Re: [dns-operations] DNS Issue

2013-04-26 Thread Dobbins, Roland
On Apr 26, 2013, at 12:27 AM, Warren Kumari wrote: I think that in many cases it is not that the named version doesn't support randomization, but rather that they / their firewall group believes that DNS should only be allowed on port 53 (and UDP, natch). The actual problem being that the

Re: [dns-operations] DNS Issue

2013-04-26 Thread WBrown
From: Dobbins, Roland rdobb...@arbor.net The actual problem being that the DNS servers oughtn't to be behind a firewall in the first place. Can you elaborate on your statement? I can guess what the reaction around here would be if I suggested it. Confidentiality Notice: This electronic

Re: [dns-operations] DNS Issue

2013-04-26 Thread Joe Abley
On 2013-04-26, at 08:11, wbr...@e1b.org wrote: From: Dobbins, Roland rdobb...@arbor.net The actual problem being that the DNS servers oughtn't to be behind a firewall in the first place. Can you elaborate on your statement? I can guess what the reaction around here would be if I

Re: [dns-operations] DNS Issue

2013-04-26 Thread Cihan SUBASI (GARANTI TEKNOLOJI)
Hi, Also can someone explain why tcp53 should be allowed on the firewalls if dns is behind a firewall? And why auditors do not like tcp53 open to public? -Original Message- From: dns-operations-boun...@lists.dns-oarc.net [mailto:dns-operations-boun...@lists.dns-oarc.net] On Behalf

Re: [dns-operations] DNS Issue

2013-04-26 Thread Phil Regnauld
Joe Abley (jabley) writes: The number of stateful firewalls that can happily handle occasional flows of up to 100,000 flows per second two/from individual devices are few. Yours probably isn't one of them. Corollary: whatever device you'll be putting in front of the DNS servers

Re: [dns-operations] DNS Issue

2013-04-26 Thread Dobbins, Roland
On Apr 26, 2013, at 7:24 PM, Cihan SUBASI (GARANTI TEKNOLOJI) wrote: Also can someone explain why tcp53 should be allowed on the firewalls if dns is behind a firewall? Truncate mode. And why auditors do not like tcp53 open to public? 'Security' misinformation spread by firewall vendors

Re: [dns-operations] DNS Issue

2013-04-26 Thread Dobbins, Roland
On Apr 26, 2013, at 7:23 PM, Joe Abley wrote: The number of stateful firewalls that can happily handle occasional flows of up to 100,000 flows per second two/from individual devices are few. Yours probably isn't one of them. I've seen 3mb/sec of spoofed SYN-flood take down a stateful

Re: [dns-operations] DNS Issue

2013-04-26 Thread Dobbins, Roland
On Apr 26, 2013, at 7:29 PM, Phil Regnauld wrote: In general, vendors of attack mitigation equipment rarely advise you about what you'll need in the future, only what they can sell you now. +1. The architecture should be designed for horizontal scalability from the outset.

Re: [dns-operations] DNS Issue

2013-04-26 Thread Warren Kumari
On Apr 26, 2013, at 4:32 AM, Dobbins, Roland rdobb...@arbor.net wrote: On Apr 26, 2013, at 12:27 AM, Warren Kumari wrote: I think that in many cases it is not that the named version doesn't support randomization, but rather that they / their firewall group believes that DNS should only

Re: [dns-operations] DNS Issue

2013-04-26 Thread John Kristoff
On Fri, 26 Apr 2013 12:24:01 + Cihan SUBASI (GARANTI TEKNOLOJI) cih...@garanti.com.tr wrote: Also can someone explain why tcp53 should be allowed on the firewalls if dns is behind a firewall? DNS over TCP is not just for zone transfers. Many legitimate queries and answers, will be carried

Re: [dns-operations] DNS Issue

2013-04-26 Thread Vernon Schryver
From: Jared Mauch ja...@puck.nether.net Because someone told them the wrong thing and they don't know any difference. Just because they're an auditor doesn't mean they are clued. Simple thing would be to show them a dns query that requires tcp, such as: Would you show anything to a doctor

Re: [dns-operations] DNS Issue

2013-04-26 Thread Fred Morris
Good timing... On Fri, 26 Apr 2013, Cihan SUBASI (GARANTI TEKNOLOJI) wrote: Also can someone explain why tcp53 should be allowed on the firewalls if dns is behind a firewall? And why auditors do not like tcp53 open to public? See, that's another of the arguments why DNS should *not* be