bind
9 TopicsBig-IP DNS - Zone Transfers
I have a customer with 192 zones on an older Big-IP GTM device. I've implemented a newer version of Big-IP DNS (vCMP). The customer is using the Big-IP DNS as the master for all the zone files, therefore local BIND on the F5 appliances are being used. Not DNS Express. The question I have is, is there a way to transfer over the zones in bulk? According to the documentation, it seems like this can only be done one at a time. In other words, is it possible to transfer more than one zone at a time? If so, is there a maximum limit? If not, that is OK, I just want to know what is theoretically possible and so far, I can't find any documentation that references this capability.Solved1.6KViews1like4CommentsMultiple DNS Views?
Hi, in our environment we have bind (tcp/udp port 53) behind an L4 virtual server on big-ip ltm virtual edition. "Views" define where the DNS traffic should be going - is there an easy and effective way to maintain source information while routing to the backend servers in our pool? Are we able to have multiple DNS views to accommodate for the different client request sources? OR Is there a better way to handle this, such as with irules, snat pools, etc? Thanks!306Views0likes1CommentDNS listeners, DNS Express & BIND
I'm a little confused over what is/ isn't deemed best practice. Is there's anything wrong with the following points? Listener configured; queries are both wip's and non-wip records. Bind is enabled to be able to create non-wip records - is this correct? Recursion has been enabled in the named config and restricted to an acl of rfc1918 addresses. DNS express is configured to import the local zone from bind for performance purposes. Unhandled Query Actions set to drop in the profile. My understanding being requests would not be passed to bind with this set thus making it more secure? With this enabled the wip times out 3 times before resolving on the 4th try. Coincidentally I have 4 VS in the gslb pool. I did try disabling bind completely and found my wip's again timed out several times before eventually resolving? Any pointers/ help, much appreciated.610Views0likes7CommentsGTM - disabling bind
It is becoming a contentious issue of f5 support personnel not supporting BIND, though configured and installed by f5 consultants? What is the best way to permanently disable BIND so that no-one can use BIND feature and only stick with GTM DNS has to offer? Thanks,560Views0likes6CommentsBIND vulnerability CVE-2015-5722
Hi Due to BIND vulnerability CVE-2015-5722 I'm using GTM version 10.2.4 and it has note (1) and (3) If I don't enable dnssec validation ...but config a pool to uses the Return to DNS load balancing method or Alternate and Fallback load balancing methods are set to None. Did My box vulnerable?373Views0likes1CommentGTM not using bind for forwarding?
i configured a listener (TMOS 11.5.1) with a DNS profile which has "Unhandled Query Actions" set to Allow i configured Use BIND Server on BIG-IP on the DNS profile i configured a bind forwarder i configured recursion to yes in the named.conf but when i do a dig @listener for a non local hostname (i.e. www.google.com) then i get a refused response and no IP(s). wide ip loop ups and zonerunner records look ups both work fine. so the request is passed to bind, but once there it isn't forwarded to the configured DNS forwarder it seems. anyone got a clue what else i can check else? the typical thing is when i do a dig @127.0.0.1 on the GTM itself then i get normal responses.296Views0likes1CommentF5 Friday: So That DNS DDoS Thing Happened
#infosec #dns #ddos Smurfs aren't just for ICMP anymore... Note: This post was originally published in 2014 after a ginormous DDoS attack targetting DNS. Generally speaking, it's still relevant, though the details are not referencing the DYN attack from 10/2016. DNS, like any public service, is vulnerable. Not in the sense that it has vulnerabilities but vulnerable in the sense that it must, by its nature and purpose, be publicly available. It can't hide behind access control lists or other traditional security mechanisms because the whole point of DNS is to provide a way to find your corporate presence in all its digital forms. It should therefore not come as a surprise that eventually it turned up in the news as the primary player in a global and quite disruptive DDoS attack. The gory details, most of which have already been circulated, are nonetheless fascinating given the low technological investment required. You can duplicate the effort with about 30 friends each with a 30Mbps connection (that means I'm out, sorry). As those who've been in the security realm for a while know, that's because these types of attacks require very little on the attack side; the desired effects come due to the unbalanced request-response ratio inherent in many protocols, DNS being one of them. In the world of security taxonomies these are called "amplification" attacks. They aren't new; "Smurf attacks" (which exploited ICMP) were first seen in the 1990s and effected their disruption by taking advantage of broadcast addresses. DNS amplification works on the same premise, because queries are small but responses tend to be large. Both ICMP and DNS amplification attacks are effective because they both rely on protoocls that do not require a handshake and are entirely uninterested in verifying whether or not the IP address in the request is the one from which the the request was received. It's ripe for spoofing with much less work than a connection-oriented protocol such as TCP. To understand just how unbalanced the request-response ratio was in this attack, consider that the request was: “dig ANY ripe.net @ <OpenDNSResolverIP> +edns0=0 +bufsize=4096”. That's 36 bytes. The responses are typically 3K bytes, for an amplification factor of 100. There were 30,000 open DNS resolvers in the attack, each sending 2.5Mbps of traffic each, all directed at the target victim. CloudFlare has a great blog on the attack, I recommend a read. Another good resource on DNS amplification attacks is this white paper. Also fascinating is that this attack differed in that the target was sent a massive number of DNS responses - rather than queries - that it never solicited in the first place. The problem is DNS is, well, public. Restricting responses could ostensibly unintentionally block legitimate client resolvers causing a kind of self-imposed denial of service. That's not acceptable. Transitioning to TCP to take advantage of handshaking and thus improve the ability to detect and shut down attempted attacks would certainly work, but at the price of performance. While F5's BIG-IP DNS solutions are optimized to avoid that penalty, most DNS infrastructure isn't and that means a general slowdown of a process that's already considered "too slow" by many users, particularly those trying to navigate the Internet via a mobile device. So it seems we're stuck with UDP and with being attacked. But that doesn't mean we have to sit back and take it. There are ways in which you can protect against the impact of such an attack as well as others lurking in the shadows. 1. DEPRECRATE REQUESTS (and CHECKING RESPONSES) It is important to validate that the queries being sent by the clients are ones that the DNS servers are interested in answering, and are able to. A DNS firewall or other security product can be used to validate and only allow the DNS queries that the DNS server is configured for. When the DNS protocol was designed, there were a lot of features built into the protocol that are no longer valid due to the evolving nature of the Internet. This includes many DNS query types, flags available and other settings. One would be surprised at what types of parameters are available to mark on a DNS request and how they can be manipulated. For example, DNS type 17=RP, which is the Responsible Person for that record. In addition, there are ways to disrupt DNS communications by putting bad data in many of these fields. A DNS firewall is able to inspect these DNS queries and drop the requests that do not conform to DNS standards and do not use parameters that the DNS servers are configured for. But as this attack proved, it's not just queries you have to watch out for - it's aslo responses. F5 DNS firewall features include stateful inspection of responses which means any unsolicited DNS responses are immediately dropped. While that won't change the impact on bandwidth, it will keep the server from becoming overwhelmed by processing unnecessary responses. F5’s DNS Services includes industry-leading DNS Firewall services 2. ENSURE CAPACITY DNS query capacity is critical to delivering a resilient available DNS infrastructure. Most organizations recognize this and put into place solutions to ensure high availability and scale of DNS. Often these solutions are simply caching DNS load balancing solutions which have their own set of risks, including being vulnerable to attack using random, jabberwocky host names. Caching DNS solutions only cache responses returned from authoritative sources and thus when presented with an unknown host name, it must query the origin server. Given a high enough volume of queries, the origin servers can still be overwhelmed, regardless of the capacity of the caching intermediary. A high performance in-memory authoritative DNS server such as F5 DNS Express (part of F5 BIG-IP DNS) can shield origin servers from being overwhelmed. 3. PROTECT AGAINST HIJACKING The vulnerability of DNS to hijacking and poisoning is still very real. In 2008, a researcher, Evgeniy Polyakov, showed that it was possible to cache poison a DNS server that was patched and running current code within 10 hours. This is simply unacceptable in an Internet-driven world that relies, ultimately, on the validity and integrity of DNS. The best solution to this and other vulnerabilities which compromise the integrity of DNS information is DNSSEC. DNSSEC was introduced to specifically correct the open and trusting nature of the protocol’s original design. DNS queries and responses are signed using keys that validate that the DNS answer was not tampered with and that it came from a reliable DNS server. F5 BIG-IP DNSnot only supports DNSSEC, but does so without breaking global server load balancing techniques. As a general rule, you should verify that you aren't accidentally running an open resolver. Consider the benefits of implementing DNS with an ICSA certified and hardened solution that does not function as an open resolver, period. And yes, F5 is a good choice for that. Additional Resources: High-Performance DNS Services in BIG-IP Version 11 DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks F5 DNS Services Infrastructure The Dynamic DNS Infrastructure | F5 White Paper365Views0likes0CommentsObfuscate GTM's BIND Version
For various reason's, one might wish not to advertise to the world the version of BIND running on the GTM. The fix action is to add two lines to the options section of the named.conf file (See Below). This can be done at the command line by editing /var/named/config/named.conf, or by editing said file via the GUI. If done in the GUI, named is restarted for you, if done at the command line, you'll need restart manually (bigstart restart named). Anway, the lines you'll need to obfuscate the version are: query-source address * port 53; version "x.y.z"; You can just leave it blank with "", or you can place a message in there. Whatever text floats your boat. I did a couple queries around the net and got some "I don't think so!" messages, as well several "Contact for version information". Quite a few sites I checked returned BIND version information. This is a standard BIND configuration, so this configuration is not specific to GTM. For this test, I'll start with a query prior to configuring named. Then, I'll set the version name to "Not today, my friend..." and re-query. Results are below. Before: user@ubuntu:~$ dig @10.10.20.5 version.bind chaos txt ; DiG 9.5.0-P2 @10.10.20.5 version.bind chaos txt ; (1 server found) ;; global options: printcmd ;; Got answer: ;; ->>HEADER;; flags: qr aa rd; QUERY: 1, ANSWER: 1, AUTHORITY: 1, ADDITIONAL: 0 ;; WARNING: recursion requested but not available ;; QUESTION SECTION: ;version.bind. CH TXT ;; ANSWER SECTION: version.bind. 0 CH TXT "9.5.1-P2" ;; AUTHORITY SECTION: version.bind. 0 CH NS version.bind. ;; Query time: 10 msec ;; SERVER: 10.10.20.5#53(10.10.20.5) ;; WHEN: Sun May 10 12:59:20 2009 ;; MSG SIZE rcvd: 65 After: user@ubuntu:~$ dig @10.10.20.5 version.bind chaos txt ; DiG 9.5.0-P2 @10.10.20.5 version.bind chaos txt ; (1 server found) ;; global options: printcmd ;; Got answer: ;; ->>HEADER;; flags: qr aa rd; QUERY: 1, ANSWER: 1, AUTHORITY: 1, ADDITIONAL: 0 ;; WARNING: recursion requested but not available ;; QUESTION SECTION: ;version.bind. CH TXT ;; ANSWER SECTION: version.bind. 0 CH TXT "Not today, my friend..." ;; AUTHORITY SECTION: version.bind. 0 CH NS version.bind. ;; Query time: 8 msec ;; SERVER: 10.10.20.5#53(10.10.20.5) ;; WHEN: Sun May 10 12:40:43 2009 ;; MSG SIZE rcvd: 61 For information on which version of BIND exists on the GTM releases (as well as the other 3rd party software), please reference Solution 9445.446Views0likes0Comments