Security Incidents mailing list archives

Re: Large DNS scans from 211.53.208.178


From: pain () ROYAL NET (Igor Gashinsky)
Date: Wed, 3 May 2000 19:28:01 -0400


        If I am not mistaken, if the UDP-DNS packet exceeds 484 bytes, it will be
re-send via TCP. The reason it is 484, is the fact that we have a 512 byte
IP packet, 20 of them goes to the IP header, and 8 more for the TCP header,
leaving only 484 for the actual DNS payload. So, if anyone has a DNS Lookup
exceeding 484 bytes, it has to go over TCP [this lookup would include the
IPs and Names of all the Authoritative DNS servers for that domain, so it
could run up fairly quickly]. However, given all of that, I have not seen
much traffic that goes over that threshold, and a few places I have
consulted for do not allow 53/TCP through the firewall at all, and have no
problem with DNS resolution whatsoever. I think it will really effect huge
MX records, and things like that. Very few places actually require UDP
based look-ups, usually for multi-hosted servers, 3DNS and the like.

It may be worth a try to log traffic to your DNS server, and see if
everything is over UDP, and if it is, lock up 53/TCP. It would greatly
improve the security of that machine.

-Igor Gashinsky, GCIA
   (pain () royal net)

"It is easy to run a secure computer system. You merely have to disconnect
all dial-up connections and permit only direct-wired terminals, put the
machine and its terminals in a shielded room, and post an armed guard at the
door."

At 12:26 PM 5/3/00 +1200, Richard Stevenson wrote:
On 1 May 2000, at 1:49, Seth Georgion wrote:

This is very common, especially from Korea and should be seen as obvious
attempts to find Zone Transferable hosts and should be secured against by
disallowing Unauthorized Zone Transfers. Of course any one who has an even
minimal computer education should be aware that all zone transfers are by
nature TCP based and that all DNS Lookups are by nature UDP based. Thus it
would follow that no one, not even the village idiot, would allow TCP 53
through the firewall.

That's not quite correct.  UDP-based DNS replies have a maximum size (about
500 bytes, IIRC), beyond which they include a flag stating that the reply
was truncated.  The client resolver may then query again using TCP, which
allows larger replies, to get the complete data set they asked for.

Regards

Richard



Current thread: