Date: Sat, 29 Jan 2000 11:58:26 -0500 From: Peter Radcliffe <pir@pir.net> To: freebsd-security@FreeBSD.ORG Subject: Re: Continual DNS requests from mysterious IP Message-ID: <20000129115826.B12465@pir.net> In-Reply-To: <200001291634.IAA36101@floozy.zytek.com>; from mccord@zytek.com on Sat, Jan 29, 2000 at 08:34:49AM -0800 References: <98581.949158146@verdi.nethelp.no> <200001291634.IAA36101@floozy.zytek.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Samara McCord <mccord@zytek.com> probably said: > point. Correct me if I'm wrong, but my DNS servers shouldn't ever have > to deliver the MX records for aol.com (or any domain for which I don't > serve), except to my own internal machines and for my own customers, right? Current security advice for nameservers; o upgrade to the latest version of bind8 o ensure the ndc control socket cannot be used by anyone but root or other users you don't mind getting root (problem on solaris) o run bind as a non-root user and possibly chrooted (standard options in recent bind8). o split your authorative and caching versions of named o turn off recursion and fetch-glue in the auth server so it cannot be poisoned o only allow access to your caching nameservers from your netblocks (by listening on an interface that cannot be reached from outside, filtering or by using allow-query {};) This brings named in line with how most services are run on the Internet these days - allow what you need to allow and no more. Applying this to your nameservers would stop these random people using you as a resolver or attacking (poisoning) your caches. I have a lot of people going off campus and leaving their resolver IP set to the tufts caches. The load and memory use of the main campus cache noticibly decreased when I applied allow-query to our netblocks. P. -- pir pir@pir.net pir@net.tufts.edu To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20000129115826.B12465>