Forgot to forward it to the list....

> -----Original Message-----
> From: Hiemstra, Brenno 
> Sent: donderdag 10 mei 2001 11:08
> To:   'Chris Keladis'
> Subject:      DNS spoofing ( was RE: DNS cannot contact Root Servers)
> 
> Chris,
> 
> for DNS poisoning you can protect yourself by don't allowing any dynamic
> updates.
> 
> allow-update { none; };
> 
> in your named.conf.
> 
> and spoofing is just enable anti spoof rules on your routers,
> firewalls, etc etc etc
> 
> If you only allow recursion of a few trusted hosts and your anti-spoofing
> rules are well put up then DNS spoofing is very hard to get it working 
> because you only recurse and cache for a few trusted hosts or this is
> done on purpose (from those trusted hosts). 
> 
> You can't do much if the internet hosts (name server you query for a
> domain name)
> isn't sending the right information to your query (for domains you don't
> host on your
> DNS servers). 
> 
> An internet host or untrusted host should not be able to poison your DNS
> cache for 
> internet domains you host if you set the anti-spoof rules up right.
> 
> If and attacker is impersonating an internet nameserver by predicting
> Query ID's
> is something that is hard to protect to.
> 
> I think this is a good protection against DNS spoofing. But it also
> depends on the
> network / situation of your own. On every implementation everone has it's
> own thoughts
> and this is one that I have about this subject
> 
> Regards,
> 
> Brenno
> 
> 
> -----Original Message-----
> From: Chris Keladis [SMTP:[EMAIL PROTECTED]]
> Sent: donderdag 10 mei 2001 11:25
> To:   Hiemstra, Brenno; Brooks Carlson
> Cc:   'Firewalls (E-mail)
> Subject:      RE: DNS cannot contact Root Servers
> 
> At 09:44 AM 5/10/01 +0200, Hiemstra, Brenno wrote:
> 
> >You can configure your outside DNS servers (if you are using BIND)
> >to allow recursion from a couple of trused hosts.
> >
> >In the named.conf file just put the following entry:
> >
> >allow-recursion { ip_addresses_trusted_hosts; };
> >(or if the list is getting pretty long then build a simple acl)
> 
> 
> Call me paranoid, but DNS being (mostly) UDP based, worries me someone can
> 
> spoof a query to make it past your ACLs, they can effectively make your
> DNS 
> perform a recursive lookup (remember, to poison a cache you don't need to 
> see the reply, you only need to be able to make the request)
> 
> I prefer to turn it off completely and supply servers dedicated to 
> recursively answer for hosts which have extra protection than the simple 
> ACLs in BIND (namely, (good) statefull inspection firewalls.)
> 
> (I read somewhere in PIXs statefull inspection of DNS, it allows the first
> 
> correct reply back in, whereas FW-1 allows (matching) return packets for a
> 
> time period defined in the rulebase properties, for UDP)
> 
> Either methods work just fine, it all depends how paranoid you are :^)
> 
> 
> 
> 
> Regards,
> 
> Chris.
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to