NetBSD-Users archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: Quick BIND question
> On 2018-09-17 19:32, Tom Sweet wrote:
> Greetings Jason:
>> On Thu, Sep 6, 2018, 4:38 PM jmitchel <jmitchel%bigjar.com@localhost> wrote:
>>> On 2018-09-06 16:21, jmitchel wrote:
>>> Hello,
>>> I know this is a somewhat annoying question, because it's very
>> broad
>>> and the server's out of date, but am I going to get in trouble
>> using
>>> the version of BIND that came with NetBSD 6.1.4. Here's the info:
>>> Karma:/etc/namedb# uname -a
>>> NetBSD Karma 6.1.4 NetBSD 6.1.4 (GENERIC) i386
>>> Karma:/etc/namedb# named -V
>>> BIND 9.9.2-P1 built with defaults
>>> using OpenSSL version: OpenSSL 1.0.1g 7 Apr 2014
>>> The box will be answering queries from a cached version of the
>> Windows
>>> DNS domain, and will also be used to forward all non-local lookups
>> to
>>> OpenDNS. It is behind a SonicWall firewall and there isn't any
>> direct
>>> access to port 53 (either TCP or UDP) from the Internet. What are
>> the
>>> odds the server will be okay?
>>> I know I should just install the latest version, but I'm under the
>> gun
>>> as we've just realized that there are about 400 "Malware" DNS
>> queries
>>> per day and I'm worried about what's installed on what computers
>> and
>>> want to know which ones are infected ASAP.
> I'd reconsider introducing another host running internet connected
> services that you have to manage when the internal environment isn't
> well behaved.
> By all means run NetBSD at every opportunity, but _not_ "under the
> gun".
> May I respectfully suggest:
> * Update the Sonicwall.
> * Turn on the Intrusion Detection & Prevention features to high
> levels.
> * Configure Sonicwall' s DNS proxy to lookup @ the provider of your
> choice.
> * Configure the Windows DNS server conditional forwarders to send all
> non-local queries to the Sonicwall.
> * Monitor your logs and start your cleanup.
> * Tune the logs to reduce unnecessary messages.
> * Look for opportunities to plan and deploy NetBSD in the
> organization. Perhaps as the heart of your new Security Information &
> Event Management initiative?
> Same results, one less host to attack. I never let AD DNS servers
> resolve queries for other than their own zones. Always forwarded to
> public providers or ISP. Firewall rules in place accordingly.
Sorry, I didn't do a good job of explaining. The NetBSD machine running named has been up and running for years. And it’s been running secondary from Windows AD DNS servers for years as well. I upgraded it to 6.1.4 a while back. The only new things were:
A) Changing DHCP scopes (on Windows) so that the NetBSD server was the first, rather than the second listed DNS server. It was still getting a bunch of queries, so I guess the Windows servers weren't fast enough for the Windows clients' taste :)
B) Upgrading BIND to the most recent version available as a binary package (just in case)
C) Turning on logging for every query
>>> Thanks in advance for reading and any help you can provide.
>>> Jason M.
>> Never mind (I think). I checked pkgsrc before writing this, but
>> didn't
>> check the right directory. I just found bind-9.10.8pl1nb1 and will
>> use
>> that. But if there's any reason I should be wary with the newer
>> software, please let me know.
>> Thanks,
>> Jason M.
> Best of luck to your efforts.
> Tom S.
I will, however, post tomorrow what I think is an obvious core dump, just so I can be sure it happened for the reason I think it happened.
Thanks!
Jason M.
Home |
Main Index |
Thread Index |
Old Index