* [gentoo-user] How to prevent a dns amplification attack
@ 2013-03-28 8:51 Norman Rieß
2013-03-28 9:07 ` Adam Carter
` (4 more replies)
0 siblings, 5 replies; 38+ messages in thread
From: Norman Rieß @ 2013-03-28 8:51 UTC (permalink / raw
To: gentoo-user
Hello,
i am using pdns recursor to provide a dns server which should be usable
for everybody.The problem is, that the server seems to be used in dns
amplification attacks.
I googled around on how to prevent this but did not really find
something usefull.
Does anyone got an idea about this?
Regards,
Norman
^ permalink raw reply [flat|nested] 38+ messages in thread
* Re: [gentoo-user] How to prevent a dns amplification attack
2013-03-28 8:51 [gentoo-user] How to prevent a dns amplification attack Norman Rieß
@ 2013-03-28 9:07 ` Adam Carter
2013-03-28 22:16 ` Norman Rieß
2013-03-28 15:12 ` Volker Armin Hemmann
` (3 subsequent siblings)
4 siblings, 1 reply; 38+ messages in thread
From: Adam Carter @ 2013-03-28 9:07 UTC (permalink / raw
To: gentoo-user@lists.gentoo.org
[-- Attachment #1: Type: text/plain, Size: 197 bytes --]
Typically you would just allow recursion from networks you trust. Why are
you making your server available to everyone?
Read this one?
https://developers.google.com/speed/public-dns/docs/security
[-- Attachment #2: Type: text/html, Size: 320 bytes --]
^ permalink raw reply [flat|nested] 38+ messages in thread
* Re: [gentoo-user] How to prevent a dns amplification attack
2013-03-28 8:51 [gentoo-user] How to prevent a dns amplification attack Norman Rieß
2013-03-28 9:07 ` Adam Carter
@ 2013-03-28 15:12 ` Volker Armin Hemmann
2013-03-28 20:51 ` Kevin Chadwick
2013-03-28 15:38 ` Michael Mol
` (2 subsequent siblings)
4 siblings, 1 reply; 38+ messages in thread
From: Volker Armin Hemmann @ 2013-03-28 15:12 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 451 bytes --]
Turn off this unnecessary crap?
Am 28.03.2013 09:52 schrieb "Norman Rieß" <norman@smash-net.org>:
> Hello,
>
> i am using pdns recursor to provide a dns server which should be usable
> for everybody.The problem is, that the server seems to be used in dns
> amplification attacks.
> I googled around on how to prevent this but did not really find
> something usefull.
>
> Does anyone got an idea about this?
>
> Regards,
> Norman
>
>
[-- Attachment #2: Type: text/html, Size: 712 bytes --]
^ permalink raw reply [flat|nested] 38+ messages in thread
* Re: [gentoo-user] How to prevent a dns amplification attack
2013-03-28 8:51 [gentoo-user] How to prevent a dns amplification attack Norman Rieß
2013-03-28 9:07 ` Adam Carter
2013-03-28 15:12 ` Volker Armin Hemmann
@ 2013-03-28 15:38 ` Michael Mol
2013-03-28 16:06 ` Pandu Poluan
` (2 more replies)
2013-03-28 16:53 ` Jarry
2013-03-31 2:08 ` Paul Hartman
4 siblings, 3 replies; 38+ messages in thread
From: Michael Mol @ 2013-03-28 15:38 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 1109 bytes --]
On 03/28/2013 04:51 AM, Norman Rieß wrote:
> Hello,
>
> i am using pdns recursor to provide a dns server which should be usable
> for everybody.The problem is, that the server seems to be used in dns
> amplification attacks.
> I googled around on how to prevent this but did not really find
> something usefull.
>
> Does anyone got an idea about this?
I'm not sure it can be done. You can't make a resolver available to
"everybody" without somebody in that "everybody" group abusing it, and
that's exacly what happens in a DNS amplification attack.
Restrict your resolver to be accessible only to your network or, at
most, those of the specific group of people you're seeking to help.
You *might* try restricting the resolver to only respond to TCP requests
rather than UDP requests, but if the resolver sends response data along
with that first SYN+ACK, then nothing is solved, and you've opened
yourself up to a SYN flood-based DoS attack. (OTOH, if your resolver
went offline as a result of a SYN flood, at least it wouldn't be part of
an amplification attack any longer...)
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 555 bytes --]
^ permalink raw reply [flat|nested] 38+ messages in thread
* Re: [gentoo-user] How to prevent a dns amplification attack
2013-03-28 15:38 ` Michael Mol
@ 2013-03-28 16:06 ` Pandu Poluan
2013-03-28 16:10 ` Michael Mol
2013-03-28 18:26 ` Norman Rieß
2013-03-28 19:16 ` Alan McKinnon
2 siblings, 1 reply; 38+ messages in thread
From: Pandu Poluan @ 2013-03-28 16:06 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 1389 bytes --]
On Mar 28, 2013 10:38 PM, "Michael Mol" <mikemol@gmail.com> wrote:
>
> On 03/28/2013 04:51 AM, Norman Rieß wrote:
> > Hello,
> >
> > i am using pdns recursor to provide a dns server which should be usable
> > for everybody.The problem is, that the server seems to be used in dns
> > amplification attacks.
> > I googled around on how to prevent this but did not really find
> > something usefull.
> >
> > Does anyone got an idea about this?
>
> I'm not sure it can be done. You can't make a resolver available to
> "everybody" without somebody in that "everybody" group abusing it, and
> that's exacly what happens in a DNS amplification attack.
>
> Restrict your resolver to be accessible only to your network or, at
> most, those of the specific group of people you're seeking to help.
>
> You *might* try restricting the resolver to only respond to TCP requests
> rather than UDP requests, but if the resolver sends response data along
> with that first SYN+ACK, then nothing is solved, and you've opened
> yourself up to a SYN flood-based DoS attack. (OTOH, if your resolver
> went offline as a result of a SYN flood, at least it wouldn't be part of
> an amplification attack any longer...)
>
Can't we rate limit UDP DNS request?
E.g., limit each source IP to, let's say, 1 UDP per second?
That should be doable easily using iptables.
Rgds,
--
[-- Attachment #2: Type: text/html, Size: 1748 bytes --]
^ permalink raw reply [flat|nested] 38+ messages in thread
* Re: [gentoo-user] How to prevent a dns amplification attack
2013-03-28 16:06 ` Pandu Poluan
@ 2013-03-28 16:10 ` Michael Mol
0 siblings, 0 replies; 38+ messages in thread
From: Michael Mol @ 2013-03-28 16:10 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 1742 bytes --]
On 03/28/2013 12:06 PM, Pandu Poluan wrote:
>
> On Mar 28, 2013 10:38 PM, "Michael Mol" <mikemol@gmail.com
> <mailto:mikemol@gmail.com>> wrote:
>>
>> On 03/28/2013 04:51 AM, Norman Rieß wrote:
>> > Hello,
>> >
>> > i am using pdns recursor to provide a dns server which should be usable
>> > for everybody.The problem is, that the server seems to be used in dns
>> > amplification attacks.
>> > I googled around on how to prevent this but did not really find
>> > something usefull.
>> >
>> > Does anyone got an idea about this?
>>
>> I'm not sure it can be done. You can't make a resolver available to
>> "everybody" without somebody in that "everybody" group abusing it, and
>> that's exacly what happens in a DNS amplification attack.
>>
>> Restrict your resolver to be accessible only to your network or, at
>> most, those of the specific group of people you're seeking to help.
>>
>> You *might* try restricting the resolver to only respond to TCP requests
>> rather than UDP requests, but if the resolver sends response data along
>> with that first SYN+ACK, then nothing is solved, and you've opened
>> yourself up to a SYN flood-based DoS attack. (OTOH, if your resolver
>> went offline as a result of a SYN flood, at least it wouldn't be part of
>> an amplification attack any longer...)
>>
>
> Can't we rate limit UDP DNS request?
>
> E.g., limit each source IP to, let's say, 1 UDP per second?
>
> That should be doable easily using iptables.
That makes the resolver highly unreliable for normal use. Many sites
trigger resource grabs from 10-15 different domains. If all but the
first request is dropped due to rate limiting, you're going to have a
very, very broken experience.
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 555 bytes --]
^ permalink raw reply [flat|nested] 38+ messages in thread
* Re: [gentoo-user] How to prevent a dns amplification attack
2013-03-28 8:51 [gentoo-user] How to prevent a dns amplification attack Norman Rieß
` (2 preceding siblings ...)
2013-03-28 15:38 ` Michael Mol
@ 2013-03-28 16:53 ` Jarry
2013-03-28 19:40 ` Paul Ezvan
2013-03-31 2:08 ` Paul Hartman
4 siblings, 1 reply; 38+ messages in thread
From: Jarry @ 2013-03-28 16:53 UTC (permalink / raw
To: gentoo-user
On 28-Mar-13 9:51, Norman Rieß wrote:
> Hello,
>
> i am using pdns recursor to provide a dns server which should be usable
> for everybody.The problem is, that the server seems to be used in dns
> amplification attacks.
> I googled around on how to prevent this but did not really find
> something usefull.
>
> Does anyone got an idea about this?
Try to set-up connection rate limiting using iptables...
Jarry
--
_______________________________________________________________
This mailbox accepts e-mails only from selected mailing-lists!
Everything else is considered to be spam and therefore deleted.
^ permalink raw reply [flat|nested] 38+ messages in thread
* Re: [gentoo-user] How to prevent a dns amplification attack
2013-03-28 15:38 ` Michael Mol
2013-03-28 16:06 ` Pandu Poluan
@ 2013-03-28 18:26 ` Norman Rieß
2013-03-28 19:16 ` Alan McKinnon
2 siblings, 0 replies; 38+ messages in thread
From: Norman Rieß @ 2013-03-28 18:26 UTC (permalink / raw
To: gentoo-user
Am 28.03.2013 16:38, schrieb Michael Mol:
> On 03/28/2013 04:51 AM, Norman Rieß wrote:
>> Hello,
>>
>> i am using pdns recursor to provide a dns server which should be usable
>> for everybody.The problem is, that the server seems to be used in dns
>> amplification attacks.
>> I googled around on how to prevent this but did not really find
>> something usefull.
>>
>> Does anyone got an idea about this?
>
> I'm not sure it can be done. You can't make a resolver available to
> "everybody" without somebody in that "everybody" group abusing it, and
> that's exacly what happens in a DNS amplification attack.
>
> Restrict your resolver to be accessible only to your network or, at
> most, those of the specific group of people you're seeking to help.
>
> You *might* try restricting the resolver to only respond to TCP requests
> rather than UDP requests, but if the resolver sends response data along
> with that first SYN+ACK, then nothing is solved, and you've opened
> yourself up to a SYN flood-based DoS attack. (OTOH, if your resolver
> went offline as a result of a SYN flood, at least it wouldn't be part of
> an amplification attack any longer...)
>
Thank you Michael!
^ permalink raw reply [flat|nested] 38+ messages in thread
* Re: [gentoo-user] How to prevent a dns amplification attack
2013-03-28 15:38 ` Michael Mol
2013-03-28 16:06 ` Pandu Poluan
2013-03-28 18:26 ` Norman Rieß
@ 2013-03-28 19:16 ` Alan McKinnon
2013-03-28 19:38 ` Michael Mol
2 siblings, 1 reply; 38+ messages in thread
From: Alan McKinnon @ 2013-03-28 19:16 UTC (permalink / raw
To: gentoo-user
On 28/03/2013 17:38, Michael Mol wrote:
> On 03/28/2013 04:51 AM, Norman Rieß wrote:
>> Hello,
>>
>> i am using pdns recursor to provide a dns server which should be usable
>> for everybody.The problem is, that the server seems to be used in dns
>> amplification attacks.
>> I googled around on how to prevent this but did not really find
>> something usefull.
>>
>> Does anyone got an idea about this?
>
> I'm not sure it can be done. You can't make a resolver available to
> "everybody" without somebody in that "everybody" group abusing it, and
> that's exacly what happens in a DNS amplification attack.
>
> Restrict your resolver to be accessible only to your network or, at
> most, those of the specific group of people you're seeking to help.
>
> You *might* try restricting the resolver to only respond to TCP requests
> rather than UDP requests,
NO NO NO NO NO
Under no circumstances ever do this. The service breaks horribly when
you do this and it has to work even remotely hard. Most likely your ISP
will outright ban you for that if you use the ISP's caches. I knwo I do,
and so does every other major ISP in this country.
but if the resolver sends response data along
> with that first SYN+ACK, then nothing is solved, and you've opened
> yourself up to a SYN flood-based DoS attack. (OTOH, if your resolver
> went offline as a result of a SYN flood, at least it wouldn't be part of
> an amplification attack any longer...)
Or just use the ISP's DNS caches. In the vast majority of cases, the ISP
knows how to do it right and the user does not.
--
Alan McKinnon
alan.mckinnon@gmail.com
^ permalink raw reply [flat|nested] 38+ messages in thread
* Re: [gentoo-user] How to prevent a dns amplification attack
2013-03-28 19:16 ` Alan McKinnon
@ 2013-03-28 19:38 ` Michael Mol
2013-03-28 20:02 ` Alan McKinnon
0 siblings, 1 reply; 38+ messages in thread
From: Michael Mol @ 2013-03-28 19:38 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 2142 bytes --]
On 03/28/2013 03:16 PM, Alan McKinnon wrote:
> On 28/03/2013 17:38, Michael Mol wrote:
>> On 03/28/2013 04:51 AM, Norman Rieß wrote:
>>> Hello,
>>>
>>> i am using pdns recursor to provide a dns server which should be usable
>>> for everybody.The problem is, that the server seems to be used in dns
>>> amplification attacks.
>>> I googled around on how to prevent this but did not really find
>>> something usefull.
>>>
>>> Does anyone got an idea about this?
>>
>> I'm not sure it can be done. You can't make a resolver available to
>> "everybody" without somebody in that "everybody" group abusing it, and
>> that's exacly what happens in a DNS amplification attack.
>>
>> Restrict your resolver to be accessible only to your network or, at
>> most, those of the specific group of people you're seeking to help.
>>
>> You *might* try restricting the resolver to only respond to TCP requests
>> rather than UDP requests,
>
> NO NO NO NO NO
>
> Under no circumstances ever do this. The service breaks horribly when
> you do this and it has to work even remotely hard. Most likely your ISP
> will outright ban you for that if you use the ISP's caches. I knwo I do,
> and so does every other major ISP in this country.
Er, what? When we're talking about a recursive resolver requiring
clients connecting to it to use TCP, what does upstream care? He's
talking about running his own open DNS server.
>
> but if the resolver sends response data along
>> with that first SYN+ACK, then nothing is solved, and you've opened
>> yourself up to a SYN flood-based DoS attack. (OTOH, if your resolver
>> went offline as a result of a SYN flood, at least it wouldn't be part of
>> an amplification attack any longer...)
>
>
> Or just use the ISP's DNS caches. In the vast majority of cases, the ISP
> knows how to do it right and the user does not.
Generally true, though I've known people to choose not to use ISP caches
owing to the ISP's implementation of things like '*' records, ISPs
applying safety filters against some hostnames, and concerns about the
persistence of ISP request logs.
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 555 bytes --]
^ permalink raw reply [flat|nested] 38+ messages in thread
* Re: [gentoo-user] How to prevent a dns amplification attack
2013-03-28 16:53 ` Jarry
@ 2013-03-28 19:40 ` Paul Ezvan
0 siblings, 0 replies; 38+ messages in thread
From: Paul Ezvan @ 2013-03-28 19:40 UTC (permalink / raw
To: gentoo-user
Le 28/03/2013 17:53, Jarry a écrit :
> On 28-Mar-13 9:51, Norman Rieß wrote:
>> Hello,
>>
>> i am using pdns recursor to provide a dns server which should be usable
>> for everybody.The problem is, that the server seems to be used in dns
>> amplification attacks.
>> I googled around on how to prevent this but did not really find
>> something usefull.
>>
>> Does anyone got an idea about this?
>
> Try to set-up connection rate limiting using iptables...
>
> Jarry
Hi,
a good example, in French but the commands will be sufficient :
http://www.bortzmeyer.org/rate-limiting-dns-open-resolver.html
Paul
^ permalink raw reply [flat|nested] 38+ messages in thread
* Re: [gentoo-user] How to prevent a dns amplification attack
2013-03-28 19:38 ` Michael Mol
@ 2013-03-28 20:02 ` Alan McKinnon
2013-03-28 20:53 ` Paul Hartman
0 siblings, 1 reply; 38+ messages in thread
From: Alan McKinnon @ 2013-03-28 20:02 UTC (permalink / raw
To: gentoo-user
On 28/03/2013 21:38, Michael Mol wrote:
> On 03/28/2013 03:16 PM, Alan McKinnon wrote:
>> On 28/03/2013 17:38, Michael Mol wrote:
>>> On 03/28/2013 04:51 AM, Norman Rieß wrote:
>>>> Hello,
>>>>
>>>> i am using pdns recursor to provide a dns server which should be usable
>>>> for everybody.The problem is, that the server seems to be used in dns
>>>> amplification attacks.
>>>> I googled around on how to prevent this but did not really find
>>>> something usefull.
>>>>
>>>> Does anyone got an idea about this?
>>>
>>> I'm not sure it can be done. You can't make a resolver available to
>>> "everybody" without somebody in that "everybody" group abusing it, and
>>> that's exacly what happens in a DNS amplification attack.
>>>
>>> Restrict your resolver to be accessible only to your network or, at
>>> most, those of the specific group of people you're seeking to help.
>>>
>>> You *might* try restricting the resolver to only respond to TCP requests
>>> rather than UDP requests,
>>
>> NO NO NO NO NO
>>
>> Under no circumstances ever do this. The service breaks horribly when
>> you do this and it has to work even remotely hard. Most likely your ISP
>> will outright ban you for that if you use the ISP's caches. I knwo I do,
>> and so does every other major ISP in this country.
>
> Er, what? When we're talking about a recursive resolver requiring
> clients connecting to it to use TCP, what does upstream care? He's
> talking about running his own open DNS server.
Because the list is indexed and archived and Googled forever. Others may
get the idea that TCP-only DNS caches are a good idea in general. Have
you ever had to deal with the insanity caused when Windows Servers
insist on using TCP only, and YOU are the upstream?
I understand what the OP was suggesting, but he did not limit the
usefulness and scope of the suggestion, so I did.
>
>>
>> but if the resolver sends response data along
>>> with that first SYN+ACK, then nothing is solved, and you've opened
>>> yourself up to a SYN flood-based DoS attack. (OTOH, if your resolver
>>> went offline as a result of a SYN flood, at least it wouldn't be part of
>>> an amplification attack any longer...)
>>
>>
>> Or just use the ISP's DNS caches. In the vast majority of cases, the ISP
>> knows how to do it right and the user does not.
>
> Generally true, though I've known people to choose not to use ISP caches
> owing to the ISP's implementation of things like '*' records, ISPs
> applying safety filters against some hostnames, and concerns about the
> persistence of ISP request logs.
I get a few of those too every now and again. I know for sure in my case
their fears are unfounded, but can't prove it. Those few (and they are
few) can go ahead and deploy their own cache. I can't stop them, they
are free to do it, they are also free to ignore my advice of they choose.
--
Alan McKinnon
alan.mckinnon@gmail.com
^ permalink raw reply [flat|nested] 38+ messages in thread
* Re: [gentoo-user] How to prevent a dns amplification attack
2013-03-28 15:12 ` Volker Armin Hemmann
@ 2013-03-28 20:51 ` Kevin Chadwick
2013-03-28 20:57 ` Kevin Chadwick
0 siblings, 1 reply; 38+ messages in thread
From: Kevin Chadwick @ 2013-03-28 20:51 UTC (permalink / raw
To: gentoo-user
On Thu, 28 Mar 2013 16:12:04 +0100
Volker Armin Hemmann <volkerarmin@googlemail.com> wrote:
> > Hello,
> >
> > i am using pdns recursor to provide a dns server which should be
> > usable for everybody.The problem is, that the server seems to be
> > used in dns amplification attacks.
> > I googled around on how to prevent this but did not really find
> > something usefull.
> >
> > Does anyone got an idea about this?
I haven't looked into it but.
You could perhaps reduce the amplification by looking for trends that
maximise response sizes such as the 100x amp against spamhaus of late,
but you would be fighting against the wind and only buying time.
Rate limiting may work but bear in mind that so many servers could be
used that attacks maybe ongoing and you wouldn't notice, again you may
be able to make attackers need to be subtler or go to more effort like
for spam but you are not going to eradicate it.
Really you would need some sort of network of dns servers communicating
about who they are hurting as thankfully there is often a single
victim, but really it would be better if the IETF had listened to the
dangers and even now simply redesigned DNSSEC.
As for tcp I used to have all my OpenBSD clients resolvers using the tcp
option in resolv.conf but I haven't noticed another OS's resolver with
that option. There are decent protections against syn floods but I
assume you are wanting random clients to connect.
^ permalink raw reply [flat|nested] 38+ messages in thread
* Re: [gentoo-user] How to prevent a dns amplification attack
2013-03-28 20:02 ` Alan McKinnon
@ 2013-03-28 20:53 ` Paul Hartman
2013-03-28 20:59 ` Michael Mol
` (2 more replies)
0 siblings, 3 replies; 38+ messages in thread
From: Paul Hartman @ 2013-03-28 20:53 UTC (permalink / raw
To: gentoo-user
On Thu, Mar 28, 2013 at 3:02 PM, Alan McKinnon <alan.mckinnon@gmail.com> wrote:
>>> Or just use the ISP's DNS caches. In the vast majority of cases, the ISP
>>> knows how to do it right and the user does not.
>>
>> Generally true, though I've known people to choose not to use ISP caches
>> owing to the ISP's implementation of things like '*' records, ISPs
>> applying safety filters against some hostnames, and concerns about the
>> persistence of ISP request logs.
>
> I get a few of those too every now and again. I know for sure in my case
> their fears are unfounded, but can't prove it. Those few (and they are
> few) can go ahead and deploy their own cache. I can't stop them, they
> are free to do it, they are also free to ignore my advice of they choose.
In my case, my ISP's DNS servers are slow (several seconds to reply),
fail randomly when they should resolve, return an IP (which goes to
their ad-laden "helper" website if you are using a web browser) when
they should instead return nxdomain, and they have openly admitted to
selling customer DNS lookup history to marketers for targeted
advertising.
Thanks for being one of the good guys. :)
^ permalink raw reply [flat|nested] 38+ messages in thread
* Re: [gentoo-user] How to prevent a dns amplification attack
2013-03-28 20:51 ` Kevin Chadwick
@ 2013-03-28 20:57 ` Kevin Chadwick
2013-03-28 21:04 ` Michael Mol
0 siblings, 1 reply; 38+ messages in thread
From: Kevin Chadwick @ 2013-03-28 20:57 UTC (permalink / raw
To: gentoo-user
> listened to the dangers and even now simply redesigned DNSSEC.
Or they could fudge it by making every request requiring padding larger
than the response. Bandwidth would increase astronomically but amp
attacks would have to find other avenues.
^ permalink raw reply [flat|nested] 38+ messages in thread
* Re: [gentoo-user] How to prevent a dns amplification attack
2013-03-28 20:53 ` Paul Hartman
@ 2013-03-28 20:59 ` Michael Mol
2013-03-29 0:49 ` Peter Humphrey
2013-03-29 13:24 ` [gentoo-user] " Alan McKinnon
2 siblings, 0 replies; 38+ messages in thread
From: Michael Mol @ 2013-03-28 20:59 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 1311 bytes --]
On 03/28/2013 04:53 PM, Paul Hartman wrote:
> On Thu, Mar 28, 2013 at 3:02 PM, Alan McKinnon <alan.mckinnon@gmail.com> wrote:
>>>> Or just use the ISP's DNS caches. In the vast majority of cases, the ISP
>>>> knows how to do it right and the user does not.
>>>
>>> Generally true, though I've known people to choose not to use ISP caches
>>> owing to the ISP's implementation of things like '*' records, ISPs
>>> applying safety filters against some hostnames, and concerns about the
>>> persistence of ISP request logs.
>>
>> I get a few of those too every now and again. I know for sure in my case
>> their fears are unfounded, but can't prove it. Those few (and they are
>> few) can go ahead and deploy their own cache. I can't stop them, they
>> are free to do it, they are also free to ignore my advice of they choose.
>
> In my case, my ISP's DNS servers are slow (several seconds to reply),
> fail randomly when they should resolve, return an IP (which goes to
> their ad-laden "helper" website if you are using a web browser) when
> they should instead return nxdomain, and they have openly admitted to
> selling customer DNS lookup history to marketers for targeted
> advertising.
Wow. That's...all the fail.
>
> Thanks for being one of the good guys. :)
>
Indeed.
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 555 bytes --]
^ permalink raw reply [flat|nested] 38+ messages in thread
* Re: [gentoo-user] How to prevent a dns amplification attack
2013-03-28 20:57 ` Kevin Chadwick
@ 2013-03-28 21:04 ` Michael Mol
2013-03-28 22:36 ` Kevin Chadwick
0 siblings, 1 reply; 38+ messages in thread
From: Michael Mol @ 2013-03-28 21:04 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 606 bytes --]
On 03/28/2013 04:57 PM, Kevin Chadwick wrote:
>
>> listened to the dangers and even now simply redesigned DNSSEC.
>
> Or they could fudge it by making every request requiring padding larger
> than the response. Bandwidth would increase astronomically but amp
> attacks would have to find other avenues.
>
Infeasible; the requester cannot know the size of the response in
advance. If a packet comes in, and the response is larger than the
request, is it really an amp packet, did the client not know, or is the
server misconfigured and not limiting the response data as much as it could?
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 555 bytes --]
^ permalink raw reply [flat|nested] 38+ messages in thread
* Re: [gentoo-user] How to prevent a dns amplification attack
2013-03-28 9:07 ` Adam Carter
@ 2013-03-28 22:16 ` Norman Rieß
0 siblings, 0 replies; 38+ messages in thread
From: Norman Rieß @ 2013-03-28 22:16 UTC (permalink / raw
To: gentoo-user
Am 28.03.2013 10:07, schrieb Adam Carter:
> Why are you making your server available to everyone?
>
For the lulz mostly.
^ permalink raw reply [flat|nested] 38+ messages in thread
* Re: [gentoo-user] How to prevent a dns amplification attack
2013-03-28 21:04 ` Michael Mol
@ 2013-03-28 22:36 ` Kevin Chadwick
0 siblings, 0 replies; 38+ messages in thread
From: Kevin Chadwick @ 2013-03-28 22:36 UTC (permalink / raw
To: gentoo-user
On Thu, 28 Mar 2013 17:04:25 -0400
Michael Mol <mikemol@gmail.com> wrote:
> >
> >> listened to the dangers and even now simply redesigned DNSSEC.
> >
> > Or they could fudge it by making every request requiring padding
> > larger than the response. Bandwidth would increase astronomically
> > but amp attacks would have to find other avenues.
> >
>
> Infeasible; the requester cannot know the size of the response in
> advance. If a packet comes in, and the response is larger than the
> request, is it really an amp packet, did the client not know, or is
> the server misconfigured and not limiting the response data as much
> as it could?
I'm certainly not saying it's a good idea, hence the 'fudge' and 'making
every request' which would mean non updateable clients or non updated
routers (90%) needing special treatment. I'm sure there are probably
other hurdles to it but it is certainly possible to make a request much
larger than any potential response similar to the anti-spam system
that makes creating a message take a lot of cpu and then only accepting
messages from those that do (hsomething I think, only works too if all
take part but would eliminate spam almost completely).
However thinking about it, considering the want for dns to provide
larger things like encryption keys, huge requests may be the best long
term solution for a DNSSEC which seemingly refuses out of pride to add
something like DNSCURVE to prevent spoofing. Similar to firewalls only
sending a single syn ack (less than or equalise)
^ permalink raw reply [flat|nested] 38+ messages in thread
* Re: [gentoo-user] How to prevent a dns amplification attack
2013-03-28 20:53 ` Paul Hartman
2013-03-28 20:59 ` Michael Mol
@ 2013-03-29 0:49 ` Peter Humphrey
2013-03-29 8:53 ` Norman Rieß
2013-03-29 22:34 ` Paul Hartman
2013-03-29 13:24 ` [gentoo-user] " Alan McKinnon
2 siblings, 2 replies; 38+ messages in thread
From: Peter Humphrey @ 2013-03-29 0:49 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 488 bytes --]
On Thursday 28 March 2013 20:53:49 Paul Hartman wrote:
> In my case, my ISP's DNS servers are slow (several seconds to reply),
> fail randomly when they should resolve, return an IP (which goes to
> their ad-laden "helper" website if you are using a web browser) when
> they should instead return nxdomain, and they have openly admitted to
> selling customer DNS lookup history to marketers for targeted
> advertising.
That is just evil. Have you no alternative to this ISP?
--
Peter
[-- Attachment #2: Type: text/html, Size: 2870 bytes --]
^ permalink raw reply [flat|nested] 38+ messages in thread
* Re: [gentoo-user] How to prevent a dns amplification attack
2013-03-29 0:49 ` Peter Humphrey
@ 2013-03-29 8:53 ` Norman Rieß
2013-03-29 13:27 ` Alan McKinnon
2013-03-29 22:34 ` Paul Hartman
1 sibling, 1 reply; 38+ messages in thread
From: Norman Rieß @ 2013-03-29 8:53 UTC (permalink / raw
To: gentoo-user
Am 29.03.2013 01:49, schrieb Peter Humphrey:
> On Thursday 28 March 2013 20:53:49 Paul Hartman wrote:
>
>
>
>> In my case, my ISP's DNS servers are slow (several seconds to reply),
>
>> fail randomly when they should resolve, return an IP (which goes to
>
>> their ad-laden "helper" website if you are using a web browser) when
>
>> they should instead return nxdomain, and they have openly admitted to
>
>> selling customer DNS lookup history to marketers for targeted
>
>> advertising.
>
>
>
> That is just evil. Have you no alternative to this ISP?
>
>
>
> --
>
> Peter
>
>
>
Like free and open DNS servers? ;-) Like the one i am talking about and
was told it was unnessesary crap?
Norman
^ permalink raw reply [flat|nested] 38+ messages in thread
* Re: [gentoo-user] How to prevent a dns amplification attack
2013-03-28 20:53 ` Paul Hartman
2013-03-28 20:59 ` Michael Mol
2013-03-29 0:49 ` Peter Humphrey
@ 2013-03-29 13:24 ` Alan McKinnon
2 siblings, 0 replies; 38+ messages in thread
From: Alan McKinnon @ 2013-03-29 13:24 UTC (permalink / raw
To: gentoo-user
On 28/03/2013 22:53, Paul Hartman wrote:
> On Thu, Mar 28, 2013 at 3:02 PM, Alan McKinnon <alan.mckinnon@gmail.com> wrote:
>>>> Or just use the ISP's DNS caches. In the vast majority of cases, the ISP
>>>> knows how to do it right and the user does not.
>>>
>>> Generally true, though I've known people to choose not to use ISP caches
>>> owing to the ISP's implementation of things like '*' records, ISPs
>>> applying safety filters against some hostnames, and concerns about the
>>> persistence of ISP request logs.
>>
>> I get a few of those too every now and again. I know for sure in my case
>> their fears are unfounded, but can't prove it. Those few (and they are
>> few) can go ahead and deploy their own cache. I can't stop them, they
>> are free to do it, they are also free to ignore my advice of they choose.
>
> In my case, my ISP's DNS servers are slow (several seconds to reply),
> fail randomly when they should resolve, return an IP (which goes to
> their ad-laden "helper" website if you are using a web browser) when
> they should instead return nxdomain, and they have openly admitted to
> selling customer DNS lookup history to marketers for targeted
> advertising.
I'm part of Infra. If we sold you service like that, you wouldn't have
to complain, the CTO would be round at my desk in a flash with his new
career path plan for me.
You know the plan, it's the cookie-cutter one that mentions "burgers"
and "flipping" many times
:-)
>
> Thanks for being one of the good guys. :)
>
--
Alan McKinnon
alan.mckinnon@gmail.com
^ permalink raw reply [flat|nested] 38+ messages in thread
* Re: [gentoo-user] How to prevent a dns amplification attack
2013-03-29 8:53 ` Norman Rieß
@ 2013-03-29 13:27 ` Alan McKinnon
2013-03-29 13:36 ` Michael Mol
0 siblings, 1 reply; 38+ messages in thread
From: Alan McKinnon @ 2013-03-29 13:27 UTC (permalink / raw
To: gentoo-user
On 29/03/2013 10:53, Norman Rieß wrote:
>> That is just evil. Have you no alternative to this ISP?
>> >
>> >
>> >
>> > --
>> >
>> > Peter
>> >
>> >
>> >
> Like free and open DNS servers? ;-) Like the one i am talking about and
> was told it was unnessesary crap?
When you describe the service you DO get from your ISP, then we can see
that rolling your own is the proper alternative for you. Unless your ISP
block outbound port 53...
If you were in Africa, I could give you an alternative but sadly I don't
think you are in Africa
--
Alan McKinnon
alan.mckinnon@gmail.com
^ permalink raw reply [flat|nested] 38+ messages in thread
* Re: [gentoo-user] How to prevent a dns amplification attack
2013-03-29 13:27 ` Alan McKinnon
@ 2013-03-29 13:36 ` Michael Mol
0 siblings, 0 replies; 38+ messages in thread
From: Michael Mol @ 2013-03-29 13:36 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 882 bytes --]
On 03/29/2013 09:27 AM, Alan McKinnon wrote:
> On 29/03/2013 10:53, Norman Rieß wrote:
>>> That is just evil. Have you no alternative to this ISP?
>>>>
>>>>
>>>>
>>>> --
>>>>
>>>> Peter
>>>>
>>>>
>>>>
>> Like free and open DNS servers? ;-) Like the one i am talking about and
>> was told it was unnessesary crap?
>
>
> When you describe the service you DO get from your ISP, then we can see
> that rolling your own is the proper alternative for you. Unless your ISP
> block outbound port 53...
It'd be trivial enough for someone in a saner spot to privately offer
him an allowed-clients entry in a DNS server listening on a non-standard
port.
Either way, it's still important he not allow just anybody to connect to
his resolver.
>
> If you were in Africa, I could give you an alternative but sadly I don't
> think you are in Africa
>
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 555 bytes --]
^ permalink raw reply [flat|nested] 38+ messages in thread
* Re: [gentoo-user] How to prevent a dns amplification attack
2013-03-29 0:49 ` Peter Humphrey
2013-03-29 8:53 ` Norman Rieß
@ 2013-03-29 22:34 ` Paul Hartman
2013-03-29 23:01 ` William Kenworthy
` (2 more replies)
1 sibling, 3 replies; 38+ messages in thread
From: Paul Hartman @ 2013-03-29 22:34 UTC (permalink / raw
To: gentoo-user
On Thu, Mar 28, 2013 at 7:49 PM, Peter Humphrey
<peter@humphrey.ukfsn.org> wrote:
> On Thursday 28 March 2013 20:53:49 Paul Hartman wrote:
>
>> In my case, my ISP's DNS servers are slow (several seconds to reply),
>> fail randomly when they should resolve, return an IP (which goes to
>> their ad-laden "helper" website if you are using a web browser) when
>> they should instead return nxdomain, and they have openly admitted to
>> selling customer DNS lookup history to marketers for targeted
>> advertising.
>
>
>
> That is just evil. Have you no alternative to this ISP?
Not really.
I have a 100 megabit connection through the cable company; my only
wired alternative is DSL (1.5 mbit for almost half the price I'm
paying for 100mbit). Cellular or satellite are not viable options for
me because of comparatively poor value, latency and miniscule data
usage caps.
In the USA, the local governments (cities and towns, etc.) are in
control of regulating which utilities can use public land, and are
entitled to compensation from those who use it. Cable companies
negotiate rental of that space called a "franchise fee" so they can
bury cables, etc.
The franchise fee used to be a government-protected monopoly. In the
1980's, when cable television started booming, regional pockets of
cable providers were built up thanks to these local monopolies
allowing them to move into towns with no competition. For the sake of
efficiency, cable companies would build out in adjacent towns and kept
spreading and growing outward until at some point nearly everyone in
the country had cable TV services available to them, with the
exception of those living in rural areas which were not dense enough
to justify the cost of laying cables, even when presented with a
monopoly.
It is no longer legal for local governments to award monopolies, but
the damage has been done. What we have is essentially the cable TV
infrastructure that was laid out during the decade when local cable
monopolies were legal, and the cost of entry for a new player into the
market now is so high that nobody ever bothers. End result for
consumers is a lack of choice. There are some places where competition
exists, but those places are pretty rare, in my experience.
There are some other possible alternatives to cable internet and DSL,
such as municipal wifi, mesh networks, powerline and FTTx, but none
are available where I live.
The service I receive from the cable company here is actually
excellent, with the exception of the aforementioned DNS woes.
Pretty much every major ISP in the US does DNS-hijacking and other
shenanigans, so there's no avoiding the evilness. I believe the board
members of major cable and telecom companies would sell their own
mothers into slavery if it meant a rise in share prices or a larger
bonus at the end of the year...
^ permalink raw reply [flat|nested] 38+ messages in thread
* Re: [gentoo-user] How to prevent a dns amplification attack
2013-03-29 22:34 ` Paul Hartman
@ 2013-03-29 23:01 ` William Kenworthy
2013-03-29 23:09 ` Michael Mol
2013-03-30 4:07 ` Walter Dnes
2013-03-30 12:06 ` Norman Rieß
2 siblings, 1 reply; 38+ messages in thread
From: William Kenworthy @ 2013-03-29 23:01 UTC (permalink / raw
To: gentoo-user
On 30/03/13 06:34, Paul Hartman wrote:
> On Thu, Mar 28, 2013 at 7:49 PM, Peter Humphrey
> <peter@humphrey.ukfsn.org> wrote:
>> On Thursday 28 March 2013 20:53:49 Paul Hartman wrote:
>>
>>> In my case, my ISP's DNS servers are slow (several seconds to reply),
>>> fail randomly when they should resolve, return an IP (which goes to
>>> their ad-laden "helper" website if you are using a web browser) when
>>> they should instead return nxdomain, and they have openly admitted to
>>> selling customer DNS lookup history to marketers for targeted
>>> advertising.
>>
>>
>>
>> That is just evil. Have you no alternative to this ISP?
>
> Not really.
>
> I have a 100 megabit connection through the cable company; my only
> wired alternative is DSL (1.5 mbit for almost half the price I'm
> paying for 100mbit). Cellular or satellite are not viable options for
> me because of comparatively poor value, latency and miniscule data
> usage caps.
>
Can you do a tunnel to a cheap vsp instance that can access an external
dns, and feed all your dns queries through it? Considering the problems
with your existing setup, that looks attractive and you can have sane
fallbacks if neccessary.
I tried this to avoid the "Australia Tax" when online shopping overseas
and the small additional latency didnt seem to be a problem.
BillK
^ permalink raw reply [flat|nested] 38+ messages in thread
* Re: [gentoo-user] How to prevent a dns amplification attack
2013-03-29 23:01 ` William Kenworthy
@ 2013-03-29 23:09 ` Michael Mol
0 siblings, 0 replies; 38+ messages in thread
From: Michael Mol @ 2013-03-29 23:09 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 1956 bytes --]
On 03/29/2013 07:01 PM, William Kenworthy wrote:
> On 30/03/13 06:34, Paul Hartman wrote:
>> On Thu, Mar 28, 2013 at 7:49 PM, Peter Humphrey
>> <peter@humphrey.ukfsn.org> wrote:
>>> On Thursday 28 March 2013 20:53:49 Paul Hartman wrote:
>>>
>>>> In my case, my ISP's DNS servers are slow (several seconds to reply),
>>>> fail randomly when they should resolve, return an IP (which goes to
>>>> their ad-laden "helper" website if you are using a web browser) when
>>>> they should instead return nxdomain, and they have openly admitted to
>>>> selling customer DNS lookup history to marketers for targeted
>>>> advertising.
>>>
>>>
>>>
>>> That is just evil. Have you no alternative to this ISP?
>>
>> Not really.
>>
>> I have a 100 megabit connection through the cable company; my only
>> wired alternative is DSL (1.5 mbit for almost half the price I'm
>> paying for 100mbit). Cellular or satellite are not viable options for
>> me because of comparatively poor value, latency and miniscule data
>> usage caps.
>>
>
> Can you do a tunnel to a cheap vsp instance that can access an external
> dns, and feed all your dns queries through it? Considering the problems
> with your existing setup, that looks attractive and you can have sane
> fallbacks if neccessary.
>
> I tried this to avoid the "Australia Tax" when online shopping overseas
> and the small additional latency didnt seem to be a problem.
Doesn't even need to be that complicated.
Set up a free tunnel with tunnelbroker.net, and use Hurricane Electric's
provided IPv6 DNS servers. They run the tunnel service as a loss-leader,
and if they're doing anything funky with their DNS data, I haven't heard
about it.
Chances are, the local ISP won't be filtering traffic flowing across a
proto41 tunnel. (IPv6 packet as an IPv4 packet payload. It's called a
proto41 tunnel because 41 is placed in the "next protocol" field in the
IPv4 packet.)
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 555 bytes --]
^ permalink raw reply [flat|nested] 38+ messages in thread
* Re: [gentoo-user] How to prevent a dns amplification attack
2013-03-29 22:34 ` Paul Hartman
2013-03-29 23:01 ` William Kenworthy
@ 2013-03-30 4:07 ` Walter Dnes
2013-03-30 12:06 ` Norman Rieß
2 siblings, 0 replies; 38+ messages in thread
From: Walter Dnes @ 2013-03-30 4:07 UTC (permalink / raw
To: gentoo-user
On Fri, Mar 29, 2013 at 05:34:41PM -0500, Paul Hartman wrote
>
> Pretty much every major ISP in the US does DNS-hijacking and other
> shenanigans, so there's no avoiding the evilness.
The obvious questions is... do they hijack all port-53 queries?
Depending on the answer, there are 2 different strategies to follow.
--
Walter Dnes <waltdnes@waltdnes.org>
I don't run "desktop environments"; I run useful applications
^ permalink raw reply [flat|nested] 38+ messages in thread
* Re: [gentoo-user] How to prevent a dns amplification attack
2013-03-29 22:34 ` Paul Hartman
2013-03-29 23:01 ` William Kenworthy
2013-03-30 4:07 ` Walter Dnes
@ 2013-03-30 12:06 ` Norman Rieß
2013-03-30 14:53 ` Rene Rasmussen
2013-03-30 15:11 ` Kevin Chadwick
2 siblings, 2 replies; 38+ messages in thread
From: Norman Rieß @ 2013-03-30 12:06 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 4194 bytes --]
Am 29.03.2013 um 23:34 schrieb Paul Hartman <paul.hartman+gentoo@gmail.com>:
> On Thu, Mar 28, 2013 at 7:49 PM, Peter Humphrey
> <peter@humphrey.ukfsn.org> wrote:
>> On Thursday 28 March 2013 20:53:49 Paul Hartman wrote:
>>
>>> In my case, my ISP's DNS servers are slow (several seconds to reply),
>>> fail randomly when they should resolve, return an IP (which goes to
>>> their ad-laden "helper" website if you are using a web browser) when
>>> they should instead return nxdomain, and they have openly admitted to
>>> selling customer DNS lookup history to marketers for targeted
>>> advertising.
>>
>>
>>
>> That is just evil. Have you no alternative to this ISP?
>
> Not really.
>
> I have a 100 megabit connection through the cable company; my only
> wired alternative is DSL (1.5 mbit for almost half the price I'm
> paying for 100mbit). Cellular or satellite are not viable options for
> me because of comparatively poor value, latency and miniscule data
> usage caps.
> […]
>
> It is no longer legal for local governments to award monopolies, but
> the damage has been done. What we have is essentially the cable TV
> infrastructure that was laid out during the decade when local cable
> monopolies were legal, and the cost of entry for a new player into the
> market now is so high that nobody ever bothers. End result for
> consumers is a lack of choice. There are some places where competition
> exists, but those places are pretty rare, in my experience.
>
> There are some other possible alternatives to cable internet and DSL,
> such as municipal wifi, mesh networks, powerline and FTTx, but none
> are available where I live.
>
> The service I receive from the cable company here is actually
> excellent, with the exception of the aforementioned DNS woes.
>
> Pretty much every major ISP in the US does DNS-hijacking and other
> shenanigans, so there's no avoiding the evilness. I believe the board
> members of major cable and telecom companies would sell their own
> mothers into slavery if it meant a rise in share prices or a larger
> bonus at the end of the year...
>
That is pretty much the same as what happened in Germany. The telephone network was build by the german postal service in the past and was run by the government. As we all know everything works better and cheaper when things are privatized, so the Deutsche Telekom was created and with it a semi monopoly over night.
Regions not dense enough are not part of the developing plans of any of the companies. So if you are lucky like me, you are stuck with 16mbit DSL provided by one company rented by an other company. If people start to build their own network or a competitor reaches for a specific underdeveloped region, this region gets an upgrade like to DSL 3 Mbit or something like that, so the competitors draw of.
If you are really lucky you live in a region which is really dense or a cable company provides you with internet, so you get 100mbit. But this is only a fraction of all people.
If the government is confronted with this they say, the market will regulate that, which it does not. And if voices get too loud, the tell the companies to develop the underdeveloped regions, they shake hands on TV and nothing happens.
And as Paul said, most ISP do DNS-hijacking and the like, which breaks things in incredible unexpected ways.
So when i wrote this post to the mailing list and got answers like "unnecessary crap" and "why make it available for everyone" i thougt, this to be answers of some weirdos which should be ignored.
Here you do not trust your ISP… you use the ISP which sucks less or the only one that gives you any internet at all.
If you reach a certain level of knowledge, you change your DNS settings to free DNS servers and if you run a resolver you do it for the other poor souls as well.
There are lists of unfiltered DNS Servers (http://www.ungefiltert-surfen.de/nameserver/de.html), which are checked regularly if they provide unfiltered answers an the like.
And there are howtos for the average user on how to change the dns settings and to avoid your isp´s dns servers.
Regards
Norman
[-- Attachment #2: Type: text/html, Size: 4943 bytes --]
^ permalink raw reply [flat|nested] 38+ messages in thread
* Re: [gentoo-user] How to prevent a dns amplification attack
2013-03-30 12:06 ` Norman Rieß
@ 2013-03-30 14:53 ` Rene Rasmussen
2013-03-30 15:15 ` [Bulk] " Kevin Chadwick
2013-03-30 15:11 ` Kevin Chadwick
1 sibling, 1 reply; 38+ messages in thread
From: Rene Rasmussen @ 2013-03-30 14:53 UTC (permalink / raw
To: gentoo-user
On Sat, 30 Mar 2013 13:06:16 +0100
Norman Rieß <norman@smash-net.org> wrote:
>
> Am 29.03.2013 um 23:34 schrieb Paul Hartman
> <paul.hartman+gentoo@gmail.com>:
>
> > On Thu, Mar 28, 2013 at 7:49 PM, Peter Humphrey
> > <peter@humphrey.ukfsn.org> wrote:
> >> On Thursday 28 March 2013 20:53:49 Paul Hartman wrote:
> >>
> >>> In my case, my ISP's DNS servers are slow (several seconds to
> >>> reply), fail randomly when they should resolve, return an IP
> >>> (which goes to their ad-laden "helper" website if you are using a
> >>> web browser) when they should instead return nxdomain, and they
> >>> have openly admitted to selling customer DNS lookup history to
> >>> marketers for targeted advertising.
> >>
> >>
> >>
> >> That is just evil. Have you no alternative to this ISP?
> >
> > Not really.
> >
> > I have a 100 megabit connection through the cable company; my only
> > wired alternative is DSL (1.5 mbit for almost half the price I'm
> > paying for 100mbit). Cellular or satellite are not viable options
> > for me because of comparatively poor value, latency and miniscule
> > data usage caps.
>
> > […]
> >
> > It is no longer legal for local governments to award monopolies, but
> > the damage has been done. What we have is essentially the cable TV
> > infrastructure that was laid out during the decade when local cable
> > monopolies were legal, and the cost of entry for a new player into
> > the market now is so high that nobody ever bothers. End result for
> > consumers is a lack of choice. There are some places where
> > competition exists, but those places are pretty rare, in my
> > experience.
> >
> > There are some other possible alternatives to cable internet and
> > DSL, such as municipal wifi, mesh networks, powerline and FTTx, but
> > none are available where I live.
> >
> > The service I receive from the cable company here is actually
> > excellent, with the exception of the aforementioned DNS woes.
> >
> > Pretty much every major ISP in the US does DNS-hijacking and other
> > shenanigans, so there's no avoiding the evilness. I believe the
> > board members of major cable and telecom companies would sell their
> > own mothers into slavery if it meant a rise in share prices or a
> > larger bonus at the end of the year...
> >
>
> That is pretty much the same as what happened in Germany. The
> telephone network was build by the german postal service in the past
> and was run by the government. As we all know everything works better
> and cheaper when things are privatized, so the Deutsche Telekom was
> created and with it a semi monopoly over night. Regions not dense
> enough are not part of the developing plans of any of the companies.
> So if you are lucky like me, you are stuck with 16mbit DSL provided
> by one company rented by an other company. If people start to build
> their own network or a competitor reaches for a specific
> underdeveloped region, this region gets an upgrade like to DSL 3 Mbit
> or something like that, so the competitors draw of. If you are really
> lucky you live in a region which is really dense or a cable company
> provides you with internet, so you get 100mbit. But this is only a
> fraction of all people. If the government is confronted with this
> they say, the market will regulate that, which it does not. And if
> voices get too loud, the tell the companies to develop the
> underdeveloped regions, they shake hands on TV and nothing happens.
> And as Paul said, most ISP do DNS-hijacking and the like, which
> breaks things in incredible unexpected ways.
>
> So when i wrote this post to the mailing list and got answers like
> "unnecessary crap" and "why make it available for everyone" i thougt,
> this to be answers of some weirdos which should be ignored. Here you
> do not trust your ISP… you use the ISP which sucks less or the only
> one that gives you any internet at all. If you reach a certain level
> of knowledge, you change your DNS settings to free DNS servers and if
> you run a resolver you do it for the other poor souls as well. There
> are lists of unfiltered DNS Servers
> (http://www.ungefiltert-surfen.de/nameserver/de.html), which are
> checked regularly if they provide unfiltered answers an the like. And
> there are howtos for the average user on how to change the dns
> settings and to avoid your isp´s dns servers.
>
> Regards
> Norman
>
There is also the possibility to use opendns.com
I've been using them for years, and have not had any trouble. I started
using them when my ISP decided to block some sites. And their standard
service is free :)
Best regards,
Rene
^ permalink raw reply [flat|nested] 38+ messages in thread
* Re: [Bulk] Re: [gentoo-user] How to prevent a dns amplification attack
2013-03-30 12:06 ` Norman Rieß
2013-03-30 14:53 ` Rene Rasmussen
@ 2013-03-30 15:11 ` Kevin Chadwick
2013-03-30 16:44 ` Norman Rieß
2013-03-30 17:30 ` [gentoo-user] Re: [seriously O/T] " Mick
1 sibling, 2 replies; 38+ messages in thread
From: Kevin Chadwick @ 2013-03-30 15:11 UTC (permalink / raw
To: gentoo-user
On Sat, 30 Mar 2013 13:06:16 +0100
Norman Rieß <norman@smash-net.org> wrote:
> As we all know everything works better and cheaper when things are
> privatized
Actually No it's not so simple at all.
You get incompetence in private and public and you may be more likely
to get away with it for longer in a public service than in a market with
competition but there are many examples where things simply get worse.
In the UK, water companies were privatisied and fat cats made lots of
money letting the pipes deteriorate for future generations.
British Telecom, well that's a mixed bag but it is certainly a
tiny shadow of it's original self.
We know ideals and theory hardly ever work but theoretically public
should be much better when well managed.
I wonder if ISPS wouldn't be handling things like TalkTalks
Homesafe in such a stupid manner (across the board is where it is
stupid, even for non users of the service) where they redirect all the
http traffic through an undoubtedly insecure layer 7 handling huawei
device with less commercial pressures or analysing bandwidth at layer
7 when they should be doing so more safely and completely at layers 3
and 4 leading me to believe they are not just thinking about bandwidth
usage. Why does it matter if you download 1000Gb via torrents or http.
ACKs can be managed in any case.
I'm glad open source is beginning to make strides into public services
as it should help put an end to expensive interoperability issues (if
we stay away from non posix things like systemd, though even then
shouldn't be too bad ;-)).
^ permalink raw reply [flat|nested] 38+ messages in thread
* Re: [Bulk] Re: [gentoo-user] How to prevent a dns amplification attack
2013-03-30 14:53 ` Rene Rasmussen
@ 2013-03-30 15:15 ` Kevin Chadwick
2013-03-30 15:30 ` Tanstaafl
0 siblings, 1 reply; 38+ messages in thread
From: Kevin Chadwick @ 2013-03-30 15:15 UTC (permalink / raw
To: gentoo-user
On Sat, 30 Mar 2013 15:53:29 +0100
Rene Rasmussen <gentoo@paranoidix.dk> wrote:
> There is also the possibility to use opendns.com
> I've been using them for years, and have not had any trouble. I
> started using them when my ISP decided to block some sites. And their
> standard service is free :)
They also support dnscurve but I thought that in the case of non
existing domain lookups they do show adverts? I don't see just that as
a huge problem as long as they are not targetted though?
^ permalink raw reply [flat|nested] 38+ messages in thread
* Re: [Bulk] Re: [gentoo-user] How to prevent a dns amplification attack
2013-03-30 15:15 ` [Bulk] " Kevin Chadwick
@ 2013-03-30 15:30 ` Tanstaafl
0 siblings, 0 replies; 38+ messages in thread
From: Tanstaafl @ 2013-03-30 15:30 UTC (permalink / raw
To: gentoo-user
On 2013-03-30 11:15 AM, Kevin Chadwick <ma1l1ists@yahoo.co.uk> wrote:
> On Sat, 30 Mar 2013 15:53:29 +0100
> Rene Rasmussen <gentoo@paranoidix.dk> wrote:
>
>> There is also the possibility to use opendns.com
>> I've been using them for years, and have not had any trouble. I
>> started using them when my ISP decided to block some sites. And their
>> standard service is free :)
> They also support dnscurve but I thought that in the case of non
> existing domain lookups they do show adverts?
This can be disabled...
The biggest problem with using them (or google dns) is if you are
running a mail server, you cannot use spamhaus or many other DNSBLs,
because they don't work with these free DNS services:
http://www.spamhaus.org/faq/section/DNSBL%20Usage#261
^ permalink raw reply [flat|nested] 38+ messages in thread
* Re: [Bulk] Re: [gentoo-user] How to prevent a dns amplification attack
2013-03-30 15:11 ` Kevin Chadwick
@ 2013-03-30 16:44 ` Norman Rieß
2013-03-30 17:30 ` [gentoo-user] Re: [seriously O/T] " Mick
1 sibling, 0 replies; 38+ messages in thread
From: Norman Rieß @ 2013-03-30 16:44 UTC (permalink / raw
To: gentoo-user
Am 30.03.2013 16:11, schrieb Kevin Chadwick:
> On Sat, 30 Mar 2013 13:06:16 +0100
> Norman Rieß <norman@smash-net.org> wrote:
>
>> As we all know everything works better and cheaper when things are
>> privatized
>
> Actually No it's not so simple at all.
>
> You get incompetence in private and public and you may be more likely
> to get away with it for longer in a public service than in a market with
> competition but there are many examples where things simply get worse.
>
> In the UK, water companies were privatisied and fat cats made lots of
> money letting the pipes deteriorate for future generations.
>
> British Telecom, well that's a mixed bag but it is certainly a
> tiny shadow of it's original self.
>
> We know ideals and theory hardly ever work but theoretically public
> should be much better when well managed.
>
> I wonder if ISPS wouldn't be handling things like TalkTalks
> Homesafe in such a stupid manner (across the board is where it is
> stupid, even for non users of the service) where they redirect all the
> http traffic through an undoubtedly insecure layer 7 handling huawei
> device with less commercial pressures or analysing bandwidth at layer
> 7 when they should be doing so more safely and completely at layers 3
> and 4 leading me to believe they are not just thinking about bandwidth
> usage. Why does it matter if you download 1000Gb via torrents or http.
> ACKs can be managed in any case.
>
> I'm glad open source is beginning to make strides into public services
> as it should help put an end to expensive interoperability issues (if
> we stay away from non posix things like systemd, though even then
> shouldn't be too bad ;-)).
>
I think, you did not spot the sarcasm in what i said :-).
^ permalink raw reply [flat|nested] 38+ messages in thread
* [gentoo-user] Re: [seriously O/T] How to prevent a dns amplification attack
2013-03-30 15:11 ` Kevin Chadwick
2013-03-30 16:44 ` Norman Rieß
@ 2013-03-30 17:30 ` Mick
1 sibling, 0 replies; 38+ messages in thread
From: Mick @ 2013-03-30 17:30 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: Text/Plain, Size: 4013 bytes --]
On Saturday 30 Mar 2013 15:11:17 Kevin Chadwick wrote:
> On Sat, 30 Mar 2013 13:06:16 +0100
>
> Norman Rieß <norman@smash-net.org> wrote:
> > As we all know everything works better and cheaper when things are
> >
> > privatized
>
> Actually No it's not so simple at all.
>
> You get incompetence in private and public and you may be more likely
> to get away with it for longer in a public service than in a market with
> competition but there are many examples where things simply get worse.
>
> In the UK, water companies were privatisied and fat cats made lots of
> money letting the pipes deteriorate for future generations.
>
> British Telecom, well that's a mixed bag but it is certainly a
> tiny shadow of it's original self.
>
> We know ideals and theory hardly ever work but theoretically public
> should be much better when well managed.
Well, as you said, "... it's not so simple at all." ;-)
Errors, incompetence, inefficiencies due to organisational friction and poor
structures, plus perverse incentives exist in all organisations. They feed on
human traits and do not depend simply on the public, or private type of
ownership, despite what political propaganda based on the prevailing Neo-
liberal economic dogma would have you believe.
In the UK, in particular, we have had railways, water, gas and energy all
privatised and costs increased 3 to 4 times as a minimum, while performance in
many cases decreased dramatically. Failed privatisations and re-
nationalisation en mass of railways is an example where fat subsidies to the
private sector did not produce the improvements in performance or cost
efficiencies promised at the beginning. The UK government is now pushing with
the privatisation of the Health Service, despite the majority of studies
showing that a public ownership model is a more cost effective model. British
Telecom was actually a mixed bag, i.e. there are areas of improvement,
especially where technological innovation could be easily taken advantage of
(read low business risk).
Economic theory speaks of 'natural monopolies' where high risk and very long
term investments with relatively low returns, make public ownership more
suitable. Typically these kind of industries are better and cheaper managed
under public ownership; i.e. goals of ownership and those of customers/users
are better aligned. However, markets with smaller scope and and shorter life
span, is where private sector ownership and competition thrives and excels.
> I wonder if ISPS wouldn't be handling things like TalkTalks
> Homesafe in such a stupid manner (across the board is where it is
> stupid, even for non users of the service) where they redirect all the
> http traffic through an undoubtedly insecure layer 7 handling huawei
> device with less commercial pressures or analysing bandwidth at layer
> 7 when they should be doing so more safely and completely at layers 3
> and 4 leading me to believe they are not just thinking about bandwidth
> usage. Why does it matter if you download 1000Gb via torrents or http.
> ACKs can be managed in any case.
>
> I'm glad open source is beginning to make strides into public services
> as it should help put an end to expensive interoperability issues (if
> we stay away from non posix things like systemd, though even then
> shouldn't be too bad ;-)).
Talk-Talk is not the only UK ISP who undertakes deep-packet inspection, and
filtering of DNS. There was a debacle only a couple of years ago when
TalkTalk (along with Virgin, PlusNet, and Sky I think) gave their users'
details to some lawyer who in turn blackmailed them with a law suit against
their alleged p2p activity. Some users paid him, but most told him where to
go and stick his head! I think his email account and company PC was also
hacked and a lot of information leaked. He ended up in court for failing to
protect private data! :D
--
Regards,
Mick
[-- Attachment #2: This is a digitally signed message part. --]
[-- Type: application/pgp-signature, Size: 198 bytes --]
^ permalink raw reply [flat|nested] 38+ messages in thread
* Re: [gentoo-user] How to prevent a dns amplification attack
2013-03-28 8:51 [gentoo-user] How to prevent a dns amplification attack Norman Rieß
` (3 preceding siblings ...)
2013-03-28 16:53 ` Jarry
@ 2013-03-31 2:08 ` Paul Hartman
2013-03-31 8:47 ` Jarry
2013-03-31 19:07 ` Norman Rieß
4 siblings, 2 replies; 38+ messages in thread
From: Paul Hartman @ 2013-03-31 2:08 UTC (permalink / raw
To: gentoo-user
On Thu, Mar 28, 2013 at 3:51 AM, Norman Rieß <norman@smash-net.org> wrote:
> Hello,
>
> i am using pdns recursor to provide a dns server which should be usable
> for everybody.The problem is, that the server seems to be used in dns
> amplification attacks.
> I googled around on how to prevent this but did not really find
> something usefull.
>
> Does anyone got an idea about this?
Coincidentally, yesterday US-CERT published a small article about DNS
amplification attacks and mitigation strategies:
http://www.us-cert.gov/ncas/alerts/TA13-088A
^ permalink raw reply [flat|nested] 38+ messages in thread
* Re: [gentoo-user] How to prevent a dns amplification attack
2013-03-31 2:08 ` Paul Hartman
@ 2013-03-31 8:47 ` Jarry
2013-03-31 19:07 ` Norman Rieß
1 sibling, 0 replies; 38+ messages in thread
From: Jarry @ 2013-03-31 8:47 UTC (permalink / raw
To: gentoo-user
On 31-Mar-13 4:08, Paul Hartman wrote:
> Coincidentally, yesterday US-CERT published a small article about DNS
> amplification attacks and mitigation strategies:
>
> http://www.us-cert.gov/ncas/alerts/TA13-088A
Thanks for interesting link. I did not know bind has support
for response rate-limiting...
Jarry
--
_______________________________________________________________
This mailbox accepts e-mails only from selected mailing-lists!
Everything else is considered to be spam and therefore deleted.
^ permalink raw reply [flat|nested] 38+ messages in thread
* Re: [gentoo-user] How to prevent a dns amplification attack
2013-03-31 2:08 ` Paul Hartman
2013-03-31 8:47 ` Jarry
@ 2013-03-31 19:07 ` Norman Rieß
1 sibling, 0 replies; 38+ messages in thread
From: Norman Rieß @ 2013-03-31 19:07 UTC (permalink / raw
To: gentoo-user
Am 31.03.2013 04:08, schrieb Paul Hartman:
> On Thu, Mar 28, 2013 at 3:51 AM, Norman Rieß <norman@smash-net.org> wrote:
>> Hello,
>>
>> i am using pdns recursor to provide a dns server which should be usable
>> for everybody.The problem is, that the server seems to be used in dns
>> amplification attacks.
>> I googled around on how to prevent this but did not really find
>> something usefull.
>>
>> Does anyone got an idea about this?
>
> Coincidentally, yesterday US-CERT published a small article about DNS
> amplification attacks and mitigation strategies:
>
> http://www.us-cert.gov/ncas/alerts/TA13-088A
>
Thanks a lot!
^ permalink raw reply [flat|nested] 38+ messages in thread
end of thread, other threads:[~2013-03-31 19:08 UTC | newest]
Thread overview: 38+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2013-03-28 8:51 [gentoo-user] How to prevent a dns amplification attack Norman Rieß
2013-03-28 9:07 ` Adam Carter
2013-03-28 22:16 ` Norman Rieß
2013-03-28 15:12 ` Volker Armin Hemmann
2013-03-28 20:51 ` Kevin Chadwick
2013-03-28 20:57 ` Kevin Chadwick
2013-03-28 21:04 ` Michael Mol
2013-03-28 22:36 ` Kevin Chadwick
2013-03-28 15:38 ` Michael Mol
2013-03-28 16:06 ` Pandu Poluan
2013-03-28 16:10 ` Michael Mol
2013-03-28 18:26 ` Norman Rieß
2013-03-28 19:16 ` Alan McKinnon
2013-03-28 19:38 ` Michael Mol
2013-03-28 20:02 ` Alan McKinnon
2013-03-28 20:53 ` Paul Hartman
2013-03-28 20:59 ` Michael Mol
2013-03-29 0:49 ` Peter Humphrey
2013-03-29 8:53 ` Norman Rieß
2013-03-29 13:27 ` Alan McKinnon
2013-03-29 13:36 ` Michael Mol
2013-03-29 22:34 ` Paul Hartman
2013-03-29 23:01 ` William Kenworthy
2013-03-29 23:09 ` Michael Mol
2013-03-30 4:07 ` Walter Dnes
2013-03-30 12:06 ` Norman Rieß
2013-03-30 14:53 ` Rene Rasmussen
2013-03-30 15:15 ` [Bulk] " Kevin Chadwick
2013-03-30 15:30 ` Tanstaafl
2013-03-30 15:11 ` Kevin Chadwick
2013-03-30 16:44 ` Norman Rieß
2013-03-30 17:30 ` [gentoo-user] Re: [seriously O/T] " Mick
2013-03-29 13:24 ` [gentoo-user] " Alan McKinnon
2013-03-28 16:53 ` Jarry
2013-03-28 19:40 ` Paul Ezvan
2013-03-31 2:08 ` Paul Hartman
2013-03-31 8:47 ` Jarry
2013-03-31 19:07 ` Norman Rieß
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox