Verisign bogosity
Stijn Jonker
SJCJonker at SJC.NL
Tue Sep 16 15:45:34 IST 2003
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Remco and others,
If I understand the verisign hijack/fix/option correctly they added and
wildcard record in the root .com zone. As a result the "authoritive"
servers for any non existant zone/host are the gtld root servers.
By blocking the single specific address you are only blocking the data
flows from and to the particulair host.
some tests:
[sjonker at ph-wks-01 sjonker]$ dig ns non-existant-domain-jskjdlk.com
; <<>> DiG 9.2.1 <<>> ns non-existant-domain-jskjdlk.com
;; global options: printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 9980
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;non-existant-domain-jskjdlk.com. IN NS
;; AUTHORITY SECTION:
com. 10800 IN SOA a.gtld-servers.net.
nstld.verisign-grs.com. 2003091600 1800 900 604800 86400
;; Query time: 135 msec
;; SERVER: 192.168.175.101#53(192.168.175.101)
;; WHEN: Tue Sep 16 16:43:24 2003
;; MSG SIZE rcvd: 122
after an blacklist for 64.94.110.11
any non existant entry still resolvs to the above address.
I don't think there is an easy way to block the resolving.
Remco Barendse said the following on 09/16/2003 04:30 PM:
| The firewall rule would block access to the Verisign server, therefore the
| domain will never resolve (this is the way it ought to be) because your
| dns server cannot reach it (supposing you are running your own name
| servers!).
|
| Remco
|
|
| On Tue, 16 Sep 2003, Rose, Bobby wrote:
|
|
|>How would a firewall stop this? A firewall won't keep the MTA from
|>resolving the bogus domain to that IP correct? It also wouldn't keep SA
|>from resolving it as part of the dns checks.
|>
|>-----Original Message-----
|>From: Remco Barendse [mailto:mailscanner at BARENDSE.TO]
|>Sent: Tuesday, September 16, 2003 9:59 AM
|>To: MAILSCANNER at JISCMAIL.AC.UK
|>Subject: Re: Verisign bogosity
|>
|>
|>I have created a firewall rule that silently drops all packets sent to
|>this ip.
|>
|>Mail seems to be flowing normally and all fake .com crap is still
|>rejected.
|>
|>On Tue, 16 Sep 2003, Jeff A. Earickson wrote:
|>
|>
|>>Gang,
|>> Hold that thought... I added 64.94.110.11 to my blackhole list,
|>>and things slowly ground to a halt over the next hour. Hmmm.. I had
|>>to back this out of my DNS. Wonder why it didn't work? I have
|>>notified Verisign that I won't be renewing my certs with them in
|>>October.
|>>
|>>--- Jeff Earickson
|>>
|>>On Tue, 16 Sep 2003, Jeff A. Earickson wrote:
|>>
|>>
|>>>Date: Tue, 16 Sep 2003 08:40:09 -0400
|>>>From: Jeff A. Earickson <jaearick at colby.edu>
|>>>Reply-To: MailScanner mailing list <MAILSCANNER at JISCMAIL.AC.UK>
|>>>To: MAILSCANNER at JISCMAIL.AC.UK
|>>>Subject: Verisign bogosity
|>>>
|>>>Gang,
|>>>
|>>>If you run a modern version of bind, simply blackhole the Verisign
|>>>number. This is what I have in my bind boot files:
|>>>
|>>> #---blackhole queries from RFC1918 private addresses
|>>> #---routes to them are never advertised, so don't waste time
|>>> #---see p. 284, DNS&Bind version 4
|>>> #---64.94.110.11 is Verisign's bogus server.
|>>> blackhole {
|>>> 10/8;
|>>> 172.16/12;
|>>> 192.168/16;
|>>> 64.94.110.11;
|>>> };
|>>>
|>>>I've changed my bind configs to do this, I suggest this ASAP.
|>>>
|>>>-----------------------------------
|>>>Jeff A. Earickson, Ph.D
|>>>Senior UNIX Sysadmin and Email Guru
|>>>Information Technology Services
|>>>Colby College, 4214 Mayflower Hill,
|>>>Waterville ME, 04901-8842
|>>>phone: 207-872-3659 (fax = 3076)
|>>>-----------------------------------
|>>>
|>>
- --
Met Vriendelijke groet/Yours Sincerely
Stijn Jonker <SJCJonker at sjc.nl>
-----BEGIN PGP SIGNATURE-----
iD8DBQE/ZyIOjU9r45tKnOARAkyUAJ9z7JCjWFMX7GcpC0UCn1s0gr9uZACgurC0
/RBsE2gOM4Su5dUQ0bzTwS0=
=jomz
-----END PGP SIGNATURE-----
More information about the MailScanner
mailing list