Quoting Ruben Safir (ruben at mrbrklyn.com):
> On Fri, Aug 20, 2021 at 04:42:05AM +0000, Qontinuum wrote:
> > On Thu, Aug 19, 2021 at 10:42:42PM -0400, Ruben Safir wrote:
> > > anyone know a solution to this that works
> > >
> > > /sbin/iptables -I INPUT -p udp --dport 53 -m string –hex-string
> > > '|03|www|08|pizzaseo|03|com|' –algo bm -j DROP
> > > iptables v1.8.7 (legacy): unknown option "--dport"
> > > Try `iptables -h' or 'iptables --help' for more information.
> > >
> > > No docs I read dislike -dport or --dport
> > >
> > > the objective here is to drop remote inquiries for pizzaseo.com which
> > > seems to be an attach
> >
> > The solution is to use the iptables-legacy binary instead of the iptables one.
> >
> > I would like to encourage you to use nftables instead of iptables
> > which is deprecated for years now and you will gain benefit in
> > performance and ease of maintenance.
> >
>
> It does the same thing with legacy. I tried that before posting.
>
> nft doesn't have a string matching capacity.
>
>
> > Also, since it is an input rule I guess that you are hosting a DNS on
> > this machine. Isn't your DNS capable of using Response Policy Zones or
> > even rules hard-coded in your configuration?
>
> That would be ideal. I am using bind9 and I have in the config
>
> options {
> directory "/usr/local/namedb/";
> version "BMT - Brighton Line";
> pid-file "/run/named.pid";
> allow-query { any; };
> allow-recursion {"localnets";};
> // ban everyone by default
> allow-transfer {"none";};
> };
>
> I thought that left recursions to only my local network and would block
> foriegn external inquiries. Evidently it doesn't stop this exploit.
Being not clear on what "exploit" you're trying to block, I'll note that
I have:
options {
[snip]
version "Shirley, you're joking";
hostname "ns1.linuxmafia.com";
[snip]
allow-recursion {
127.0.0.0/8;
192.168.0.0/24;
10.0.0.0/8;
96.95.217.102/32;
96.95.217.96/29;
};
allow-query {
127.0.0.0/8;
192.168.0.0/24;
10.0.0.0/8;
96.95.217.102/32;
96.95.217.96/29;
};
[snip]
//For Rick Moen
zone "linuxmafia.com" {
type master;
file "/etc/bind/linuxmafia.com.zone";
allow-query { any; };
allow-transfer {
//Drew Bertola <drewbertola at gmail.com> or <drew at drewb.com>,
//[redacted tel. #]
//ns6.linuxmafia.com aka ns1.thecoop.net is:
209.205.200.166;
//Aaron T. Porter <atporter at primate.net>, [redacted tel. #]
//http://www.lbl.gov/cgi-bin/ds/ds.cgi?include=n&peopleName=atporter
//ns.primate.net is:
198.144.194.12;
//Aaron T. Porter <atporter at primate.net>, [redacted tel. #]
//http://www.lbl.gov/cgi-bin/ds/ds.cgi?include=n&peopleName=atporter
//ns.tx.primate.net is:
72.249.38.88;
//David Wolfskill <david at catwhisker.org>, [redacted tel. #]
//ns3.linuxmafia.com aka ns.catwhisker.org is:
107.204.234.170;
[...]
Please note allow-query and allow-recursion ACLs. I'm really not
sure where you wish to block _all_ queries, and where you wish to
block _recursive_ queries. Above meets my use-case's needs,
Full prototype /etc/bind files (in Debian/Devuan garb) can be found at
http://linuxmafia.com/pub/linux/network/bind9-examples-linuxmafia.tar.gz
, in case you want to see a complete working example.
For a more-thorough and professional set of BIND9 prototyping
suggestions, please see the Zytrax book "DNS for Rocket Scientists",
http://zytrax.com/books/dns/ .
--
Cheers, Grammarian's bar joke #26: A gerund and an
Rick Moen infinitive walk into a bar, drinking to forget.
rick at linuxmafia.com
McQ! (4x80)
More information about the artix-general
mailing list