[dns-operations] Google DNS used as amplification - aren't they caching?

2014-08-06 Thread Paul Wouters
Hi, My nohats.ca domain has been under a couple of weeks long ANY attack. I assume spoofed IPs querying open resolvers that in have their upstream DNS send me queries. The vast majority of queries are coming from Google's many IP addresses. While I understand it must be an impressive ANYCAST ne

Re: [dns-operations] Google DNS used as amplification - aren't they caching?

2014-08-06 Thread Casey Deccio
On Wed, Aug 6, 2014 at 11:10 AM, Paul Wouters wrote: > > Hi, > > My nohats.ca domain has been under a couple of weeks long ANY attack. I > assume spoofed IPs querying open resolvers that in have their upstream > DNS send me queries. > > The vast majority of queries are coming from Google's many I

Re: [dns-operations] Google DNS used as amplification - aren't they caching?

2014-08-06 Thread Casey Deccio
On Wed, Aug 6, 2014 at 11:33 AM, Casey Deccio wrote: > Google's implementation seems to recursively query for and cache ANY based > on the entire set of records for the same name, rather than on a per-record > basis. nohats.ca includes an NSEC3PARAM record with TTL 0. This results > in zero cac

Re: [dns-operations] Google DNS used as amplification - aren't they caching?

2014-08-06 Thread Lutz Donnerhacke
* Paul Wouters wrote: > It seems that the nsd ratelimits to send TC=1 isn't working well either > to reduce the incoming amount of UDP queries. > > Why does google dns seems so inefficient at caching? I can second this. With rate limiting and dampening (at my side) I get customer complains, that t

Re: [dns-operations] Google DNS used as amplification - aren't they caching?

2014-08-06 Thread Paul Wouters
On Wed, 6 Aug 2014, Casey Deccio wrote: Why does google dns seems so inefficient at caching? Google's implementation seems to recursively query for and cache ANY based on the entire set of records for the same name, rather than on a per-record basis.  nohats.ca includes an NSEC3PARAM rec

[dns-operations] Curious use of cname

2014-08-06 Thread John Wobus
From everything I know, this is wrong and it's apparently making our nameservers give inconsistent results. What nameserver allows this and what might they be attempting to accomplish? John Wobus Cornell University IT dig +norecurs mx cjsarchitects.com @dns3.name-services.com. ; <<>> DiG 9.4.

Re: [dns-operations] Curious use of cname

2014-08-06 Thread David C Lawrence
John Wobus writes: > From everything I know, this is wrong and it's apparently making our > nameservers give inconsistent results. What nameserver allows > this and what might they be attempting to accomplish? It is wrong, and what they're attempting to accomplish is to hand over their "naked" d

Re: [dns-operations] Curious use of cname

2014-08-06 Thread Andrew Sullivan
On Wed, Aug 06, 2014 at 02:15:15PM -0400, John Wobus wrote: > From everything I know, this is wrong Yep. > and it's apparently making our > nameservers give inconsistent results. Doubtless. > What nameserver allows this Several, every one of which apparently has to re-learn this. > and what

Re: [dns-operations] Google DNS used as amplification - aren't they caching?

2014-08-06 Thread Paul Wouters
On Wed, 6 Aug 2014, Casey Deccio wrote: Why does google dns seems so inefficient at caching? Google's implementation seems to recursively query for and cache ANY based on the entire set of records for the same name, rather than on a per-record basis.  nohats.ca includes an NSEC3PARAM rec

Re: [dns-operations] Curious use of cname

2014-08-06 Thread Mark Andrews
In message <20140806191927.gt37...@mx1.yitter.info>, Andrew Sullivan writes: > On Wed, Aug 06, 2014 at 02:15:15PM -0400, John Wobus wrote: > > From everything I know, this is wrong > > Yep. > > > and it's apparently making our > > nameservers give inconsistent results. > > Doubtless. > > > Wh

[dns-operations] resolvers - which do you care about?

2014-08-06 Thread intdnsops intdnsops
We are working on a DNS consistency check tool tool and a component includes checking several public recursive name servers for the latest SOA/A/ records and TTLs. The zones we publish often have TTLs measured in the 7+ day range, changes are incredibly low volume, and we always plan on waiting

Re: [dns-operations] resolvers - which do you care about?

2014-08-06 Thread P Vixie
Who is we? Why are we allowing role accounts to subscribe here? Who is intdnsops? On August 6, 2014 3:24:39 PM PDT, intdnsops intdnsops wrote: >We are working on a DNS consistency check tool tool and a component >includes checking several public recursive name servers for the latest >SOA/A/AAA

Re: [dns-operations] Curious use of cname

2014-08-06 Thread Andrew Sullivan
On Thu, Aug 07, 2014 at 07:51:53AM +1000, Mark Andrews wrote: > Those with developers that don't read RFC 1034 which tried to prevent > this from happening. You're probably right. But of course, RFC 1034 was written a number of years ago, and some of the protocol-specification language that later

Re: [dns-operations] Curious use of cname

2014-08-06 Thread George Michaelson
we all said symlinks were a bad idea when Berkeley did them. We also all use them. The properties OF the symlink matter more than people realize, because 99% of the time, they care about the properties of the object pointed to by the symlink. when Sun added ${symbolic} expansion on the fly to syml

Re: [dns-operations] Curious use of cname

2014-08-06 Thread Yonghua Peng
>What nameserver allows this Several, every one of which apparently has to re-learn this. Hi, I saw Amazon Route53 has allowed this also. does it mean route53 is broken? thanks. -- We are hiring cloud Dev/Ops, for more details please see: http://soa.game.yy.com/jobs.html

Re: [dns-operations] Curious use of cname

2014-08-06 Thread Andrew Sullivan
No. They're doing it by simulating it. The actual dns responses are a or records. It only works under some circumstances. A -- Andrew Sullivan Please excuse my clumbsy thums. > On Aug 6, 2014, at 21:10, Yonghua Peng wrote: > > >>> >What nameserver allows this >> Several, every on

Re: [dns-operations] Curious use of cname

2014-08-06 Thread Paul Vixie
Andrew Sullivan wrote: > No. They're doing it by simulating it. The actual dns responses are a or > records. It only works under some circumstances. my view of the cname-precludes-other-data rule is that it's always been clear. protocol engineering means figuring out what other complia

Re: [dns-operations] Curious use of cname

2014-08-06 Thread Fred Morris
The grain of sand that causes this pearl is that TLDs won't just publish the CNAME without delegation. That is all... -- Fred Morris ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https://lists.dns-oarc.net/mailman/listinfo/dns-ope

Re: [dns-operations] Curious use of cname

2014-08-06 Thread Mark Andrews
In message <201408061907.32371.m3...@m3047.net>, Fred Morris writes: > The grain of sand that causes this pearl is that TLDs won't just publish the > CNAME without delegation. > > That is all... Even if they do allow publishing CNAMEs it doesn't solve the issue for many as what they really want

Re: [dns-operations] Curious use of cname

2014-08-06 Thread Colm MacCárthaigh
On Wed, Aug 6, 2014 at 7:16 PM, Paul Vixie wrote: > the now-common CDN trick of inventing a nonstandard "ALIAS" record or > similar, that causes the authority server to recurse for any qtype > that's not actually present in the zone, and to report that recursive > data as authoritative, does not c

Re: [dns-operations] Curious use of cname

2014-08-06 Thread P Vixie
On August 6, 2014 9:08:34 PM PDT, "Colm MacCárthaigh" wrote: >On Wed, Aug 6, 2014 at 7:16 PM, Paul Vixie wrote: >> the now-common CDN trick of inventing a nonstandard "ALIAS" record or >> similar, that causes the authority server to recurse for any qtype >> that's not actually present in the zo