<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ios firewall DNSSEC in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ios-firewall-dnssec/m-p/1368312#M727354</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hi to All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;- Are there someone @Cisco that can tell us if the ASA is aware about the EDNS (from which version) ?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;- Are there someone @Cisco that can tell us if the IOS FIREWALL and IOS ZONE BASED FIREWALL is aware about the EDNS (from which version) ?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;- or open a TAC case and ask ...&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Roberto Taccon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 21 Apr 2010 14:56:39 GMT</pubDate>
    <dc:creator>ROBERTO TACCON</dc:creator>
    <dc:date>2010-04-21T14:56:39Z</dc:date>
    <item>
      <title>ios firewall DNSSEC</title>
      <link>https://community.cisco.com/t5/network-security/ios-firewall-dnssec/m-p/1368306#M727348</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;as recent increases in DNSSEC deployment are exposing problems with DNS resolvers that cannot receive large responses:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;WHICH ARE THE CONFIGURATION OPTION AVAILABLE FOR DNS ON CISCO IOS FIREWALL and IOS ZONE BASED FIREWALL ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The maximim reply size between a DNS server and resolver may be limited by a number of factors: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- If a resolver does not support the Extension Mechanisms for DNS (EDNS), replies are limited to 512 bytes. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- The resolver may be behind a firewall that blocks IP fragments.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Some DNS-aware firewalls block responses larger than 512 bytes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DNSSEC responses may not fit into one 512-byte UDP packet. When UDP queries fail, clients may revert automatically to TCP. Where both TCP and EDNS0 are not supported, DNS queries on signed domains may fail. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;*&lt;/STRONG&gt; SOLUTIONS &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;** JUNIPER &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SCREENOS &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This setting is enforced by Deep Inspection and can be changed with the following command: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;set di service dns udp_message_limit 512 - 4096 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The default size is 512 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;*&lt;/STRONG&gt; CISCO &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX / ASA / FWSM &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="ot-anchor" href="http://www.cisco.com/web/about/security/intelligence/dns-bcp.html#5" target="_blank"&gt;http://www.cisco.com/web/about/security/intelligence/dns-bcp.html#5&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DNS message size limitations: &lt;BR /&gt;DNS amplification and reflection attacks are more effective when leveraging large DNS messages than small DNS message sizes. The message-length parameters submode command for policy-map type inspect dns can be used to ensure that message sizes to not exceed a specified size thus reducing the efficiency of these attacks. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This feature is available beginning with software release 7.2(1) for Cisco ASA and Cisco PIX Firewalls. This feature is available beginning with software release 3.1 for FWSM Firewalls. This function is enabled by default with a limit of 512 bytes. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;For example, in earlier versions of PIX (6.3.2 and below), you had to manually configure the DNS fixup to permit DNS packets with the longer length : &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 4096 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;in more recent versions, it would be covered by : &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map &lt;BR /&gt;parameters &lt;BR /&gt;message-length maximum 4096 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or to increase the response size length: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy &lt;BR /&gt;class inspection_default &lt;BR /&gt;inspect dns maximum-length 4096 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Roberto Taccon&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:33:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-firewall-dnssec/m-p/1368306#M727348</guid>
      <dc:creator>ROBERTO TACCON</dc:creator>
      <dc:date>2019-03-11T17:33:29Z</dc:date>
    </item>
    <item>
      <title>Re: ios firewall DNSSEC</title>
      <link>https://community.cisco.com/t5/network-security/ios-firewall-dnssec/m-p/1368307#M727349</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;IOS (CBAC or ZBF) dns inspection will not drop DNSSec packets.&lt;/P&gt;&lt;P&gt;So, it will not break DNSSec.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Apr 2010 22:27:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-firewall-dnssec/m-p/1368307#M727349</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-04-16T22:27:07Z</dc:date>
    </item>
    <item>
      <title>Re: ios firewall DNSSEC</title>
      <link>https://community.cisco.com/t5/network-security/ios-firewall-dnssec/m-p/1368308#M727350</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;as it's not supported can you confirm if with IOS firewall and IOS ZBF the DNS packets are limit by "message-length maximum 512" bytes ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Roberto Taccon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Apr 2010 12:25:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-firewall-dnssec/m-p/1368308#M727350</guid>
      <dc:creator>ROBERTO TACCON</dc:creator>
      <dc:date>2010-04-18T12:25:57Z</dc:date>
    </item>
    <item>
      <title>Re: ios firewall DNSSEC</title>
      <link>https://community.cisco.com/t5/network-security/ios-firewall-dnssec/m-p/1368309#M727351</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have the following default config on my ASA version 8.2(2).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map netflow-policy&lt;BR /&gt; class netflow-export-class&lt;BR /&gt;&amp;nbsp; flow-export event-type all destination ITL01-FMSDEMO&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; description Netflow&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As can be seen the maximum length is 512 bytes, however if I dig an EDNS server I confirm I get much more than 512 bytes!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 12pt; font-family: Calibri; "&gt;From my PC running dig&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: Calibri; color: #000000; font-size: 12pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 12pt; font-family: Calibri; "&gt;c:\dig&amp;gt; dig @158.43.128.1 +short rs.dns-oarc.net txt&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 12pt; font-family: Calibri; "&gt;rst.x3827.rs.dns-oarc.net.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 12pt; font-family: Calibri; "&gt;rst.x3837.x3827.rs.dns-oarc.net.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 12pt; font-family: Calibri; "&gt;rst.x3843.x3837.x3827.rs.dns-oarc.net.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;STRONG style="mso-bidi-font-weight: normal; : ; color: #000000; font-size: 12pt; font-family: Calibri; "&gt;"62.189.58.236 DNS reply size limit is at least 3843"&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 12pt; font-family: Calibri; "&gt;"62.189.58.236 sent EDNS buffer size 4096"&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 12pt; font-family: Calibri; "&gt;"Tested at 2010-04-21 13:44:22 UTC"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So current ASAs you do not need to change the configuration at all, the policy-map is just for DNS not EDNS that DNSSEC uses.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Apr 2010 13:48:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-firewall-dnssec/m-p/1368309#M727351</guid>
      <dc:creator>andyirving</dc:creator>
      <dc:date>2010-04-21T13:48:11Z</dc:date>
    </item>
    <item>
      <title>Re: ios firewall DNSSEC</title>
      <link>https://community.cisco.com/t5/network-security/ios-firewall-dnssec/m-p/1368310#M727352</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;can you paste the output of "show service-policy inspect dns"&lt;/EM&gt; ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="ot-anchor" href="http://www.cisco.com/web/about/security/intelligence/dns-bcp.html#5"&gt;http://www.cisco.com/web/about/security/intelligence/dns-bcp.html#5&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DNS message size limitations: &lt;BR /&gt;DNS amplification and reflection attacks are more effective when leveraging large DNS messages than small DNS message sizes. The message-length parameters submode command for policy-map type inspect dns can be used to ensure that message sizes to not exceed a specified size thus reducing the efficiency of these attacks. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This feature is available beginning with software release 7.2(1) for Cisco ASA and Cisco PIX Firewalls. This feature is available beginning with software release 3.1 for FWSM Firewalls. This function is enabled by default with a limit of 512 bytes. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;- Are there someone @Cisco that can tell us if the ASA is aware about the EDNS (from which version) ?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;- Are there someone @Cisco that can tell us if the IOS FIREWALL and IOS ZONE BASED FIREWALL is aware about the EDNS (from which version) ?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks to all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Roberto Taccon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Apr 2010 14:07:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-firewall-dnssec/m-p/1368310#M727352</guid>
      <dc:creator>ROBERTO TACCON</dc:creator>
      <dc:date>2010-04-21T14:07:00Z</dc:date>
    </item>
    <item>
      <title>Re: ios firewall DNSSEC</title>
      <link>https://community.cisco.com/t5/network-security/ios-firewall-dnssec/m-p/1368311#M727353</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;show service-policy inspect dns&lt;/P&gt;&lt;P&gt;Global policy: &lt;BR /&gt;&amp;nbsp; Service-policy: global_policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: inspection_default&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inspect: dns preset_dns_map, packet 1706599, drop 3746, reset-drop 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; message-length maximum 512, drop 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dns-guard, count 560373&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; protocol-enforcement, drop 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; nat-rewrite, count 0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Apr 2010 14:34:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-firewall-dnssec/m-p/1368311#M727353</guid>
      <dc:creator>andyirving</dc:creator>
      <dc:date>2010-04-21T14:34:19Z</dc:date>
    </item>
    <item>
      <title>Re: ios firewall DNSSEC</title>
      <link>https://community.cisco.com/t5/network-security/ios-firewall-dnssec/m-p/1368312#M727354</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hi to All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;- Are there someone @Cisco that can tell us if the ASA is aware about the EDNS (from which version) ?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;- Are there someone @Cisco that can tell us if the IOS FIREWALL and IOS ZONE BASED FIREWALL is aware about the EDNS (from which version) ?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;- or open a TAC case and ask ...&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Roberto Taccon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Apr 2010 14:56:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-firewall-dnssec/m-p/1368312#M727354</guid>
      <dc:creator>ROBERTO TACCON</dc:creator>
      <dc:date>2010-04-21T14:56:39Z</dc:date>
    </item>
  </channel>
</rss>

