Bind recursion on by default, can be used for ddos attacks!

BuGoFf

Verified User
Joined
Nov 12, 2009
Messages
26
Location
Belgium
This thread is more a notice to people to check there dns server.

As you might have noticed, or heard a lot of Ddos attacks these days are done by using dns. If you want to check if your server is vulnerable, use this url: https://isc.sans.edu/dnstest.html

By default DirectAdmin allows recursion to everyone around the world wich leads into botnets abusing your dns servers by spoofing ip's and sending dns requests to your server.

For more info take a look at these links:

http://www.secureworks.com/research/threats/dns-amplification/
http://isc.sans.org/diary.html?storyid=5713
http://www.isotf.org/news/DNS-Amplification-Attacks.pdf
https://www.dns-oarc.net/oarc/articles/upward-referrals-considered-harmful

When using DirectAdmin and no other servers use this as a dns resolver, put this in your /etc/bind/named.conf.options


allow-recursion {
127.0.0.1;
};


This will allow the localhost to do dns lookups using your server, everything else is denied.

I noticed the latest bind versions don't do this by default, can someone confirm this?

Kr,
Bram
 
Its already been discussed before a million times. A lot of hosts like my own like to allow recursion to customers.
 
Back
Top