named has been disabled on our servers 209.191.185.65 and 209.191.185.66. Thanks for the heads up.
On Sat, Jul 26, 2014 at 6:44 AM, <supp...@networkredux.com> wrote: > Hello Team, > > We received following abuse report for your server > > > =========================================================================================== > You appear to be running an open recursive resolver at IP address > 209.191.185.66 > that participated in an attack against a customer of ours today, generating > large UDP responses to spoofed queries, with those responses becoming > fragmented > because of their size. > > Please consider reconfiguring your resolver in one or more of these ways: > > - To only serve your customers and not respond to outside IP addresses (in > BIND, > this is done by defining a limited set of hosts in "allow-query"; with > a Windows DNS server, you would need to use firewall rules to block > external > access to UDP port 53) > - To only serve domains that it is authoritative for (in BIND, this is > done by > defining a limited set of hosts in "allow-query" for the server > overall but setting "allow-query" to "any" for each zone) > - To rate-limit responses to individual source IP addresses (such as by > using > DNS Response Rate Limiting or iptables rules) > > More information on this type of attack and what each party can do to > mitigate > it can be found here: http://www.us-cert.gov/ncas/alerts/TA13-088A > > If you are an ISP, please also look at your network configuration and make > sure > that you do not allow spoofed traffic (that pretends to be from external IP > addresses) to leave the network. Hosts that allow spoofed traffic make > possible > this type of attack. > > Example DNS responses from your resolver during this attack are given > below. > Timestamps (far left) are PDT (UTC-7), and the date is 2014-07-20. > > 22:57:22.690040 IP (tos 0x0, ttl 53, id 42948, offset 0, flags [+], proto > UDP > (17), length 1500) 209.191.185.66.53 > 192.223.27.x.36996: 3361| 9/0/1 > webpanel.sk. RRSIG[|domain] > 0x0000: 4500 05dc a7c4 2000 3511 510d d1bf b942 E.......5.Q....B > 0x0010: c0df 1b5e 0035 9084 0f97 581f 0d21 8380 ...^.5....X..!.. > 0x0020: 0001 0009 0000 0001 0877 6562 7061 6e65 .........webpane > 0x0030: 6c02 736b 0000 ff00 01c0 0c00 2e00 0100 l.sk............ > 0x0040: 00e7 7802 1f00 3007 0200 0151 8053 db3a ..x...0....Q.S.: > 0x0050: 5351 SQ > 22:57:22.693345 IP (tos 0x0, ttl 53, id 42949, offset 0, flags [+], proto > UDP > (17), length 1500) 209.191.185.66.53 > 192.223.27.x.36996: 3361| 9/0/1 > webpanel.sk. RRSIG[|domain] > 0x0000: 4500 05dc a7c5 2000 3511 510c d1bf b942 E.......5.Q....B > 0x0010: c0df 1b5e 0035 9084 0f97 a6d0 0d21 8380 ...^.5.......!.. > 0x0020: 0001 0009 0000 0001 0877 6562 7061 6e65 .........webpane > 0x0030: 6c02 736b 0000 ff00 01c0 0c00 2e00 0100 l.sk............ > 0x0040: 00e7 7802 1f00 3007 0200 0151 8053 db3a ..x...0....Q.S.: > 0x0050: 5351 SQ > 22:57:22.696631 IP (tos 0x0, ttl 53, id 42950, offset 0, flags [+], proto > UDP > (17), length 1500) 209.191.185.66.53 > 192.223.27.x.36996: 3361| 9/0/1 > webpanel.sk. RRSIG[|domain] > 0x0000: 4500 05dc a7c6 2000 3511 510b d1bf b942 E.......5.Q....B > 0x0010: c0df 1b5e 0035 9084 0f97 581f 0d21 8380 ...^.5....X..!.. > 0x0020: 0001 0009 0000 0001 0877 6562 7061 6e65 .........webpane > 0x0030: 6c02 736b 0000 ff00 01c0 0c00 2e00 0100 l.sk............ > 0x0040: 00e7 7802 1f00 3007 0200 0151 8053 db3a ..x...0....Q.S.: > 0x0050: 5351 SQ > > (The final octet of our customer's IP address is masked in the above output > because some automatic parsers become confused when multiple IP addresses > are > included. The value of that octet is "94".) > > -John > President > Nuclearfallout, Enterprises, Inc. (NFOservers.com) > > (We're sending out so many of these notices, and seeing so many > auto-responses, > that we can't go through this email inbox effectively. If you have > follow-up > questions, please contact us at n...@nfoe.net.) > > =========================================================================================== > -- > Sujith Paily > System Architect | Global RTAC > Network Redux, LLC > > Common Answers: http://www.networkredux.com/answers > How am I doing? Email my management team at > rtac.escalat...@networkredux.com > >