<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DNS attack with empty queries in Networking</title>
    <link>https://community.hpe.com/t5/networking/dns-attack-with-empty-queries/m-p/4668342#M1854</link>
    <description>I've installed Microsoft Network Monitor 3.4 on this server and I'm looking at the dns traffic.&lt;BR /&gt;&lt;BR /&gt;The occasional standard queries look like this in Netmon:&lt;BR /&gt;&lt;BR /&gt;Query for _domainkey.example.com of type TXT on class Internet&lt;BR /&gt;&lt;BR /&gt; or&lt;BR /&gt;&lt;BR /&gt;Query for example.com of type MX on class Internet&lt;BR /&gt;&lt;BR /&gt;The abusive behaviour looks like this:&lt;BR /&gt;&lt;BR /&gt;Query for  of type NS on class Internet&lt;BR /&gt;&lt;BR /&gt;I can get the same message with nslookup, and querying for . (dot).&lt;BR /&gt;&lt;BR /&gt;I don't know why someone would want to query my DNS server for . hundreds of times per minute.  What could they get from that other than annoyance?&lt;BR /&gt;&lt;BR /&gt;Also, is there a way to block just that type of query?  &lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;&lt;BR /&gt;Rob</description>
    <pubDate>Mon, 09 Aug 2010 11:55:42 GMT</pubDate>
    <dc:creator>Robert A. Pierce</dc:creator>
    <dc:date>2010-08-09T11:55:42Z</dc:date>
    <item>
      <title>DNS attack with empty queries</title>
      <link>https://community.hpe.com/t5/networking/dns-attack-with-empty-queries/m-p/4668339#M1851</link>
      <description>&lt;!--!*#--&gt;&lt;BR /&gt;One of our external DNS servers is getting slammed with hundreds of requests per minute from some IP addresses, and I'm not sure what we can do about it.&lt;BR /&gt;&lt;BR /&gt;Most remote hosts will lookup A or MX records, maybe a dozen times a day.&lt;BR /&gt;&lt;BR /&gt;Standard requests look like this in our DNS log:&lt;BR /&gt;&lt;BR /&gt;20100730 08:39:03 490 PACKET  UDP Rcv 123.456.101.134 9f99   Q [0001   D   NOERROR] (7)example(3)com(0)&lt;BR /&gt;20100730 08:39:03 490 PACKET  UDP Snd 123.456.101.134 9f99 R Q [0085 A D   NOERROR] (7)example(3)com(0)&lt;BR /&gt;&lt;BR /&gt;20100730 08:39:06 490 PACKET  UDP Rcv 213.321.234.175 be3c   Q [1000       NOERROR] (7)example(3)com(0)&lt;BR /&gt;20100730 08:39:06 490 PACKET  UDP Snd 213.321.234.175 be3c R Q [0084 A     NOERROR] (7)example(3)com(0)&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Bad requests look like this:&lt;BR /&gt;&lt;BR /&gt;20100730 08:42:11 490 PACKET  UDP Rcv 98.76.543.164   0da6   Q [0001   D   NOERROR] (0)&lt;BR /&gt;20100730 08:42:11 490 PACKET  UDP Snd 98.76.543.164   0da6 R Q [0281   D  SERVFAIL] (0)&lt;BR /&gt;&lt;BR /&gt;20100730 08:42:11 1C38 PACKET  UDP Rcv 98.76.543.235   1e0f   Q [0001   D   NOERROR] (0)&lt;BR /&gt;20100730 08:42:11 1C38 PACKET  UDP Snd 98.76.543.235   1e0f R Q [0281   D  SERVFAIL] (0)&lt;BR /&gt;&lt;BR /&gt;The attack doesn't _seem_ to do much more than eat up bandwidth, but I was hoping someone could shed some light on this subject.&lt;BR /&gt;&lt;BR /&gt;Currently we limit the number of requests per IP per minute, and we block abusive IPs.  After blocking, the attack shifts to another set of IP addresses.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;My questions:&lt;BR /&gt;&lt;BR /&gt;Is there a way to filter out only the empty requests?  We don't want to over-block.&lt;BR /&gt;&lt;BR /&gt;What is the purpose of this attack?  Denial of service, or is this used as some sort of control channel for a rootkit or spyware?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;&lt;BR /&gt;Rob Pierce</description>
      <pubDate>Fri, 30 Jul 2010 12:35:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/networking/dns-attack-with-empty-queries/m-p/4668339#M1851</guid>
      <dc:creator>Robert A. Pierce</dc:creator>
      <dc:date>2010-07-30T12:35:30Z</dc:date>
    </item>
    <item>
      <title>Re: DNS attack with empty queries</title>
      <link>https://community.hpe.com/t5/networking/dns-attack-with-empty-queries/m-p/4668340#M1852</link>
      <description>Hi Rob,&lt;BR /&gt;&lt;BR /&gt;Are these requests are from the IP addresses you are managing? If not,i think its better to use DNS sniffer for verification.&lt;BR /&gt;&lt;BR /&gt;BR,&lt;BR /&gt;Venu.</description>
      <pubDate>Tue, 03 Aug 2010 05:15:22 GMT</pubDate>
      <guid>https://community.hpe.com/t5/networking/dns-attack-with-empty-queries/m-p/4668340#M1852</guid>
      <dc:creator>Venu Madhava</dc:creator>
      <dc:date>2010-08-03T05:15:22Z</dc:date>
    </item>
    <item>
      <title>Re: DNS attack with empty queries</title>
      <link>https://community.hpe.com/t5/networking/dns-attack-with-empty-queries/m-p/4668341#M1853</link>
      <description>Hi Venu,&lt;BR /&gt;&lt;BR /&gt;No, the DNS queries are coming from external IPs.&lt;BR /&gt;&lt;BR /&gt;Which DNS sniffer would you suggest?&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;&lt;BR /&gt;Rob</description>
      <pubDate>Mon, 09 Aug 2010 11:07:48 GMT</pubDate>
      <guid>https://community.hpe.com/t5/networking/dns-attack-with-empty-queries/m-p/4668341#M1853</guid>
      <dc:creator>Robert A. Pierce</dc:creator>
      <dc:date>2010-08-09T11:07:48Z</dc:date>
    </item>
    <item>
      <title>Re: DNS attack with empty queries</title>
      <link>https://community.hpe.com/t5/networking/dns-attack-with-empty-queries/m-p/4668342#M1854</link>
      <description>I've installed Microsoft Network Monitor 3.4 on this server and I'm looking at the dns traffic.&lt;BR /&gt;&lt;BR /&gt;The occasional standard queries look like this in Netmon:&lt;BR /&gt;&lt;BR /&gt;Query for _domainkey.example.com of type TXT on class Internet&lt;BR /&gt;&lt;BR /&gt; or&lt;BR /&gt;&lt;BR /&gt;Query for example.com of type MX on class Internet&lt;BR /&gt;&lt;BR /&gt;The abusive behaviour looks like this:&lt;BR /&gt;&lt;BR /&gt;Query for  of type NS on class Internet&lt;BR /&gt;&lt;BR /&gt;I can get the same message with nslookup, and querying for . (dot).&lt;BR /&gt;&lt;BR /&gt;I don't know why someone would want to query my DNS server for . hundreds of times per minute.  What could they get from that other than annoyance?&lt;BR /&gt;&lt;BR /&gt;Also, is there a way to block just that type of query?  &lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;&lt;BR /&gt;Rob</description>
      <pubDate>Mon, 09 Aug 2010 11:55:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/networking/dns-attack-with-empty-queries/m-p/4668342#M1854</guid>
      <dc:creator>Robert A. Pierce</dc:creator>
      <dc:date>2010-08-09T11:55:42Z</dc:date>
    </item>
  </channel>
</rss>

