<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic DNS cache poisoning, 4004 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dns-cache-poisoning-4004/m-p/1051267#M79307</link>
    <description>&lt;P&gt;Can we get some details on what this signatures is looking at?  Does it do anything more intelligent than look at query throughput? I'm thinking something more along the lines of these Snort rules:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#by many very smart people&lt;/P&gt;&lt;P&gt;# This may be a high load sig. Take time and seriously consider &lt;/P&gt;&lt;P&gt;# that your dns_servers var is set as narrowly as possible&lt;/P&gt;&lt;P&gt;alert udp any 53 -&amp;gt; $DNS_SERVERS any (msg:"ET CURRENT_EVENTS Excessive DNS Responses with 1 or more RR's (100+ in 10 seconds) - possible Cache Poisoning Attempt"; byte_test:2,&amp;gt;,0,6; byte_test:2,&amp;gt;,0,10; threshold: type both, track by_src, count 100, seconds 10; classtype:bad-unknown; sid:2008446; rev:8;)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#this will catch large numbers of nxdomain replies, a sign that someone may be trying to poison you&lt;/P&gt;&lt;P&gt;alert udp any 53 -&amp;gt; $HOME_NET any (msg:"ET CURRENT_EVENTS Excessive NXDOMAIN responses - Possible DNS Poisoning Attempt Backscatter"; byte_test:1,&amp;amp;,128,2; byte_test:1,&amp;amp;,3,1,relative; threshold: type both, track by_src, count 100, seconds 10; classtype:bad-unknown; sid:2008470; rev:1;)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 11:13:07 GMT</pubDate>
    <dc:creator>mhellman</dc:creator>
    <dc:date>2019-03-10T11:13:07Z</dc:date>
    <item>
      <title>DNS cache poisoning, 4004</title>
      <link>https://community.cisco.com/t5/network-security/dns-cache-poisoning-4004/m-p/1051267#M79307</link>
      <description>&lt;P&gt;Can we get some details on what this signatures is looking at?  Does it do anything more intelligent than look at query throughput? I'm thinking something more along the lines of these Snort rules:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#by many very smart people&lt;/P&gt;&lt;P&gt;# This may be a high load sig. Take time and seriously consider &lt;/P&gt;&lt;P&gt;# that your dns_servers var is set as narrowly as possible&lt;/P&gt;&lt;P&gt;alert udp any 53 -&amp;gt; $DNS_SERVERS any (msg:"ET CURRENT_EVENTS Excessive DNS Responses with 1 or more RR's (100+ in 10 seconds) - possible Cache Poisoning Attempt"; byte_test:2,&amp;gt;,0,6; byte_test:2,&amp;gt;,0,10; threshold: type both, track by_src, count 100, seconds 10; classtype:bad-unknown; sid:2008446; rev:8;)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#this will catch large numbers of nxdomain replies, a sign that someone may be trying to poison you&lt;/P&gt;&lt;P&gt;alert udp any 53 -&amp;gt; $HOME_NET any (msg:"ET CURRENT_EVENTS Excessive NXDOMAIN responses - Possible DNS Poisoning Attempt Backscatter"; byte_test:1,&amp;amp;,128,2; byte_test:1,&amp;amp;,3,1,relative; threshold: type both, track by_src, count 100, seconds 10; classtype:bad-unknown; sid:2008470; rev:1;)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 11:13:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-cache-poisoning-4004/m-p/1051267#M79307</guid>
      <dc:creator>mhellman</dc:creator>
      <dc:date>2019-03-10T11:13:07Z</dc:date>
    </item>
    <item>
      <title>Re: DNS cache poisoning, 4004</title>
      <link>https://community.cisco.com/t5/network-security/dns-cache-poisoning-4004/m-p/1051268#M79308</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;4004 just looks for a flood basically. In s347, we're making that pps rate visible. That number is currently set at 500.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will say that dns responses with more than 1 RR are completely normal and happen all the time. I was watching some of my own dns traffic and I was getting responses with multipl RRs from things like Yahoo, Google CNN... completely normal and legitimate, nothing odd about it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does honing in on that make a sig any more specific - not really - its still a flood. Its the rate thats the kicker and what works for small shops, doesn't work for large shops - so you do have to have some handle of what you "normally" see. I'm not saying that looking for more might not be something that's useful, but it'll largely depend on what you normally see.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The traffic itself is legitimate, albeit crammed with bogus data.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Jul 2008 20:51:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-cache-poisoning-4004/m-p/1051268#M79308</guid>
      <dc:creator>wsulym</dc:creator>
      <dc:date>2008-07-25T20:51:16Z</dc:date>
    </item>
    <item>
      <title>Re: DNS cache poisoning, 4004</title>
      <link>https://community.cisco.com/t5/network-security/dns-cache-poisoning-4004/m-p/1051269#M79309</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the response.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;None of the sigs are perfect, but it seems to me that the RR flood would likely be a better indicator of this than a query flood.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Jul 2008 11:55:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-cache-poisoning-4004/m-p/1051269#M79309</guid>
      <dc:creator>mhellman</dc:creator>
      <dc:date>2008-07-28T11:55:37Z</dc:date>
    </item>
    <item>
      <title>Re: DNS cache poisoning, 4004</title>
      <link>https://community.cisco.com/t5/network-security/dns-cache-poisoning-4004/m-p/1051270#M79310</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;At many of our busier/larger customers, this signature was a bit noisy (enough that we had to turn it off).  The snort rules seem a bit smarter about detecting an attack than simply triggering on a rate.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Jul 2008 15:29:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-cache-poisoning-4004/m-p/1051270#M79310</guid>
      <dc:creator>attmidsteam</dc:creator>
      <dc:date>2008-07-28T15:29:24Z</dc:date>
    </item>
    <item>
      <title>Re: DNS cache poisoning, 4004</title>
      <link>https://community.cisco.com/t5/network-security/dns-cache-poisoning-4004/m-p/1051271#M79311</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;same here.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Jul 2008 16:04:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-cache-poisoning-4004/m-p/1051271#M79311</guid>
      <dc:creator>mhellman</dc:creator>
      <dc:date>2008-07-28T16:04:52Z</dc:date>
    </item>
  </channel>
</rss>

