-
Notifications
You must be signed in to change notification settings - Fork 1.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
insecure recursive DNS resolver? #587
Comments
@ghoshorn |
I guess your VPS provider is hetzner as I recognize this type of notifications. They simply do not allow public DNS resolvers so the only viable solution would be to use another VPS provider (or maybe restrict the IP addresses you allow as @mveplus has suggested). AdGuard Home by default takes some anti-DNS-amplification measures:
|
I tried as you said, the in the new round test, there are no vps public IP(v4 & v6) on 53, only my Mac IP and 127.0.0.1 as clients. But the same problem happened again after a while. So maybe there are some other configs I didn't set right? @mveplus |
@ameshkov |
@ghoshorn just in case, I run my own private AG Home instances on Vultr and Digitalocean, and they never had any issues with it. |
@ameshkov Thank you for your extra test on your vps, and sad to hear my vps does not support it. Maybe I should try to find another way to make it work, thanks. |
@ghoshorn do you use standard DNS as upstream resolvers? You can try to use TLS:// instead classic DNS and see if it makes any difference? I hear you that you listen only on IPV4 - 127.0.0.1 but what about IPv6? Make sure you have firewall rules disabling queries on UDP/TCP 53 on both IP4 and IPV6 public interfaces check with nmap without VPN from outside and do change upstream to DoH or DoT may help mitigate the issue. |
@mveplus No IPv6 traffic during my test, seen from the query logs. And upstream_dns set as:
P.S. bandwagon --> https://bandwagonhost.com/index.php |
Related to this, hetzner relayed an email to me today send by the bsi.bund.de (translates to something like Federal Office for Security in Information Technology) which is a government branch. I've had setup a small test instance on a docker machine of mine. Following this lead I did a small check on the official adguard home dns servers and they also seem to be not secured against reflection attacks, see: http://openresolver.com/?ip=176.103.130.130 So basically the official setup could be abused right now? |
Well, almost any public DNS resolver can be abused: That's why we have strict rate limiting rules, and AGH has it even more stricter by default (~20 rps as I recall). |
I have set up the AdGuard Home in my vps server, and it worked fine for several minutes. After a while, something happened and the DNS cannot be used. The reason for it is that the vps provider "has detected an insecure recursive DNS resolver on IP ***(my vps ip), which may result in your server getting involved in DNS Amplification DoS attacks." and blocked the 53 port.
Then I removed the block rule and reopen the AdGuard Home, it worked fine again. But after a while, the same thing happened again.
In the client area, I can see some normal client ip as well as 127.0.0.1 and 2a06:e881:5100::1, I don't know if it matters.
Your environment
The text was updated successfully, but these errors were encountered: