[TriLUG] Securing Recursive DNS
Mike Johnson
mike at enoch.org
Sun Mar 19 17:40:00 EST 2006
Tanner Lovelace wrote:
> Greetings,
>
> It looks like people have come up with ways to use recursive DNS
> servers to cause a distributed denial of service on other name servers[1].
> There's nothing new here, recursive DNS servers have been the norm
> for many, many years, but then again, so were open SMTP relays[2].
> So, as a result, it seems that prudence would suggest that people
> secure their DNS servers. However, just turning off recursive DNS
> is generally not an option because DNS doesn't work without it.
> Instead, you need to restrict recursive DNS to just your own network.
> Looks like good instructions for doing that with bind can be found
> here[3]. Might as well secure now so as to not contribute to problems
> later. :-(
And people used to sneer at my split-dns setups... If you aren't
running BIND, your version of BIND doesn't support views, or you're
running a DNS server that does not support the concept of recursion
restriction based on source, there is another way: run two (or more, two
is a minimum) DNS servers. These could reside on a multihomed host, if
you wanted to, but separate physical hosts would be best. Configure one
server as authoritative only (this is where you put all your DNS
entries) that is publicly available and one that is recursive only that
is only available on your local network. Configure the recursive DNS
server to send all requests for your domain directly to the
authoritative server (this is so you can use bogus/test domains, if you
want), the rest go to the root servers (or to your ISP's recursive servers).
Mike
More information about the TriLUG
mailing list