<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>ripe &#8211; VeriTeknik</title>
	<atom:link href="https://www.veriteknik.net.tr/en/tag/ripe/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.veriteknik.net.tr/en/</link>
	<description>VeriTeknik Bilişim &#124; VeriTeknik Bilişim</description>
	<lastBuildDate>Wed, 18 Sep 2019 20:51:48 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>How to add reverse DNS delegation for RIPE</title>
		<link>https://www.veriteknik.net.tr/en/how-to-add-reverse-dns-delegation-for-ripe/</link>
					<comments>https://www.veriteknik.net.tr/en/how-to-add-reverse-dns-delegation-for-ripe/#respond</comments>
		
		<dc:creator><![CDATA[Tunc Yıldırım]]></dc:creator>
		<pubDate>Wed, 18 Sep 2019 20:51:47 +0000</pubDate>
				<category><![CDATA[Network]]></category>
		<category><![CDATA[DNS]]></category>
		<category><![CDATA[rdns]]></category>
		<category><![CDATA[ripe]]></category>
		<guid isPermaLink="false">https://www.veriteknik.net.tr/?p=4351</guid>

					<description><![CDATA[<p>Let&#8217;s say we want to add reverse DNS delegation for the IP block 123.234.12.0/24 The first step of the configuration is on the nameserver, BIND on our case. Create the relevant reverse DNS file on /var/named/rev and then edit the file: cd /var/named/rev touch 123.234.12 vim 123.234.12 The file contents should be like the following: [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.veriteknik.net.tr/en/how-to-add-reverse-dns-delegation-for-ripe/">How to add reverse DNS delegation for RIPE</a> appeared first on <a rel="nofollow" href="https://www.veriteknik.net.tr/en/">VeriTeknik</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Let&#8217;s say we want to add reverse DNS delegation for the IP block 123.234.12.0/24</p>
<p>The first step of the configuration is on the nameserver, BIND on our case.</p>
<p>Create the relevant reverse DNS file on /var/named/rev and then edit the file:</p>
<pre class="EnlighterJSRAW" data-enlighter-language="null">cd /var/named/rev
touch 123.234.12
vim 123.234.12</pre>
<p>The file contents should be like the following:</p>
<pre class="EnlighterJSRAW" data-enlighter-language="null">$TTL 3D
@       IN      SOA     ns1.rackdc.com. postmaster.rackdc.com. (
                        2018112201   ; Serial, todays date + todays serial
                        8H      ; Refresh
                        2H      ; Retry
                        4W      ; Expire
                        1D)     ; Minimum TTL
                                ; Created on http://root0.net 2005-10-27
                 NS             ns1.rackdc.com.
                 NS		ns2.rackdc.com.
                 
$ORIGIN 12.234.123.in-addr.arpa.


12		PTR		rackdc.com.
</pre>
<p>After configuring this file with correct details, edit the file /etc/named.conf to include the file you&#8217;ve just created.</p>
<pre class="EnlighterJSRAW" data-enlighter-language="null">vim /etc/named.conf</pre>
<p>Add the following line in the file:</p>
<pre class="EnlighterJSRAW" data-enlighter-language="null">zone "12.234.123.in-addr.arpa" { notify yes; type master; file "/var/named/rev/123.234.12";allow-query { any; };};</pre>
<p>Finally, restart the DNS service.</p>
<pre class="EnlighterJSRAW" data-enlighter-language="null">service named restart</pre>
<p>It is important to complete this step before creating an object in RIPE.</p>
<p>The post <a rel="nofollow" href="https://www.veriteknik.net.tr/en/how-to-add-reverse-dns-delegation-for-ripe/">How to add reverse DNS delegation for RIPE</a> appeared first on <a rel="nofollow" href="https://www.veriteknik.net.tr/en/">VeriTeknik</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.veriteknik.net.tr/en/how-to-add-reverse-dns-delegation-for-ripe/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4351</post-id>	</item>
		<item>
		<title>Snort rules for isc.org and ripe.net DNS Amplification Attacks</title>
		<link>https://www.veriteknik.net.tr/en/snort-rules-for-isc-org-and-ripe-net-dns-amplification-attacks/</link>
					<comments>https://www.veriteknik.net.tr/en/snort-rules-for-isc-org-and-ripe-net-dns-amplification-attacks/#respond</comments>
		
		<dc:creator><![CDATA[ckaraca]]></dc:creator>
		<pubDate>Sat, 16 Mar 2013 21:25:55 +0000</pubDate>
				<category><![CDATA[Network]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[amplification]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[DNS]]></category>
		<category><![CDATA[isc]]></category>
		<category><![CDATA[pfsense]]></category>
		<category><![CDATA[ripe]]></category>
		<category><![CDATA[rule]]></category>
		<category><![CDATA[snort]]></category>
		<guid isPermaLink="false">http://www.plugged.in/?p=783</guid>

					<description><![CDATA[<p>Everything started with a few queries of isc.org thrugh open DNS servers located at our data center. Searching through the net we found that we are not the victims but a part of  uncomprimised sources of  a huge DDoS attack. A 60 byte query will turn into 50 times larger data directed to victims IP [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.veriteknik.net.tr/en/snort-rules-for-isc-org-and-ripe-net-dns-amplification-attacks/">Snort rules for isc.org and ripe.net DNS Amplification Attacks</a> appeared first on <a rel="nofollow" href="https://www.veriteknik.net.tr/en/">VeriTeknik</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Everything started with a few queries of isc.org thrugh open DNS servers located at our data center. Searching through the net we found that we are not the victims but a part of  uncomprimised sources of  a huge DDoS attack. A 60 byte query will turn into 50 times larger data directed to victims IP addresses. Even we were not the victims, the attacks became threading our connection if you think of hundreds of servers each of them pushing 10 Mbits to the Net. We needed a solution to stop those attacks.</p>
<p>Finally we have found a solution to stop DNS Amplification Attacks using pfsense with snort.</p>
<p>The below codes are extracted from raw IP data, as a sample, you may check what we had done for ripe.net query:</p>
<pre>0x0000: 4500 0042 6142 4000 7911 e7c3 9a23 a00b E..BaB@.y....#..
0x0010: 5e67 200f 0035 0035 002e 0000 03b8 0100 ^g...5.5........
0x0020: 0001 0000 0000 00<span style="background-color: #ffff99;">01 <strong>0472 6970 6503 6e65</strong></span> .........<span style="background-color: #ffff99;"><strong>ripe.ne</strong></span>
0x0030: <span style="background-color: #ffff99;"><strong>74</strong></span>00 00ff 0001 0000 2910 0000 0080 0000 <span style="color: #ffff99;">t</span>.......).......
0x0040: 0000 ..</pre>
<p>Use the code below to stop DNS Amplification attacks, you can paste the code to snort interface Advanced configuration pass through section:</p>
<pre>alert udp $EXTERNAL_NET any -&gt; $HOME_NET 53 (msg:"DNS ripe.net UDP"; content:"|<span style="background-color: #ffff99;">01 04 72 69 70 65 03 6e 65 74 00</span>|";classtype:attempted-dos;sid:4000003;)
alert udp $EXTERNAL_NET any -&gt; $HOME_NET 53 (msg:"DNS isc.org UDP"; content:"|01 03 69 73 63 03 6f 72 67|";classtype:attempted-dos;sid:4000003;)</pre>
<p>The code is tested to have minimal overhead.</p>
<p>Please post your comment if you need additional DNS Amplification Attack rules.</p>
<p>The post <a rel="nofollow" href="https://www.veriteknik.net.tr/en/snort-rules-for-isc-org-and-ripe-net-dns-amplification-attacks/">Snort rules for isc.org and ripe.net DNS Amplification Attacks</a> appeared first on <a rel="nofollow" href="https://www.veriteknik.net.tr/en/">VeriTeknik</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.veriteknik.net.tr/en/snort-rules-for-isc-org-and-ripe-net-dns-amplification-attacks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">783</post-id>	</item>
	</channel>
</rss>
