stff
Category: Internet
DNS mindshare
I have been thinking about how much people are thinking about DNS and I came across the Google Zeitgeist project (http://www.google.com/intl/en/press/zeitgeist/index.html). Basically this is an interface to understand what people are using the Google search engine for. Specifically, I was poking around Insights for Search and queried a few terms related to DNS. The information is fascinating. The most interesting part I noticed is the number of searches and the countries they are coming from. Again, I find this stuff fascinating. We beat the drum each day for DNS and most people never give it a thought, much as it should be, but if you are reading this you probably have a bit more interest. DNS searches have actually decreased over the past few years. Maybe people are more educated? Less concerned? However, DNS attacks are on the rise that is certain.
In our last TechTalk event we had a great number of participants and fielded a lot of questions. There was some good discussion about DNSSEC implementation. Based on what we discussed – you should plan to have your DNSSEC implementations done by the end of 2011, at the latest. Also there were lots of questions about reverse DNS. Reverse DNS is just like DNS but specifically for the IP addresses, for example when you want to know what an IP address points to you would do a reverse DNS query.
The questions were focused on how admins setup a reverse DNS. Reverse DNS is typically maintained by the organization who “owns†the IP address(s) or block. In their DNS server they create records for each of their IP address that point to hostnames. Many times those host names will be generic, which is fine. For certain things, especially email, having the hostname come back as generic can create a problem. For example, when you email server attempts to send a message to another server (the receiving server), nine times out of ten, the receiving server will do a reverse DNS lookup on the IP address of the sending server, if the hostname returned is not related to your email zone or if there is no reverse DNS record the receiving server may reject the message. Some email servers can get particularly persnickety about this.
So make sure your reverse DNS ducks are in a row. One of the easiest ways to verify all of your DNS settings is to run a DNSreport at DNSstuff.com. You first need to get a free 21-day trial account to have access to all tools.
Secunia PSI 1.5 is out…
Download it now: http://secunia.com/vulnerability_scanning/personal/ Secuina PSI is a great Windows application to give you visibility into what security threats are sitting on your computer. There are so many pieces and parts of software that can be easily compromised… how do you keep up with all the updates? Use Secuina PSI. It is free for personal use and I don’t compute without it. Not only does it show you what has an issue but gives direct links on how to fix it. Cool.
Also published on Medium.
Dusty Name System
Every IT person has some interaction with a DNS server, even if it is not managing it. Most DNS servers, certainly the majority are sitting in some closet or rack somewhere dutifully running and collecting dust. Like a certain battery operated bunny, these services just keep on running. The durability of DNS (Domain Name System, that is) is a testimony of just how well it was designed. DNS serves every single user of the Internet consistently, day-in and day-out. What DNS does and how well it does it is nothing short of an engineering miracle simple, elegant, scalable – truly amazing. How often do you think about your DNS server? Here is my plan for how to keep your relationship with your DNS server alive and well.
- Check your system logs to make sure there are no impending hardware failures on the horizon. For example, be sure you have SMART enabled to check your systems hard disks and make sure that you can receive the SMART alerts should they occur. You should also review your logs for any other errors such unexpected reboots that you may have missed.
- Monitoring, you should really think about monitoring your DNS server. Is it up? Is it responsive? Is it giving the right answers? Can those who need to access it connect?
- Don’t confuse things. Don’t run a recursive name server that is also the start of authority for a DNS zone. You really, and I mean really, need to separate these functions to different servers. If you don’t you are opening your zone to a very high level of risk.
- Check your DNS server version. Make sure you are running the latest version of you DNS server software. This is imperative.
- OS updates are critical as well. Make sure you keep your system up-to-date!
- Run only DNS on your DNS server. You can run other software but you then have to be concerned that periodic (required) updates to your DNS software could impact other parts of that server. So the less you are running on that server the less risk. Just an idea.
- Never have only one DNS server. You absolutely need two resolver servers and two SOA servers, at a minimum.
- Try to have your SOA DNS servers on different networks with different paths to the Internet. If you do this and one of your networks goes down people will still be able to resolve your zone.
- Backups. Right now – go and do a dry run to restore your DNS server. If you are thinking, “Boy, how do I do that?” You should panic. You don’t want to ask that question when it really fails. Get your ducks in a row right now.
- Replace older hardware. The nature of hardware is that it fails. Proactively plan for replacement of your DNS server.
So please take a few minutes and at least think through each of these issues. DNS will always be an attack target. DNSstuff can help with robust tools and proactive alerts that verify configuration and assist with troubleshooting and resolution. Having DNSstuff’s web application at your fingertips is a must for IT professionals.
Blogging from somewhere over the USA
I am on a Virgin America flight – right now – typing this blog entry via onboard wifi. Very cool. I am using GoToMyPC to access my office PC. My IP address is: Your IP: 12.130.118.3 Near: Itasca, Illinois United States (this info is courtousey of DNSstuff.com). I am not able to use anything but pure HTTP and HTTPS. I tried to make an RDP connection but no go. Attempting to make an SSH connection into servers also failed. But I can most everything I need to do via what I have here. There is a standard power outlet at my seat, in coach, so I have all the power I need! Very cool.