Thursday, August 30, 2018

Re: DNS (UNBOUND) + PF ISSUE

Hi NN,

On Wed, 29 Aug 2018 11:57:15 +0200 NN wrote:
>
> here is my pf.conf on VM#1:
>
>     int_if="{ vether0 re0 }"
>     set block-policy drop
>     set log interface egress
>     set skip on lo0
>     match in all scrub (no-df random-id max-mss 1440)
>     match out on egress inet from !(egress:network) to any nat-to (egress:0)
> pass out quick inet pass in on $int_if inet
> pass in on egress inet proto { tcp, udp } from any to (egress) port 53 rdr-to 192.168.50.2


Yuck.

Block everything:-


block in all
block in log on $ext_if
block return in on $int_if
block return out


Then only open up what is needed, e.g:


pass out on $ext_if inet proto {udp, tcp} \
from $ext_if port > 1023 \
to any port domain \
user {_nsd, _unbound}


pass in on $int_if inet proto {udp, tcp} \
from $int_if:network port > 1023 \
to $int_if port domain \
user root \
modulate state


Define your Unbound server in your DHCP daemon configuration.

>
> *P.S: unbound.conf is here ...*
>
> server:
>         # interface: 188.192.103.156

No no no no No No NO NO NO *NO* *NO* _NO_!!!!

NEVER run a recursive resolver on the Internet!!!



"Overview

A Domain Name Server (DNS) amplification attack is a popular form of
distributed denial of service (DDoS) that relies on the use of
publically accessible open DNS servers to overwhelm a victim system
with DNS response traffic.

...."

https://www.us-cert.gov/ncas/alerts/TA13-088A






Cheers,
--
Craig Skinner | http://linkd.in/yGqkv7

No comments:

Post a Comment