nanog mailing list archives

Re: Are public DNS a good thing? (was: Re: 1.1.1.1)


From: Jay Acuna via NANOG <nanog () lists nanog org>
Date: Fri, 18 Jul 2025 10:16:42 -0500

On Fri, Jul 18, 2025 at 9:02 AM Marc Binderberger via NANOG
<nanog () lists nanog org> wrote:
are we talking about BCP-140, aka RFC5358 ("Preventing Use of Recursive
Nameservers in Reflector Attacks") ?
Well, it's both, a BCP and RFC - which statement above wins? ... ;-)

Some RFCs are proposed standards, and some are just publication of
Informational documents and merely suggested Best Current Practices to
aid in implementation of the standards.   The language at the header
of the BCPs always say the request discussion and suggestions for improvements.
Their publication doesn't mean the recommendations are perfect.

Joking aside, I don't see why this BCP would not be relevant today. If you
run an open recursive DNS in the Internet, this still seems to me a valid

The BCP-140 is perfectly valid, and a good implementor should still
take the issues
discussed into consideration before developing DNS software and when
planning the implementation of DNS services.  The recommendations don't
necessarily apply to every implementation; the SHOULDs might be infeasible,
or not necessarily the best option, or an option.

It is Not necessarily the case that you want to actually follow every
recommendation.
You can consider scenarios and problems discussed in the BCP;  make some
determinations about whether they apply, and the risks your
implementation poses,
then design and build other solutions.

For example, You can likely detect a possible attempted amplification
attack from
a remote recursor by maintaining  per IP address byte rate counters
for each querier
and the response size against your recursor network.  Force TCP-only to an IP
or cap UDP response sizes and throttle UDP packets for a period of time
after a certain query volume has been exceeded.   You might also drop the first
DNS request packet, and look for possible query retry request packets
to fingerprint.

Ampther type of alternate solution for a Public DNS provider whose DNS
service is
inherently external.  You can also begin to deprecate direct UDP DNS
access in general
in favor of DoH/DoT.

You can also through Anycast publication of your numerous public DNS instances
Identify _which_ of your DNS sites a specified query source IP address should
actually reach based on internet topology and historic legitimate query data
assuming the source IP address is not spoofed for amplification purposes,  and
implement a protocol where the DNS queries are ignored and discarded
If received by
the incorrect site  until you see a TCP exchange proofing a legitimate
query from that source,
instead of the correct region Anycast site peered with the provider of
that source IP address.

--
-JA
_______________________________________________
NANOG mailing list 
https://lists.nanog.org/archives/list/nanog () lists nanog org/message/PRLJAKCMC6PZHN4F5ZPBXIP3EUANP3CW/

Current thread: