Help Please: Hardening DNS using Bind
I am going to work in project that is about hardening DNS using Bind and we have to test and validate my configuration by launching an attack. Unfortunately, I am new to linux and I don't know how to create an attack. Would you please support me on this part by providing ready attack.
Appreciate your immediate response as the deadline is due next week |
Quote:
Secondly, we are happy to help you with things, but we are certainly NOT going to do your work for you. We aren't going to provide you a 'ready attack', but will be glad to assist when you show what you have done/tried so far on your own. Seems very, VERY odd that you got a job working on a project using DNS, Bind, and Linux...and don't know anything about Linux or how to actually do the job you've described. How did this occur? And you provide zero details about how you want to run this (command line? Bash/perl/ruby/python/java/whatever??), or tell us anything about the environment. All of these are things that someone who got a job to perform this task should know. Show us your efforts and tell us where you're stuck and we'll be happy to assist. You can start by putting "how to test security on a dns server" into Google...lots of places to get you started. |
For securing I would use PowerDNS:
https://doc.powerdns.com/md/authoritative/migration/ |
I have installed and configured BIND on fedora 26. I have done the following to secure it :-
1. Hiding the version string 2. Restricting the recursive queries. 3. Restricted zone transfers 4. also disabled named_ write_master_zones in selinux 5. I configured named-chroot 6. dnssec keys for trust relationships between master and slave DNS 7. Configured signed zone I did above to harden my DNS. I want to test my DNS by actually creating attacks to it using some attacking tool. Can anyone suggest please. |
Quote:
We suggested:
|
All times are GMT -5. The time now is 10:58 PM. |