Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Unbound cache poisoning question

    Scheduled Pinned Locked Moved DHCP and DNS
    21 Posts 4 Posters 5.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • K
      kejianshi
      last edited by

      ONLY unbound, not in forwarder mode and with DNSSEC and nothing else.

      Is there a reason you wish to have more than that running?

      1 Reply Last reply Reply Quote 0
      • T
        Trel
        last edited by

        @kejianshi:

        ONLY unbound, not in forwarder mode and with DNSSEC and nothing else.

        Is there a reason you wish to have more than that running?

        No, the DNS servers in general were left over from when I was using dnsmasq.

        My settings now are DNSSEC on, Forwarder off, specific interfaces to respond on, WAN only in outgoing, and one custom host for an internal site, and DHCP and Static Registration on.

        If it happens again, I know 100% it's upstream, though from what I've been told, it has to be.
        But if it's upstream, what's the next step :\

        1 Reply Last reply Reply Quote 0
        • K
          kejianshi
          last edited by

          http://en.wikipedia.org/wiki/Carrier_pigeon

          1 Reply Last reply Reply Quote 0
          • T
            Trel
            last edited by

            @kejianshi:

            http://en.wikipedia.org/wiki/Carrier_pigeon

            Hmm, I tried that before.  The transmission size was excellent, but the latency and packet loss left a lot to be desired.

            1 Reply Last reply Reply Quote 0
            • K
              kejianshi
              last edited by

              Ultimately you will probably find that networks can only be trusted if they are limited to a LAN and there is no access to the internet.

              I'm sure whatever measures I take to make things more secure are at best an annoyance to any well funded highly motivated agency, group of criminals or bored teen-age kid.

              1 Reply Last reply Reply Quote 0
              • T
                Trel
                last edited by

                @kejianshi:

                Ultimately you will probably find that networks can only be trusted if they are limited to a LAN and there is no access to the internet.

                I'm sure whatever measures I take to make things more secure are at best an annoyance to any well funded highly motivated agency, group of criminals or bored teen-age kid.

                For now I put 2 floating block rules against that whole subnet that the DNS gets redirected to.  Hopefully even if the DNS gets messed with somehow still, it'll prevent people from trying to load those sites.

                1 Reply Last reply Reply Quote 0
                • K
                  kejianshi
                  last edited by

                  You can also block 0.0.0.0/0 and 0::0/0

                  That would do it for sure…  (kidding)

                  Seriously though, I thing its fixed now.

                  1 Reply Last reply Reply Quote 0
                  • T
                    Trel
                    last edited by

                    @kejianshi:

                    You can also block 0.0.0.0/0 and 0::0/0

                    That would do it for sure…  (kidding)

                    Seriously though, I thing its fixed now.

                    If it's fixed now, I still want to know what was happening to cause it….

                    1 Reply Last reply Reply Quote 0
                    • C
                      cmb
                      last edited by

                      @Trel:

                      If it's fixed now, I still want to know what was happening to cause it….

                      Based on what people have reported thus far, I'm thinking there is some successful cache poisoning happening against Google and Level 3's public DNS. By the nature of how such anycasted services work, it would probably be very hit and miss if it were successful on occasion. Not sure, as I haven't seen it happen myself, but there are enough reports and details within them here that show switching away from 8.8.8.8/8.8.4.4/4.2.2.2/4.2.2.1 fixes their issues that it appears the most likely cause. It's also possible someone's hijacking 8.8.8.0/24, 8.8.4.0/24, etc. routes in Internet BGP with some degree of success, but a glance at some BGP looking glasses makes that seem unlikely.

                      1 Reply Last reply Reply Quote 0
                      • T
                        Trel
                        last edited by

                        @cmb:

                        @Trel:

                        If it's fixed now, I still want to know what was happening to cause it….

                        Based on what people have reported thus far, I'm thinking there is some successful cache poisoning happening against Google and Level 3's public DNS. By the nature of how such anycasted services work, it would probably be very hit and miss if it were successful on occasion. Not sure, as I haven't seen it happen myself, but there are enough reports and details within them here that show switching away from 8.8.8.8/8.8.4.4/4.2.2.2/4.2.2.1 fixes their issues that it appears the most likely cause. It's also possible someone's hijacking 8.8.8.0/24, 8.8.4.0/24, etc. routes in Internet BGP with some degree of success, but a glance at some BGP looking glasses makes that seem unlikely.

                        So best practice here would be to simply not use those and have unbound strictly deal with the roots?

                        1 Reply Last reply Reply Quote 0
                        • C
                          cmb
                          last edited by

                          @Trel:

                          So best practice here would be to simply not use those and have unbound strictly deal with the roots?

                          Yes, less susceptibility to this type of thing in that case. Granted, what's apparently happening here should really never happen, but there have been instances of cache poisoning a number of times in the past with such DNS services.

                          1 Reply Last reply Reply Quote 0
                          • W
                            wagonza
                            last edited by

                            If you see its the same domains that are always being affected then there may be a possibility that the NS's themselves have data that differs from one another.

                            Follow me on twitter http://twitter.com/wagonza
                            http://www.thepackethub.co.za

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.