OpenDNS As Quick-Fix To DNS Patch Dilemma 61
CWmike writes "It turns out that problems with the July 8 patch that was rolled out to fix a cache poisoning flaw discovered by researcher Dan Kaminsky are causing headaches for admins. Preston Gralla suggests a 30-second quick-fix, perhaps until everyone is patched up: Use OpenDNS, which has been patched, as your personal DNS. If you run a corporate network and need help getting OpenDNS set up, your best bet is to go to the OpenDNS FAQ page, he writes."
If you run a corporate network (Score:5, Funny)
If you run a corporate network and need the FAQ page to help, you should not be running a corporate network.
Then your job should promptly be given to me.
Re: (Score:2)
Right, because everybody has the OpenDNS server IP addresses memorized.
Re: (Score:3, Informative)
You don't need it memorized, and you don't need to look at the FAQ. The addresses are on the front page, in the bottom right corner.
Re:If you run a corporate network (Score:5, Funny)
Unless someone already hacked your DNS server and are serving you a fake OpenDNS page that points to their own server...
Re:If you run a corporate network (Score:4, Insightful)
Unless someone already hacked your DNS server and are serving you a fake OpenDNS page that points to their own server...
Good point. Try this: https://www.opendns.com/ [opendns.com]. If your browser doesn't complain about a mis-matched certificate, then either you're going to the OpenDNS servers, or whoever's hacked your upstream DNS server has either hacked your list of trusted root CA certificates, or has hacked Thawte's private key. If either of those latter is true, you're pretty much screwed, DNS flaw or not.
Re:If you run a corporate network (Score:5, Informative)
208.67.222.222
208.67.220.220
There :)
Re: (Score:3, Funny)
How do you know your upstream DNS isn't poisoned with the IP number of a site that passes Slashdot through a filter that substitutes the IP numbers with other values?
You did say 74.125.19.147 and 74.125.19.104, right?
Re: (Score:2, Insightful)
Biggest boom for Open DNS's busineess (Score:2, Insightful)
Re: (Score:3, Interesting)
How do you get this to work with a corporate split DNS infrastructure. This is not a fix but a hack which does not work in many scenarios...
Re: (Score:1)
Re: (Score:2)
Unless you hace a shitty NAT-firewall in between. And if a lot of people use OpenDNS, you'll all be an easy target.
Re: (Score:1)
Re: (Score:2)
No I'm talking about someone trying to spoof answers for your questions to OpenDNS. If your NAT messes up your source-port-randomisation, you'll still be in trouble.
Re: (Score:1)
Re:Biggest boom for Open DNS's busineess (Score:4, Funny)
Hush now, we're trying to advertise OpenDNS. Just use it and shut up like a good lemming.
Re: (Score:2)
Right... (Score:2)
Like I'm going to switch out my name server on a high-availability server farm, which would require even more testing.
"During the development cycle, we became aware of a potential performance issue on high-traffic recursive servers, defined as those seeing a query volume of greater than 10,000/queries per second," said Vixie.
Emphasis mine.
It's almost as useful as saying the solution to BSoD is Linux. Amusing though. :)
"Quick Fx"? (Score:2)
Re: (Score:2)
Great idea. (Score:4, Funny)
Thank God my parents don't trust me... (Score:2, Funny)
Re:Thank God my parents don't trust me... (Score:5, Funny)
mom: "Not while you're living under my roof without paying rent!"
step-dad: "Besides, son, I hear it can help protect you against that dns cache poisoning that's been going on."
supersloshy: "Shut up! You're not my real dad!"
real dad: "Now supersloshy, you obey your step father, even if he does dress funny and try too hard."
supersloshy: "I hate you! I wish I'd never been born!"
Whole thing sounds kind of silly now, huh?
Re: (Score:3, Informative)
Great (Score:2, Insightful)
So we can replace possible random DNS hijacking with guaranteed DNS hijacking that's passed off as a feature.
Didn't we get extremely upset at Verizon when they served up adverts and returned bogus DNS responses on domains that don't exist?
Re:Great (Score:4, Informative)
You can actually turn that off when you log in (creating an account is free).
Just log in, click the "settings" tab, and the settings you are looking for are in there.
Replace a distributed system with a SPOF? (Score:2)
What's with the constant OpenDNS slashvertisements?
Why would anyone in their right mind replace a distributed system that gets overloaded often enough with a single point of failure?
Have oodles of servers been slashdotted in vain?
np: Spooky - Belong (Open (Disc 1))
Re: (Score:3, Informative)
I did because Comcast is the only service provider in my area, and OpenDNS actually provides better DNS reliability than Comcast's DNS servers. The switch was actually driven by a Comcast DNS outage.
Does Slashdot really need Computer World ads? (Score:4, Insightful)
Seriously, this solution has been posted in response to every DNS article on Slashdot this past month and has been mentioned by just about every article talking about the issue.
Does Slashdot really need to post links to Computer World that rehash was has been discussed 100 times already?
Re: (Score:2)
Hey, if all you have is a hammer, but people keep tossing you nails...
Re: (Score:1, Insightful)
Thankfully... (Score:1)
Privacy? Effectiveness? (Score:3, Insightful)
Given the near fanatical privacy concerns on Slashdot, I'm surprised nobody is screaming over this "recommendation." Imagine how valuable it would be to know every web site visited by "millions of people a day." Does anyone think the for-profit company isn't mining then reselling the lookup->client-ip information?
On a technical issue, how effective is their service? I've had hotel/hot-spot links that were proxying DNS queries regardless of my settings. It seems to me that unless you know that your ISP's DNS is way broken and that they aren't intercepting DNS queries, this is of questionable use.
Just use patched, NX-replying public DNS servers (Score:5, Informative)
No.
OpenDNS does terrible NX-overriding and other useless, annoying things (logins, etc..)
Instead, just use public, geo-distributed DNS servers which FOLLOW RFC and are patched. Here are the standard suggestions (Level7):
4.2.2.1 through 4.2.2.6.
These have good randomness and are multi-cast addresses for DNS servers all over the country. They are VERY fast in most areas.
Re: (Score:1)
Re: (Score:2)
Instead, just use public, geo-distributed DNS servers which FOLLOW RFC and are patched. Here are the standard suggestions (Level7):
4.2.2.1 through 4.2.2.6.
Those aren't actually public DNS servers though, are they? They are private DNS servers which just happen to publicly accessible at the moment. If at some point in the future they block all access from outside their network, which they have every right and incentive to do, you will lose DNS. They have in the past temporarily changed the reverse DNS names for those servers to please-do-not-steal-service.whatever.net, so don't say you weren't warned.
And when it comes to FOLLOWING RFC, I'm pretty sure that "do
Re: (Score:1)
And when it comes to FOLLOWING RFC, I'm pretty sure that "don't use other people's DNS servers" is pretty high on the list.
And how do you do that? Isn't DNS a hierarchical system, where all the answers you are not authoritative on get resolved through queries to other servers? That implies you can't avoid other people's DNS servers.
Re:Just use patched, NX-replying public DNS server (Score:1)
These have good randomness and are any-cast addresses for DNS servers all over the country.
Fixed.
Performance of OpenDNS? (Score:2)
I wonder how OpenDNS' performance with more users using it due to this flaw.
Re: (Score:2)
I just switched to it right now because my ISP -still- didnt do anything about it. Its pretty zippy honestly (my ISP's DNS servers were actually the bottleneck of my connection). I'm happy.
Re: (Score:2)
Unpatched _still_? Latent, too? Who are these jokers?
Re: (Score:2)
As far as I can tell, and from the information I gather on the patch, and the tests I ran... the losers DID patch the darn thing, but they stuck their DNS servers behind a firewall that blocks most ports (probably a 2 headed department, where the people in charge of firewall and the ones in charge of DNS arent the same and dont talk much), so while the ports are randomized, there's only a couple that can go through, so it kills the point.
Re:Performance of OpenDNS? (Score:4, Funny)
Oh, and while not naming em, let just say I have a screenshot from long ago that I took from a trace route to Google that I did, and all of the routers that my ISP owned on the way had been renamed to something like "xyz-cannot-secure-their-routers.xyz.com" and such things. Nuff said :)
Re: (Score:1)
I've been a little intrigued by what sort of real benefit the likes of OpenDNS might actually have on, so I thought I'd do a bit of a test of, and see what it does.
SO I thought I'd start with the worlds most popular websites, according to http://www.alexa.com/ [alexa.com] I got a list of the top 100 global websites.
the basic results turned out to be...
1. OpenDNS server at 208.67.222.222 average = 108.8787879 min = 15 max = 1273
2. my IS
Re: (Score:1)
for my home and to address the privacy concerns have written a script which deletes my history automatically, I don't have to personally log in to do it. In any event, I don't care if OpenDNS knows I made a lookup request for any of the sites I visit. If I really want to cover my tracks, I would not use it. However that said, I would never, ever, recommend this service for an enterprise.
Care to share this script?
Astroturfing gone pro! (Score:2)
Ok, so I can deal with all the 'turfing on EVERY FUCKING DNS story that slashdot posts. Fine. I just ignore it and move on.
But now we're getting editors astroturfing..their..own site...
opendns isn't that special. I've looked at it. Anybody who uses it for a corporate network should be shot. You are purposely exposing your internal users to the whims of an external company.
Cache forced refresh (Score:1)
Must be nice..... (Score:2)
I remember being stateside and getting to control my choice of DNS server. That said, many small third-world ISPs and plenty of colleges and other overly-controlled environments where bandwidth is expensive NAT you and run transparent proxies, locking you in to the DNS server used by said proxy and, even if the stray packet does get to OpenDNS, prevents you from using ddclient or anything else to effectively manage your settings there.
How 'bout an option for us? What ever happened to Tor? Any similar vulner
ISC BIND (Score:1)
OpenDNS & Marketing (Score:1)
they appear to make their money by sending you to an advertising site whenever a name doesn't resolve. to me, this seems a bad idea imagine the scenario - 'hey bob, the kitties getting a bit empty you know' - 'not a prob boss, just let me tweak some dns resolver timings'
also, their idea that they are 'quicker' because they use a 'large' cache is also bobbins. a dns time to live (ttl) is