[dns-operations] Anyone on this list from Arbor Networks (or know a solid engineering contact)?

Petr Špaček petr.spacek at nic.cz
Wed Jun 20 10:37:45 UTC 2018


Let me add that firewall users who have enabled too strict filtering are 
going to be affected by https://dnsflagday.net/ , so some communication 
from firewall vendors to their customes might be desirable.

Petr Špaček  @  CZ.NIC


On 20.6.2018 10:56, Mark Andrews wrote:
> Unfortunately it is a knob that doesn’t really do any good for anyone.
> All it does is turn NXDOMAIN/NOERROR NODATA into SERVFAIL.  Foot, Gun,
> pull trigger.  DNS queries haven’t been mostly A records or even A and AAAA
> records for over a decade now.
> 
> Similarly firewalls that assume normal queries don’t have EDNS options or
> that currently reserved flag bits won’t be set or EDNS version will always
> be zero just make the DNS brittle.  They don’t actually do anything useful
> by dropping such queries.  EDNS servers handle all of these conditions.
> 
> All dropping these sorts of queries does is slow down your and other firewall
> vendors customer’s customer’s lookups as the recursive servers try different
> styles of queries and occasionally break DNSSEC when those servers back off
> too far because no response doesn’t currently mean “packet loss”.
> 
> The features need to be removed and/or clearly document the negative effects
> of enabling them.
> 
> If you don’t want to answer particular EDNS options remove them from the query
> and pass the rest of the request through.  That won’t break the client provided
> TSIG/SIG(0) is not in use. The server will just look like it doesn’t support the
> option.  Similarly for currently reserved flag bits in the DNS and EDNS headers.
> If they are worried about EDNS version != 0 then send back BADVERS with the
> supported version (0) set.
> 
> Mark
> 
>> On 19 Jun 2018, at 5:05 pm, Roland Dobbins <rdobbins at arbor.net> wrote:
>>
>>
>> On 19 Jun 2018, at 12:35, Viktor Dukhovni wrote:
>>
>>> due to a misconfigured Arbor Networks firewall,
>>
>> To clarify, Arbor Network doesn't produce firewalls, but rather intelligent DDoS mitigation systems, or IDMSes.
>>
>>> in which DNS filters were enabled that drop queries for all but the most common RR types.
>>
>> I'm unaware of any feature in Arbor products which by default does what's being described; operators of our IDMSes do have the ability to filter packets, including DNS queries, but they're typically operator-configurable.
>>
>> Please feel free to ping me directly so that we can understand the details better, and go from there.
>>
>> Thanks for reaching out, and to Barry for cc'ing me directly!
>>
>> -----------------------------------
>> Roland Dobbins <rdobbins at arbor.net>




More information about the dns-operations mailing list