<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Internet Systems Consortium</title>
	<atom:link href="http://www.isc.org/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.isc.org</link>
	<description>Maintainers of BIND and ISC DHCP</description>
	<lastBuildDate>Fri, 27 Sep 2013 23:20:12 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.6.1</generator>
		<item>
		<title>Happy 30th Birthday, GNU!</title>
		<link>https://www.isc.org/blogs/happy-30th-birthday-gnu/</link>
		<comments>https://www.isc.org/blogs/happy-30th-birthday-gnu/#comments</comments>
		<pubDate>Fri, 27 Sep 2013 22:54:53 +0000</pubDate>
		<dc:creator>Michael McNally</dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Open Source]]></category>

		<guid isPermaLink="false">http://staging.isc.org/?p=10314</guid>
		<description><![CDATA[Happy 30th birthday to the GNU project! According to their announcement commemorating the event on the GNU.org site, September 27th, 1983 was the day that Richard Stallman first announced the GNU project to the public. Today the open source software movement that GNU pioneered is vibrant, thriving, and global.   It counts among its members a multitude of individuals and project groups [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Happy 30th birthday to the GNU project!</p>
<p>According to their <a href="https://gnu.org/gnu/initial-announcement.html">announcement commemorating the event</a> on the GNU.org site, September 27th, 1983 was the day that Richard Stallman first announced the GNU project to the public.</p>
<p>Today the open source software movement that GNU pioneered is vibrant, thriving, and global.   It counts among its members a multitude of individuals and project groups motivated by an amazing variety of values and goals.  Millions every day use open source software directly and innovation and competition from open source have spurred improvement even in projects that don&#8217;t share the open source philosophy.</p>
<p>At ISC we&#8217;re proud to be part of the open source movement that the GNU Project trailblazed.  We&#8217;d  like to salute our colleagues (and respected elder siblings) at GNU and congratulate them on their past 30 years of remarkable achievement.  Well done, GNU, and thank you for all that you have done to make the world a better place.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.isc.org/blogs/happy-30th-birthday-gnu/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>BIND 9.9.4 Released</title>
		<link>https://www.isc.org/blogs/bind-9-9-4-released/</link>
		<comments>https://www.isc.org/blogs/bind-9-9-4-released/#comments</comments>
		<pubDate>Thu, 19 Sep 2013 22:37:40 +0000</pubDate>
		<dc:creator>Adib Behjat</dc:creator>
				<category><![CDATA[BIND]]></category>
		<category><![CDATA[BIND 9.9.4]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[Download]]></category>
		<category><![CDATA[Response Rate Limiting]]></category>
		<category><![CDATA[RRL]]></category>

		<guid isPermaLink="false">http://staging.isc.org/?p=10269</guid>
		<description><![CDATA[ISC is excited to announce the release of BIND 9.9.4, featuring Response Rate Limiting (RRL), security patches, and bug fixes for DNSSEC, RPZ and configuration modules. The latest dot release ensures the stability, robustness and security of your critical Internet infrastructure. Response Rate Limiting (RRL) A DNS DDoS attack works by forging queries that look like they came from the [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>ISC is excited to announce the release of BIND 9.9.4, featuring Response Rate Limiting (RRL), security patches, and bug fixes for DNSSEC, RPZ and configuration modules. The latest dot release ensures the stability, robustness and security of your critical Internet infrastructure.</p>
<p><strong>Response Rate Limiting (RRL)</strong></p>
<p>A DNS DDoS attack works by forging queries that look like they came from the victim’s server, making it appear to be requesting a high volume of information. RRL enables server administrators to limit the rate at which their server will send replies to forged queries, thereby preventing it from contributing to the attack.</p>
<p>“Our users have been asking for RRL to be incorporated into BIND,” said Kannan Ayyar, President of Internet Systems Consortium, “and we recognize the important role it plays in DDoS mitigation. With DDoS attacks increasing in both number and severity, we felt it was important to integrate RRL into a supported release.”</p>
<p>“We have been testing RRL in limited release, and are now confident that it is ready for general use in BIND installations,” said Scott Mann, ISC’s VP of Engineering. “Third-party additions like RRL are possible because BIND is open source software. Now that it is fully implemented, we look forward to enhancing and building on RRL in future releases.”</p>
<p>For more information on RRL, visit the following links:</p>
<ul>
<li><a title="ISC YouTube" href="http://youtu.be/grHRrJaj4J0?utm_source=isc&amp;utm_medium=website&amp;utm_term=rrl-webinar&amp;utm_content=youtubetraffic&amp;utm_campaign=bind994_release_091913 " target="_blank">DDoS Defense Module for BIND DNS &#8211; RRL (Webinar)</a></li>
<li><a title="ISC KnowledgeBase" href="https://kb.isc.org/article/AA-01000/189/A-Quick-Introduction-to-Response-Rate-Limiting.html?utm_source=isc&amp;utm_medium=website&amp;utm_term=rrl-kb&amp;utm_content=kbarticle&amp;utm_campaign=bind994_release_091913" target="_blank">A Quick Introduction to Response Rate Limiting</a></li>
<li><a title="Cache poisoning gets a second wind from RRL?  Probably not." href="https://www.isc.org/blogs/cache-poisoning-gets-a-second-wind-from-rrl-probably-not/" target="_blank">Cache poisoning gets a second wind from RRL? Probably not.</a></li>
</ul>
<p>Commercial support for BIND and additional RRL functionality, RRL Classifier, is available to The DNS Company subscription customers; visit The DNS Company’s <strong><span style="color: #f16431;"><a title="DNSco BIND Solutions" href="http://www.dns-co.com/solutions/bind/?utm_source=isc&amp;utm_medium=website&amp;utm_term=dnsco&amp;utm_content=bind-solution&amp;utm_campaign=bind994_release_091913" target="_blank"><span style="color: #f16431;">BIND Solutions</span></a></span></strong> to learn more.</p>
<p>For questions, suggestions and discussions relevant to BIND, participate in our community mailing list, available at <a href="https://www.isc.org/community/mailing-list/" target="_blank">https://www.isc.org/community/mailing-list/</a>.</p>
<p>BIND 9.9.4 is available for download at our <strong><a title="Downloads" href="/downloads/">Downloads</a></strong> page.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.isc.org/blogs/bind-9-9-4-released/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Cache poisoning gets a second wind from RRL?  Probably not.</title>
		<link>https://www.isc.org/blogs/cache-poisoning-gets-a-second-wind-from-rrl-probably-not/</link>
		<comments>https://www.isc.org/blogs/cache-poisoning-gets-a-second-wind-from-rrl-probably-not/#comments</comments>
		<pubDate>Fri, 13 Sep 2013 21:44:53 +0000</pubDate>
		<dc:creator>Brian Conry</dc:creator>
				<category><![CDATA[BIND]]></category>
		<category><![CDATA[Blogs]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CVE-2013-5661]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[DNS]]></category>
		<category><![CDATA[RRL]]></category>

		<guid isPermaLink="false">http://staging.isc.org/?p=10228</guid>
		<description><![CDATA[You may have heard recently that Response Rate Limiting (RRL) has re-opened the door on cache poisoning attacks (see CVE-2013-5661). ISC acknowledges that RRL can increase the effectiveness of cache poisoning attacks and appreciates the detailed research that uncovered it.  This is, however, only one piece in the larger context of competing security concerns, and each operator will need to [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>You may have heard recently that <a title="French Government Advisory" href="http://www.certa.ssi.gouv.fr/site/CERTA-2013-AVI-506/index.html">Response Rate Limiting (RRL) has re-opened the door on cache poisoning attacks</a> (see <a title="CVE-2013-5661" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5661">CVE-2013-5661</a>).</p>
<p>ISC acknowledges that RRL can increase the effectiveness of cache poisoning attacks and appreciates the detailed research that uncovered it.  This is, however, only one piece in the larger context of competing security concerns, and each operator will need to find their own balance of protection.</p>
<p>For those unfamiliar with it, RRL is designed to reduce the effectiveness of reflected denial of service (DoS) attacks which leverage DNS servers to amplify the attack.  DNS servers are frequently used as amplifying reflectors in DoS attacks because attackers can send a small UDP query with a forged source address to the DNS server and get it to respond with a much larger answer to the target of the DoS.  RRL reduces the effectiveness of these attacks by detecting when a large amount of similar traffic is being sent to a single target and suppressing responses.</p>
<p>This could, of course, potentially be used to create a different kind of DoS attack against a target if an attacker chooses to ask the same kinds of questions that the target is likely to ask.  If this were done against all of the servers authoritative for a zone then an attacker could potentially prevent the target from getting any answers at all for the zone.</p>
<p>In order to combat this risk, RRL was designed with a concept called &#8220;slip&#8221;.  Slip comes into play after RRL starts suppressing responses, and works by allowing a specified fraction of responses to &#8220;slip&#8221; through the suppression.  These responses contain none of the actual answer data, but do have the truncation (TC) bit set in the header of the response in order to tell the client to retry over TCP.  This enables legitimate clients to get answers via TCP, which has a lot more overhead than UDP but is not vulnerable to source address forgery.</p>
<p>ISC&#8217;s RRL implementation will debut in our upcoming 9.9.4 release.  Like the <a title="ratelimits on redbarn.org" href="http://www.redbarn.org/dns/ratelimits">redbarn.org patches</a> that preceded our implementation, we have chosen a default slip value of &#8220;2&#8243;, meaning that TC answers will be sent to the client/target 1 time in 2.  The other half of the time the queries will go unanswered.</p>
<p>It is these unanswered queries that create the increased opportunity for cache poisoning by giving an attacker a larger time window in which to get a forged reply with poison data to the victim.  The data that we&#8217;ve seen indicates that for a reasonably-configured resolver it takes, on average, more than sixteen hours of 100Mbps of forged answers in order to get the resolver to accept a poisoned answer.  During this time, the resolver is both being flooded with traffic and assumed to be unable to resolve the name in question.  Both of these are usually fairly visible events.  We have not seen any analysis of the expected time for a &#8220;stealthy&#8221; cache poisoning attack, but we expect it to be significantly longer.</p>
<p>The researchers who discovered this have recommended a slip value of &#8220;1&#8243;, sending a TC answer for every response that RRL decides needs to be suppressed.  This reduces the effectiveness of cache poisoning attacks while increasing the effectiveness of using DNS to amplify DoS attacks.</p>
<p>Note that this analysis only applies to queries and responses that are affected by RRL, while anything that causes the legitimate packets to be dropped, even simple traffic congestion, will benefit someone attempting cache poisoning.  Therefore, modifications to the behavior of RRL can have, at best, a limited effect in defending against cache poisoning. The best defense is for authoritative server operators to sign their zones with DNSSEC, and for resolver operators to validate responses.</p>
<p>The bottom line is that there is no clear &#8220;right&#8221; answer here.  Both concerns are valid and the mitigation for one increases the risk of the other.</p>
<p>We believe, based on what we know of the current state of the internet, that a slip value of &#8220;2&#8243; is closer to the theoretical &#8220;sweet spot&#8221; in addressing both risks than a slip value of &#8220;1&#8243; is, which is why we are keeping &#8220;2&#8243; as our default.  Since RRL is not enabled by default even when it is compiled in to BIND, and the slip value is a configurable option, we believe that this provides the most useful default value while giving individual operators the freedom to choose the risk balance that they are comfortable with.</p>
<p>Finding the right risk balance also includes considering the effect that other features (e.g. DNSSEC) have on amplification potential and resistance to cache poisoning.</p>
<p>Those who are interested in learning more about how we got into this situation and where we ought to go from here may want to check out Paul Vixie&#8217;s blog post &#8220;<a title="On the Time Value of Security Features in DNS" href="http://www.circleid.com/posts/20130913_on_the_time_value_of_security_features_in_dns/">On the Time Value of Security Features in DNS</a>&#8220;.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.isc.org/blogs/cache-poisoning-gets-a-second-wind-from-rrl-probably-not/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>ISC adds DDoS defense module to BIND software</title>
		<link>https://www.isc.org/blogs/isc-adds-ddos-defense-module-to-bind-software/</link>
		<comments>https://www.isc.org/blogs/isc-adds-ddos-defense-module-to-bind-software/#comments</comments>
		<pubDate>Wed, 24 Jul 2013 12:00:22 +0000</pubDate>
		<dc:creator>Adib Behjat</dc:creator>
				<category><![CDATA[BIND]]></category>
		<category><![CDATA[Events]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[amplification]]></category>
		<category><![CDATA[BIND 9.9.4]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[rDoS]]></category>
		<category><![CDATA[Response Rate Limiting]]></category>
		<category><![CDATA[RRL]]></category>
		<category><![CDATA[Webinar]]></category>

		<guid isPermaLink="false">http://staging.isc.org/?p=10122</guid>
		<description><![CDATA[Internet Systems Consortium (ISC) announces that the RRL module, currently the most effective defense against the use of DNS in Distributed Denial of Service attacks, is now part of the upcoming BIND release. A DNS DDoS attack works by forging queries that look like they came from the victim’s server, making it appear to be requesting a high volume of [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Internet Systems Consortium (ISC) announces that the RRL module, currently the most effective defense against the use of DNS in Distributed Denial of Service attacks, is now part of the upcoming BIND release.</p>
<p>A DNS DDoS attack works by forging queries that look like they came from the victim’s server, making it appear to be requesting a high volume of information. RRL enables server administrators to limit the rate at which their server will send replies to forged queries, thereby preventing it from contributing to the attack. The frequency of DNS DDoS attacks has been increasing, rising by 20% in Q2 of 2013. In an average attack 50 million packets per second are beamed at the victim. As attacks increase, RRL is the best defense available.</p>
<p>“Our users have been asking for RRL to be incorporated into BIND,” said Kannan Ayyar, President of Internet Systems Consortium, “and we recognize the important role it plays in DDoS mitigation. With DDoS attacks increasing in both number and severity, we felt it was important to integrate RRL into a supported release.&#8221;</p>
<p>“We have been testing RRL in limited release, and are now confident that it is ready for general use in BIND installations,” said Scott Mann, ISC’s VP of Engineering. “Third-party additions like RRL are possible because BIND is open source software. Now that it is fully implemented, we look forward to enhancing and building on RRL in future releases.”</p>
<p>For more information on RRL, visit the ISC Knowledgebase at <a title="KnowledgeBase" href="https://kb.isc.org/article/AA-01000" target="_blank">https://kb.isc.org/article/AA-01000</a>, or sign up for a webinar listed at our <a href="/mission/events">events page</a>.</p>
<p>Commercial support for BIND and additional RRL functionality is available to DNSco subscription customers; visit DNSco&#8217;s <a title="DNSco BIND Solutions" href="http://www.dns-co.com/solutions/bind/" target="_blank">BIND Solutions</a> to learn more.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.isc.org/blogs/isc-adds-ddos-defense-module-to-bind-software/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>ISC Spins Off Its Security Business Unit</title>
		<link>https://www.isc.org/blogs/isc-spins-off-its-security-business-unit/</link>
		<comments>https://www.isc.org/blogs/isc-spins-off-its-security-business-unit/#comments</comments>
		<pubDate>Tue, 02 Jul 2013 13:00:33 +0000</pubDate>
		<dc:creator>Adib Behjat</dc:creator>
				<category><![CDATA[Blogs]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[DNSco]]></category>
		<category><![CDATA[Farsight]]></category>
		<category><![CDATA[ISC]]></category>
		<category><![CDATA[Paul]]></category>
		<category><![CDATA[Paul Vixie]]></category>
		<category><![CDATA[Vixie]]></category>

		<guid isPermaLink="false">http://staging.isc.org/?p=10070</guid>
		<description><![CDATA[Internet Systems Consortium (ISC) announces that it has sold its security-related assets to Farsight Security, Inc., (“Farsight”) a new company started by ISC founder, Paul Vixie. The DNSDB and SIE services developed by ISC over the past five years will now be provided by Farsight. “Paul Vixie has been the driving force in Internet security innovation at ISC for many [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Internet Systems Consortium (ISC) announces that it has sold its security-related assets to Farsight Security, Inc., (“Farsight”) a new company started by ISC founder, Paul Vixie. The DNSDB and SIE services developed by ISC over the past five years will now be provided by Farsight.</p>
<p>“Paul Vixie has been the driving force in Internet security innovation at ISC for many years,” said Kannan Ayyar, President of Internet Systems Consortium. “We are pleased that he will be taking these technologies forward and providing ongoing leadership in the security space. We look forward to his continued innovation there. Paul Vixie has been part of ISC for 18 years; with this new venture he has ended all of his involvement with ISC. We are grateful for his many contributions and share his excitement about Farsight.”</p>
<p>This is the second time this year that ISC has divested certain assets to a commercial for-profit entity. ISC is doing this to increase clarity and focus for its non-profit Internet mission, which includes running F-Root, providing hosting and Internet services for non- profits, researching and developing new ideas for the Internet and of course providing free world-class nameserver and DHCP software for the benefit of the Internet.</p>
<p>In April of this year, ISC launched DNSco (http://dns-co.com), a wholly-owned subsidiary delivering a full suite of commercial services for BIND and ISC DHCP. Farsight, unlike DNSco, is a privately held company that is independent of ISC.</p>
<p>“Farsight security technologies and service delivery capabilities are the result of years of research at ISC,” said Paul Vixie. “During that time we iterated on a range of business models and technology prototypes yielding best-in-class Internet security solutions that will help make the Internet a safer place.”</p>
<p><strong>About ISC</strong></p>
<p>Internet Systems Consortium is a non-profit 501(c)(3) public benefit corporation widely known for world-class Internet software engineering and network operations. ISC produces only open-source software with emphasis on Internet core technology, of which BIND and ISC DHCP are the two best-known examples. ISC&#8217;s Managed Open Source process ensures the quality of this software while keeping it open and available.</p>
<p>ISC operates high-reliability global networks of DNS root servers (F-root) and authoritative DNS servers (SNS@ISC) both for non-profit and for commercial enterprises. ISC is also very involved in ongoing Internet protocol and standards development, particularly in the areas of DNSSEC and IPv6. ISC is supported by donations from generous sponsors, by program membership fees, and by increasing revenues from for-profit subsidiaries. For program or donation information, please visit our website at <a href="http://ctt.marketwire.com/?release=1031332&amp;id=3178648&amp;type=1&amp;url=http%3a%2f%2fisc.org%2f">http://isc.org</a>.</p>
<p><strong>About Farsight Security, Inc.</strong></p>
<p>Farsight is a privately held Delaware corporation exclusively focused on the development of leading edge security solutions for ISPs, network and system security solution providers, governments, and medium to large commercial companies. Leveraging its superior telemetry data collection and processing capabilities, Farsight provides its clients with cloud-based, real-time network observability and reporting solutions.</p>
<p>Like ISC before it, Farsight is committed to sharing its security-related telemetry data with security industry partners and academic researchers at nominal, non-discriminatory subscription rates. In support of its mission as a clearing house for such data, Farsight invites network operators and commercial clients to provide additional telemetry data, which will increase the volume, quality and accuracy of its data provision services thus improving the overall safety of the Internet as a viable commercial marketplace.</p>
<p>Further information about it can be found at <a title="Farsight Security" href="http://www.farsightsecurity.com" target="_blank">http://www.farsightsecurity.com</a></p>
]]></content:encoded>
			<wfw:commentRss>https://www.isc.org/blogs/isc-spins-off-its-security-business-unit/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>ISC Board Members inducted into the Internet Hall of Fame</title>
		<link>https://www.isc.org/blogs/isc-board-members-inducted-into-the-internet-hall-of-fame/</link>
		<comments>https://www.isc.org/blogs/isc-board-members-inducted-into-the-internet-hall-of-fame/#comments</comments>
		<pubDate>Fri, 28 Jun 2013 05:43:45 +0000</pubDate>
		<dc:creator>Adib Behjat</dc:creator>
				<category><![CDATA[Events]]></category>
		<category><![CDATA[Board Members]]></category>
		<category><![CDATA[induction]]></category>
		<category><![CDATA[Internet Hall of Fame]]></category>

		<guid isPermaLink="false">http://staging.isc.org/?p=10065</guid>
		<description><![CDATA[ISC congratulates Board members Stephen Wolff and David Farber on their induction into the Internet Hall of Fame. Thank you for all you&#8217;ve done for ISC and the Internet! Internet Hall of Fame]]></description>
				<content:encoded><![CDATA[<p>ISC congratulates Board members Stephen Wolff and David Farber on their induction into the Internet Hall of Fame. Thank you for all you&#8217;ve done for ISC and the Internet!</p>
<p><a title="Internet Hall of Fame - Press" href="http://internethalloffame.org/press/latest-news/internet-hall-fame-announces-2013-inductees" target="_blank">Internet Hall of Fame</a></p>
]]></content:encoded>
			<wfw:commentRss>https://www.isc.org/blogs/isc-board-members-inducted-into-the-internet-hall-of-fame/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Hijacking DNS? Error? DDoS? What happened, and what you can do</title>
		<link>https://www.isc.org/blogs/hijacking-dns-error-ddos-what-happened-and-what-you-can-do/</link>
		<comments>https://www.isc.org/blogs/hijacking-dns-error-ddos-what-happened-and-what-you-can-do/#comments</comments>
		<pubDate>Fri, 21 Jun 2013 02:51:56 +0000</pubDate>
		<dc:creator>Adib Behjat</dc:creator>
				<category><![CDATA[BIND]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Cache]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[DNS Error]]></category>
		<category><![CDATA[DNS Hijack]]></category>
		<category><![CDATA[Fidelity]]></category>
		<category><![CDATA[LinkedIn]]></category>
		<category><![CDATA[Resolver]]></category>

		<guid isPermaLink="false">http://staging.isc.org/?p=10053</guid>
		<description><![CDATA[Last night, TechCrunch reported that LinkedIn and Fidelity.com faced an outage due to a DNS error. ISC staff and colleagues observed that the error was caused due to the changing of nameserver information at the registry; leading to DNS queries to be directed to nameservers that did not correctly answer those queries. Suzanne Woolf, ISC&#8217;s Director of Strategic Partnerships, points [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Last night, TechCrunch reported that <a title="TechCrunch" href="http://techcrunch.com/2013/06/19/linkedin-outage-due-to-possible-dns-hijacking/" target="_blank">LinkedIn and Fidelity.com faced an outage due to a DNS error</a>. ISC staff and colleagues observed that the error was caused due to the changing of nameserver information at the registry; leading to DNS queries to be directed to nameservers that did not correctly answer those queries. Suzanne Woolf, ISC&#8217;s Director of Strategic Partnerships, points out &#8220;the problem was apparently aggravated by a long <a href="https://en.wikipedia.org/wiki/Time_to_live" target="_blank">TTL</a> on the incorrect nameserver records, causing the bad information to persist in resolver caches and the misdirection of queries to continue far longer than such information is usually held&#8221;. Eric Ziegast, member of the security products group for ISC, also observed via <a href="https://security.isc.org/" target="_blank">DNSDB</a> that over 40 domains have been affected as well.</p>
<p>It doesn&#8217;t appear, based on current observations, that this incident was due to malicious activity. However, ISC staff have identified multiple domains hosted by the registrar that are still having DNS queries for them directed to the wrong nameservers, as caches in recursive DNS resolvers all over the Internet have continued to hold incorrect records for them. This data distributed in error could persist in recursive servers, by some reports, for up to two days from the original incident before it times out, meaning that end users who rely on those servers might continue to be unable to reach the affected domains.</p>
<p>ISC Support staff have identified some steps that operators of recursive servers based on BIND can take to mitigate this issue by removing the bad data from your caches. The article is publicly available at KnowledgeBase, titled <a title="ISC KnowledgeBase" href="https://kb.isc.org/article/AA-01002" target="_blank">&#8216;How do I flush or delete incorrect records from my recursive server cache?&#8217;</a></p>
<p>It&#8217;s also worth pointing out that this case is not exactly the same as &#8216;cache poisoning,&#8217; as the cached data was not introduced by a third party but published, at one time, as authoritative data.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.isc.org/blogs/hijacking-dns-error-ddos-what-happened-and-what-you-can-do/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Thoughts on a Recent BIND Interop Issue</title>
		<link>https://www.isc.org/blogs/thoughts-on-a-recent-bind-interop-issue/</link>
		<comments>https://www.isc.org/blogs/thoughts-on-a-recent-bind-interop-issue/#comments</comments>
		<pubDate>Thu, 20 Jun 2013 18:28:28 +0000</pubDate>
		<dc:creator>Jeff Wright</dc:creator>
				<category><![CDATA[BIND]]></category>
		<category><![CDATA[Quality]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[DNSSEC]]></category>
		<category><![CDATA[Interop]]></category>

		<guid isPermaLink="false">http://staging.isc.org/?p=10019</guid>
		<description><![CDATA[Unexpected DNSSEC validation failures ISC was recently involved in the troubleshooting and diagnosis of a DNSSEC-validation interoperability issue between BIND 9 and PowerDNS, where BIND is acting as a recursive server, and PowerDNS is authoritative. The end result was that BIND marked the PowerDNS server as not supporting EDNS0. Since DNSSEC requires EDNS0 support, the PowerDNS server was no longer considered capable of [&#8230;]]]></description>
				<content:encoded><![CDATA[<h4>Unexpected DNSSEC validation failures</h4>
<p>ISC was recently involved in the troubleshooting and diagnosis of a DNSSEC-validation interoperability issue between BIND 9 and PowerDNS, where BIND is acting as a recursive server, and PowerDNS is authoritative. The end result was that BIND marked the PowerDNS server as not supporting EDNS0. Since DNSSEC requires EDNS0 support, the PowerDNS server was no longer considered capable of answering DNSSEC questions, and therefore, the BIND server was not able to resolve the DNSSEC-signed domains served by the PowerDNS authoritative servers.</p>
<p>EDNS0 is a DNS extension that has been part of the protocol since 1999, and was originally described in <a href="http://tools.ietf.org/html/rfc2671">RFC 2671</a> (since obsoleted by <a href="http://tools.ietf.org/html/rfc6891">RFC 6981</a>). BIND 9, like most other recursive resolvers, supports this extension, and implements logic to work around DNS servers and network devices that do not understand EDNS0, or that do not behave properly if they do understand EDNS0. BIND must handle <a href="https://kb.isc.org/article/AA-00912">competing objectives</a> when processing query responses from an authoritative server. If BIND sends an EDNS0-enabled query to a server and does not get a well-formed answer, it will try sending the query again, only this time without EDNS0. If an answer arrives, then the server is considered to work &#8211; but not with EDNS0.</p>
<h4>The Issue in Detail</h4>
<p>In the specific case described here, sometimes the PowerDNS authoritative server was returning an answer, but <a href="https://lists.dns-oarc.net/pipermail/dns-operations/2013-April/010132.html">the response packet was malformed</a>. Here is how the DNS packet flow transpired:</p>
<p><a href="https://www.isc.org/wp-content/uploads/2013/06/Screen-Shot-2013-06-20-at-2.22.06-PM1.jpg"><img class="alignnone size-medium wp-image-10023" alt="Screen Shot 2013-06-20 at 2.22.06 PM" src="https://www.isc.org/wp-content/uploads/2013/06/Screen-Shot-2013-06-20-at-2.22.06-PM1-214x300.jpg" width="214" height="300" /></a></p>
<p>At this point, the BIND server has received a well-formed answer from the PowerDNS server &#8211; with EDNS0 disabled &#8211; so it marks the server as being able to answer, but this time <em><strong>without</strong></em> EDNS0.</p>
<p>Now, the main impact of marking a server as not being able to support EDNS0 is that DNSSEC <strong>requires</strong> EDNS0. This means that if all authoritative name servers for a domain are running PowerDNS and have the same error, then a DNSSEC-validating BIND 9 recursive server will not be able to resolve that DNSSEC-signed domain.</p>
<p>Further, this means that DNSSEC validation will no longer be possible for <strong>any</strong> of those servers&#8217; DNSSEC-signed domains; if they are hosting thousands of domains secured by DNSSEC, all of them will become unresolvable.</p>
<h4>Mitigation</h4>
<p>From an administrative standpoint (i.e. what should the hapless DNS admin do about this), the solution is to either patch PowerDNS authoritative servers per the link above, or upgrade PowerDNS to version <a href="http://doc.powerdns.com/html/changelog.html#changelog-auth-3-3">3.3 RC</a>. BIND administrators do not need to take any action unless they are running a validating recursive server that is already returning SERVFAILs due to marking the authoritative servers for the domains as EDNS0-incapable. In that situation, flushing the cache or restarting the server will restore normal service. It&#8217;s also particularly important in this case to be running a current version of BIND, as there have been bug fixes to cache management that are applicable to this situation &#8211; one in particular that ensures that an authoritative server&#8217;s EDNS0 capability (and other information) is refreshed after holding it for 30 minutes. Prior to this fix, authoritative server details were never discarded whilst the server was still being queried regularly.</p>
<p>Yet, while the actual fix for this situation is to upgrade the affected PowerDNS authoritative servers, it is theoretically possible for BIND to handle such partially-working servers better. One fix would be to always use EDNS0 when trying to get DNSSEC information from an authoritative server, rather than checking the server&#8217;s current status. This is what other resolvers (e.g. Unbound) do. The theory here is that if it works, then the user gets an answer; and if it does not work, it is no worse than not sending the query at all. Unfortunately, BIND 9&#8242;s current design does not make such information available when queries are sent. Changing the design to get around unusual situations like this would require a significant amount of engineering work, along with comprehensive functional and regression testing.</p>
<p>BIND could also try things such as requiring multiple failures, or shortening the time period before rechecking a server for EDNS0 support. These minor tweaks might help, and would not require major code changes. But they may also hurt in certain other cases, and again, would require significant retest effort. Ultimately, the BIND team decided not to make any code changes for this particular condition, since a fix exists for the PowerDNS server bug that is part of the problem, and this entirely mitigates the issue from a functional standpoint.</p>
<h4>Looking Forward</h4>
<p>Significant changes are pending in the EDNS0 handling code for BIND 9.10 which will make BIND behave better in its handling of EDNS0 in general. This should certainly improve the situation, but highlights one of the issues with changing protocols, and changing existing implementations. Postel&#8217;s law states: &#8221;Be conservative in what you do, be liberal in what you accept from others.&#8221; BIND &#8211; and indeed all other production recursive resolvers &#8211; must be fairly liberal in handling implementation quirks.</p>
<p>The unfortunate truth is that, because of the way DNS works, it is often the resolver server&#8217;s operator who has to deal with the impact of broken authoritative servers. Even when the authoritative servers are responding correctly, the effects of an earlier problem can persist in cache and may require special administrator (or script) intervention. Until we discover reliable techniques to handle for the majority of situations, we&#8217;re stuck muddling through occasional breakages. <a href="https://kb.isc.org/article/AA-00912">This ISC Knowledge Base article</a> may help those who need to handle those situations.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.isc.org/blogs/thoughts-on-a-recent-bind-interop-issue/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>ISC creates commercial subsidiary: DNSco</title>
		<link>https://www.isc.org/blogs/isc-creates-commercial-subsidiary-dnsco-2/</link>
		<comments>https://www.isc.org/blogs/isc-creates-commercial-subsidiary-dnsco-2/#comments</comments>
		<pubDate>Tue, 09 Apr 2013 10:41:38 +0000</pubDate>
		<dc:creator>Adib Behjat</dc:creator>
				<category><![CDATA[Blogs]]></category>
		<category><![CDATA[Events]]></category>
		<category><![CDATA[Press Release]]></category>
		<category><![CDATA[DHCP]]></category>
		<category><![CDATA[DNS]]></category>
		<category><![CDATA[DNSco]]></category>
		<category><![CDATA[ISC Team]]></category>
		<category><![CDATA[Launch]]></category>
		<category><![CDATA[subscription]]></category>
		<category><![CDATA[Subsidiary]]></category>

		<guid isPermaLink="false">https://www.isc.org/wordpress/?p=2265</guid>
		<description><![CDATA[Beijing, China &#8211; 9 April 2013. Internet Systems Consortium (ISC) announces the creation of its first commercial subsidiary, DNSco. ￼DNSco combines a business view and full-service solution with ISC&#8217;s world-renowned technical excellence. For over 15 years ISC has been the world&#8217;s leading expert in DNS and related technologies such as DHCP. ISC employees are versed in every aspect of these [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Beijing, China &#8211; 9 April 2013. Internet Systems Consortium (ISC) announces the creation of its first commercial subsidiary, DNSco.</p>
<p><a title="DNSco" href="http://www.dns-co.com">￼DNSco</a> combines a business view and full-service solution with ISC&#8217;s world-renowned technical excellence. For over 15 years ISC has been the world&#8217;s leading expert in DNS and related technologies such as DHCP. ISC employees are versed in every aspect of these technologies, from protocol to implementation to operations to registries to policy. As the leader in these core Internet technologies and as the author and distributor of BIND and other core software, ISC has frequently been asked to provide business services to enterprises that recognize their dependence on DNS and DHCP.</p>
<p>&#8220;ISC realized that we could be more responsive to our commercial customers while remaining true to our original mission of improving and supporting Internet growth and stability,&#8221; said Kannan Ayyar, President of Internet Systems Consortium. &#8220;We are separating our globally respected public-benefit activities from our growing business activities. The mission of our new DNSco subsidiary is to provide credible, compatible, economical, stable, and expert support and services to businesses for which ISC’s software and technologies are mission-critical.&#8221;</p>
<p>DNSco is entirely owned by ISC, but will be managed separately. Its mission is different, its financials are separate, and it will be run as a commercial entity. But DNSco remains an ISC company, which means that expertise, staff, experience, and culture will move back and forth between the two companies. Separating commercial and public-benefit activities enables us do a better job of both. Moreover, profits from DNSco will help fund ISC’s ongoing public benefit mission.<br />
DNSco&#8217;s products are subscriptions for major ISC software titles, training and consulting for the technologies involved, subscriber-only enhancements to the software, and software support related to their operation as well as advance notifications of security vulnerabilities.</p>
<p>In addition DNSco will release various closed-source software products, tools and services, including the newly launched back-end registry service. If DNS technologies are important to your business, or if they are your business, you will find DNSco products and services to be critical to your success.</p>
<p>Visit DNSco at <a title="DNSco" href="http://www.dns-co.com">http://www.dns-co.com</a></p>
<p><strong>Media Contact:</strong><br />
Brian Reid<br />
reid@isc.org<br />
+1 650 423 1327</p>
]]></content:encoded>
			<wfw:commentRss>https://www.isc.org/blogs/isc-creates-commercial-subsidiary-dnsco-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Is Your Open DNS Resolver Part of a Criminal Conspiracy?</title>
		<link>https://www.isc.org/blogs/is-your-open-dns-resolver-part-of-a-criminal-conspiracy-2/</link>
		<comments>https://www.isc.org/blogs/is-your-open-dns-resolver-part-of-a-criminal-conspiracy-2/#comments</comments>
		<pubDate>Fri, 29 Mar 2013 02:18:02 +0000</pubDate>
		<dc:creator>Michael McNally</dc:creator>
				<category><![CDATA[BIND]]></category>
		<category><![CDATA[Blogs]]></category>
		<category><![CDATA[Press Release]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">https://www.isc.org/wordpress/?p=2120</guid>
		<description><![CDATA[It has been a very eventful week in the field of DNS operations. In addition to the BIND vulnerability disclosed by ISC this week, the DNS world has been buzzing with news about &#8220;the biggest Distributed Denial of Service attack to date&#8221;, directed against Spamhaus by parties critical of their decision to list Cyberbunker as a spam source. As an [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>It has been a <em>very</em> eventful week in the field of DNS operations. In addition to the <a title="BIND vulnerability disclosed by ISC this week" href="https://kb.isc.org/article/AA-00871/74/CVE-2013-2266%3A-A-Maliciously-Crafted-Regular-Expression-Can-Cause-Memory-Exhaustion-in-named.html" target="_blank">BIND vulnerability disclosed by ISC this week</a>, the DNS world has been buzzing with news about &#8220;the biggest Distributed Denial of Service attack to date&#8221;, directed against Spamhaus by parties critical of their decision to list Cyberbunker as a spam source. As an industry leader in the field of DNS software, <a title="ISC" href="https://www.isc.org" target="_blank">ISC</a> sees the Spamhaus DDOS as a perfect opportunity to remind DNS operators why it is important to not operate an &#8220;open&#8221; recursive resolver, a policy recommendation we have been making since 2005.</p>
<p>A significant component of the DDOS traffic targeted at Spamhaus is coming from a technique that has been known for years &#8212; a variety of reflection attack commonly known as a &#8220;DNS amplification attack.&#8221; By relying on the fact that an answer to a DNS query can be much larger than the query itself, attackers are able to both amplify the magnitude of the traffic directed against a DDOS victim and conceal the source of the attacking machines.</p>
<p>To accomplish this, the attacker sends a DNS query a few bytes in size to an open resolver, forging a &#8220;spoofed&#8221; source address for the query.  The open resolver, believing the spoofed source address, sends a response which can be hundreds of bytes in size to the machine it believes originated the request.  The end result is that the victim&#8217;s network connection is hit with several hundred bytes of information that were not requested.  They will be discarded when they reach the target machine, but not before exhausting a portion of the victim&#8217;s network bandwidth. And the traffic reaching the victim comes from the open resolver, not from the machine or machines used to initiate the attack.  Given a large list of open resolvers to reflect against, an attacker using a DNS amplification attack can hide the origin of their attack and magnify the amount of traffic they can direct at the victim by a factor of 40 or more.</p>
<p>DNS operators who operate open resolvers without taking precautions to prevent their abuse generally believe they are harming nobody, but as the Spamhaus DDOS proves, open resolvers can be effortlessly coopted by attackers and used in criminal attacks on third parties.</p>
<p>Beginning in 2005, ISC began publicly advocating for operators to stop operating open resolvers. In 2007 we changed the behavior of BIND, <a title="the world's most popular nameserver software" href="https://www.isc.org/wordpress/downloads/" target="_blank">the world&#8217;s most popular nameserver software</a>, so that open resolvers would no longer be the default. And in 2008 ISC CTO Joao Damas co-authored <a title="RFC 5358" href="http://www.ietf.org/rfc/rfc5358.txt" target="_blank">RFC 5358</a>, &#8220;Preventing Use of Recursive Nameservers in Reflector Attacks.&#8221; For 8 years now we&#8217;ve been consistently leading on this issue as part of our mission to strengthen the DNS infrastructure, improve network security, and contribute to a stable and open internet. But there are still many open resolvers in operation. In order to avoid being pressed into service as an unwitting pawn in a criminal conspiracy, <a title="ISC strongly advises" href="https://kb.isc.org/article/AA-00269/11/What-has-changed-in-the-behavior-of-allow-recursion-and-allow-query-cache.html" target="_blank">ISC strongly advises</a> that DNS operators make use of the security features in BIND to enforce reasonable access permissions on their recursive resolvers.</p>
<p>At ISC, supporting the health of the Domain Name System and improving the security and stability of an open internet are core values and the biggest part of our public mission. If you would like to know more about us and our efforts, follow us on <a title="Twitter" href="http://twitter.com/ISCdotORG" target="_blank">Twitter</a> or <a title="Linked In" href="http://us.linkedin.com/company/internet-systems-consortium" target="_blank">Linked In</a>, or get in touch via our <a title="contact page" href="https://www.isc.org/contact" target="_blank">contact page</a>.</p>
<p>Next week we&#8217;ll have more to share about how current ISC development efforts are targeting reflection attacks and other network abuse to create a better internet for everybody.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.isc.org/blogs/is-your-open-dns-resolver-part-of-a-criminal-conspiracy-2/feed/</wfw:commentRss>
		<slash:comments>10</slash:comments>
		</item>
	</channel>
</rss>