PPA for Raspbian distros

2023-03-24 Thread Andrew P .
Greetings.

Per chance, is there a repo of pre-built bind code for the Raspberry Pi 
platform? I tried using the PPA specified at 
https://launchpad.net/~isc/+archive/ubuntu/bind but it didn't support the 
release on my DNS server host (buster). I received the error 

Ign:2 https://ppa.launchpadcontent.net/isc/bind/ubuntu buster InRelease 
  
Err:3 https://ppa.launchpadcontent.net/isc/bind/ubuntu buster Release   
  
  404  Not Found [IP: 185.125.190.52 443]
Hit:4 http://archive.raspberrypi.org/debian buster InRelease
  
Reading package lists... Done 
E: The repository 'https://ppa.launchpadcontent.net/isc/bind/ubuntu buster 
Release' does not have a Release file.
N: Updating from such a repository can't be done securely, and is therefore 
disabled by default.
N: See apt-secure(8) manpage for repository creation and user configuration 
details.

If I have to compile from source, so be it, but it would be far more convenient 
to get a binary build from the authority.

Andrew Pavlin
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: latency and response time

2023-06-27 Thread Andrew P .
Personally, I would consider response time to be the duration between the 
arrival of a request at the DNS server and when the server spits the response 
for the request out its local network interface, and latency to be the 
additional time the request and response spend traversing the network between 
the client and server.

So what the client sees is the sum of response_time + (2 * latency) {making the 
somewhat arbitrary assumption that the latency is the same in both directions, 
which isn't really valid just because of the different sizes of the request and 
response, potentially exacerbated by network links on the path with 
asymmetrical baud rates}.

Just my $.02 (or whatever your local currency is).

Andrew Pavlin
ka2ddo.org



From: bind-users  on behalf of Matus UHLAR - 
fantomas 
Sent: Tuesday, June 27, 2023 12:54:09 PM

On 27.06.23 16:22, sami.ra...@sofrecom.com wrote:
>Hello In DNS benchmarking  which is more important latency or response
> time?  for a DNS server what is the difference between the two values?

I don't see any difference between those two.

--
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
The 3 biggets disasters: Hiroshima 45, Tschernobyl 86, Windows 95
--


-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


How to selectively skip DNSSEC validation?

2020-12-07 Thread Andrew P .
Greetings, all.

I'm having an odd problem, and I can't seem to figure out how to get Bind to 
behave the way I need it to.

I have a computer with a caching-only Bind instance (version 
9.11.24-RedHat-9.11.24-2.fc32), which is used both to access the regular 
Internet and to access the Amateur Radio Emergency Data Network (AREDN). AREDN 
is an RF intranet, and it has its own instance of name servers, which do not 
use encryption (as this is prohibited by national and international amateur 
radio laws and regulations). As such, I tried to add forwarding entries for the 
top-level domains in AREDN to my /etc/named.conf file as follows:

zone "mesh." IN {
type forward;
delegation-only no;
forward only;
forwarders { 192.168.0.7; };
};

zone "local.mesh." IN {
type forward;
delegation-only no;
forward only;
forwarders { 192.168.0.7; };
};

zone "10.in-addr.arpa." IN {
type forward;
forward only;
forwarders { 192.168.0.7; };
};

The options section of the file specifies

recursion yes;
dnssec-enable yes;
dnssec-validation yes;

Note that 192.168.0.7 is my local LAN address for my AREDN node (which includes 
DNS service on standard port 53).

However, whenever I try to do a lookup of an AREDN mesh domain name, it 
properly forwards to the AREDN node for service, and then complains to syslog:

Dec  7 14:54:39 server named[207007]: no valid RRSIG resolving 
'aa3e-southwest-230.local.mesh/DS/IN': 192.168.0.7#53
Dec  7 14:54:39 server named[207007]: no valid DS resolving 
'aa3e-southwest-230.local.mesh/A/IN': 192.168.0.7#53

and returns a SERVFAIL error to the client.

If I use nslookup directly to the AREDN node, the lookup succeeds. But this 
won't work for a system that needs arbitrary applications (such as web 
browsers) to look up both Internet and AREDN names.

I have confirmed that neither the global Internet servers nor the AREDN 
intranet servers have RRSIG or DS records for the mesh or local.mesh domains. 
And lookups of Internet domain names (or even my non-secured local private 
subnet zones) still works successfully.

So, how can I configure Bind to skip the DNSSEC checks _only_ when going to the 
specific AREDN server, or, alternatively, only for the zones mentioned above? 
Either method would be acceptable; ideal would be to restrict it to the 
intersection of both server and zones. Given the number of criminals and 
identity thieves on the Internet, I can't just turn off DNSSEC checks globally. 
And I can't use separate computers with separate Bind instances because I need 
to be able to selectively relay traffic between the Internet and AREDN.

The use of "delegation-only no;" in the above zone definitions was an attempt 
to work around the problem, but it didn't change the behavior over not having 
the option there. The version of Bind I am using does not permit putting the 
"dnssec-enable" and "dnssec-validation" options inside a zone definition.

I look forward to your advice in this matter.

Andrew Pavlin, KA2DDO
member, Amateur Radio Emergency Service
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


How does query denial actually work?

2020-12-17 Thread Andrew P .
Greetings, all.

I was curious about one of the features in BIND. Per the Best Practices, my 
on-site primary nameserver for my public domains (the secondaries being with a 
large public DNS provider) is configured to only allow queries from within my 
LAN and transfers in the LAN and to the designated servers at the DNS provider, 
and the zones don't actually list the primary in NS records (only in the SOA 
record). So I'm seeing large numbers of bursts of denied errors like this:

client @0x6e702710 73.61.186.10#21509 (.): query (cache) './ANY/IN' denied

I'll get maybe 20 in a row in under 2 seconds from one IP address, then a time 
gap, then a similar burst supposedly from a different IP address.

So, my questions are:

1. Are these attacks?

2. Does BIND actually send a reject message back, or is it silent in such 
denial cases (as in, not still attacking with smaller packets the victim of a 
DNS amplication attack)?

I can't figure it out from reading the source code; I haven't so far been able 
to trace back from where the messages are logged to where (if any) a response 
packet would be transmitted.

Andrew
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: SRV Record Server Availability

2021-01-06 Thread Andrew P .
Isn't this sort of dynamic functionality (real-time presence or absence of SRV 
records) what mDNS and the avahi daemon are for?


From: bind-users  on behalf of Matus UHLAR - 
fantomas 
Sent: Wednesday, January 6, 2021 8:51 AM
To: bind-users@lists.isc.org
Subject: Re: SRV Record Server Availability

On 06.01.21 21:41, Wilfred Sarmiento via bind-users wrote:
>Your understanding is correct, i just thought that SRV can detect whose
>server is alive so it can choose and provide an answer with the available
>Server.

DNS is not designed to provide this functionality. While technically you can
change contents of DNS depending on which servers are alive and which are
not, it's almost never a good idea.

That means, BIND has nothing like this built in.

>> On Tue, Jan 5, 2021 at 4:30 AM Wilfred Sarmiento via bind-users
>>  wrote:
>> > Is DNS Bind SRV record can detect the Server's availability? If yes, how?

>On Tue, 5 Jan 2021, 23:53 tale  wrote:
>> Could you provide more information about your goal?  I don't fully
>> understand the question.
>>
>> For my reading, the answer is basically no, in that an SRV record just
>> provides data about where.a particular service can be found.  It's up
>> to other systems to fetch that data and interpret it, including
>> whether that service is actually available at the given endpoint.  In
>> its typical operation, BIND will just take whatever name and port the
>> zone administrator said to provide for that SRV record, and not do any
>> sort of availability checks on it.
>>
>> However, if you go deep into a far more complicated, custom use of
>> BIND, you could set up a process that monitors the availability and
>> changes the SRV record accordingly.

--
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
Microsoft dick is soft to do no harm
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Millions of './ANY/IN' queries denied

2021-12-15 Thread Andrew P .
So why isn't there a way to tell BIND not to respond to queries for which it 
clearly is not authoritative (such as these attack vectors)? Since no 
legitimate resolver would be asking a non-authoritative server for information, 
why should his (or my) public BIND server respond to these even with an error 
message?




From: bind-users  on behalf of Ondřej Surý 

Sent: Wednesday, December 15, 2021 7:18 AM
To: Danilo Godec
Cc: bind-users@lists.isc.org
Subject: Re: Millions of './ANY/IN' queries denied

> Would I be doing a bad thing by using fail2ban to block these IPs?

That’s the question that only you can answer.  The IP addresses are
not attacker’s but victim’s and you would be punishing those networks
by blocking access from them to your network.

Do you absolutely know that these IP addresses doesn’t need access
to your DNS?  If yes, then go ahead.

Ondrej
--
Ondřej Surý (He/Him)
ond...@isc.org

> On 15. 12. 2021, at 12:51, Danilo Godec via bind-users 
>  wrote:
>
> Hello,
>
>
> I'm noticing some unusual activity where 48 external IPs generated over
> 2M queries that have all been denied (just today):
>
> 15-Dec-2021 00:01:42.023 security: info: client @0x7f96180b3fe0
> 194.48.217.14#59698 (.): view outside: query (cache) './ANY/IN' denied
> 15-Dec-2021 00:01:42.023 security: info: client @0x7f9618019e20
> 194.48.217.14#59698 (.): view outside: query (cache) './ANY/IN' denied
> 15-Dec-2021 00:01:42.023 security: info: client @0x7f9618019e20
> 194.48.217.14#59698 (.): view outside: query (cache) './ANY/IN' denied
> 15-Dec-2021 00:01:42.023 security: info: client @0x7f9618019e20
> 194.48.217.14#59698 (.): view outside: query (cache) './ANY/IN' denied
> 15-Dec-2021 00:01:42.123 security: info: client @0x7f9618019e20
> 45.145.227.33#11092 (.): view outside: query (cache) './ANY/IN' denied
> 15-Dec-2021 00:01:42.127 security: info: client @0x7f96180b3fe0
> 45.145.227.33#11092 (.): view outside: query (cache) './ANY/IN' denied
>
>
> I'm guessing this is some sort of an reflection attack attempt, but I
> don't quite understand if these are the perpetrators or victims?
>
> Would I be doing a bad thing by using fail2ban to block these IPs?
>
>
> Regards,
>
>  Danilo
>
>
> ___
> Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
> from this list
>
> ISC funds the development of this software with paid support subscriptions. 
> Contact us at https://www.isc.org/contact/ for more information.
>
>
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Millions of './ANY/IN' queries denied

2021-12-16 Thread Andrew P .
Sorry about forgetting to post the list. I hit Reply instead of Reply All. 
Annoying inconsistent list servers

You don't understand what kind of blacklist I want; I want to blacklist the 
domain name being asked for, so I don't answer for it. I'm not looking to 
blacklist forged IP addresses of requestors (since we all know criminals don't 
use their own identities; they use the identities of innocent bystanders).

Again, why should _my_ nameserver_ respond to a query for "./ANY/IN"? I am not 
a rootserver, and never will be.


From: bind-users  on behalf of Reindl Harald 

Sent: Thursday, December 16, 2021 8:14 AM
To: bind-users@lists.isc.org
Subject: Re: Millions of './ANY/IN' queries denied



Am 16.12.21 um 14:04 schrieb Andrew P.:
> So you're claiming that legitimate resolvers would still be pointing at the 
> wrong IP address for a public DNS server after over 16 years?

besides that i don't know why you are answering off-list nowhere did i
say anything about 16 years

but it can take time

just because some IP is asking for a domain you don't host is for sure
not a justification for automated blacklisting - that will happen
regulary after domain-transfers for some time

> And asking repeatedly and rapidly for the same illegal root domain name in 
> synchronized bursts of 10 queries supposedly from 10 different IP addresses?

that's what "Response Rate Limiting" is for

> I say that because I have held the particular static IPv4 address that my 
> nameserver is running on for that long, and I have never run a root 
> nameserver of any sort, or hosted domains for anyone but myself.

fine, that's *your* case - we host 800 domains and all the time some get
transferred to us and some get away

> I agree with the concept of a blacklist

i don't because the IP is in most cases FORGED

> how do I set up one on my copy of bind so I can refuse to answer those 
> obvious DNS DDoS attacks? While still answering legitimate requests for the 
> domains I do hosts, that is.

"Response Rate Limiting"

again: the IP you mostly see is FORGED and the victim not the attacker
and all you do is blacklisting the innocent victim which never did
anything bad

with automated blacklisting you expose yourself to a simple DOS attack -
when i forge 8.8.8.8 and 8.8.4.4 and you do automated blacklisting i
take your domain offline for anybody on the planet using the google
resolvers

and after 8.8.8.8 and 8.8.4.4 i feed you with a list of all known ISP
resolvers for endusers - game over, you blacklisted the world

> 
> From: bind-users  on behalf of Reindl 
> Harald 
> Sent: Wednesday, December 15, 2021 8:44 AM
> To: bind-users@lists.isc.org
> Subject: Re: Millions of './ANY/IN' queries denied
>
>
>
> Am 15.12.21 um 14:33 schrieb Andrew P.:
>> So why isn't there a way to tell BIND not to respond to queries for which it 
>> clearly is not authoritative (such as these attack vectors)? Since no 
>> legitimate resolver would be asking a non-authoritative server for 
>> information, why should his (or my) public BIND server respond to these even 
>> with an error message?
>
> because in case of UDP it would make things much worser
>
> how do the client smell that you didn't respond by purpose and distinct
> it from packet loss leading to retries?
>
> --
>
> "Since no legitimate resolver would be asking a non authoritative server
> for information" isn't true at all
>
> years ago we moved a server to a different location and all sorts of ISP
> resolvers did respond with old IPs months later, the dumbest one even
> played lottery responding 50% old and 50% new IP
>
> i found that out by random complaints because one domain had 60 count
> subdomains and started to query all open rsolvers i was able to find
> with script's - a tragedy
>
> that machine was sadly the primary NS for 800 domains and over the
> months the old ip could have been ru-used for a new customer running a
> nameserver for completly different domains
>
> --
>
> long story short: no sane service should supress replies completly
> unless a explicit blacklist saying so is involved
>
>> 
>> From: bind-users  on behalf of Ondřej Surý 
>> 
>> Sent: Wednesday, December 15, 2021 7:18 AM
>> To: Danilo Godec
>> Cc: bind-users@lists.isc.org
>> Subject: Re: Millions of './ANY/IN' queries denied
>>
>>> Would I be doing a bad thing by using fail2ban to block these IPs?
>>
>> That’s the question that only you can answer.  The IP addresses are
>&

Re: Millions of './ANY/IN' queries denied

2021-12-16 Thread Andrew P .
Reindl Harald  writes:
Am 16.12.21 um 14:22 schrieb Andrew P.:
>> You don't understand what kind of blacklist I want; I want to blacklist the 
>> domain name
>> being asked for, so I don't answer for it. I'm not looking to blacklist 
>> forged IP addresses
>> of requestors (since we all know criminals don't use their own identities; 
>> they use the
>> identities of innocent bystanders).
>>
>> Again, why should _my_ nameserver_ respond to a query for "./ANY/IN"? I am 
>> not a rootserver, and never will be.
>
>AGAIN: you don't gain anything by not responding on a UDP protocol
>because the client can't distinct no response and packet loss

AGAIN, the criminal DDoS attacker who's creating these forged requests isn't 
looking for replies to themselves; they're looking to abuse some poor victim. 
And the victim can't make the attacker shut up.

>so you *increase* the load by retries on the client

No, the attacker is going to send their packets as often as they feel like it 
regardless of whether I answer, and they won't know if the load on the victim 
is sufficient to crush them (or if I am participating), since the attacker 
isn't receiving the attack. They won't speed up on me just because I refuse to 
participate in their ugly little games because they won't know I'm not playing 
along (at least until they decide to attack _me_ instead of someone else).

>don't get me wrong but you need to understand the implications of what
>you are doing - for DOS attacks "Response Rate Limiting" was invented
>and for non-DOS requests there isn't any valid reason to take action

Please tell me what non-DOS requests would be asking _my_ name server to dump 
the root domain. I'm not running a caching-only public nameserver (such as an 
ISP might run for their customers), so _no_ _one_ should be asking my 
nameserver for the entire root domain. Even webcrawlers don't need to harrass 
non-root-nameservers for root domain information.

Note I haven't done anything yet; I'm asking if there _is_ a way to do it 
presently implemented in Bind.


___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Millions of './ANY/IN' queries denied

2021-12-16 Thread Andrew P .
Reindl Harald  writes:
>Am 16.12.21 um 14:56 schrieb Andrew P.:
>> Reindl Harald  writes:
>> Am 16.12.21 um 14:22 schrieb Andrew P.:
>>>> You don't understand what kind of blacklist I want; I want to blacklist 
>>>> the domain name
>>>> being asked for, so I don't answer for it. I'm not looking to blacklist 
>>>> forged IP addresses
>>>> of requestors (since we all know criminals don't use their own identities; 
>>>> they use the
>>>> identities of innocent bystanders).
>>>>
>>>> Again, why should _my_ nameserver_ respond to a query for "./ANY/IN"? I am 
>>>> not a rootserver, and never will be.
>>>
>>> AGAIN: you don't gain anything by not responding on a UDP protocol
>>> because the client can't distinct no response and packet loss
>>
>> AGAIN, the criminal DDoS attacker who's creating these forged requests isn't 
>> looking for replies to themselves
>
>but a legit client does while these attacks aren't successful at all

And you still haven't told me who would be a legitimate client making that 
request for the
root domain from my nameserver. Frankly, I can't think of _anyone_ who should 
be making
that request of my nameserver.

Sure, it's a legitimate request to make of someone's first-hop ISP-provided 
caching-only nameserver, or of
a root nameserver. But not against _my_ nameserver. Or are you claiming there 
is DNS spoofing out
there identifying legitimate name servers as authoritative for domains they are 
not actually
authoritative for? Seems like a rather useless form of DNS spoofing, when such 
attackers could
more usefully (to them) direct victims to nameservers under the attacker's 
control.

>> they're looking to abuse some poor victim. And the victim can't make the 
>> attacker shut up
>
>this attacker must be pretty dumb then because the ANY request makes
>only sense if it get answered and the response is magnitudes larger then
>the request

Not if the attacker has a huge bot-net to make the requests. He doesn't care 
how much of
the bots' network capacity is used up, since the attacker isn't paying for it. 
And, based on the same
philosophy as spam, if they hit enough name servers, some of them will be 
insecure and provide the
full response, while even those who only send an error packet still need to 
have that packet
consumed at the victim.

>hence you need to send them to a server giving a full answer to the victim

No, not if you get enough error responses, it will still work. It just takes 
more.

>with just a error response he could send it's attack traffic directly
>given that the attacker needs the full bandwidth anyways and not using a
>valid DNS request, just blow out traffic to UDP 53

And why should the attacker give away the location of all his bots, when he
can get all these legitimate nameservers to take the blame?

>one couldn't care less about attackers which don't know what they are doing

I suspect they do know what they are doing, or they wouldn't be wasting their
time doing it.
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Why did my DNS bill go up?

2022-04-14 Thread Andrew P .
Greetings, all.

I had a surprise on the bill from my secondary DNS provider after I turned on 
DNSSEC. The number of record queries on my domains increased by a factor of 
about 5, compared to the number of record queries when I didn't have DNSSEC. Is 
this normal for DNSSEC? It's been a consistent significantly higher query level 
since deploying DNSSEC 3 months ago on 2 small domains (total of 120 records 
across the two domains), and it was 57 new RRSIG, DNSKEY, and NSEC3PARAM 
records added the domains for the DNSSEC.

The average number of attacks per day on my webserver (according to the server 
logs) does not appear to have increased since the DNSSEC deployment.

This is for the ka2ddo.org and ka2ddo.radio domains.

So, is DNSSEC really that much more costly in terms of queries?

Andrew Pavlin
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users