[161733] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Open Resolver Problems

daemon@ATHENA.MIT.EDU (Jared Mauch)
Tue Mar 26 10:54:31 2013

From: Jared Mauch <jared@puck.nether.net>
In-Reply-To: <Pine.LNX.4.61.1303260937380.26706@soloth.lewis.org>
Date: Tue, 26 Mar 2013 10:49:42 -0400
To: Jon Lewis <jlewis@lewis.org>
Cc: North American Operators' Group <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org


On Mar 26, 2013, at 10:15 AM, Jon Lewis <jlewis@lewis.org> wrote:
>> On 25/03/2013 14:33, Mikael Abrahamsson wrote:
>>> I would like to be able to request an IP list of open resolvers in =
my ASN,
>>> perhaps sent to the contact details in RIPE whois database to make =
sure I'm
>>> not falsely representing that ASN.
>=20
> Or you could just get an off-site system (cloud VM), get the software =
from http://monkey.org/~provos/dnsscan/, and find all your own open =
recursive DNS servers.
>=20
> There are different levels of openness for recursive DNS servers =
though. It looks like Jared's project lists any DNS server that responds =
with anything other than refused as open.  A DNS server could have open =
recursion "disabled", but still respond with referrals to the =
root-servers.  Older versions of bind seem to do this when configured =
with allow-recursion for a limited range of IPs.  While not really =
"open" such servers are still useful for DNS amplification.  The example =
config at
>=20
> http://www.team-cymru.org/Services/Resolvers/instructions.html
>=20
> for a bind 9.x caching server can be adapted for older bind versions =
doing caching+authoratative such that it'll provide recursion to those =
who should have it, and authority for zones for which it needs to do so.

I was throwing up the 'quick & dirty' data that I had for everyone to =
get access to quickly.

There are a large number of attacks using these servers in the past =
week.  I hope everyone takes a minute and gets with their =
unix/systems/DNS team and determines what they can do to minimize this.

One other important item:

Stop your customers from being able to spoof!  If you punch in 8.8.8.8 =
(for example) into the system, you will see a number of devices where if =
a packet is directed at it that respond with 8.8.8.8, either by =
spoofing, or by forwarding that request to google and spoofing the =
origin IP.

Same for the 73.73.73.73 IP as well.  Those CPE devices should be locked =
down.

- Jared=


home help back first fref pref prev next nref lref last post