Re: [dns-operations] DSCng 0.1.0

2013-05-15 Thread Bedrich Kosata
Now that I read my post again, I found out that all your questions were about the collector, not the presenter. Unfortunately, I am not on the operations side of things, so I have no experience with the resources that the DSC collector consumes :( Best regards Beda On 15/05/13 08:53, Bedric

[dns-operations] security with a firewall

2013-05-15 Thread fenghe
Hi, Does a hardware firewall help to defend the DNS attack? If so what's the suggested policy/rules? Thanks. ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https://lists.dns-oarc.net/mailman/listinfo/dns-operations dns-jobs mailing l

Re: [dns-operations] security with a firewall

2013-05-15 Thread Steven Carr
On 15 May 2013 09:13, fenghe wrote: > Does a hardware firewall help to defend the DNS attack? > If so what's the suggested policy/rules? Chances are your firewall will break long before your DNS server is overwhelmed. DNS traffic should not be firewalled, the number of UDP transactions will very

Re: [dns-operations] security with a firewall

2013-05-15 Thread Lawrence K. Chen, P.Eng.
I've been told that we can't implement BCP38 because its actually an egress filteringits only ingress from the perspective of the ISP and its downstream customersto DNS operators, that the ISPs need to implement. Since it is to prevent source address that aren't in the netblock of its

Re: [dns-operations] security with a firewall

2013-05-15 Thread Paul Vixie
... Lawrence K. Chen, P.Eng. wrote: > I've been told that we can't implement BCP38 because its actually an egress > filteringits only ingress from the perspective of the ISP and its > downstream customersto DNS operators, that the ISPs need to implement. > Since it is to prevent source

[dns-operations] bind-9.9.3rc2 ANY+TCP patch

2013-05-15 Thread Jared Mauch
I thought I'd share this to anyone that wants to just force all TYPE=ANY queries over TCP to prevent those from coming from spoofed locations. This is a crude but effective hack. It doesn't stop the system from recursing to find the response. http://puck.nether.net/~jared/bind-9.9.3rc2-tcp-any

Re: [dns-operations] bind-9.9.3rc2 ANY+TCP patch

2013-05-15 Thread Vernon Schryver
> From: Jared Mauch > I thought I'd share this to anyone that wants to just force all TYPE=ANY > queries over TCP to prevent those from coming from spoofed locations. > > This is a crude but effective hack. It doesn't stop the system from > recursing to find the response. > > http://puck.nethe

Re: [dns-operations] bind-9.9.3rc2 ANY+TCP patch

2013-05-15 Thread Matthäus Wander
* Vernon Schryver [2013-05-15 21:40]: >> From: Jared Mauch >> This is a crude but effective hack. It doesn't stop the system from >> recursing to find the response. > > > I can understand simplistic DNS reflection mitigation in firewalls, > especially when response rate limiting is not availab

Re: [dns-operations] bind-9.9.3rc2 ANY+TCP patch

2013-05-15 Thread Jared Mauch
On May 15, 2013, at 5:09 PM, Matthäus Wander wrote: > * Vernon Schryver [2013-05-15 21:40]: >>> From: Jared Mauch >>> This is a crude but effective hack. It doesn't stop the system from >>> recursing to find the response. >> >> >> I can understand simplistic DNS reflection mitigation in fi

Re: [dns-operations] bind-9.9.3rc2 ANY+TCP patch

2013-05-15 Thread John Kristoff
On Wed, 15 May 2013 17:52:11 -0400 Jared Mauch wrote: > If others want, I can look at putting in a config directive. It > would be possible to add other RRtypes easily enough that should get > TCP only that are not commonly used. I can speak for others, but I would prefer to use the RRL code al

Re: [dns-operations] bind-9.9.3rc2 ANY+TCP patch

2013-05-15 Thread Jared Mauch
On May 15, 2013, at 5:58 PM, John Kristoff wrote: > On Wed, 15 May 2013 17:52:11 -0400 > Jared Mauch wrote: > >> If others want, I can look at putting in a config directive. It >> would be possible to add other RRtypes easily enough that should get >> TCP only that are not commonly used. > >

Re: [dns-operations] bind-9.9.3rc2 ANY+TCP patch

2013-05-15 Thread Jared Mauch
One more comment: This patch only impacts recursive servers, not authorities. They won't set TC=1 for an ANY query. - Jared On May 15, 2013, at 6:03 PM, Jared Mauch wrote: > > On May 15, 2013, at 5:58 PM, John Kristoff wrote: > >> On Wed, 15 May 2013 17:52:11 -0400 >> Jared Mauch wrote: >

Re: [dns-operations] bind-9.9.3rc2 ANY+TCP patch

2013-05-15 Thread Vernon Schryver
> From: Jared Mauch > Because of the FP ratio presented at the DNS-OARC meeting this > past week. It's suitable on a recursive resolver, where RRL is most effective > on an authority. > > See > > https://indico.dns-oarc.net/indico/getFile.py/access?contribId=4&resId=0&materialId=slides&confId=0

Re: [dns-operations] bind-9.9.3rc2 ANY+TCP patch

2013-05-15 Thread Jared Mauch
On May 15, 2013, at 6:52 PM, Vernon Schryver wrote: >> This effectively does slip=1 and does away with any amplification and just >> makes it >> a pure reflection attack. Still not ideal, but doesn't amplify. > > On the contrary, as I just now wrote in the ratelimits mailing list > http://lis

Re: [dns-operations] bind force qtype=ANY to TCP

2013-05-15 Thread Vernon Schryver
> From: Jared Mauch > The folks that are most concerned with RRL are those expecting queries > from stub resolvers, I think this would mitigate this risk. } > Is it intentional that the patch does not affect authoritative ANY } > responses? I think the patch would fail to stop the authorities f

Re: [dns-operations] [ratelimits] bind force qtype=ANY to TCP

2013-05-15 Thread Jared Mauch
On May 15, 2013, at 8:03 PM, Vernon Schryver wrote: > I think the patch has a false negative rate of approximately 100%. > To check whether I am wrong again, I set up a test server and tried > two `dig +ignore isc.org any` commands. The first got a TC=1 error > response as expected. The second

Re: [dns-operations] [ratelimits] bind force qtype=ANY to TCP

2013-05-15 Thread Jared Mauch
I fixed the patch by moving where it does this check to before query_find as opposed to inside it. Thanks for the insight and input. - Jared On May 15, 2013, at 8:03 PM, Vernon Schryver wrote: > I think the patch has a false negative rate of approximately 100%. > To check whether I am wrong a