LinuxQuestions.org

LinuxQuestions.org (/questions/)
-   Linux - Newbie (https://www.linuxquestions.org/questions/linux-newbie-8/)
-   -   i have a question over resolver and DNS (https://www.linuxquestions.org/questions/linux-newbie-8/i-have-a-question-over-resolver-and-dns-699441/)

jonhanna 01-23-2009 02:42 PM

i have a question over resolver and DNS
 
So I am trying to figure out resolver and I need to figure out how a resolver might attempt to find the IP address of the example domain? I dont know to much about a resolver and I was wondering if someone could help me.
My second question is for a project I am setting up and I need to figure out which part of the DNS is most vulnerable to an attack from a malicious user and why is this? I need to have a reason for this so if anyone could help me on this too, it would be greatly appreciated.
Thanks

unSpawn 01-23-2009 07:25 PM

Quote:

Originally Posted by jonhanna (Post 3418977)
I need to figure out how a resolver might attempt to find the IP address

For an explanation maybe start with Name Service and Resolver Configuration?


Quote:

Originally Posted by jonhanna (Post 3418977)
I need to figure out which part of the DNS is most vulnerable to an attack

See www.cve.mitre.org, www.kb.cert.org, securityfocus.com and secunia.com and do some research using terms like DNS and vulnerability, Paul Vixie, Dan Kaminsky, Dancho Danchev


Quote:

Originally Posted by jonhanna (Post 3418977)
(..) and why is this?

...which should give you a cornucopia of reasons, ranging from "simple" privilege escalations in software and 'net infrastructure crippling Root Server DDoS and identity theft to spoofed DNS recursion attacks, rebinding and cache poisoning attacks. (Also see 'net "economy" as in Russian Business Network, shadowserver as in botnet stats, shady marketing, typo-squatting, malware distribution.)

salasi 01-24-2009 06:08 AM

...and bear in mind that DNS != Bind (ie, there are alternatives).

unSpawn 01-24-2009 06:10 AM

Quote:

Originally Posted by salasi (Post 3419545)
...and bear in mind that DNS != Bind (ie, there are alternatives).

Good one, I could have said that...

salasi 01-25-2009 08:37 AM

If you were trying to say "I said that first", I'll also throw in this example from '07:

http://www.linuxquestions.org/questi...?highlight=dns

More seriously, I don't know why so many people think DNS is exactly equivalent to bind. Setting up Bind can be a bit of a pain, particularly when its chrooted and the history of Bind is not one that gives you a great deal of confidence that the current version is free of significant bugs.

Something like djbdns/dnsmasq/maradns/pdns is a better bet (imho) in simpler set ups, although there can still be a case for the Bind 'swiss army knife' for some of the more involved set-ups.

And, for a secure installation, with Bind, I think that you should know who is your security specialist, and that they check for security advisories on a very frequent basis.

This may be overkill for a small installation.

You may think I'm being paranoid (and you may be right), but most of the effort in trying to develop exploits seems to be expended against Bind rather than the alternatives and so I'm a bit more relaxed about the security situation with, say, djbdns than Bind.

servat78 01-25-2009 07:50 PM

I guess you will have to decide which DNS implementation you want to use, before figuring out the resolver mechanism. As for the attack issues - this seems rather to be a firewall/router topic, since these are better suited to deal with attacks. I would assume to have name servers always behind a firewall, it should be quite rare to have a name server as the only computer in an office. Otherwise putting 'named' in a jailroot seems to be quite common as a precaution move.

Debian

salasi 01-26-2009 06:14 AM

Quote:

Originally Posted by servat78 (Post 3421152)
I guess you will have to decide which DNS implementation you want to use, before figuring out the resolver mechanism.

Not necessarily; understanding the protocol first seems like a very valid first step and that helps whichever resolver you eventually decide on.

Quote:

As for the attack issues - this seems rather to be a firewall/router topic, since these are better suited to deal with attacks.
I'm sorry, but not completely. If you look at the kaminsky exploit (for example here http://blog.invisibledenizen.org/200...ly-leaked.html or, for those of a more techie bent, here http://www.securiteam.com/exploits/5DP0L15OUY.html) the mechanism is such that the DNS resolver seems to be doing the kind of thing that a DNS resolver should be doing, so its unclear what a firewall should be doing to stop that (without breaking all of DNS).

If you have a blacklist of all those involved in the exploit, you could use that with your firewall ruleset, but isn't curing the fundamental problem better?


All times are GMT -5. The time now is 02:16 PM.