Apple was making 
undocumented patches to bind and someone said no, it's as distributed.


But this is why I really like installing from source - too many packagers 
making undocumented changes that cause software to behave differently than 
the documentation says it till.


But I will get to testing your ideas. In the meantime, with a startup 
delay script and an hourly monitoring job, I have a "comfortable" 
environment.


-- Larry Stone
   lston...@stonejongleux.com
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


RE: Upgrading from 9.8.3 to 9.9.4

2014-01-22 Thread Mike Bernhardt
Thanks for that. I just remembered there was also the change to the db file
having a default raw format on slaves unless specified.

-Original Message-
From: Lawrence K. Chen, P.Eng. [mailto:lkc...@ksu.edu] 
Sent: Tuesday, January 21, 2014 1:56 PM
To: bind-users@lists.isc.org
Subject: Re: Upgrading from 9.8.3 to 9.9.4



On 01/16/14 16:39, Mike Hoskins (michoski) wrote:
> -Original Message-
> From: Mike Bernhardt 
> Date: Thursday, January 16, 2014 4:09 PM
> To: "bind-users@lists.isc.org" 
> Subject: RE: Upgrading from 9.8.3 to 9.9.4
> 
>> Sorry for the double post, but I forgot to ask this:
>> And if it is indeed enabled regardless of my RFC1918 ranges, I would 
>> imagine that for my internal servers which have those ranges, I would 
>> want to add "disable-empty-zone ".";" to my global options? And for 
>> my external-facing server which of course has no RFC1918, I would 
>> leave it to the default setting?
> 
> 
> You don't have to do this.  BIND won't enable the empty zone if you 
> already have it defined.
> 
> 

The problem I was referring to is mentioned in the feedback to this KB
article:

https://kb.isc.org/article/AA-00803/0/Why-are-queries-for-some-PTR-records-n
o-longer-forwarded-since-upgrading-to-BIND-9.9.0.html

Though, from 9.9.4 Release Notes, that's probably addressed by this bug fix:

Fix forwarding for  forward only "zones" beneath automatic empty zones.
[RT #34583]


--
Who: Lawrence K. Chen, P.Eng. - W0LKC - Sr. Unix Systems Administrator
For: Enterprise Server Technologies (EST) -- & SafeZone Ally


___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Upgrading from 9.8.3 to 9.9.4

2014-01-22 Thread Mike Hoskins (michoski)
-Original Message-
From: Mike Bernhardt 
Date: Wednesday, January 22, 2014 at 3:25 PM
To: "'Lawrence K. Chen, P.Eng.'" ,
"bind-users@lists.isc.org" 
Subject: RE: Upgrading from 9.8.3 to 9.9.4

>Thanks for that. I just remembered there was also the change to the db
>file
>having a default raw format on slaves unless specified.

That's what I meant by my response about masterfile-format.  :-)

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users