Re: How to track DNS resolution sources

2014-12-04 Thread Notify Me
Hi Nick and List

Yes it's possible. The dud DNS response in some parts of the internet was
the public IP address being used by their proxy server. I'm not sure what
the proxy is, but it's a windows box. I was going to try to dig trace but
by then the poisoning  suddenly stopped happening. Any other ideas on how
to deal with this ? What can I proactively do in case it happens again?

On Thursday, 4 December 2014, Nicholas Oas  wrote:

> Is it possible that your client site has a helpful firewall that is
> performing DNS doctoring?
>
> http://www.juniper.net/techpubs/en_US/junos12.1/topics/concept/dns-alg-nat-doctoring-overview.html
>
> The first time I encountered this neither myself nor my customer expected
> it. We upgraded the firewall and suddenly their external hostname
> resolution was coming back with internal IP addresses, as defined by the
> firewall's NAT table.
>
> Note this only really happens with NAT. If the spoofed records are
> internal its most likely something else.
>
> On Wed, Dec 3, 2014 at 11:22 AM, Notify Me  > wrote:
>
>> Hi!
>>
>> I hope I'm wording this correctly. I had a incident at a client site where
>> a DNS record was being spoofed. How does one track down the IP address
>> that's returning the false records ? What tool can one use?
>>
>> Thanks!
>>
>>
>>
>>
>> --
>> Sent from MetroMail
>>
>
>

-- 
Sent from MetroMail


RE: How to track DNS resolution sources

2014-12-03 Thread teleric team


> Date: Wed, 3 Dec 2014 17:56:23 +0100
> From: bortzme...@nic.fr
> To: notify.s...@gmail.com
> Subject: Re: How to track DNS resolution sources
> CC: nanog@nanog.org
> 
> On Wed, Dec 03, 2014 at 05:22:58PM +0100,
>  Notify Me  wrote 
>  a message of 13 lines which said:
> 
> > I hope I'm wording this correctly.
> 
> Not really :-)
> 
> > I had a incident at a client site where a DNS record was being
> > spoofed.
> 
> How do you know? What steps did you use to assert this? Answers to
> these questions would help to understand your problem.
> 
> > How does one track down the IP address that's returning the false
> > records ?
> 
> If it's real DNS spoofing (which I doubt), the source IP address of
> the poisoner is forged, so it would not help.
> 
> The main tool to use is dig. Let's assume the name that bothers you is
> foobar.example.com. Query your local resolver:
> 
> dig A foobar.example.com
> 
> Query an external resolver, here Google Public DNS:
> 
> dig @8.8.4.4 A foobar.example.com
> 
> Query the authoritative name servers of example.com. First, to find them:
> 
> dig NS example.com
> 
> Second, query them (replace the server name by the real one):
> 
> dig @a.iana-servers.net. A foobar.example.com

I didn't understand how this will help him identify the poisoner.
What an IDS rule will do is check for responding authoritative query IDs for 
DNS queries never made to that responder, but made for the authoritative server 
identified as per above (direct NS inquiry).
If no IDS is present, BIND logging would allow for identification of 
authoritative responses and query ID identification. 
In summary whatever is answered authoritatively by a server other than the NS 
ones tracked by "dig +trace foobar.examplecom" is the potential poisoner. But 
if the poisoing is done from an spoofed IP address (spoofing the authoritative 
IP), well good luck w/ that if the spoofed domain is not DNSSEC aware.  
   

Re: How to track DNS resolution sources

2014-12-03 Thread Stephane Bortzmeyer
On Wed, Dec 03, 2014 at 11:32:08AM -0500,
 TR Shaw  wrote 
 a message of 20 lines which said:

> On the command line:
> 
> host spoofed.host.name.com

Excuse me but it is useless. It tests only the local resolver (which
may be unpoisoned). It provides no details that could help to debug
the problem (such as the TTL).




Re: How to track DNS resolution sources

2014-12-03 Thread Stephane Bortzmeyer
On Wed, Dec 03, 2014 at 05:22:58PM +0100,
 Notify Me  wrote 
 a message of 13 lines which said:

> I hope I'm wording this correctly.

Not really :-)

> I had a incident at a client site where a DNS record was being
> spoofed.

How do you know? What steps did you use to assert this? Answers to
these questions would help to understand your problem.

> How does one track down the IP address that's returning the false
> records ?

If it's real DNS spoofing (which I doubt), the source IP address of
the poisoner is forged, so it would not help.

The main tool to use is dig. Let's assume the name that bothers you is
foobar.example.com. Query your local resolver:

dig A foobar.example.com

Query an external resolver, here Google Public DNS:

dig @8.8.4.4 A foobar.example.com

Query the authoritative name servers of example.com. First, to find them:

dig NS example.com

Second, query them (replace the server name by the real one):

dig @a.iana-servers.net. A foobar.example.com


Re: How to track DNS resolution sources

2014-12-03 Thread TR Shaw
On the command line:

host spoofed.host.name.com


On Dec 3, 2014, at 11:22 AM, Notify Me  wrote:

> Hi!
> 
> I hope I'm wording this correctly. I had a incident at a client site where
> a DNS record was being spoofed. How does one track down the IP address
> that's returning the false records ? What tool can one use?
> 
> Thanks!
> 
> 
> 
> 
> -- 
> Sent from MetroMail



How to track DNS resolution sources

2014-12-03 Thread Notify Me
Hi!

I hope I'm wording this correctly. I had a incident at a client site where
a DNS record was being spoofed. How does one track down the IP address
that's returning the false records ? What tool can one use?

Thanks!




-- 
Sent from MetroMail