dns tunnels a threat?

nextime at nexlab.it nextime at nexlab.it
Thu Sep 6 14:47:00 UTC 2007


> Hello,
> 
> How many people consider dns tunneling a real concern? Just curious...

For me is a real issue as the italian laws say that anyone setup a free
or pay hot-spot need to register personal data ( document ) and to trace
the logs of connection/disconnection time for any user.
 
> Never heard of it? see http://dnstunnel.de/
>

This is one "public", but ther's many software that permit to setup a
"personal" and more advanced tunnel.

> 
> It could be a simple matter of dropping DNS packets with TXT records before
> authentication. No?

No, in theory ( and even in reality ) it is possible to make a dns
tunnel even on other query type, like NS, MX, A, CNAME and so on.

Dropping TXT request block *some* of the dnstunnel software, but not
all, and for the "cracker" prospective is only a way to make the tunnel
more slow, but not blocked.

I use a different approach:

All dns request are permitted only to a my dns server over ( so, i have
only one dns server centralized for many hot-spots ).

I've written a little udp relayer that get all udp request on a specific
port ( of course 53 ) on the "user" side, ad redirect all the packets to
two different ip/port, one by default, and the other one if the source
ip of the request is in a list ( in a simple file text list ).


The daemon refresh the "alternative ip" list by a SIGUSR1 signal.

Now, on the conup and condown script of coova-chilli, i put some lines
of shell script that get the list of already authenticated users by
perform a chilli_query <socket> dhcp-list | grep pass | awk awk -F ' ' '{print $2}' > /tmp/listfile
and then send a SIGUSR1 signal to my daemon refreshing the "internal" list.

By default i send all packets to a "fake" dns server that manage *only* A, CNAME and AAAA records, 
and where i use iptables to setup a very restrictive policy about how many packets
can comein ( i permit only 2 packets/second, not more that 100 packets in 5 minutes ).

When a client is authenticated, all the dns request are redirected to a "real and normal" bind server, no more 
restricted.

In this way i block *any* dns tunnel.

> David

-- 

Franco (nextime) Lanza
Busto Arsizio - Italy
SIP://casa@casa.nexlab.it

NO TCPA: http://www.no1984.org
you can download my public key at:
http://danex.nexlab.it/nextime.asc || Key Servers
Key ID = D6132D50
Key fingerprint = 66ED 5211 9D59 DA53 1DF7  4189 DFED F580 D613 2D50
-----------------------------------
echo 16i[q]sa[ln0=aln100%Pln100/snlbx]sbA0D212153574F444E49572045535520454D20454B414D204F54204847554F4E452059415020544F4E4E4143205345544147204C4C4942snlbxq | dc
-----------------------------------

-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
URL: <http://lists.coova.org/pipermail/chilli/attachments/20070906/4ffe9ffa/attachment.pgp>


More information about the Chilli mailing list