Directory:Bind easy Tutorial (1): Installation and basic configurationBind Easy Tutorial (2): Bind view ConfigurationBind easy Tutorial (3): DNSSEC configuration (This article)DNSSec, with a half-and-a-half name called DNS security extension . To say a little better, it is to sign the domain name authentication, to ensure the integrity and correctness of the domain name, will not be modified.
Note: If you have any questions about the content described in this article, contact Jimmy Xu.
DNSSEC has been released for a short time, and the root server has been supported. The. org domain and some ccTLD have been fully deployed. However, it is a pity that the DNS system provided by the domain name registrar rarely supports this security extension, so you have to do it yourself.
This article mainly describes the operation steps, which are hardly
DNSSEC Based on hybrid encryption mechanism
SymmetricEncryptionEncryption andDecryptionShare the sameKey, Also known as the single-key algorithm. It requires the sender and receiver to jointly agree on a key before secure communication. The security of symmetric encryption algorithms depends on shared keys. symmetric encryption algorithms have the advantages of Public algorithms, low computing workload, fast encryption speed, and high encryption effic
expects. There is also a more dangerous scenario in which some organizations, for some purpose, steer unsuspecting users to a Web server that criticizes the newspaper, or deliberately tampered with the contents of the newspaper or even falsely reports the events in a defamatory manner.
To address this problem, the IETF is embarking on a security extension protocol in the DNS protocol, the so-called Domain Name System security Protocol (SECURITY,DNSSEC
bit of this stuff. Therefore, ldns goes to the Domain Name Server for help.
! Export image_1cqdvfa3bgjl1igd1e2bc1u1oan33.png-698.3kb] [1]
# DNS port number
> DNS port: 53
# DNS Cache service establishment
### Preparations
> Rpm-Qa | grep-W bind-chroot ==> two software packages must be installed.
### Main configuration file
> Vim/etc/named. conf ==> DNS master configuration file (the main configuration file is available after the software package is installed)
'''
Options {Listen-on port 53 {192
, responsible for and client communication) and name server (domain name authoritative server, storage rrsets, responsible and resolver communication) are faced with a very large number of query requests every day? Have you thought about it? Domain name parsing is a very short process, if TCP is used, then the process of connection building and demolition is much longer than the query process.I:...... If you use TCP, then each of the relevant server consumes the compute resources will be crazy,
the working directory for BindAllow-query defines a host that can allow DNS queries, typically configured as any, to allow DNS lookups for all hosts.Recursion Yes whether recursive queries (two queries in DNS resolution, recursive queries, and iterative queries) are generally set to Yes.Dnssec-enable Yes supports DNSSEC switches (DNSSEC technology: A series of DNS security authentication mechanisms provide
, attackers can use similar methods to obtain information about the client. Attackers can achieve this in various ways, including phishing emails and direct queries.
The problem described in VU #800113 this time is that most DNS Cache servers have one or all of these two vulnerabilities.
After talking about the attack principle, I think more people will be concerned about the following: what can we do?
If you are a desktop user, the best way is to wait for the company or ISP staff to correct the
The BIND service program supports the TSIG encryption mechanism in order to provide the parsing service safely, and Tsig mainly uses the password encoding method to protect the zone Transfer, which means the security of the zone information between the DNS servers is ensured.Primary DNS server ip:192.168.16.20From the DNS server ip:192.168.16.301. Generate the DNS service key using Dnssec-keygen in the master server[Email protected] ~]#
Security issues in the DNS protocol
DNS is a distributed domain name resolution system that converts domain names, IP addresses, email services, and so on through the cache technology and tree-based hierarchical authorization structure, however, the DNS Service and the domain name resolution server adopt a non-connection UDP protocol, so it is impossible to confirm the data source and whether the data is tampered with. This poses a major security risk and causes frequent attacks to the DNS serve
address that can communicate with an external hostConfiguration of the cache name server:The external address can be monitored;DNSSEC: It is recommended to turn DNSSEC off, set to NoConfiguring the Primary DNS serverPrimary DNS name servers:(1) Define a zone in the master configuration fileZone "Zone_name" in {type {Master|slave|hint|forward};File "Zone_name.zone";};(2) define the Zone resolution library f
Build a master-slave DNS Server Based on CentOS 6
1. Switch to the root user
2. bind is installed on two servers.
yuminstallbind
3. Compare the bind versions of the two servers
4. Modify the master configuration file information. We recommend that you back up the master configuration file and modify it later.
Cp/etc/named. conf/etc/named. conf. bakvi/etc/named. confoptions {listen-onport53 {127.0.0.1;}; // only listen to the 53 port listen-on-v6port53 of the Local Machine {: 1 ;}; directory "/v
/named.conf//named.conf//Provided by Red Hat bind package To configure the ISC bind named (8) DNSServer as a caching only nameserver (as a localhost, DNS resolver only).//See/usr/share/doc/bind*/sample/for example named configuration files.//Options {Listen-on Port 53 {127.0.0.1; 192.168.1.100;}; # # # Primary DNS IP address # # #Listen-on-v6 Port 53 {:: 1;};Directory "/var/named";Dump-file "/var/named/data/cache_dump.db";Statistics-file "/var/named/data/named_stats.txt";Memstatistics-file "/var
Lab Notes:test Machine 1:192.168.1.11 as the parent domain servertest Machine 2:192.168.1.12 as a subdomain serverExperimental steps: 1. On the lab machine 1 install bind Span style= " font-size:24px;font-family: ' the song body ';> and edit the configuration file, configure it as a cache server, then add zones and add Zone resolution library files, and change the Zone resolution library file to complete the dig [[emailprotected]~]#yuminstallbind–y[[emailprotected]~] #vim /etc/nam
Prepare for work (assuming name is bigcloud.local)
1234567891011121314151617
#更改主机名称#vi/etc/sysconfig/network#CreatedbyanacondaNETWORKING=yesHOSTNAME=bigcloud.local#修改文件/etc/hosts,内容如下:127.0.0.1localhostlocalhost.localdomainlocalhost4localhost4.localdomain4::1localhostlocalhost.localdomainlocalhost6localhost6.localdomain6192.168.188.135bigcloudbigcloud.localdomain#修改DNS配置#vi/etc/resolv.conf添加如下DNS1=192.168.188.11DNS2=192.168.188.12DOMAIN=bigclou
Preparations (assuming the name is bigcloud. Local)
# Change host name # vi/etc/sysconfig/Network # Created by anacondanetworking = yeshostname = bigcloud. local # modify the file/etc/hosts with the following content: 127.0.0.1 localhost. localdomain localhost4 localhost4.localdomain4: 1 localhost. localdomain localhost6 localhost6.localdomain6192.168.188.135 bigcloud. localdomain # modify DNS configuration # vi/etc/resolv. add the following dns1 = 192.168.188.11dns2 = 192.168.188.12dom
NetScaler system can block unwanted requests and reduce the risk of attacks on the server. This feature can also parse http GET and POST requests and filter out known error signatures to better protect against HTTP -based server attacks such as Nimda and Code A variant of the Red virus. Application Firewall: Citrix Application firewall prevents applications from being abused by hackers and malicious software by filtering traffic between the server and the end user. The application firewall can
,dump-file "/var/ Named/data/cache_dump.db "; #dump data File path, statistics-file "/var/named/data/named_stats.txt";# static file path, memstatistics-file "/var/named/data/named_mem_ Stats.txt ";#allow-query{ any;};# allows the client to query the IP address, any for any, for example: 192.168.1.0/24;172.16.0.0/18, etc., recursionyes;# recursive query, root server to open as far as possible, dnssec-enableyes;# whether
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.