Re: How to Setup DNSSEC

2012-10-17 Thread SM
At 21:10 16-10-2012, pangj wrote: IMO, a resolver will have the ability to get the public key of a ZSK for validating the signed RR. How will it get this public key? And, is the usage of a KSK similiar to the CA certificate? See http://www.nlnetlabs.nl/publications/dnssec_howto/ Regards, -sm

about DNS RRL

2012-10-17 Thread pangj
I have read the document of redbarn RRL for BIND and this NSD RRL: https://www.nlnetlabs.nl/blog/2012/10/11/nsd-ratelimit/ I have a question that, since the DDoS to DNS are coming from spoofed IPs. But RRL is working based on source IP. So how can it stop the real life attack? Thanks. ___

Re: about DNS RRL

2012-10-17 Thread Phil Mayers
On 10/17/2012 09:17 AM, pangj wrote: I have read the document of redbarn RRL for BIND and this NSD RRL: https://www.nlnetlabs.nl/blog/2012/10/11/nsd-ratelimit/ I have a question that, since the DDoS to DNS are coming from spoofed IPs. But RRL is working based on source IP. So how can it stop the

Re: about DNS RRL

2012-10-17 Thread Barry Margolin
In article , pangj wrote: > I have read the document of redbarn RRL for BIND and this NSD RRL: > https://www.nlnetlabs.nl/blog/2012/10/11/nsd-ratelimit/ > > I have a question that, since the DDoS to DNS are coming from spoofed > IPs. But RRL is working based on source IP. So how can it stop th

Solaris 11 and BIND 64-bit

2012-10-17 Thread Jaco Lesch
Anybody have had any luck to get the latest BIND 9.9.2 to compiled on Solaris 11 SPARC to support 64-bit binaries? I have tried with both GCC version 4.5.2 and Solaris Studio 12.3. Everything configure, link and compile fine, but when I try to run named or dig I get core dumps. Not sure if the

DNS accept filter

2012-10-17 Thread David Malone
I'm not sure if this is of interest to anyone, but I wrote a FreeBSD accept filter for DNS a few years ago. An accept filter is a socket option that you can use to tell the kernel to wait before the accept() syscall returns. In this case, the accept filter delays the return of accept until there is

Re: about DNS RRL

2012-10-17 Thread pangj
> In article , > pangj wrote: > >> I have read the document of redbarn RRL for BIND and this NSD RRL: >> https://www.nlnetlabs.nl/blog/2012/10/11/nsd-ratelimit/ >> >> I have a question that, since the DDoS to DNS are coming from spoofed >> IPs. But RRL is working based on source IP. So how can it

RE: about DNS RRL

2012-10-17 Thread Todd Snyder
>> You're thinking that the rate limit is intended to protect YOUR server. >> It's actually to prevent your server from being used as a reflector to >> attack some OTHER server. The spoofed addresses all point to that >> server. >Sorry I just can't understand that why my server is being used to

Possible DDoS?

2012-10-17 Thread Manson, John
>From time to time I notice a large number of queries like these to one of my >external dns servers: 14:14:40.01407 121.10.105.66 -> 143.231.1.67 DNS C gop.gov. Internet * ? 14:14:40.01529 121.10.105.66 -> 143.231.1.67 DNS C speaker.gov. Internet * ? 14:14:40.03688 121.10.105.66 -> 143.231.1.67 D

Re: Possible DDoS?

2012-10-17 Thread Chuck Swiger
Hi-- On Oct 17, 2012, at 11:17 AM, Manson, John wrote: > From time to time I notice a large number of queries like these to one of my > external dns servers: > > 14:14:40.01407 121.10.105.66 -> 143.231.1.67 DNS C gop.gov. Internet * ? > [ ... ] > 14:14:40.98668 121.10.105.66 -> 143.231.1.67 DNS

Re: How to Setup DNSSEC

2012-10-17 Thread Tony Finch
babu dheen wrote: > > All users in our company using internal DNS server for name resolution. > All internal DNS server are pointed to our gateway recursive BIND name > server which is responsible for getting DNS queries from authoritative > internet DNS server. > > Now we would like to configure

RE: Possible DDoS?

2012-10-17 Thread Manson, John
Thanks So that is why there are usually no NS records? -Original Message- From: Chuck Swiger [mailto:cswi...@mac.com] Sent: Wednesday, October 17, 2012 2:31 PM To: Manson, John Cc: bind-users@lists.isc.org Subject: Re: Possible DDoS? Hi-- On Oct 17, 2012, at 11:17 AM, Manson, John wrote:

Re: Possible DDoS?

2012-10-17 Thread Dennis Clarke
> From time to time I notice a large number of queries like these to one > of my external dns servers: > > 14:14:40.01407 121.10.105.66 -> 143.231.1.67 DNS C gop.gov. Internet * > ? > > Does this rise to the level of a DDoS attack? > No NS record for this IP. > I blackhole IPs that behave lik

Re: Possible DDoS?

2012-10-17 Thread Phil Mayers
On 10/17/2012 07:39 PM, Dennis Clarke wrote: I have the exact same problem with an ip inside State of Colorado General Government Computer subnet : http://whois.arin.net/rest/org/SCGGC That's not exactly a fly-by-night organisation; have you contacted them? Some server there has been pound

?????? Re: Possible DDoS?

2012-10-17 Thread Tony Xue
I used to get the same problem but that was everytime from three or four different source IP and they are all querying "ripe.net IN ANY" for around 10 queries per second. I am pretty sure the sources were hacked because one of my another DNS server also become the source to attack and from the

Re: 答复: Re: Possible DDoS?

2012-10-17 Thread Phil Mayers
On 10/18/2012 12:12 AM, Tony Xue wrote: I am pretty sure the sources were hacked because one of my another What makes you think the source IPs were real? ___ Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this li

?????? Re: ?????? Re: Possible DDoS?

2012-10-17 Thread Tony Xue
Because my server also used to be hacked and send this kind of junk queries and my server was null-routed by the datacenter. The high bandwidth was happened exactly on my server. -Original Message- From: Phil Mayers Sender: bind-users-bounces+xuezxbb=gmail@lists.isc.orgDate: Thu, 18

Re: How to Setup DNSSEC

2012-10-17 Thread Alan Clegg
On Oct 16, 2012, at 7:48 PM, pangj wrote: > > $ dig +dnssec udp53.org soa > > ; <<>> DiG 9.6.1-P2 <<>> +dnssec udp53.org soa > ;; global options: +cmd > ;; Got answer: > ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 37254 > ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 5, ADDITIONA