Re: [dns-operations] Prevalence of nameserver software Was: Re: DNS Operations

2024-03-04 Thread Jared Mauch


> On Mar 3, 2024, at 12:26 PM, Fred Morris  wrote:
> 
> Speaking to the message not the (ChetGPT) "massage"...
> 
> On Sun, 3 Mar 2024, Turritopsis Dohrnii Teo En Ming wrote:
>> [...]
>> I define most popular as the largest number of DNS server installed 
>> throughout the whole world.
> 
> I think this is a valid point. DNS is not synonymous with the Internet; 
> neither is operations.
> 
> Internal DNS servers exist, and with guidance concerning the need for network 
> segmentation there should be a lot more of them. I have had several requests 
> and inquiries over the past few years specifically concerning a desire to log 
> the addresses of clients making requests.
> 
> These requests persistently refuse to accept that DNS is an application level 
> protocol, and that a request (or response) is recast by every nameserver it 
> passes through even if it is merely "forwarding": "there must be a way!" 
> People go to great lengths, there's a lot of language lawyering and playing 
> with EDNS involved in these attempts.
> 
> Invariably my answer (for all but the most technical questions) is install a 
> real DNS server with visibility inside of the NAT horizon (if there is one; 
> there usually is), and that the general-purpose "logging" solution is Dnstap.
> 
> My admittedly cynical response to the question posed here is that the most 
> common server software is probably a lightweight forwarder (e.g. dnsmasq) or 
> something which only coincidentally does DNS (e.g. Active Directory).


I think based on the surveys that I had done before, there’s quite a number of 
not only forwarders, eg: dnsmasq but also iptables rules that perform 
forwarding as a service, eg: take all udp/53 hitting the host and forward the 
packets (only sometimes with source address rewritten) to the configured DNS 
server(s).

It’s likely much harder to determine this as you could practically put 
something behind DoH w/ HTTP basic auth preventing any queries from occurring 
without authorization.  If there were a stable standards based way to deliver 
the credentials, I could see this being done as part of a captive portal or 
pay-as-you-go service even.

- Jared
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] DNS .com/.net resolution problems in the Asia/Pacific region

2023-07-11 Thread Jared Mauch
More of a routing thing than DNS - but this type of view from the outside in is 
really helpful to detect by providers feeding RIPE RIS or route views so there 
are better external views into networks. 

This is an area where I want to expand and improve coverage after things like 
the silent and hidden hijacking's (see ripe invisible hijacks talk) - as we are 
more distributed it makes it more diverse and resilient but also more places 
for interesting local failures. 

Sent via RFC1925 compliant device

> On Jul 11, 2023, at 7:38 PM, Viktor Dukhovni  wrote:
> 
>> Unfortunately, a peering router remained
>> active, which was not immediately obvious to our teams due to the lack
>> of connectivity there.
> 
> Thanks for the PM details, much appreciated.

___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] "off label" use of PTR records for fanout

2023-06-15 Thread Jared Mauch
Often folks will use TXT with a low TTL and use a specific label path to 
perform this function. 

Sent via RFC1925 compliant device

> On Jun 15, 2023, at 4:22 PM, Fred Morris  wrote:
> 
> Hello,
> 
> I'm using DNS to retrieve some distributed telemetry data from multiple
> servers. To facilitate this I have an FQDN which resolves to a set of
> PTR records. If there's a generally accepted better option, let me know.
> 
> If you just want to bike shed this fine, I invite you to email me
> directly as I think this is already tangential to the purpose of this list.
> 
> Thank you for understanding...
> 
> --
> 
> Fred Morris
> 
> --
> 
> (Are you still reading?)
> 
> I'm basically using PTR records like CNAME, but with the semantics "try
> all of these". The normal semantics of DNS resolution have the objective
> of finding "the one (best) answer from the (best) server"
> notwithstanding that the answer may consist of multiple answers,
> presuming in a panglossian fashion that the first answer we get is the
> best one for us at this point in time. Can't use CNAME because the DNS
> builds semantics around it which would interfere the semantics here. I
> presume the same accrues to e.g. SRV records. It just isn't expecting us
> to try them all as a matter of course.
> 
> 
> ___
> dns-operations mailing list
> dns-operations@lists.dns-oarc.net
> https://lists.dns-oarc.net/mailman/listinfo/dns-operations

___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] c.root-servers.net over IPv6

2020-02-03 Thread Jared Mauch
from what source IP?


> On Feb 3, 2020, at 3:02 PM, SM  wrote:
> 
> Hello,
> 
> c.root-servers.net (2001:500:2::c) is not responding to queries over IPv6 [1].
> 
> Regards,
> -sm
> 
> 1. The error from DNSViz is "arpa zone: The server(s) were not responsive to 
> queries over UDP. (2001:500:2::c)"
> 
> ___
> dns-operations mailing list
> dns-operations@lists.dns-oarc.net
> https://lists.dns-oarc.net/mailman/listinfo/dns-operations


___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] IPv6 only for nameservers

2019-12-31 Thread Jared Mauch
While I would not recommend this generally there are a few of us that operate 
free secondary services that are dual stacked. Make sure one NS is dual stacked 
and you are likely fine. 

Sent from my iCar

> On Dec 31, 2019, at 4:47 AM, Shane Kerr  wrote:
> 
> Stephane and all,
> 
>> On 30/12/2019 16.01, Stephane Bortzmeyer wrote:
>> On Mon, Dec 30, 2019 at 05:18:01PM +0300,
>>  Anand Buddhdev  wrote
>>  a message of 17 lines which said:
>>> If your domain's authoritative name servers have only IPv6
>>> addresses, then your domain will not be resolvable by many resolvers
>>> on the Internet, because many of them only have IPv4 connectivity.
>> This was in 2014 but I'm not sure it changed a lot since:
>> https://labs.ripe.net/Members/stephane_bortzmeyer/how-many-ripe-atlas-probes-can-resolve-ipv6-only-domain-names
> 
> I just re-ran a similar test and got about a 71% success rate:
> 
> https://atlas.ripe.net/measurements/23732712/
> 
> While technically slightly better than 67% success rate measured 5 years ago, 
> to me this means that running an IPv6-only name server it is basically not 
> possible.
> 
> I also ran a version using IPv6-enabled probes, and got an 89% success rate:
> 
> https://atlas.ripe.net/measurements/23734035
> 
> I think that even 90% is still not good enough to allow you to run an 
> IPv6-only name server, at least for general Internet usage. 
> 
> Cheers,
> 
> --
> Shane
> ___
> dns-operations mailing list
> dns-operations@lists.dns-oarc.net
> https://lists.dns-oarc.net/mailman/listinfo/dns-operations

___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] root? we don't need no stinkin' root!

2019-11-27 Thread Jared Mauch



> On Nov 27, 2019, at 5:26 PM, Florian Weimer  wrote:
> 
> What's the change rate for the root zone?  If there is a full
> transition of the name server addresses for a zone, how long does it
> typically take from the first change to the completion of the sequence
> of changes?

There are regular changes. 

Resolvers regularly have old data. Survey for old root hints to see how bad 
they are. 
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] glitch on [ip6|in-addr].arpa?

2019-10-16 Thread Jared Mauch



> On Oct 16, 2019, at 7:41 AM, Paul Vixie  wrote:
> 
> hurricane and cogent are also businesses, each having employees and investors 
> and customers. they are each doing what makes sense to them. this is not a 
> "peering war" by any stretch of the vocabulary. cogent does not have a 
> completely open peering policy, and while hurricane has transit for its ipv4 
> network, it lacks transit for its ipv6 network.

I'm unaware of any network that discriminates based on AFI for transit so this 
fails to pass the laugh test. 

> their networks, their rules.

I get this mantra, it applies in many cases but as per the above, it's poor 
behavior that harms us all. 
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] glitch on [ip6|in-addr].arpa?

2019-10-10 Thread Jared Mauch
On Thu, Oct 10, 2019 at 01:56:11PM -0700, Randy Bush wrote:
> >> Neither Cogent or HE buy transit from anybody else
> 
> i believe this statement to be false

i know of at least 2 transit providers.. 

    - jared

-- 
Jared Mauch  | pgp key available via finger from ja...@puck.nether.net
clue++;  | http://puck.nether.net/~jared/  My statements are only mine.
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] Verifying that a recursor is performing DNSSec validation

2015-07-21 Thread Jared Mauch
I have plans for a browser based test suite
similar to test-ipv6.com for this.  I have a host, domains, IPs but
am missing time to complete the testing.

If you are interested in collaboration please contact
me off-list.

- Jared

On Tue, Jul 21, 2015 at 08:21:16AM -0500, Frank Bulk wrote:
 Thanks.  I found three on the Internet that are set up that way:
  sigfail.verteiltesysteme.net
  www.dnssec-failed.org
  rhybar.cz
 I'm using those in my script (randomly) for checking for that failure case.
 
 Frank
 
 -Original Message-
 From: Livingood, Jason [mailto:jason_living...@cable.comcast.com] 
 Sent: Tuesday, July 21, 2015 3:33 AM
 To: Frank Bulk frnk...@iname.com; dns-operati...@dns-oarc.net
 Subject: Re: [dns-operations] Verifying that a recursor is performing DNSSec
 validation
 
 And for one that is always deliberately broken, for testing:
 www.dnssec-failed.org
 
 On 7/20/15, 10:13 PM, Frank Bulk frnk...@iname.com wrote:
 
 Does anyone have an zone that will always remain unsigned?
 verteiltesysteme.net is going to make one, but if there was a second
 organization that could provide a zone that will never be signed, that
 would
 be great as a control.
 
 Frank
 
 -Original Message-
 From: dns-operations [mailto:dns-operations-boun...@dns-oarc.net] On
 Behalf
 Of Frank Bulk
 Sent: Friday, July 17, 2015 12:51 AM
 To: dns-operati...@dns-oarc.net
 Subject: Re: [dns-operations] Verifying that a recursor is performing
 DNSSec
 validation
 
 I've completed writing the first iteration of a NAGIOS-oriented Perl
 script
 that does the checks I've described.  It was actually more painful to get
 the Net:DNS:DNSsec Perl module installed than anything else.
 
 We'll see how this works out in our environment.
 
 Frank
 
 -Original Message-
 From: dns-operations [mailto:dns-operations-boun...@dns-oarc.net] On
 Behalf
 Of Frank Bulk
 Sent: Tuesday, July 14, 2015 12:08 AM
 To: dns-operati...@dns-oarc.net
 Subject: [dns-operations] Verifying that a recursor is performing DNSSec
 validation
 
 Is there an existing tool, ideally a NAGIOS-friendly one, that performs a
 check against a resolver that it gets an AD back on DNSSec query for a
 zone
 that is properly signed, failure for one that is not properly signed, and
 nothing for one that isn't signed?
 http://docs.menandmice.com/display/MM/How+to+test+DNSSEC+validation
 
 I'd rather not re-invent the wheel if it already exists.
 
 Regards,
 
 Frank Bulk
 
 
 ___
 dns-operations mailing list
 dns-operations@lists.dns-oarc.net
 https://lists.dns-oarc.net/mailman/listinfo/dns-operations
 dns-jobs mailing list
 https://lists.dns-oarc.net/mailman/listinfo/dns-jobs
 
 
 ___
 dns-operations mailing list
 dns-operations@lists.dns-oarc.net
 https://lists.dns-oarc.net/mailman/listinfo/dns-operations
 dns-jobs mailing list
 https://lists.dns-oarc.net/mailman/listinfo/dns-jobs
 
 
 ___
 dns-operations mailing list
 dns-operations@lists.dns-oarc.net
 https://lists.dns-oarc.net/mailman/listinfo/dns-operations
 dns-jobs mailing list
 https://lists.dns-oarc.net/mailman/listinfo/dns-jobs
 
 
 
 
 ___
 dns-operations mailing list
 dns-operations@lists.dns-oarc.net
 https://lists.dns-oarc.net/mailman/listinfo/dns-operations
 dns-jobs mailing list
 https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

-- 
Jared Mauch  | pgp key available via finger from ja...@puck.nether.net
clue++;  | http://puck.nether.net/~jared/  My statements are only mine.
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] AWS footnote: DNS firewall rules are UDP only

2015-01-28 Thread Jared Mauch

Sadly, there are devices such as the most recent Netgear routers and firmware 
that block TCP queries as well in the most horrific way, e.g.:

https://www.cloudshark.org/captures/273da18d3057

- Jared

 On Jan 28, 2015, at 3:45 PM, Warren Kumari war...@kumari.net wrote:
 
 On Wed, Jan 28, 2015 at 2:28 PM, Fred Morris m3...@m3047.net wrote:
 I just noticed that when configuring firewall rules for an AWS instance,
 if DNS is chosen then the (only) protocol automagically filled in is
 UDP.
 
 To get TCP, you have to create a custom TCP rule.
 
 When you save, the UDP one gets saved as DNS, the TCP one stays custom
 TCP rule.
 
 
 Well, of course. What did you expect? DNS only uses UDP...
 
 
 
 
 
 
 
 Warren runs away, giggling manically
 
 W
 
 --
 
 Fred Morris
 
 ___
 dns-operations mailing list
 dns-operations@lists.dns-oarc.net
 https://lists.dns-oarc.net/mailman/listinfo/dns-operations
 dns-jobs mailing list
 https://lists.dns-oarc.net/mailman/listinfo/dns-jobs
 
 
 
 -- 
 I don't think the execution is relevant when it was obviously a bad
 idea in the first place.
 This is like putting rabid weasels in your pants, and later expressing
 regret at having chosen those particular rabid weasels and that pair
 of pants.
   ---maf
 ___
 dns-operations mailing list
 dns-operations@lists.dns-oarc.net
 https://lists.dns-oarc.net/mailman/listinfo/dns-operations
 dns-jobs mailing list
 https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] Bind v6 TCP listen?

2014-11-27 Thread Jared Mauch

 On Nov 27, 2014, at 9:27 AM, bert hubert bert.hub...@netherlabs.nl wrote:
 
 On Wed, Nov 26, 2014 at 12:37:57PM -0500, Jared Mauch wrote:
 Is there some specific configuration magic that I’m missing to make bind 
 listen to TCPv6 sockets?
 
 I do realize that in many places DNS and BIND are nearly the same thing, but
 perhaps we should keep this list for generic DNS things?

While the question was about a specific piece of software, it’s one that many 
likely operate (hence asking on dns-operations).  I could have asked on 
bind-users or other lists, but I’m subscribed to this one and know many that 
are smarter than I are here.

As I mentioned yesterday, this seems like a bug and one that others may 
experience as well.  I’ll troubleshoot and share more information later.  (back 
to family time here in the US).

- Jared
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

Re: [dns-operations] Looking for a public blackhole/sinkhole IP address

2014-11-26 Thread Jared Mauch
We have such an IP address in our backbone  but don't publish it. I suppose 
someone could ask for an allocation for this purpose from a local RIR and this 
could be done for that whole range. 

Jared Mauch

 On Nov 26, 2014, at 9:25 AM, Stephane Bortzmeyer bortzme...@nic.fr wrote:
 
 I'm trying to find out if it exists a public IP address which is a
 black hole, swallowing every packet sent to it.
 
 I can do that on my network but I'm wondering if it already exists
 somewhere, may be as an anycasted service (AS112-style).
 
 The idea is to delegate some domain names to unresponsive name servers
 (deleting the domain name is less efficient, since the negative TTL is
 smaller than the delegation TTL).
 
 It must work from everywhere on the Internet. 127/8 does not (the
 packets are not dropped but delivered to the resolver itself when it
 will try to follow the delegation). Same thing for RFC 1918 (there are
 often such addresses in the local network).
 
 I was thinking of non-routed addresses like 198.18.0.0/15 or
 203.0.113.0/24 but it's not their normal use. AFAIK, there are no
 public sinkholes IPv4 addresses. For IPv6, there is 100::/64 but it
 is only internal, there is no public 100::/64 service.
 ___
 dns-operations mailing list
 dns-operations@lists.dns-oarc.net
 https://lists.dns-oarc.net/mailman/listinfo/dns-operations
 dns-jobs mailing list
 https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


[dns-operations] Bind v6 TCP listen?

2014-11-26 Thread Jared Mauch
Is there some specific configuration magic that I’m missing to make bind listen 
to TCPv6 sockets?

Looking at what it’s doing via lsof it seems to not be listening to v6/tcp:

named   909 named   20u IPv4  24571  0t0  TCP 
204.42.254.5:domain (LISTEN)
named   909 named   21u IPv4  28306  0t0  TCP 
127.0.0.1:rndc (LISTEN)
named   909 named  512u IPv4  24570  0t0  UDP 
204.42.254.5:domain 
named   909 named  513u IPv4  24570  0t0  UDP 
204.42.254.5:domain 
named   909 named  514u IPv6  28319  0t0  UDP 
[2001:418:3f4::5]:domain 
named   909 named  515u IPv6  28319  0t0  UDP 
[2001:418:3f4::5]:domain 


My configuration is fairly straightforward, including manual listen-on 
segments, e.g.:

listen-on { 204.42.254.5; };
listen-on-v6 { 2001:418:3f4::5; };

- Jared
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

Re: [dns-operations] Looking for a public blackhole/sinkhole IP address

2014-11-26 Thread Jared Mauch

 On Nov 26, 2014, at 10:13 AM, Paul Wouters p...@nohats.ca wrote:
 
 http://tools.ietf.org/html/rfc6598 defines 100.64.0.0/10
 
   Packets with Shared Address Space source or destination addresses
   MUST NOT be forwarded across Service Provider boundaries.  Service
   Providers MUST filter such packets on ingress links.  One exception
   to this paragraph's proscription is in the case of business
   relationships, such as hosted CGN services.
 
   When running a single DNS infrastructure, Service Providers MUST NOT
   include Shared Address Space in zone files.  When running a split DNS
   infrastructure, Service Providers MUST NOT include Shared Address
   Space in external-facing zone files.
 
 So you should be fine to use it :)


That’s certainly not the intent/purpose of the block of space any more than
hard-coding 10.0.0.1 or some other answer like 1.1.1.1 or 1.2.3.4.

- Jared
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

Re: [dns-operations] Bind v6 TCP listen?

2014-11-26 Thread Jared Mauch

 On Nov 26, 2014, at 3:48 PM, Niall O'Reilly niall.orei...@ucd.ie wrote:
 
 At Wed, 26 Nov 2014 12:37:57 -0500,
 Jared Mauch wrote:
 
 Is there some specific configuration magic that I’m missing to make
 bind listen to TCPv6 sockets?
 
  [...]
 
 My configuration is fairly straightforward, including manual
 listen-on segments, e.g.:
 
listen-on { 204.42.254.5; };
listen-on-v6 { 2001:418:3f4::5; };
 
  I realize I'm at risk of teaching my grandmother to suck eggs, but
  reckon you must be dealing with something which is either really
  obscure or hidden in plain sight, so here goes ...
 
  I'ld expect that to be enough, unless there's a typo in the address.
 
  I have for some reason
 
   listen-on-v6 { all; };
 
  It might be worth checking whether this makes a difference.


Thanks everyone.  Looks like this is actually a bug in bind, or the one 
packaged with FC21 (at least).

With any it seems to do the right thing:

named   909 named   20u IPv4  24571  0t0  TCP 
204.42.254.5:domain (LISTEN)
named   909 named   21u IPv4  28306  0t0  TCP 
127.0.0.1:rndc (LISTEN)
named   909 named   22u IPv4   18812144  0t0  TCP 
204.42.254.5:domain-217.21.61.8:21683 (ESTABLISHED)
named   909 named   23u IPv6   18810485  0t0  TCP *:domain 
(LISTEN)
named   909 named  512u IPv4  24570  0t0  UDP 
204.42.254.5:domain 
named   909 named  513u IPv4  24570  0t0  UDP 
204.42.254.5:domain 
named   909 named  514u IPv4   18809462  0t0  UDP *:13642 
named   909 named  516u IPv6   18810484  0t0  UDP *:domain 
named   909 named  518u IPv6   18810484  0t0  UDP *:domain 

I’ll have to do some more testing later, back to family time.

- Jared
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

Re: [dns-operations] Looking for a public blackhole/sinkhole IP address

2014-11-26 Thread Jared Mauch
If someone wanted to dispose of that volume of requests they could get 
assistance if they asked the right people. 

Jared Mauch

 On Nov 26, 2014, at 7:12 PM, Robert Edmonds edmo...@mycre.ws wrote:
 
 Warren Kumari wrote:
 This thingie has many aspects that look a bunch like AS112 -- I'm
 wondering if it makes sense to also request an AS number for this.
 It's not strictly needed, but having fewer inconsistent origin routes
 is always nice.
 
 It also seems that (also like AS112), networks could do this in one of
 (at least) 3 ways:
 1: They can spin up this route purely within their own network  --
 basically have one or more places where the route points at null0 /
 discard and *not announce it to peers / customers* or
 2: announce to customers only or
 3: be good citizens and announce it to everyone.
 
 1 and 2 already exist, for RTBH (like you mention in the doc), they
 are just not anycasted. I wonder if we ask the IANA nicely if they'd
 assign 666.666.666.0/24 to.. oh, bugger
 
 The more people who do this, the more benefit there is - unfortunately
 this argument often doesn't work on the Internets, but still worth
 trying...
 
 If one is trying to dispose of 250 million DNS requests per second [0]
 or  1Mr/s (mega-requests per second) [1], then you probably *don't*
 want the traffic to be routed to whoever happens to have announced it,
 or anywhere, really.  That seems to be a much different use case (drop
 the traffic as quickly and universally as possible, minimizing
 collateral damage) from routing the traffic to something like a
 community sinkhole.
 
 [0] 
 http://www.forbes.com/sites/parmyolson/2014/11/20/the-largest-cyber-attack-in-history-has-been-hitting-hong-kong-sites/
 
 [1] 
 https://la51.icann.org/en/schedule/mon-tech/presentation-dafa888-dos-attack-13oct14-en.pdf
 
 -- 
 Robert Edmonds
 ___
 dns-operations mailing list
 dns-operations@lists.dns-oarc.net
 https://lists.dns-oarc.net/mailman/listinfo/dns-operations
 dns-jobs mailing list
 https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] Bind v6 TCP listen?

2014-11-26 Thread Jared Mauch

 On Nov 26, 2014, at 8:25 PM, Mark Andrews ma...@isc.org wrote:
 
 There are some OS where named can't enumerate the IPv6 interfaces
 usually due to stupid OS hacks which means the listen-on-v6 ACL
 above has nothing to match against.  What was wrong with providing
 this information via the socket interface?  Why put it in the
 filesystem which then has to be duplicated when you are running
 chroot’d?

my use case is not chroot()’ed and it sounds like others have hit this as well.

I’ve solved my immediate issue.  Happy to troubleshoot more with another host 
elsewhere that doesn’t have 8.5k zones seeing queries so it’s easier to tell 
what occurred.  (aside: really wish bind would launch faster when loading these 
zones, or background the loading of the zones and answer those it can).

 That said this isn't the issue here as the process was bound on the
 IPv6 UDP port.  I suspect a accept() failure caused named to close
 the socket or something else was listening on the TCP port when
 named was started or ...

This is possible, I will dig through logs looking for any relevant messages.. 
once I changed to any; things immediately resolved with a rndc reload.

- Jared
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

Re: [dns-operations] Comments welcome : draft-song-dnsop-ipv6only-dns-00

2014-10-11 Thread Jared Mauch

 On Oct 11, 2014, at 5:00 PM, Davey Song songlinj...@gmail.com wrote:
 
 IPv6 MTU is specified larger than IPv4. But the implementation like firewall 
 or other mid-box may not follow the specification.  It needs test in 
 large-scaled network. 
 

I am completely in favor of breaking people who are not standards compatible 
with 1280 MTU.

- Jared
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] Is this valid edns0 query?

2014-10-10 Thread Jared Mauch

 On Oct 10, 2014, at 2:54 PM, Hugo Salgado hsalg...@nic.cl wrote:
 
 
 On 10/10/2014 03:24 PM, Roland Dobbins wrote:
 
 On Oct 11, 2014, at 1:07 AM, Mohamed Lrhazi mohamed.lrh...@georgetown.edu 
 wrote:
 
 The appliance vendor, Google, tells me that edns0 opt code 20732 must be 
 the service name, whatever that means
 
 I don't know what that means in the context of a non-SRV query . . . can you 
 turn off the F5's 'malformed DNS query' scrubbing and see what happens?
 
 
 Well... F5 is known of misbehavior with its aggressive filtering,
 even with  records some time ago:
  http://hugo.salga.do/post/50030273426/quad-a-blocking-in-dns

I’ve never had success with F5 and DNS packet handling properly going all the 
way back to Nov 1998 timeframe.  One of their engineers was troubleshooting it 
in our offices of my employer at the time and ended up upset and saying “why 
doesn’t this work” when it was broken vs being able to properly triage it.

I’m expecting someone from F5 to email me because at the time when I posted 
about the issue on NANOG they were aggressive in trying to defend a public view 
of their product and legitimate technical problems.

- Jared
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

Re: [dns-operations] First new gTLD using ICANN's Name Collision Occurrence Management Framework

2014-08-28 Thread Jared Mauch
On Thu, Aug 28, 2014 at 05:36:29PM -0400, Warren Kumari wrote:
 On Thu, Aug 28, 2014 at 4:12 PM, Warren Kumari war...@kumari.net wrote:
  On Thu, Aug 28, 2014 at 12:50 PM, SM s...@resistor.net wrote:
  Hi Chris,
 
  At 05:38 28-08-2014, Chris Thompson wrote:
 
  The gTLD otsuka, created sometime in the last 24 hours, appears to be
  the
  first to use the wildcards described at
 
 
  [snip]
 
 
  What do people think about this business? Is anyone taking specific
  precautions
  to detect attempts to connect to 127.0.53.53?
 
 
  I presume that the people who invented this stuff know what they are doing.
 
  Mwahahahahahhah hahhhahaha teehee...
 
  Thanks, I needed that.
 
 So, I just realized that this sounded like a jab specifically at JAS
 (the folk who proposed the 127.0.53.53 answer) -- this was actually
 instead supposed to be a jab at everyone :-)
 I had long discussions with the JAS folk, and have huge respect for
 them - they did, IMO,  a good job.

The really fun part (for me) is that depending on the OS you can ping
127.0.53.53.  (eg: Linux, Yes,  MacOS, No).  Linux will also give you
Connection refused for TCP connections.

- Jared

-- 
Jared Mauch  | pgp key available via finger from ja...@puck.nether.net
clue++;  | http://puck.nether.net/~jared/  My statements are only mine.
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] Does anybody have a good list of capture filters for DNS traffic - details in email

2014-07-02 Thread Jared Mauch

On Jul 2, 2014, at 9:56 AM, Stefan netfort...@gmail.com wrote:

 Hello, DNS gurus,
 
 Does anybody have a good set of tcpdump/tshark capture filters, associated 
 with DNS, already prep-ed for specific fields in the payload (so beyond just 
 the simplistic udp 53 or tcp 53)? 
 

I've used the perl Net::DNS module for this type of stuff.  It can easily be 
used to do that type of stuff.

- Jared


 Why am I asking?
 
 - I need to set up traffic captures in various tiers of 
 servers-hosting-applications whose owners cannot tell where the inter-tiers 
 reachability depends (and maybe fails) on FWD or REVERSE lookups. This cannot 
 be done by asking the server or apps folks to use the DNS traditional tools 
 (dig, nslookup, host, etc.) simply because they cannot tell which hostnames 
 or IPs make up the functionality of very complex apps, and have dependency on 
 name resolution (direct or reverse) in order to work
 - I would be mostly interested (of course) in DNS packets with no responses
 - I would like to avoid re-inventing the wheel by trying to figure out at 
 which byte offset I would have to start reading a string (is it even possible 
 to identify that, knowing that certain strings are variable in length??), and 
 identify no response, if someone has already figured out such things ;-)
 
 Thanks in advance for directions or no way - forget about it
 ***Stefan
 ___
 dns-operations mailing list
 dns-operations@lists.dns-oarc.net
 https://lists.dns-oarc.net/mailman/listinfo/dns-operations
 dns-jobs mailing list
 https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] Current thinking on internal corporate/campus domain names

2014-06-24 Thread Jared Mauch

On Jun 24, 2014, at 9:01 AM, Kelly Setzer kelly.set...@wnco.com wrote:

 * Most respondents agreed that a registered domain for internal DNS was
 the way to go.

Beware the mistakes of others as well, check out 'corp.verio.net' as an example 
of a poorly operated sub-domain.

- Jared
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] Current thinking on internal corporate/campus domain names

2014-06-24 Thread Jared Mauch

On Jun 24, 2014, at 12:53 PM, Phil Regnauld regna...@nsrc.org wrote:

 Jared Mauch (jared) writes:
 
 On Jun 24, 2014, at 9:01 AM, Kelly Setzer kelly.set...@wnco.com wrote:
 
 * Most respondents agreed that a registered domain for internal DNS was
 the way to go.
 
 Beware the mistakes of others as well, check out 'corp.verio.net' as an 
 example of a poorly operated sub-domain.
 
   corp.verio.net is indeed a subdomain, and not a registered domain:

Sorry, you seem to need more data to observe what i was trying to point out..

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;corp.verio.net.IN  NS

;; ANSWER SECTION:
corp.verio.net. 0   IN  NS  10.254.241.250.
corp.verio.net. 0   IN  NS  stngva1-dc05.wpm.corp.verio.net.
corp.verio.net. 0   IN  NS  frnkde1-dc03.corp.verio.net.
corp.verio.net. 0   IN  NS  ns1.secure.net.
corp.verio.net. 0   IN  NS  stngva1-dc03.corp.verio.net.
corp.verio.net. 0   IN  NS  w3scva02.win.smewh.net.
corp.verio.net. 0   IN  NS  w3scva00.win.smewh.net.
corp.verio.net. 0   IN  NS  neutde1-dc00.corp.verio.net.
corp.verio.net. 0   IN  NS  stngva1-dc06.wpm.corp.verio.net.
corp.verio.net. 0   IN  NS  w3scca01.win.smewh.net.
corp.verio.net. 0   IN  NS  oremut1-dc03.corp.verio.net.
corp.verio.net. 0   IN  NS  w3dwin01.win.smewh.net.
corp.verio.net. 0   IN  NS  iad-wprd-cordc1.corp.verio.net.
corp.verio.net. 0   IN  NS  w3scva03.win.smewh.net.
corp.verio.net. 0   IN  NS  s.ns.verio.net.
corp.verio.net. 0   IN  NS  a.ns.verio.net.
corp.verio.net. 0   IN  NS  stngva1-dc01.corp.verio.net.
corp.verio.net. 0   IN  NS  bcrtfl1-fdc00.corp.verio.net.
corp.verio.net. 0   IN  NS  ns2.secure.net.
corp.verio.net. 0   IN  NS  198.104.179.227.
corp.verio.net. 0   IN  NS  neutde1-dc03.
corp.verio.net. 0   IN  NS  iad-wprd-cordc2.corp.verio.net.
corp.verio.net. 0   IN  NS  frnkde1-dc00.corp.verio.net.
corp.verio.net. 0   IN  NS  w3scca00.win.smewh.net.
corp.verio.net. 0   IN  NS  stngva1-dc04.corp.verio.net.
corp.verio.net. 0   IN  NS  w3scsp01.win.smewh.net.
corp.verio.net. 0   IN  NS  bcrtfl3-pdevdc1.pdev.verio.net.
corp.verio.net. 0   IN  NS  w3scde01.win.smewh.net.
corp.verio.net. 0   IN  NS  w3dwin00.win.smewh.net.
corp.verio.net. 0   IN  NS  w3scca02.win.smewh.net.
corp.verio.net. 0   IN  NS  oremut1-dc00.corp.verio.net.
corp.verio.net. 0   IN  NS  neutde1-dc03.corp.verio.net.
corp.verio.net. 0   IN  NS  w3scga01.win.smewh.net.
corp.verio.net. 0   IN  NS  stngva1-dc02.corp.verio.net.
corp.verio.net. 0   IN  NS  bcrtfl1-fdc01.corp.verio.net.
corp.verio.net. 0   IN  NS  bcrtfl3-pdevdc2.pdev.verio.net.
corp.verio.net. 0   IN  NS  bcrtfl1-dc04.corp.verio.net.
corp.verio.net. 0   IN  NS  neutde1-dc00.

Please point out the trouble with this in one sentence or less.

- jared
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] Current thinking on internal corporate/campus domain names

2014-06-24 Thread Jared Mauch

On Jun 24, 2014, at 4:29 PM, Matthew Ghali mgh...@snark.net wrote:

 Hi PHB- I'm curious when this scheme would be simpler to implement or less 
 expensive to operate as opposed to using a delegated internal subdomain of an 
 existing parent domain registration (see corp.verio.net modulo the 
 psychopathic NS rrset). I'm certainly no authority but everyone seems to have 
 a much more complicated solution to what I've always found to be a simple 
 problem. Is it the old never expose 1918 addresses in public DNS fetish, or 
 the related must not expose secret internal names via DNS paranoia?

It's possible to have an 'internally' visible zone, but the 'corp.verio.net' 
example I provided is somewhat like the worst of both worlds.  You detail a lot 
about your zone and internal server IPs without any security benefit at all. 

One should (ideally) not respond with ULA or 1918 addresses in your  or A 
responses as the behavior can be undefined.

What you don't want is to be delegating everything so far that you may have a 
host querying for an internal resource sending everyone talking to their own 
local 10.x DNS server because of the way you established NS records. 

Your VPN and internal resolvers can be an authority on corp.example.com 
without exposing that to the broader internet.

- jared
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] 172.in-addr.arpa DNSSEC broken

2014-05-20 Thread Jared Mauch

On May 20, 2014, at 7:13 AM, cgielen+dnso...@gielen.name wrote:

 DNSSEC-validation fails for 172.in-addr.arpa . This causes reverse DNS
 lookups to fail for all IPv4-address starting with 172.
 
 http://dnsviz.net/d/16.172.in-addr.arpa

Is this perhaps related to AS112 project as well or 172.16 zones being built-in 
to some resolvers?

- Jared


https://www.as112.net/
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] The Decline and Fall of BIND 10

2014-05-15 Thread Jared Mauch

On May 15, 2014, at 3:55 AM, João Damas j...@bondis.org wrote:

 If it is 9.11, it might be good number to make attack resilience the focus of 
 that version (a good code audit, more robust error-condition response, 
 evolution of RRL and related features, logging that doesn't kill you, etc)

I heard they are skipping number 11, the next release would be 9.12.

- Jared
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] The Decline and Fall of BIND 10

2014-05-15 Thread Jared Mauch
On Thu, May 15, 2014 at 03:12:07PM +, Evan Hunt wrote:
 On Thu, May 15, 2014 at 07:12:53AM -0400, Jared Mauch wrote:
  I heard they are skipping number 11, the next release would be 9.12.
 
 It's on our roadmap as 9.11.

Apparently i misheard.

- Jared

-- 
Jared Mauch  | pgp key available via finger from ja...@puck.nether.net
clue++;  | http://puck.nether.net/~jared/  My statements are only mine.
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] Weirdness with glue for old (gone) DNS servers

2014-05-14 Thread Jared Mauch

On May 14, 2014, at 3:22 AM, Jim Reid j...@rfc1035.com wrote:

 On 13 May 2014, at 22:51, Andrew Sullivan a...@anvilwalrusden.com wrote:
 
 Check every name using your nameservers at the parent side for glue before 
 renumbering.
 
 If only it was that simple Andrew. :-)
 
 A delegation in TLD1 might point at a name in TLD2. So when the reference 
 count for ns.foo.tld2 drops to zero, the registry deletes it from the DNS 
 even though there's an NS record with RDATA for ns.foo.tld2 in TLD1.
 
 ISTR this caused some pain when org was separated from the Verisign registry. 
 I think at that time nameserver objects in the SRS were shared across all 
 three TLDs.

I recall a great deal of pain when renumbering a nameserver and folks would 
keep re-registering it, or a name on that IP address that I was trying to move 
them all away from back in 96-97 timeframe.  Now we have something that's 
perhaps 'equally' bad which is there are many names in the TLDs that point to 
the same IP address, eg:

Aborting search 50 records found .
NS7.HANGGORO.COM
TITAN.LOSTSERVER.NET
NS2.ATOPIA.NET
C.NS.OTAHUNA.NET
NS2.GREYBEAM.NET
NS3.AGYEI.NET
NS3.CRYSTALONE.NET
C.NS.THORIUMINVESTMENTS.COM
C.NS.OSMIUMGLOBAL.COM
NS2.KARDINGS.COM
NS2.PATEDMA.COM
NS3.HIJINKS.COM
C.NS.MAILFORWARDED.COM
NS2.ETEAMBUILD.COM
NS4.SIDEBARDISABLER.NET
NS1.PRIORITYLANE.COM
DNS2.GRANABIKE.COM
NS3.MICRODUAL.COM
NS2.TETRO.NET
NS3.BACASOFT.COM
NS2.XENONCORE.NET
NS2.DGSI.COM
NSFICKDICH.CSE-SERVER.COM
NS7.DNS-DIENST.NET
NS2.PCH.NET
NS2.QLOGICS.COM
NS2.KEITHLAMCPA.COM
C.NS.OSMIUM-INVESTMENTS.COM
NS2.POPUTKA.COM
NS3.QLOGICS.COM
NS2.FETTLE.NET
NS2.PEDANT.NET
NS2.MOTORTRAK.COM
NS2.CMUNGERJR.COM
NS2.MISSALAINEOUS.COM
B.NS.QMUTE.COM
B.NS.SUREJOURNEY.COM
B.NS.QONTIX.COM
NS2.BITLANCER.NET
NS2.LYONOPENLAB.NET
NS3.SIDOPORT.COM
NS02.SPYRO.NET
NS3.MZANSIDNS.NET
NS4.VITTGAM.NET
NS4.CAIZHENGZHU.COM
NS3.IDOPORT.COM
B.NS.CATAAFFE.COM
NS2.PRIMADESIGN.COM
NS2.SPRIXA.COM
NS6.OFLOO.NET

I'm sure there are more as well.. the worst part is some have  and some 
have both  and A..

- Jared
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] AAAA record for c.root-servers.net

2014-03-31 Thread Jared Mauch

On Mar 31, 2014, at 5:08 PM, Mark Andrews ma...@isc.org wrote:

 Yes.
 
 I posted the output for networks which cannot reach 
 c.root-servers.net over IPv6.
 
 Basically anyone using Hurricane Electric.

This is well known that Cogent (nee c.psi.net - c.root-servers) is not 
connected to Hurricane Electric.  It's odd that their IPv4 works between the 
networks and not IPv6 as the ISPs involved should have congruent policies for 
each AFI.


I suspect there's something strategic being done on the part of one of them 
in not keeping the policies the same.

The good news is the software will work around servers that don't respond.  If 
your software is buggy it can always be upgraded.

- Jared
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] bind-9.9.4-P1 crash

2014-01-13 Thread Jared Mauch
FYI:

https://kb.isc.org/article/AA-01078


On Dec 17, 2013, at 9:00 PM, Jared Mauch ja...@puck.nether.net wrote:

 Anyone seen this crash:?
 
 I’m hitting it fairly often right now and trying to poke at the code for 
 triage:
 



___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


[dns-operations] bind-9.9.4-P1 crash

2013-12-17 Thread Jared Mauch
Anyone seen this crash:?

I’m hitting it fairly often right now and trying to poke at the code for triage:

17-Dec-2013 20:56:03.138 general: name.c:1727: INSIST(offset = length) failed, 
back trace
17-Dec-2013 20:56:03.138 general: #0 0x43140d in ??
17-Dec-2013 20:56:03.138 general: #1 0x7622517a in ??
17-Dec-2013 20:56:03.138 general: #2 0x77873536 in ??
17-Dec-2013 20:56:03.139 general: #3 0x77877b8d in ??
17-Dec-2013 20:56:03.139 general: #4 0x432590 in ??
17-Dec-2013 20:56:03.139 general: #5 0x4367a6 in ??
17-Dec-2013 20:56:03.139 general: #6 0x440c1f in ??
17-Dec-2013 20:56:03.139 general: #7 0x445c19 in ??
17-Dec-2013 20:56:03.139 general: #8 0x426bef in ??
17-Dec-2013 20:56:03.139 general: #9 0x76247836 in ??
17-Dec-2013 20:56:03.139 general: #10 0x75dfcf33 in ??
17-Dec-2013 20:56:03.139 general: #11 0x75b2aead in ??
17-Dec-2013 20:56:03.139 general: exiting (due to assertion failure)


Seems to perhaps be with a specific QNAME

(gdb) bt
#0  0x75a6bc59 in raise () from /usr/lib64/libc.so.6
#1  0x75a6d368 in abort () from /usr/lib64/libc.so.6
#2  0x004315d6 in assertion_failed (file=optimized out, 
line=optimized out, type=optimized out, cond=optimized out) at 
./main.c:218
#3  0x7622517a in isc_assertion_failed () from /usr/lib64/libisc.so.95
#4  0x77873536 in set_offsets () from /usr/lib64/libdns.so.100
#5  0x77877b8d in dns_name_copy () from /usr/lib64/libdns.so.100
#6  0x00432590 in query_findclosestnsec3 
(qname=qname@entry=0x726b6810, db=db@entry=0x7fffe73d82b0, 
version=version@entry=0x0, 
client=client@entry=0x7fffe8132e10, rdataset=0x7fffed088b00, 
sigrdataset=0x7fffed0880f0, fname=0x7fffed0850b0, 
exact=exact@entry=isc_boolean_true, 
found=found@entry=0x726b6810) at query.c:5337
#7  0x004367a6 in query_addwildcardproof (client=optimized out, 
db=0x7fffe73d82b0, version=0x7fffe73d0590, name=optimized out, 
ispositive=ispositive@entry=isc_boolean_false, 
nodata=nodata@entry=isc_boolean_false) at query.c:3482
#8  0x00440c1f in query_find (client=0x7fffe8132e10, 
event=event@entry=0x0, qtype=optimized out, qtype@entry=12) at query.c:6686
#9  0x00445c19 in ns_query_start (client=client@entry=0x7fffe8132e10) 
at query.c:7794
#10 0x00426bef in client_request (task=optimized out, 
event=optimized out) at client.c:1939
#11 0x76247836 in run () from /usr/lib64/libisc.so.95
#12 0x75dfcf33 in start_thread () from /usr/lib64/libpthread.so.0
#13 0x75b2aead in clone () from /usr/lib64/libc.so.6

QNAME available in private for those that I trust.

- Jared

___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] summary of recent vulnerabilities in DNS security.

2013-10-22 Thread Jared Mauch

On Oct 22, 2013, at 7:42 AM, Daniel Kalchev dan...@digsys.bg wrote:

 I for one, do not believe DNSSEC is any difficult. I have turned DNSSEC 
 wherever I can. It has become easier and easier in the past few years to the 
 point I would call deploying DNSSEC today trivial. I have therefore changed 
 my stance with people considering DNSSEC deployment from careful, this stuff 
 needs special attention to good, encourage those guys.
 
 See, I can answer such questions. Why can't others?

It's difficult because there is not universal support amongst registrars.  Once 
again the wheel gets stuck when the technical side meets the business side.  
Before someone says switch registrar, it's usually not that easy and then 
becomes something resembling a full time project vs just throwing a switch.

Edit a zone file vs edit, run a script, upload some keys, roll some keys, do 
some other magic is harder than edit a zone file.

This runs into the same friction issue that using PGP and other tools 
encounter.  It seems simple enough to most folks, but when you add in someone 
less-technical, it goes off the rails quickly.  I can't count the number of 
times someone emailed me their full keyring or private key when they meant 
public.  It's not as easy as you think it is.

- Jared
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] Should medium-sized companies run their own recursive resolver?

2013-10-17 Thread Jared Mauch

On Oct 17, 2013, at 4:09 AM, Daniel Kalchev dan...@digsys.bg wrote:

 
 On 17.10.13 00:12, Jared Mauch wrote:
 Even small networks (I have a friend with a ~100 user wisp) shouldn't run 
 their own caches. The economics of it don't support this.
 
 
 Care to elaborate on this economic problem?
 
 Just an reference point:
 Most of today's smartphones already have more resources than the DNS 
 resolvers many small ISPs already use and those ISPs don't suffer from any 
 kind of trouble because of that.
 And, these smartphones are considered disposable tech.

He's power/space constrained in some locations.  It's also not cheap to get 
equipment that will run in a shed at the base of a tower that's not climate 
controlled.  There is some hardware that could be used for this, but the cost 
of pointing at his upstream or someone else is much lower and reduces any 
possible OPEX on his side for it.

There's also the need for monitoring, care and feeding, etc..  100 subscribers 
and not a lot of profit means lack of capital to invest.  easier to just 
outsource to upstream/3rd party.  

Also, customer CPE equipment is poor and doesn't scale well for the current 
rate of DNS queries needed to load a webpage and the volume of devices now in 
the home.  Many pages will require 100+ elements or DNS queries to transact the 
basics.  This means tech support calls for network is down or intermittent 
that require hard-coding to work around the busted CPE gear. (e.g.: use these 
resolvers instead of those i just got from DHCP).  He's small so ends up making 
house calls to fix things for those that are unable to do it themselves.

- Jared
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] Should medium-sized companies run their own recursive resolver?

2013-10-16 Thread Jared Mauch
Comcast doesn't give me broken name servers to use, there is no cognitive 
dissonance here :-)

You are a DNS expert. Most end users when DNS fails think everything has 
failed, including the network.

I type URLs into my browser. Do you know how many people type google into the 
google search box? Or the yahoo box?

You seem disconnected from the average user and average user tech support.

Even small networks (I have a friend with a ~100 user wisp) shouldn't run their 
own caches. The economics of it don't support this.

- Jared 

 On Oct 16, 2013, at 10:37 AM, Vernon Schryver v...@rhyolite.com wrote:
 
 Folks like Comcast have large validating resolvers.  Their customers
 ] should use them.  
 
 despite https://www.google.com/search?q=COMCAST+dns+hijacking
 
 If you check the pages found by that URL, you'll see
  - older reports that Comcast was phasing out DNS hijacking
  - more recent reports of redirection or hijacking of 58/UDP
 packets--not just falsified results from those big Comcast DNS
 servers but packet hijacking
  - far more complication, confusion, and mystification than is
 realistic to expect a two person IT department to resolve.
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] Should medium-sized companies run their own recursive resolver?

2013-10-15 Thread Jared Mauch

On Oct 15, 2013, at 2:12 AM, Peter Koch p...@denic.de wrote:

 sure. Yet another instance of the DNS people have said  Come on.

This is akin to asking the founding member of the local mercedes car club what 
sort of car you should get. :)

sarcasmIs there something wrong with this?/sarcasm

- Jared
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] Should medium-sized companies run their own recursive resolver?

2013-10-15 Thread Jared Mauch

On Oct 15, 2013, at 4:58 PM, Paul Hoffman paul.hoff...@vpnc.org wrote:

 On Oct 15, 2013, at 1:36 PM, Jared Mauch ja...@puck.nether.net wrote:
 
 On Oct 15, 2013, at 2:12 AM, Peter Koch p...@denic.de wrote:
 
 sure. Yet another instance of the DNS people have said  Come on.
 
 This is akin to asking the founding member of the local mercedes car club 
 what sort of car you should get. :)
 
 sarcasmIs there something wrong with this?/sarcasm
 
 It could have been, but the responses were a few on one pole, a few on the 
 other, and a lot of it depends. Some of the it depends responses leaned 
 in one direction, but some leaned in the the other. And I don't think anyone 
 said Mercedes...

Have you ever driven one?  They are mighty nice :)

Back in the 90's I would agree everyone should run a DNS server as the network 
wasn't as robust as it is today.

Some folks may need local elements (e.g.: MS DNS/AD, but these should not be 
exposed to the internet.  They lack the ability to scope responses based on the 
query source to prevent them being global open resolvers.  They are just fine 
for behind a firewall/NAT to take stub queries and meet the internal IT needs.

Everyone else should just use either their ISP (with NXDOMAIN rewriting turned 
off) or someone like OpenDNS that can help enforce some security policies and 
practices with a few knobs being turned at most.

Folks like Comcast have large validating resolvers.  Their customers should use 
them.  Folks here are surely going to do the right thing the majority of the 
time.  The vast majority of others are going to set things up once and it 
*will* be left to rot.  This isn't intentional, but it naturally happens.

- Jared
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] Should medium-sized companies run their own recursive resolver?

2013-10-14 Thread Jared Mauch
I'll say no. They don't have resources to deal with 98 angry users when DNS 
fails. Using OpenDNS or the ISP is likely the best choice. Most large ISP dns 
servers are good. 

Jared Mauch

 On Oct 14, 2013, at 7:08 PM, Paul Hoffman paul.hoff...@vpnc.org wrote:
 
 A fictitious 100-person company has an IT staff of 2 who have average IT 
 talents. They run some local servers, and they have adequate connectivity for 
 the company's offices through an average large ISP.
 
 Should that company run its own recursive resolver for its employees, or 
 should it continue to rely on its ISP?
 
 --Paul Hoffman
 ___
 dns-operations mailing list
 dns-operations@lists.dns-oarc.net
 https://lists.dns-oarc.net/mailman/listinfo/dns-operations
 dns-jobs mailing list
 https://lists.dns-oarc.net/mailman/listinfo/dns-jobs
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


[dns-operations] OpenResolver Statistics Updated

2013-09-16 Thread Jared Mauch
I've reprocessed some data on the OpenResovlerProject and wanted to share some 
results.

1) I stopped filtering on if the #answers was 0 on the query to determine the 
alternate ip in the data.

This filter was originally in-place because I thought DNS implementations were 
sane/good.  They are not ;)

OLD RESULTS:

 data_date  | alternate 
+---
 2013-03-24 |654122
 2013-03-31 |655030
 2013-04-07 |731040
 2013-04-14 |914175
 2013-04-21 |812921
 2013-04-28 |795565
 2013-05-05 |   1188210
 2013-05-12 |811517
 2013-05-19 |781274
 2013-05-26 |778730
 2013-06-02 |797657
 2013-06-09 |890517
 2013-06-16 |776594
 2013-06-23 |804478
 2013-06-30 |798410
 2013-07-07 |808724
 2013-07-14 |819078
 2013-07-21 |919887
 2013-07-28 |908050
 2013-08-04 |988527
 2013-08-11 |835917
 2013-08-18 |823313
 2013-08-25 |785411
 2013-09-01 |920041
 2013-09-08 |833074
 2013-09-15 |   1026649
(26 rows)

New Results:

 data_date  | alternate 
+---
 2013-03-24 |787771
 2013-03-31 |792139
 2013-04-07 |862110
 2013-04-14 |   1055201
 2013-04-21 |960058
 2013-04-28 |967275
 2013-05-05 |   1345394
 2013-05-12 |996038
 2013-05-19 |959157
 2013-05-26 |970176
 2013-06-02 |   1000718
 2013-06-09 |   776
 2013-06-16 |980098
 2013-06-23 |   1006528
 2013-06-30 |   1012998
 2013-07-07 |   1020873
 2013-07-14 |   1044292
 2013-07-21 |   1161634
 2013-07-28 |   1136955
 2013-08-04 |   1224921
 2013-08-11 |   1085401
 2013-08-18 |   1094469
 2013-08-25 |   1035215
 2013-09-01 |   1159322
 2013-09-08 |   1116035
 2013-09-15 |   1026649
(26 rows)

2) I also reprocessed looking for TC=1 in responses and found interesting 
clusters of IP ranges that always respond with TC=1 but never provide UDP.  
Some others just force TCP for everything.

3) I started collecting the TTL responses to packets this past week.  Not sure 
who else is collecting this type of data, but any ideas of graphs, etc.. you 
want related to this, let me know.  I could create a weekly graph showing the 
distriubtion of all responses.

- Jared
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] Implementation of negative trust anchors?

2013-08-23 Thread Jared Mauch

On Aug 22, 2013, at 3:59 PM, wbr...@e1b.org wrote:

 Running the DNS for 100+ school districts and 400,000+ devices, I really, 
 REALLY don't want to be the one saying Sorry, you can't use the site 
 called for in your lesson plan today because they messed up the DNSSEC 
 records.  Management's response would be Just make it work!
 
 Without a per domain NTA, the only option would be to turn off DNSSEC, 
 returning to square one.

I wanted to point out this is a  semi-false premise.  If you were dependent on 
the resources, you would be pulling circuits or hosting those sites in-house.  
I see this argument made about availability in an absolute sense and one can't 
control the entire ecosystem.

OpenDNS didn't just start charging enterprises because they could, they did it 
as a result of people realizing they were dependent on resources where they had 
no contractual relationship or SLA.

- Jared
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] Geoff Huston on DNS-over-TCP-only study.

2013-08-21 Thread Jared Mauch
BTW, The goal of OpenResolverProject was to have an inventory so folks could 
measure against attacks and determine what % of attacks utilized them.

The list is available in weekly format to security teams to download in bulk so 
they can use tools like GrepCidr to perform this cross-reference.

The unexpected results of the data were knowing that ~46% are just a broken CPE 
device that does something weird with DNS packets.

BCP-38 isn't going to resolve the DDoS threat, but does close some of the 
attack surface.

A number of folks are doing derivative research with the data as well.  You can 
use the broken CPE devices to measure BCP-38 compliance, and I've been working 
with at least two different university research teams to help them understand 
the data.

I'd love for more people to dive into it, and any help I can provide in 
collecting better data (some folks want the UDP reply TTLs captured for 
example) I'm interested to know about.  I've also thought about doing an actual 
TCP/53 scan as well and send the query over TCP to measure how many reply 
there.  (I have some TC=1 responses in my weekly scan results).

The name and shame side-effect is helpful to drive interest, as well as 
presentations at various meetings.

Personally, I see some of the larger threats being the lack of rigorous CPE 
testing, the fact that many want to be your DNS proxy, and unmanaged VPS/VM 
solutions that exist out there.

- Jared

On Aug 21, 2013, at 6:00 AM, Geoff Huston g...@apnic.net wrote:

 Yes, our goal was to test out the asserting in RFC5966 that: The majority of 
 DNS server operators already support TCP and we wanted to see if we could 
 quantify what that majority actually was.
 
 What we found out was that of the DNS resolvers that were visible to the 
 authoritative name server, some 83% of them did use TCP following the 
 reception of a truncated UDP response, and the failing 17% of these visible 
 resolvers were used by 6% of the end clients. Of these affected clients, 2/3 
 of them then used alternate resolvers that did perform TCP, while the 
 remaining 2% were stranded and were unable to complete the name resolution 
 process.
 
 But that is just one part of the total story, and a TCP-based resolver is 
 more vulnerable to various forms of SYN flooding attacks as Paul points out.
 
 Of course you could always turn to stateless TCP 
 (http://www.potaroo.net/ispcol/2009-11/stateless.html) but while that effort 
 was a more light hearted response to the issue, the issue of TCP server 
 scaling and vulnerability to SYN attack is nevertheless a serious one. On the 
 other hand its no more serious than any other form of small TCP transaction 
 based services that are subjected to massive volumes, such as, say, a search 
 engine front end. We've seen a variant of this scaling discussion in a number 
 of domains, and there is a common theme running along here: as the internet 
 grows the servers that support its function need to grow as well. While part 
 of the answer may well be selective TCP session rate limiting and other TCP 
 smarts that reduce the per-TCP-session resource footprint in the server, 
 another part of the answer may simply be that being a DNS authoritative 
 server today simply needs more grunt than yesterday.
 
 (Its not just the population of clients and the query loads that can be 
 imposed on servers - its also related to our efforts to increase the 
 information load in the DNS. As an illustration of this in the context of 
 DNSSEC I did some measurements on the amount of additional queries and 
 additional traffic we see from a DNSSEC-signed name as compared to a unsigned 
 name earlier this year when using the client - our results and estimates of 
 the increase in traffic and query loads are at 
 http://www.iepg.org/2013-07-ietf87/2013-07-28-dnssec.pdf)
 
 Geoff
 
 
 
 
 
 On 21/08/2013, at 4:27 PM, George Michaelson g...@apnic.net wrote:
 
 
 
 I believe our goal was to find out how many clients, measured by resolver, 
 failed to complete a TCP forced DNS query. Other people will be looking at 
 the server side, that wasn't what we were primarily exploring. People who 
 want to consider TCP based DNS need both sides of the questionspace filled, 
 so choosing to analyse client failure isn't the whole picture, but it is 
 part of the picture.
 
 ___
 dns-operations mailing list
 dns-operations@lists.dns-oarc.net
 https://lists.dns-oarc.net/mailman/listinfo/dns-operations
 dns-jobs mailing list
 https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] bind + client-subnet

2013-08-13 Thread Jared Mauch

On Aug 13, 2013, at 1:43 AM, Evan Hunt e...@isc.org wrote:

 Do you mean the BIND views? It has been there for many years.
 http://www.zytrax.com/books/dns/ch7/view.html
 
 I believe Jared meant this:
 
 http://tools.ietf.org/html/draft-vandergaast-edns-client-subnet-02

Correct.

I'm not sure how accurate this really is, but:

http://www.cdnplanet.com/blog/which-cdns-support-edns-client-subnet/

Basically, it helps pass the client IP upstream so the CDN can make a better 
guess to which cluster to direct you to, instead of the query-source IP of the 
recursive they are talking to.

We've seen poor CDN performance as a result of them only being granular to a 
/24 scope, as well as folks using the 'wrong' dns servers and being sent to CDN 
nodes a few networks or continents away.

- Jared
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] bind + client-subnet

2013-08-13 Thread Jared Mauch

On Aug 13, 2013, at 6:47 AM, Ken Peng p...@att.net wrote:

 On 2013-8-13 18:30, Jared Mauch wrote:
 I'm not sure how accurate this really is, but:
 
 http://www.cdnplanet.com/blog/which-cdns-support-edns-client-subnet/
 
 Basically, it helps pass the client IP upstream so the CDN can make a better 
 guess to which cluster to direct you to, instead of the query-source IP of 
 the recursive they are talking to.
 
 but how to implement that? since local DNS server always has caching.


The CDNs typically do this through chained CNAMES, with one of them having a 
low TTL. 

;; ANSWER SECTION:
swcdn.apple.com.3242IN  CNAME   swcdn.apple.com.akadns.net.
swcdn.apple.com.akadns.net. 38  IN  CNAME   swcdn.apple.com.c.footprint.net.

- Jared
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


[dns-operations] bind + client-subnet

2013-08-12 Thread Jared Mauch
Does anyone know if BIND supports the client-subnet option, or do I need to 
seek another recursive resolver for this?

it does seem there are some patches, but I'm not sure if this is something 
others have experimented with, e.g.:

http://wilmer.gaa.st/edns-client-subnet/

We operate a large recursive resolver infrastructure and I'm thinking the users 
will be best served with this option set to be directed to local CDN caches.

Wanted to ask about what others were doing before I went to our dns group.

- Jared

___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


[dns-operations] 20130625 survey version.bind

2013-06-25 Thread Jared Mauch
The openresolver project surveyed version.bind from those resolvers that 
respond from port 53 based on the 20130616 dataset.

I know this will be of value to some people in understanding what resolvers may 
be reaching their systems.

Here are the results:

http://openresolverproject.org/version.bind.20130616.20130625.parsed.txt

Enjoy!

- Jared
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] That’ll never work–we don’t allow port 53 out | Strategic Cyber LLC

2013-06-21 Thread Jared Mauch

On Jun 21, 2013, at 7:24 AM, Mike Jones m...@mikejones.in wrote:

 http://code.kryo.se/iodine/ allows you to set up a full IP(v4) VPN over DNS.
 
 Obviously a VPN type setup with IP packet headers and TCP retransmits etc 
 doesn't help performance compared to a program implementing its own data 
 channel over DNS, but it does mean it works with unmodified software.
 
 SSH over DNS is usable when there's literally no other option, but you're 
 probably not going to have much luck with youtube.

You're not going to tunnel over ssh over dns to get to your SQUID proxy? :)

These things always interest/amuse me when folks try to find a way around 
airgapped means airgapped between networks that need to be secured.  That 
includes removable media.

- Jared
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] That?ll never work?we don?t allow port 53 out | Strategic Cyber LLC

2013-06-21 Thread Jared Mauch

On Jun 21, 2013, at 2:57 PM, Lawrence K. Chen, P.Eng. lkc...@ksu.edu wrote:

 Wonder about all the other people that run their own DNS (and such) on 
 campusOne time the physics department was all angry that we (central IT) 
 had changed the size of a DNS packet to be larger than 512-bytes on them.  
 Forget if I ever mentioned that DNS isn't just udp

Just start replying to them with TC=1 on all packets for a day.  They will 
figure it out.

- jared
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] Querying version.bind illegal?

2013-05-23 Thread Jared Mauch

On May 23, 2013, at 9:53 AM, Jim Reid j...@rfc1035.com wrote:

 On 23 May 2013, at 14:39, Vitalie Cherpec vita...@penguin.ro wrote:
 
 I would like to know if querying version.bind is illegal (in
 some countries)?
 
 Ask a lawyer or policeman in those countries. It's hard to see how such 
 largely useless queries could be illegal or result in a successful 
 prosecution. Or get you extradited. Then again, some countries have very 
 strange laws and extradition treaties.

IANAL,

http://en.wikipedia.org/wiki/Computer_Fraud_and_Abuse_Act

The CFAA defines a “protected computer” under 18 U.S.C. § 1030(e)(2) to mean a 
computer:

• which is used in or affecting interstate or foreign commerce or 
communication, including a computer located outside the United States that is 
used in a manner that affects interstate or foreign commerce or  communication 
of the United States...

(Seems a DNS server would possibly fall into this category)

Looking at a.2.C, it could apply to anything a DNS server replies with.  Then 
again, it's a server so meant to be a public item, so I wouldn't be concerned.

- Jared
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] [ratelimits] bind force qtype=ANY to TCP

2013-05-21 Thread Jared Mauch

On May 15, 2013, at 8:40 PM, Jared Mauch ja...@puck.nether.net wrote:

 I fixed the patch by moving where it does this check to before query_find as 
 opposed to inside it.
 
 Thanks for the insight and input.


It looks like some people deployed this patch (or at least downloaded it based 
on user-agents with CURL and Wget).

I thought I'd share statistics seen on my DNS server:

http://puck.nether.net/~jared/bind-tcp-any-stats.txt

I have a feeling that it's not counting the stats properly when it sends a 
truncate on an ANY query, I should perhaps look at that later.

If you're also running this patch, I'm interested in hearing of your 
experiences.

- Jared
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] bind-9.9.3rc2 ANY+TCP patch

2013-05-15 Thread Jared Mauch

On May 15, 2013, at 5:09 PM, Matthäus Wander matthaeus.wan...@uni-due.de 
wrote:

 * Vernon Schryver [2013-05-15 21:40]:
 From: Jared Mauch ja...@puck.nether.net
 This is a crude but effective hack.  It doesn't stop the system from 
 recursing to find the response.
 
 
 I can understand simplistic DNS reflection mitigation in firewalls,
 especially when response rate limiting is not available in the DNS
 server implementation or when local policies forbid the use of patches.
 I don't understand why would one use a patch like that with its
 limitations and drawbacks (e.g. usable only on recent versions of
 BIND9, affects only ANY, affects all ANY, doesn't limit the flood of
 reflected truncated responses during attacks, no whitelisting for local
 clients, not view-specific) instead of the full blown RRL patch for
 9.9.3rc2, 9.9.2, 9.9.2-P1, 9.9.2-P2, 9.8.4-P2, 9.8.4-P1, or 9.8.5rc2.
 
 
 By the way, why use qtype == 255 instead of qtype == dns_rdatatype_any ? 
 
 Why #define TCP_CLIENT() and use the macro exactly once instead
 something like
if (qtype == dns_rdatatype_any 
(client-attributes  NS_CLIENTATTR_TCP) != 0) {
 If TCP_CLIENT() is used in query.c, then its definition should be moved
 from client.c to bin/named/include/named/client.h and the several uses
 of client-attributes  NS_CLIENTATTR_TCP in query.c replaced with
 TCP_CLIENT().   It's bad form to define macros (or much of anything)
 more than once, because you can be sure that eventually the definitions
 will differ.
 
 I think the keyword here is hack. I wouldn't invest too much time in
 an analysis.

Thanks :)

Yes, the idea here is that most of this attack traffic is of type=ANY.

If I invested more than 30 minutes, I could put in configuration directives 
around this as well making it an option to set.

What I have noticed in the past is someone better than myself has usually 
reimplemented these patches to make things better. (e.g.: FreeBSD raw socket in 
jail patch)

(for Vernons knowledge, I thought TCP_CLIENT wasn't limited to just that one .c 
file, so when it failed to compile I lazily stole that line of code and put it 
immediately before it, hence it's poor location as well).

I've cleaned up the patch (it should be == 0 now btw, the above code correction 
is wrong).

If others want, I can look at putting in a config directive.  It would be 
possible to add other RRtypes easily enough that should get TCP only that are 
not commonly used.

- Jared
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] bind-9.9.3rc2 ANY+TCP patch

2013-05-15 Thread Jared Mauch
One more comment:  This patch only impacts recursive servers, not authorities.

They won't set TC=1 for an ANY query.

- Jared

On May 15, 2013, at 6:03 PM, Jared Mauch ja...@puck.nether.net wrote:

 
 On May 15, 2013, at 5:58 PM, John Kristoff j...@cymru.com wrote:
 
 On Wed, 15 May 2013 17:52:11 -0400
 Jared Mauch ja...@puck.nether.net wrote:
 
 If others want, I can look at putting in a config directive.  It
 would be possible to add other RRtypes easily enough that should get
 TCP only that are not commonly used.
 
 I can speak for others, but I would prefer to use the RRL code already
 pretty well tested and being implemented in various name server
 implementations already.  I would recommend others do so as well.
 
 http://www.redbarn.org/dns/ratelimits
 
 Why would someone choose to use your patch over RRL?
 
 Because of the FP ratio presented at the DNS-OARC meeting this
 past week.  It's suitable on a recursive resolver, where RRL is most effective
 on an authority.
 
 See 
 
 https://indico.dns-oarc.net/indico/getFile.py/access?contribId=4resId=0materialId=slidesconfId=0
 
 Page #12
 
 This effectively does slip=1 and does away with any amplification and just 
 makes it
 a pure reflection attack.  Still not ideal, but doesn't amplify.
 
 - jared

___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] bind-9.9.3rc2 ANY+TCP patch

2013-05-15 Thread Jared Mauch

On May 15, 2013, at 6:52 PM, Vernon Schryver v...@rhyolite.com wrote:

 This effectively does slip=1 and does away with any amplification and just 
 makes it
 a pure reflection attack.  Still not ideal, but doesn't amplify.
 
 On the contrary, as I just now wrote in the ratelimits mailing list
 http://lists.redbarn.org/mailman/listinfo/ratelimits
 your patch does not affect amplification by authorities.
 For example, if applied to an authority for isc.org, 
 `dig +dnssec isc.org any @ams.sns-pb.isc.org'
 would still reflect almost 4 KBytes for each 60 byte ANY request.

The folks that are most concerned with RRL are those expecting queries
from stub resolvers, I think this would mitigate this risk.

- Jared
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] [ratelimits] bind force qtype=ANY to TCP

2013-05-15 Thread Jared Mauch

On May 15, 2013, at 8:03 PM, Vernon Schryver v...@rhyolite.com wrote:

 I think the patch has a false negative rate of approximately 100%.
 To check whether I am wrong again, I set up a test server and tried
 two `dig +ignore isc.org any` commands.  The first got a TC=1 error
 response as expected.  The second command got 3500 bytes of RRs via
 UDP.  I expect (but haven't tested) that all subsequent queries get
 normal responses until all of the TTLs expire.

Heh, you're right.  I'll have to tweak where that code happens…

puck:~$ dig any nothing.cnn.com. @204.42.254.5
;; Truncated, retrying in TCP mode.

;  DiG 9.9.3-rl.131.14rc2  any nothing.cnn.com. @204.42.254.5
;; global options: +cmd
;; Got answer:
;; -HEADER- opcode: QUERY, status: NXDOMAIN, id: 33076
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;nothing.cnn.com.   IN  ANY

;; AUTHORITY SECTION:
cnn.com.3600IN  SOA ns1.timewarner.net. 
hostmaster.turner.com. 2013051301 28800 7200 604800 3600

;; Query time: 1 msec
;; SERVER: 204.42.254.5#53(204.42.254.5)
;; WHEN: Wed May 15 20:16:00 EDT 2013
;; MSG SIZE  rcvd: 116

puck:~$ dig any nothing.cnn.com. @204.42.254.5

;  DiG 9.9.3-rl.131.14rc2  any nothing.cnn.com. @204.42.254.5
;; global options: +cmd
;; Got answer:
;; -HEADER- opcode: QUERY, status: NXDOMAIN, id: 34337
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;nothing.cnn.com.   IN  ANY

;; AUTHORITY SECTION:
cnn.com.3593IN  SOA ns1.timewarner.net. 
hostmaster.turner.com. 2013051301 28800 7200 604800 3600

;; Query time: 1 msec
;; SERVER: 204.42.254.5#53(204.42.254.5)
;; WHEN: Wed May 15 20:16:07 EDT 2013
;; MSG SIZE  rcvd: 116





___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] Multiple A/AAAA RRs associated with an NS RR

2013-05-03 Thread Jared Mauch
I think many of the problems we saw back in the win95/98 days with stickiness 
of DNS records have mostly been resolved. Most software does the right thing 
these days. 

Jared Mauch

On May 3, 2013, at 6:45 PM, Simon. Munton simon.mun...@communitydns.net 
wrote:

 We were curious about this.
 
 As a quick test we set up a zone with two name servers with two ipv4 
 addresses each.
 
 All four addresses received roughly the same query load and we saw no 
 resolution issues, but made no real attempt to search them out, this was just 
 based on polling various (open) resolvers.
 
 
 ___
 dns-operations mailing list
 dns-operations@lists.dns-oarc.net
 https://lists.dns-oarc.net/mailman/listinfo/dns-operations
 dns-jobs mailing list
 https://lists.dns-oarc.net/mailman/listinfo/dns-jobs
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] open resolver version.bind responses

2013-04-21 Thread Jared Mauch

On Apr 16, 2013, at 8:52 AM, Jared Mauch ja...@puck.nether.net wrote:

 
 On Apr 16, 2013, at 8:21 AM, Jared Mauch ja...@puck.nether.net wrote:
 
 Greetings,
 
 I took the latest 'Open Resolver' list and queried the hosts another time 
 with a version.bind query.
 
 You can view the results here:
 
 
 Ok, I didn't expect everyone to post this to twitter/facebook so fast :)
 
 FYI: The data in the OpenResolverProject is available for derivative works.  
 I don't want to directly share where to find the lists of data, but some 
 notes about it.
 
 1) We run a weekly query for a unique name per IP
 2) We match the response w/ query and note mismatches
 3) I have per-ASN (ask your network people what it is) reports available if 
 you email me from a corporate email address for your domain.  Same if you are 
 a national CERT.
 4) The queries take ~6.5 hours to run ; Don't try to bulk scrape the data, 
 it's easier to just ask/trick me or run your own scan.
 5) I log the full response packet for the weekly scan.  There are interesting 
 sets of data encoded in there.
 6) Many IPs repeat SERVFAIL for days/weeks after the query
 7) Many hosts respond from a port other than 53 (!) meaning while they are a 
 resolver, they are 'broken'.
 
 Some basic weekly summary data is available here:
 
 http://www.openresolverproject.org/breakdown.html
 
 If there's something specific you want parsed out of the responses, let me 
 know and I can automate it.

Here's an updated list based on the 20130421 results:

http://openresolverproject.org/version.bind.20130421.final.txt

- Jared

___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] [Off-topic] DNS dataset for academic research

2013-04-18 Thread Jared Mauch
The openresolverproject has weekly results from its survey of the ipv4 space, 
including response. 

It's available for ongoing research and derivative work. 

Jared Mauch

On Apr 18, 2013, at 11:28 AM, Joe Abley jab...@hopcount.ca wrote:

 On 2013-04-18, at 11:24, Kaio Rafael kaioraf...@dcc.ufam.edu.br wrote:
 
 I am looking for a DNS dataset for academic research. I have been
 studying .BR DNS dataset (DITL 2008 on DNS-OARC servers), however, I
 would like to investigate more recent traffic.
 
 What are you looking for?
 
 Data from authority-only servers (which ones?), recursive servers,
 something else?
 
 Packet captures, something else?
 
 What sample period do you need? Do you need a continuous/complete set
 of data within that window, or samples?
 
 How recent?
 
 
 Joe
 ___
 dns-operations mailing list
 dns-operations@lists.dns-oarc.net
 https://lists.dns-oarc.net/mailman/listinfo/dns-operations
 dns-jobs mailing list
 https://lists.dns-oarc.net/mailman/listinfo/dns-jobs
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] open resolver versio.bind responses

2013-04-17 Thread Jared Mauch
I'm going to automate some graphs 'soon'.

As I mentioned here and elsewhere, the methodology has been tweaked slightly in 
the past few weeks and has exposed a few more than the last week.

The last change is happening on 4-21.  I'm going to start showing more data, 
but my time has been limited due to $dayjob and $family.

I don't expect that to get any better in the next month, so anyone interested 
in helping with the data, I'm looking for people to come up with ideas of what 
to present/show.

- jared

On Apr 17, 2013, at 11:15 AM, L. Aaron Kaplan kap...@cert.at wrote:

 Jared,
 
 I did a very similar tracking of number of open recursive DNS Servers for my 
 pet wireless ISP.
 We reduced the # of ORNs from ~ 260 to 7 in half a year.
 So, these things are possible!
 
 http://ormon.funkfeuer.at/
 http://ormon.funkfeuer.at/stats.png
 
 
 I have a feature request for openresolverproject.org: please make such a 
 graph as above and put it on the front page. This way, people (network 
 operators etc) get some visual feedback on the global efforts. This visual 
 feedback is very helpful when you ask people to clean up.
 
 
 The source code for my scripts is here: 
 https://github.com/aaronkaplan/open-recursor-check
 (might want to copy  paste  adapt the scripts for generating the graphs)
 
 
 
 --- 
 // L. Aaron Kaplan kap...@cert.at - T: +43 1 5056416 78
 // CERT Austria - http://www.cert.at/
 // Eine Initiative der nic.at GmbH - http://www.nic.at/
 // Firmenbuchnummer 172568b, LG Salzburg
 
 
 
 

___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


[dns-operations] open resolver versio.bind responses

2013-04-16 Thread Jared Mauch
Greetings,

I took the latest 'Open Resolver' list and queried the hosts another time with 
a version.bind query.

You can view the results here:

http://openresolverproject.org/version.bind.report.txt

- jared
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] open resolver version.bind responses

2013-04-16 Thread Jared Mauch

On Apr 16, 2013, at 8:21 AM, Jared Mauch ja...@puck.nether.net wrote:

 Greetings,
 
 I took the latest 'Open Resolver' list and queried the hosts another time 
 with a version.bind query.
 
 You can view the results here:
 
 http://openresolverproject.org/version.bind.report.txt

Ok, I didn't expect everyone to post this to twitter/facebook so fast :)

FYI: The data in the OpenResolverProject is available for derivative works.  I 
don't want to directly share where to find the lists of data, but some notes 
about it.

1) We run a weekly query for a unique name per IP
2) We match the response w/ query and note mismatches
3) I have per-ASN (ask your network people what it is) reports available if you 
email me from a corporate email address for your domain.  Same if you are a 
national CERT.
4) The queries take ~6.5 hours to run ; Don't try to bulk scrape the data, it's 
easier to just ask/trick me or run your own scan.
5) I log the full response packet for the weekly scan.  There are interesting 
sets of data encoded in there.
6) Many IPs repeat SERVFAIL for days/weeks after the query
7) Many hosts respond from a port other than 53 (!) meaning while they are a 
resolver, they are 'broken'.

Some basic weekly summary data is available here:

http://www.openresolverproject.org/breakdown.html

If there's something specific you want parsed out of the responses, let me know 
and I can automate it.

- Jared
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] open resolver versio.bind responses

2013-04-16 Thread Jared Mauch

On Apr 16, 2013, at 10:39 AM, Roy Arends r...@dnss.ec wrote:

 On Apr 16, 2013, at 1:21 PM, Jared Mauch ja...@puck.nether.net wrote:
 
 Greetings,
 
 I took the latest 'Open Resolver' list and queried the hosts another time 
 with a version.bind query.
 
 You can view the results here:
 
 http://openresolverproject.org/version.bind.report.txt
 
 Interesting list. I assume that some resolvers are actually happy to try and 
 resolve version.bind chaos txt on your behalf, and so you might see the 
 version.bind response from either the IANA roots or some alternative servers.

This could be the case.  I went ahead and tweaked the code I was using to send 
a fixed packet to all the IPs in the list.

Either way, this gives folks an idea of the challenges.  The 'skbroadband' 
devices all need to be patched it seems.

Check out the breakdown.html page for some minor details about the resolver 
behaviors.

- Jared
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] open resolver versio.bind responses

2013-04-16 Thread Jared Mauch
Vernon,

On Apr 16, 2013, at 11:58 AM, Vernon Schryver v...@rhyolite.com wrote:

 From: Jared Mauch ja...@puck.nether.net
 
 Check out the breakdown.html page  ...
 
2013-04-14 results
 
34030764 servers responded to our udp/53 probe
914175 servers responded from a different IP than probed
27773382 gave the 'correct' answer to my A? for the DNS name queried.
13721271 responded from a source port other than udp/53
29571967 responses had recursion-available bit set.
2827206 returned REFUSED
 
 What was heard from the 3.4 million servers that responded with neither
 the A RR nor REFUSED?  The 2.8 million that REFUSED are significantly
 fewer than those mysterious 3.4 million, not to mention the 27 million
 functional open resolvers or the 29.5 million ostensibly open resolvers.

I can point you at that file if you'd like :)

 In other words https://www.google.com/search?q=sisyphus seems
 relevant.  I don't mean to suggest that the effort is not worthwhile.
 The work is valuable, but realism forces us to acknowledge some
 implications.  One is that there is no hope in outreach.

There is plenty of hope.  I've seen the following actions taken:

a) Hosting providers emailed customer base, said close your open resolver or we 
shut your host
b) ISPs have implemented spoofing filters.  NTT is one of them that has cranked 
the filters up as a result (at least on static routed customers).
c) National CERTs have contacted the project and obtained lists of 
hosts/machines in their control.
d) LARGE ISPs have contacted for lists of resolvers, including at least one 
major provider in the US.
e) At least one ISP today emailed me about their former customers freaking out 
when they were notified of upcoming DNS server changes which might impact them 
(people restricting or closing open resolvers).

I certainly understand the concerns here regarding mitigation and outreach, but 
things are happening.

My changes in measurement technique aren't helping accurately measure this, but 
there should be some good data in the next few weeks as I've made the last 
tweak.  The good news is the # of folks returning REFUSED keeps going up.

- Jared

___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs