Take 2. Sent from the wrong email address! Greg
On Sat, 12 Feb 2022 at 08:01, Greg Choules <gregchou...@googlemail.com> wrote: > > "...to use a traditional VPN solution such as DNSSEC ..." > DNSSEC is not a VPN service. It is regular, unencrypted DNS on port 53, or > whichever port you choose - see the manuals and KB articles for how to > configure non-standard ports. DNSSEC adds extra records to provide checks > that answers are genuine. > > > "P.S. My guess is that this so-call "security" service is no such thing, > or at > least its not the only thing. They are probably harvesting DNS > lookups > to sell as marketing data, or at least that would be my first guess." > I would try to establish exactly what Comcast's Security Service is > actually doing first, or if this is even the real problem. Run some manual > tests between the machines inside and the machines outside to establish > whether port number is the problem. e.g. use "dig -p" > > Thanks, Greg > > > On Fri, 11 Feb 2022 at 16:30, Jakob Bohm via bind-users < > bind-users@lists.isc.org> wrote: > >> On 2022-02-11 16:20, Tim Daneliuk via bind-users wrote: >> > >> > After some months of poking around, we are now certain that our >> > so-called "Business" >> > service from Comcast is compromising our DNS servers because of their >> > execrable "Security Edge" garbage. (They are willing to remove this >> > 'service' >> > only if we are willing to incur a higher monthly recurring fee.) >> > >> > Our master is in the wild and works fine, but the slave is behind the >> > compromised >> > Comcast pipe. The effect of having Security Edge in place is that the >> > slave cannot get updates from the master and is also unable to resolve >> > anything outside our own zone. Comcast is apparently hijacking all >> port >> > 53 requests and doing unspeakable things with them. >> > >> > Is there a way to have these servers work as usual, listening to >> > resolution >> > request on port 53, but have the slave update AND forward requests to >> the >> > master over a non-standard port, so as to work around the Comcast >> > madness? >> > >> > TIA, >> > Tim >> > >> > P.S. My guess is that this so-call "security" service is no such >> > thing, or at >> > least its not the only thing. They are probably harvesting DNS >> > lookups >> > to sell as marketing data, or at least that would be my first >> guess. >> If bind cannot be configured to avoid a port blocking or filtering 3rd >> party filter between two of your own servers, the obvioussolution is >> to use a traditional VPN solution such as DNSSEC or OpenVPN to encrypt >> all traffic between the two servers. That should pass through any ISP >> filters that don't block work-from-home VPNs. >> >> Enjoy >> >> Jakob >> -- >> Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com >> Transformervej 29, 2860 Søborg, Denmark. Direct +45 31 13 16 10 >> This public discussion message is non-binding and may contain errors. >> WiseMo - Remote Service Management for PCs, Phones and Embedded >> >> -- >> Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe >> from this list >> >> ISC funds the development of this software with paid support >> subscriptions. Contact us at https://www.isc.org/contact/ for more >> information. >> >> >> bind-users mailing list >> bind-users@lists.isc.org >> https://lists.isc.org/mailman/listinfo/bind-users >> >
-- Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list ISC funds the development of this software with paid support subscriptions. Contact us at https://www.isc.org/contact/ for more information. bind-users mailing list bind-users@lists.isc.org https://lists.isc.org/mailman/listinfo/bind-users