Skip to Content.
Sympa Menu

discuss - [opennic-discuss] Fwd: [dns-operations] DNS ANY requests / UltraDNS

discuss AT lists.opennicproject.org

Subject: Discuss mailing list

List archive

[opennic-discuss] Fwd: [dns-operations] DNS ANY requests / UltraDNS


Chronological Thread 
  • From: Julian DeMarchi <julian AT jdcomputers.com.au>
  • To: OpenNIC discussion <discuss AT lists.opennicproject.org>
  • Subject: [opennic-discuss] Fwd: [dns-operations] DNS ANY requests / UltraDNS
  • Date: Thu, 10 Jan 2013 14:02:36 +1000




-------- Original Message --------
Subject: [dns-operations] DNS ANY requests / UltraDNS
Date: Thu, 10 Jan 2013 00:24:12 +0000
From: Scott Brynen <scott.brynen AT visioncritical.com>
To: dns-operations AT lists.dns-oarc.net <dns-operations AT lists.dns-oarc.net>

In an interesting development to this, UltraDNS are starting to REFUSE a
UDP/ANY request on some of their name servers. As they're unicast, your
local ones may or may not. The implication is that any software making
an ANY query will start to fail when they're all switched over. In my
region (W.Canada):
UDNS1.ULTRADNS.NET, UDNS2.ULTRADNS.NET, PDNS1.ULTRADNS.NET,
PDNS2.ULTRADNS.NET, all refuse a UDP/ANY, whereas PDNS3.ULTRADNS.ORG,
PDNS4.ULTRADNS.ORG, PDNS5.ULTRADNS.INFO and PDNS6.ULTRADNS.CO.UK still
accept them

qmail is the 1st piece of software out there that jumps to mind that is
going to break, but what else is there out there that makes these
queries? When all 6 start refusing ANYs, I predict there may be some
backlash.

I published a one line fix for djbdns (on the djbdns list) if you use it
as a local cache, to force an ANY query via TCP instead of UDP
(dns_transmit.c, line 220)
- if (len + 16 > 512) return firsttcp(d);
+ if ((len + 16 > 512) || byte_equal(qtype,2,DNS_T_ANY))
return firsttcp(d);
which (partly) solves the issue in case you have software making ANY
queries; but it also has the downside that misconfigured DNS servers
that don't listen on TCP then don't work correctly; (such as midco.net's
name servers).


I really wish that ISPs would solve the root problem here, which is
allowing spoofed packets to exit their networks, then a reflected
DNS/UDP attack simply wouldn't be possible.






_______________________________________________
dns-operations mailing list
dns-operations AT lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs



Archive powered by MHonArc 2.6.19.

Top of Page