/
DNS Cache Poisoning

DNS Cache Poisoning

DNS cache poisoning involves inserting a false address record for an Internet domain into a DNS query. If the DNS server accepts the record, subsequent requests for the address of the domain are answered with the address of a server controlled by the attacker. For as long as the false entry is cached, incoming web requests and emails will go to the attacker’s address. Cache poisoning attacks, such as the “birthday paradox,” use brute force, flooding DNS responses and queries at the same time, hoping to get a match on one of the responses and poison the cache.

The following table lists auto rules that Infoblox External DNS Security uses to mitigate DNS cache poisoning on your advanced appliance. For information about the parameters, see Overview of Packet Flow.

Rule ID

Rule Type

Rule NameDescription

Enable/Disable Condition

ParametersComments
100000100Auto

EARLY PASS UDP response traffic

This rule passes UDP DNS response packets (from upstream DNS servers or external DNS primaries) if the packet rate is less than the Packets per second value. If any source IP sends packets over this value, the appliance allows traffic up to the rate limit and then blocks traffic from this source IP for the remainder of the Drop interval.

Always enabled

Packets per second (default = 30000)

Drop interval (default = 10

seconds)

Rate algorithm (default = rate limiting)

Events per second (default = 1)

Consider tuning Packets per second to a smaller number if your system is serving authoritative DNS.

NOTE: If you set the parameter incorrectly, the rule could block legitimate DNS responses from upstream DNS servers, which could cause the DNS server to exceed its quota.

100000101Auto

EARLY PASS UDP response traffic no Question count

This rule passes UDP DNS response packets with Question count = 0 (from upstream DNS servers or external DNS primaries) if the packet rate is less than the Packets per second value. If any source IP sends packets over this value, the appliance allows traffic up to the rate limit and then blocks traffic from this source IP for the remainder of the Drop interval.

Always enabled

Packets per second (default = 30000)

Drop interval (default = 10 seconds)

Rate algorithm (default = rate limiting)

Events per second (default = 1)

Consider tuning Packets per second to a smaller number if your system is serving authoritative DNS.

NOTE: If you set the parameter incorrectly, the rule could block legitimate DNS responses from upstream DNS servers, which could cause the DNS server to exceed its quota.

100000200Auto

EARLY PASS TCP response traffic

This rule passes TCP DNS responses initiated by the appliance.

Always enabled

Packets per second (default = 100)

Consider raising the Packets per second value if DNSSEC is enabled.

100000300Auto

EARLY PASS ACK packets from NIOS initiated connections

This rule passes TCP ACK packets for DNS or BGP from NIOS initiated connections if the packet rate is less than the Packets per second value. If any source IP sends packets over this value, the appliance allows traffic up to the rate limit and then blocks traffic from this source IP for the remainder of the Drop interval.

Always enabled

Packets per second (default = 600)

Drop interval (default = 10 seconds)

Rate algorithm (default = rate limiting)

Events per second (default = 1)

Consider raising the Packets per second value if DNSSEC is enabled.