Re: Possible cache poisoning

2010-10-26 Thread Niobos
On 2010-10-26 00:39, The Doctor wrote: > My question is how can you detect if a DSN / Domain name > has been 'poisoned'? By using DNSSEC ___ bind-users mailing list bind-users@lists.isc.org https://lists.isc.org/mailman/listinfo/bind-users

Re: Possible cache poisoning

2010-10-26 Thread lst_hoe02
Zitat von The Doctor : My question is how can you detect if a DSN / Domain name has been 'poisoned'? Compare what your cache deliver with results from other sites. To prevent cache poison you might use DNSSEC if the zones which are affected support it and at least use a recent Resolver wit

Re: bind9.7.1 Reload Fails with Permission Denied. solved

2010-10-26 Thread Matus UHLAR - fantomas
On 21.10.10 15:51, Martin McCormick wrote: > The problem was that named.conf.keys was owned by root > instead of bind. I have an #include statement in named.conf to > read in the file so there is where the permission problem was > and the log tells you quite nicely what line number in > named

Re: Possible cache poisoning

2010-10-26 Thread Matus UHLAR - fantomas
On 25.10.10 16:39, The Doctor wrote: > My question is how can you detect if a DSN / Domain name > has been 'poisoned'? quitye hard if it's already been done. You can see what it contains and compare it with what is should contain, but you never know if the incorrect data didn't come from misconfig

bind9.7.1 Skipping lots of Zone Transfers

2010-10-26 Thread Martin McCormick
Ah, the wonderful world of high stakes no-return upgrades! I turned on a new installation of bind9.7.1 after running it in slave mode for a few days and: 26-Oct-2010 07:30:46.497 zone 78.139.IN-ADDR.ARPA/IN: refresh: skipping zone transfer as master 139.78.100.1#53 (source 0.0.0.0#0) is

Re: bind9.7.1 Skipping lots of Zone Transfers

2010-10-26 Thread Alan Clegg
On 10/26/2010 8:45 AM, Martin McCormick wrote: > 26-Oct-2010 07:30:46.497 zone 78.139.IN-ADDR.ARPA/IN: refresh: > skipping zone transfer as master 139.78.100.1#53 (source 0.0.0.0#0) is > unreachable (cached) Are you able to "dig @139.78.100.1 78.139.IN-ADDR.ARPA axfr" when logged into the slave

Re: bind9.7.1 Skipping lots of Zone Transfers

2010-10-26 Thread Martin McCormick
Alan Clegg writes: > Are you able to "dig @139.78.100.1 78.139.IN-ADDR.ARPA axfr" when logged > into the slave? No and your diagnosis was spot on. > It seems that communications between the slave (which we don't know the > IP address of) and the server at 139.78.100.1 is broken. Oh, yes!

Re: Possible cache poisoning

2010-10-26 Thread Sten Carlsen
If we talk about checking after suspected poisoning, my best idea is: dump the cache, then flush the cache and do the lookups again and compare to the cache-dump. Any difference is suspicious and should be looked closer upon. The cure is BTW also to flush the cache of the fake info. Remember tha

limiting number of recursion/queries per IP address

2010-10-26 Thread Kebba Foon
Dear List, Is is possible to limit the number of recursion/queries per IP address. there is some kind of virus thats bombarding my dns servers with a lot of queries, i realize that when ever the total number of recursion clients reach 1000 dns resolution stop working. i have increase the recursive

RE: limiting number of recursion/queries per IP address

2010-10-26 Thread Todd Snyder
What version of bind, on what OS? There may be some things you can do with iptables to limit connections http://www.debian-administration.org/articles/187 I don't recall seeing anything native to BIND that would allow for limits per src. t. -Original Message- From: bind-users-bounces+

RE: limiting number of recursion/queries per IP address

2010-10-26 Thread Kebba Foon
On Tue, 2010-10-26 at 15:22 -0400, Todd Snyder wrote: > What version of bind, on what OS? > I use Debian 5.0 with bind 9.6-ESV-R1 but also i thought that the OS might have some security holes so i try FreeBSD 8.1 with BIND 9.7.1 but still have ihave the same problems. > here may be some things yo

RE: limiting number of recursion/queries per IP address

2010-10-26 Thread Lightner, Jeff
iptables is available in most Linux distros and it is definitely better to block things there than in BIND itself. I don't know that BIND has a rate limiter. It DOES have a "blacklist" option where you can completely block a site's access to it but as noted above it is better to do it in iptables