nanog mailing list archives

Re: Open Resolver Problems


From: Jared Mauch <jared () puck nether net>
Date: Mon, 25 Mar 2013 16:45:59 -0400


On Mar 25, 2013, at 2:04 PM, Jay Ashworth <jra () baylink com> wrote:

----- Original Message -----
From: "Jared Mauch" <jared () puck nether net>

Open resolvers pose a security threat.

Could you clarify, here, Jared?

Do "open DNS customer-resolver/recursive servers" *per se* cause a problem?

Or is it merely "customer zone servers which are misconfigured to recurse",
as has always been problematic?

That is: is this just a reminder we never closed the old hole, or 
notification of some new and much nastier hole?

There have been some moderate size attacks recently that I won't go into detail here about.  The IPs that are on the 
website are certainly being used/abused.  A recent attack saw a 90% match rate against the "master list" here.  This 
means your open resolver is likely being used.

Anything to raise the bar here will minimize the impact to those networks under attack.  Turn on RPF facing your 
colocation and high-speed server lans.  We all know hosts become compromised.  Help minimize the impact of these 
attacks by 

a) doing BCP-38
b) locking down your recursive servers to networks you control
c) locking down your authority servers to not provide the same answer 15x in a second to the same querying IP.  If it's 
asking that same question 15x, then it's not you that's broken, it's that client.  (Or it's being abused).

- Jared

Current thread: