Do you have some DNS requests/replies you could share?

Published: 2014-06-25. Last Updated: 2014-06-25 02:03:20 UTC
by Mark Hofman (Version: 1)
2 comment(s)

Looking at DNS traffic it looks like it has been a busy month, but traffic seems to have dropped off. 


port 53 as a target has dropped off and during June there was an increase in traffic with a source port of 53. Something that we've seen on various IDS.  We either see one of two types of packets.  A request for any for a particular domain with the packet size set to 65535 and a spoofed source IP (i.e. the target).  So that accounts for the traffic to port 53.  

The second types of requests we see is from port 53.  Typically with a random source ports and typically to a number of servers in the target network.  The only thing that changes is often the queryid.  So these are likely attempts to poison the cache.  

The third type we see are DNS requests to check for open resolvers and a final type of query we see a lot of are DNS queries with HTTP elements in the traffic.  

There are a few things I'm interested in.  What caused the drop off for port 53 as the target.  What DNS queries are you seeing targetting your environment?  and if you can share, I'd be interested in the actual request itself.  

Regards

Mark H

Keywords:
2 comment(s)

Comments

I had caught a few last week, I have logging verbose mode on now; also using a few sources to attempt to catch anything.I have to mention that "Proxifier" (Application) came/comes in handy too when set to verbose mode.
I can't say if it's trending up or down, my DNS servers are pretty low volume, but I do see a fair amount of ANY requests for interesting domains people have no business querying our servers for: isc.org, ietf.org, lots of .gov - fema.gov, census.gov, usembassy.gov, etc.

We don't allow recursion from outside and I blackhole excessive requests with iptables so it's a biased sample. No packets handy but I might grab some and see if source port and packet size are consistent with what you see. A random sample of the source IPs (whether spoofed or not) seems to point to usual suspects eastern Europe and Asia.

Diary Archives