Patch DNS Servers Faster 145
51mon writes "Austrian CERT used data from one of their authoritative DNS server to measure the rate at which the latest DNS patch (source port randomization) is being rolled out to larger recursive name servers. While about half the traffic (PDF) they receive is now using source port randomization, their data suggest that this is due to ISPs who roll out such fixes immediately. The rate of patching has fallen to disappointingly low levels since. If your ISP isn't patched, perhaps it is time to switch." After details of the DNS vulnerability leaked, researchers |)ruid and HD Moore released attack code; ZDNet's security blog has an analysis.
Switch DNS Servers, NOT ISPs (Score:5, Insightful)
Re: (Score:1)
Re: (Score:3, Informative)
It'll either be a setting on your router, or if your directly connected to the modem, you'll need to change it on the network settings on your computer.
Re:Switch DNS Servers, NOT ISPs (Score:5, Informative)
You can change this in your DHCP or IP configuration settings on your home router or PC. On my home network, for instance, my DD-WRT router isn't running a DNS server on it, and the DHCP static DNS settings are set for my Server 2008 box and the two OpenDNS resolvers. My Server 2008 box also has its forwarders set to OpenDNS.
That's probably more complicated than it needs to be, but better safe than sorry.
On Windows XP, 2000, and I think Vista, you can tell Windows to ignore the DNS server settings provided by DHCP by going into the IP properties for the connection and hard coding in the IP addresses under Local Area Connection Properties > Internet Protocol Properties > Use the Following DNS Server Addresses.
This can also be done under linux, but I don't know the particular commands for it.
Re: (Score:1)
This can also be done under linux, but I don't know the particular commands for it.
I imagine it would vary somewhat between distros, but netconfig (requires root) seems to be pretty much the standard way of doing it.
Re: (Score:3, Informative)
I put OpenDNS right in my router configuration so it applies to my whole house. The other big benefit is that I block doubleclick whose ads always seem to make pages so slow to load. You also get some scam and phishing protection.
Re: (Score:2, Informative)
I have no idea what netconfig is meant to do, but it doesn't exist on my computer. /etc/resolv.conf is the standard way of doing it.
Re:Switch DNS Servers, NOT ISPs (Score:5, Informative)
resolv.conf will be written over by DHCP unless you set PEERDNS=no in the /etc/sysconfig/network-scripts/ifcfg-ethX file.
Re:Switch DNS Servers, NOT ISPs (Score:5, Interesting)
I had been using OpenDNS. I stopped when I realized they were monitoring my traffic. When I go to Google, they were returning their own Google-like page, to which my browser would submit the query, and then redirect me to Google.
I stopped using them after that discovery.
Re: (Score:1, Informative)
I had been using OpenDNS. I stopped when I realized they were monitoring my traffic. When I go to Google, they were returning their own Google-like page, to which my browser would submit the query, and then redirect me to Google.
They claim they're doing this for your own good, or for the good of Dell users at least, to stop some Google / Dell conspiracy. Details [opendns.com].
Wrong url or Viurs. (Score:1)
Re: (Score:2)
Re: (Score:2)
a) Are you sure? Google behaves normally in a browser, but OpenDNS doesn't resolve Google's real IP by default. I know this only because I happened to try to do an nslookup on Google when I was troubleshooting a network issue.
b) If it really isn't doing that for you, and you didn't turn it off, someone else did it for you. They really do do this by default, and yes, I'm positive I don't have a virus or anything like that.
Re: (Score:3, Informative)
I had been using OpenDNS. I stopped when I realized they were monitoring my traffic. When I go to Google, they were returning their own Google-like page, to which my browser would submit the query, and then redirect me to Google.
I stopped using them after that discovery.
Your claim that OpenDNS is "monitoring your traffic" is misleading.
If you ping www.google.com it pings google.navigation.opendns.com (208.67.219.231). You still get the standard Google homepage and search results when you go to http://www.google.com/ [google.com] however. The odd DNS resolution for www.google.com is apparently because some software such as the Google Toolbar bypasses DNS requests, which breaks some of OpenDNS's features. (More on this below.) One apparent advantage of OpenDNS doing this is that it help
Re: (Score:2)
That is why using ANY DNS service is a really, really bad idea. You want to have proper answers, run your own recursive name server and don't use forwards you don't trust, go to root zones directly. Every respective geek should be running that anyway. It is just so much more flexible and *faster* than trying to use ISP's DNS.
And if this creates a problem for the root servers being hit too much, well too bad. Domain owners are paying through the nose for the ICANN fees and the registrar fees and everything e
Re: (Score:2)
>>my DD-WRT router isn't running a DNS server on it, and the DHCP static DNS settings are set for my Server 2008 box
You are using NAT right? This doesn't protect you any more as your NAT router is still listening for those UDP 53 replies and forwarding them onto your 2008 server. So the same thing could occur.
However, if you've put Microsoft's patch for this on your 2008 server then yes, you are protected.
This is a nasty thing.
Switching to OpenDNS is kinda of ironic. To protect myself from someone
Re:Switch DNS Servers, NOT ISPs (Score:4, Interesting)
I ditched the phone company when my email didn't get a reply in a week.
Re: (Score:1)
Problem with certs and anything that impacts their servers aren't quick to apply the patch no matter how critical it is. The patches have to be tested, re-tested and tested again to be sure it won't have a adverse impact on their service to the customers.
Some are quick to apply the patches in a day while others will take weeks or even months depending on the size of their infrastructure and size of the staff to test the patches.
Switching phone companies is your choice but I think they wanted to make sure t
Re: (Score:2)
Re: (Score:2)
And their ssl certificates are used between computers that need to communicate each others. If one doesn't get the update that the other has changed of certificate you can go in the wall. And If you have hundred, thousands of such computers that need to talk to each other, you can imagine the nightmare.
Re: (Score:2)
DNS became slower (Score:3, Interesting)
It seems that dns queries have become much slower. With opera I can see what urls are being requested (main page, images/flash or ads).I can see that for every new page the first thing opera does is doing the dns queries for all the urls. And this has become very slow from time to time.
I've read somewhere that the randomization really slows down bind, but that the team is working on a patch to solve that.
(I also don't understand why opera need to execute dns queri
Re: (Score:3, Interesting)
If it has become slower, they are probably using bind9, because it's quick fix. After they've known for 6 months, all they could release was a quick fix. Even though the author/organsation that created/maintainces bind knew about possible problems somewhere in the preview century. I'm sorry, but I've stopped using their software as much as possible.
Re: (Score:1)
Re:Switch DNS Servers, NOT ISPs (Score:5, Interesting)
I used OpenDNS and gave it up because it replaced firefox's feature to search google with what you type on the address bar with its own crappy search.
Re: (Score:1)
You can fix this by changing the setting for keyword.URL [mozillazine.org] in about:config back to a Google search.
Re: (Score:2, Informative)
First, it's not a 404. A 404 is a http server response that says I don't have the resource you're requesting.
OpenDNS however, hijacks the DNS protocol when you attempt to lookup the address for a server. And so yes, a dns response that says that no addresses are found is more useful than a fake address that, if you connect using http, will provide an html response with search results on it. Note that this breaks any other use of DNS where you now connect to the server and get garbage rather than simpl
Re: (Score:3, Informative)
"404 error: File not found" is more useful then the OpenDNS search result page?
Yes, yes it is. Because many, many things depend on getting a proper 404 error, like all those http-download automatic updates for example.
Of course, it's not the 404 error that's missing. It's a name resolution failure. This is also very important. You need to know when a domain has gone missing, and it needs to be available in an automated fashion. The proper, per-specification behavior is to return NXDOMAIN when there is no domain found, not to return a bullshit, erroneous result.
This WOULD be LESS offen
Re: (Score:2)
Yes
[..]
So, are you trolling, or just utterly unqualified to have this conversation
+1, Right
-1, Arrogant
Re:Switch DNS Servers, NOT ISPs (Score:5, Informative)
A DNS server returns you a result, or tells you that it can't resolve the domain. Instead of doing the latter, OpenDNS redirects you somewhere you didn't intend to go and attempts to hit you with some advertising. That seems more like typosquatting to me, although admittedly it's with your permission.
Re: (Score:2)
Re: (Score:2, Insightful)
Re: (Score:1)
OpenDNS is not the best answer (Score:2, Insightful)
Re: (Score:2)
>>You don't need to switch to a new ISP if they haven't patched yet - just switch to a new DNS server such as OpenDNS.
Is this really true?
From what I gather this doesn't solve the problem, just makes it a little more difficult. Correct me if my understanding is wrong.
Your router still uses default of 53 -> OpenDns -> public on random port.
UDP
You still listen on 53, so the hacker can spoof the response as though it's from OpenDNS's two IP's and send that straight to your router on port 53.
Am I w
Re: (Score:3, Informative)
You don't need to switch to a new ISP if they haven't patched yet - just switch to a new DNS server such as OpenDNS.
Please don't do that.
I don't think OpenDNS is a terribly good idea, and here's why:
They actively screw with the records and return incorrect information. Now you can argue that they do it for "OK" reasons, and indeed, OpenDNS does exactly this in their marketing materials, but the fact remains: they answer some queries with information that is in conflict with the authoritative nameservers.
Personally, I don't trust any DNS provider that does this, and I don't think it's a good idea for anyone to do so.
Use
Re: (Score:2)
Re: (Score:2)
No, do NOT switch to OpenDNS:
Yes, switch to a DNS provider that provides source port randomization, if your ISP's DNS servers do not. But no, don't switch to an untrustworthy one out of desperation.
try Level 3's nameserver (Score:2)
YMMV, but I found it much faster (in terms of pageloads) than OpenDNS's.
Re: (Score:2)
The same here (.3 and .4 are also DNS servers). Far more reliable then my ISP, and lower latency to boot. Sadly, I just checked and they don't seem to be randomizing the source ports...
have you been using the test at (Score:2)
Re: (Score:2)
thanks for the heads-up (Score:2)
Am I safe? (Score:1, Insightful)
How can I know if my ISP has patched its DNS servers?
Re:Am I safe? (Score:5, Informative)
Re: (Score:1, Insightful)
Re: (Score:1)
I tested myself.. not safe. My home router is a linksys. but linksys isn't listed in the vendors. hmm, i guess that means they simply haven't patched it yet? doesn't cisco own linksys? maybe i should talk to cisco.
Re: (Score:2)
Re: (Score:3, Informative)
Re: (Score:1, Informative)
http://entropy.dns-oarc.net/test/ [dns-oarc.net]
Re: (Score:3, Informative)
https://www.dns-oarc.net/oarc/services/porttest [dns-oarc.net]
Re:Am I safe? (Score:5, Informative)
dig +short porttest.dns-oarc.net TXT
Monopoly (Score:5, Insightful)
My ISP has a monopoly over internet services in my area you insensitive clod.
Re: (Score:2, Funny)
Re: (Score:2)
Run your own then.
It must suck to be gnu.org! (Score:1, Funny)
Fortunately my domain name is not recursive therefore I am safe.
Re: (Score:1)
Hey, that actually was pretty funny. Well done!
Don't we? (Score:1)
Re: (Score:2)
Don't trust them if yours is behind a simple DSL-router with NAT. The NAT may defeat any randomisation you might have.
Re: (Score:2)
Behind Linux NAT
===============
$ dig +short porttest.dns-oarc.net TXT
z.y.x.w.v.u.t.s.r.q.p.o.n.m.l.k.j.i.h.g.f.e.d.c.b.a.pt.dns-oarc.net.
"aaa.bbb.ccc.ddd is GOOD: 26 queries in 2.2 seconds from 26 ports with std dev 20143.31"
Clean, without NAT
==================
z.y.x.w.v.u.t.s.r.q.p.o.n.m.l.k.j.i.h.g.f.e.d.c.b.a.pt.dns-oarc.net.
"123.123.123.123 is GOOD: 26 queries in 1.3 seconds from 26 ports with std dev 17930.62"
Conclusion
==========
So, your comment is not quite correct.
Re: (Score:2)
I said _may_ default any randomisation and I said simple DSL-router, Linux is not such a thing.
Re: (Score:2)
time to switch? (Score:4, Insightful)
If your ISP isn't patched, perhaps it is time to switch.
Thanks to the "free market economy" in my capitalist country I can't switch, you insensitive clod!
Re: (Score:1)
Re: (Score:2)
No. For many people its more a choice between "Evil ISP XYZ, and Pigeon over IP and/or dial up".
That said, my ISP enrolled me in a "contract" without ever once mentionning it. (It -is- optional, and I never said I wanted it when I subscribed, and I didn't sign anything, but my bill states that I picked the contract option). Kind of amusing.
I'm not saying anything now because it is cheaper, I don't care even if I -was- on contract, and they wouldn't last very long in court if I ever changed my mind, but...
Re: (Score:2)
Meh, I'll stick to the good old commercial boat filled to brim with bluray discs. Best bandwith you can get (ok, so ping time suffers a -little-, but meh!)
AT&T Southeast way behind the curve (Score:3, Interesting)
We use AT&T (formerly Bellsouth) and their servers are not fixed according to the 'dig +short porttest.dns-oarc.net TXT' test.
I contacted their NOC about the problem yesterday and got the following reply:
"Patching for these servers are scheduled to begin next week."
So, major vulnerability, two weeks advance notice, exploit code released - we'll get around to it later.
Re: (Score:2)
Or immediately after att.com starts resolving to the IP of goatse.cx ?
Time to switch? (Score:1)
If your ISP isn't patched, perhaps it is time to switch.
To whom, exactly?
Sincerely,
A US ISP customer.
Re: (Score:1)
ISP DNS (Score:2, Insightful)
Who uses their ISPs DNS servers? Most people probably. Well, I don't trust them. My friends and I run a recursing nameserver that we access over a VPN link.
ISPs just aren't trustworthy.
Oops. (Score:5, Funny)
Re: (Score:2)
For once, I can check how many people have really RTFA (or at least fetched the .pdf). :-)
I really didn't expect we'd make slashdot with that report. Well, any exposure help to get people to patch.
Re: (Score:2)
Easier Said Than Done (Score:5, Interesting)
These kind of systems are really hard for security guys to get changed.
It's like updating switch and routing firmware. Most network engineers who know what they're doing and that have been around for awhile have been burned by "simple" or "easy" patches and config changes going tits up.
When your core network infrastructure goes tits up your phone tends to light up like a christmas tree. (Granted, when your web presence is redirected to porn or a copy that hides an iframe exploiting customers with unpatched browsers, well, you'll maybe get some phone calls.)
This DNS patch is a case-in-point: Microsoft's fix is rather ham-fisted and broke stuff; the BIND-Users list is full of people troubleshooting ISC's patch.
Also, many organizations (like mine) are taking this as an opportunity to reengineer their DNS architecture. This is the perfect time to reevaluate using TSIG and DNSSEC if you don't already.
It has only been just over two weeks since the initial "announcement". The progress so far is really amazing when you consider how big a ship the Internet is.
Re: (Score:3, Informative)
It's a perfect time to start using PowerDNS, djbdns or Unbound/NSD as well. :-)
Re: (Score:3, Funny)
When your core network infrastructure goes tits up your phone tends to light up like a christmas tree.
Not if it is an IP phone!
Re: (Score:2)
MY IP phone has a dedicated monitor that shows a christmas tree with a pretty pony under it and all the shiny blinking lights come on when people call, you insensitive clod.
Whoosh
Does this fancy IP phone still work when your IP network is broken?
Rediculious requirements (Score:5, Insightful)
I'll get this patch applied as soon as I reconfigure my entire network topology.
Re:Rediculious requirements (Score:5, Informative)
You can restrict it to a port range... even giving it access to 2048 ports gives you 2^11 randomness, which is still better than 2^0.
The issue I'm facing, which I find terribly frustrating, is in upgrading older distros. I'm now looking at completely reinstalling a bunch of older BSD servers just to get this idiotic vulnerability resolved, because the maintainers aren't backporting the patch and upgrading BIND itself would be a royal pain. Given how DNS servers tend to run unattended for eons, I suspect this near-sightedness is respnosible to a large degree for the slow patching. It's not that I don't want to patch my servers, it's that I now have to waste a day at the colo doing physical reinstalls. If it weren't for that hitch, I'd be done already!
Re: (Score:1)
1. rsync your colo'd server os partition to your in-house test server; ;-)
2. patch your test server;
3. rsync your test server to your colo'd server.
4. profit?
As your in-house test server should be more-or-less the same as your deployed server the rsync's should take too long.
Beats babysitting your server in a cold and dark datacenter.
Re: (Score:2)
I'm now looking at completely reinstalling a bunch of older BSD servers just to get this idiotic vulnerability resolved, because the maintainers aren't backporting the patch and upgrading BIND itself would be a royal pain
I recently upgraded a bunch of FreeBSD boxes I didn't want to rebuild world on:
You can configure the port to replace the base bind too, but this is easier to roll back in event of problems. Presumably the situations similar for the other BSD's.
Re: (Score:2)
Er, that's named_flags="-c /etc/namedb/named.conf", of course.
Not really (Score:1)
It's one single change on the firewalls, nobody needs to "reconfigure [their] entire network." And should be easier if as most large organizations the DNS servers are on a DMZ.
Re:Rediculious requirements (Score:5, Funny)
That is not the case at all. First off, on outbound requests, the destination port is still 53. The _source_ port is what gets randomized. On inbound replies to the randomized port, your stateful firewall will see this as an ESTABLISHED connection and you can safely let it in without blindly opening up the entire UDP port space.
You _are_ running a stateful firewall, right? Its not 1998 anymore.
-molo
Re: (Score:2)
Re: (Score:2)
Well then... (Score:2)
... now might be the time to look into stateful firewalls, huh?
Well, okay, 'stateful', most modern firewalls should be able to fake a stateful connection for UDP.
Re: (Score:2)
"IANA root servers go down after UDP port storm" (Score:2)
I posted this a
iPhone users are just screwed (Score:2)
OpenSuSe 10.2 RPMs miss the point? (Score:3, Interesting)
I have an OpenSuSe 10.2 x86_64 machine and have manually upgrade-installed the x86_64 RPMs from the security announcement (http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html [opensuse.org]). Yast2 has some problems due to this release being old and mirrors not available so I did a manual "rpm -Uhv".
Still, from a traffic dump it seems that on SuSe 10.2 the caching Bind nameserver sends out queries with predictable source ports (incrementing by 1).
Fedora's patched Bind sends from random ports (didn't run statistical randomness test on them, though).
Re: (Score:3, Informative)
Re: (Score:1)
Re: (Score:3, Informative)
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
Easiest is to temporarily put it in /etc/hosts.
Re: (Score:2)
Exactly what kind of attack are you less vulnerable (or invulnerable) to now that you've installed DNSSEC?
DNSSEC doesn't protect against most of the problems using DNS as an attack vector- bugs in BIND and derivatives- DJBDNS has always been secure against this attack.
Re: (Score:2)
There are lots of ways to protect against spoofed replies that are far simpler than DNSSEC. Random ports and only accepting in-bailiwick answers stop a lot of short-range attacks, and RP filtering stops the long-range ones.