{"id":3625,"date":"2014-05-13T21:16:16","date_gmt":"2014-05-13T21:16:16","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=3625"},"modified":"2025-04-02T11:32:06","modified_gmt":"2025-04-02T18:32:06","slug":"finding-and-fixing-open-dns-resolvers","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/finding-and-fixing-open-dns-resolvers\/","title":{"rendered":"Finding and Fixing Open DNS Resolvers"},"content":{"rendered":"<h2 id=\"toc-hId-649788934\">DoS Attacks Leveraging Open DNS Resolvers<\/h2>\n<p>The <a href=\"https:\/\/www.infoblox.com\/glossary\/domain-name-system-dns\/\" target=\"_blank\"><strong>Domain Name System (DNS)<\/strong><\/a> has been the target of many types of attacks in recent years.\u00a0 Authoritative DNS servers are exposed to the Internet and generally allow queries from all IP addresses.\u00a0 However, DNS resolvers are typically internal to an organization and allow queries only from the internal clients they serve.\u00a0 DNS resolvers that allow queries from all IP addresses and are exposed to the Internet can be attacked and used to conduct Denial of Service (DoS) attacks on behalf of the hacker.\u00a0 Following is a picture of how an attack on an open DNS resolver could take place and result in a DNS traffic amplification attack.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3626\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/open-dns-resolver.png\" alt=\"Open DNS Resolver\" width=\"400\" height=\"336\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/open-dns-resolver.png 400w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/open-dns-resolver-300x252.png 300w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/p>\n<p>Step 1) The attacker places a very large DNS record on an authoritative DNS server that is accessible from the Internet. \u00a0This record also has a very long Time-To-Live (TTL) value.\u00a0 The attacker could also send a query for a well-known large response such as a query for ANY from isc.org.<\/p>\n<p>Step 2) The attacker sends a spoofed DNS query for this DNS record to the open DNS resolver.\u00a0 The open DNS resolver is not checking the source IP address of the query so it accepts the query and performs the DNS recursive lookup on the behalf of the client.<\/p>\n<p>Step 3) The open DNS resolver fetches the large DNS record and caches that entry for the very long TTL duration.\u00a0 At this point, the attacker can remove the DNS record from the authoritative DNS server.<\/p>\n<p>Step 4) The attacker continues to send small spoofed queries to the open DNS resolver for that cached record.\u00a0 Those queries have a source address of the victim\u2019s IP address.\u00a0 The open DNS resolver fails to check the query IP address and sends the large DNS cached record to the victim\u2019s IP address.\u00a0 The attack continues as long as the attacker sends the fake queries.<\/p>\n<p>A crafty attacker could achieve up to an 80:1 amplification potential by taking advantage of EDNS0\u2019s (RFC 2671) larger response packet size.\u00a0 An army of attackers leveraging a set of open DNS resolvers could generate gigabits of DoS traffic.\u00a0 In fact, the largest DNS DDoS attack targeting\u00a0<a href=\"http:\/\/www.spamhaus.org\/news\/article\/695\/answers-about-recent-ddos-attack-on-spamhaus\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Spamhaus<\/a>\u00a0in March of 2013 generated a whopping\u00a0<a href=\"http:\/\/www.techrepublic.com\/blog\/it-security\/ddos-strike-on-spamhaus-highlights-need-to-close-dns-open-resolvers\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">300Gbps<\/a>.<\/p>\n<p>These types of attacks and how to protect against them are well documented in IETF RFC 5358,\u00a0<a href=\"http:\/\/www.ietf.org\/rfc\/rfc5358.txt\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Preventing Use of Recursive Nameservers in Reflector Attacks<\/a>.<\/p>\n<h2 id=\"toc-hId-678418085\">Do You Have an Open DNS Resolver?<\/h2>\n<p>We first need to figure out if we are vulnerable to such type of attack.\u00a0 The first step would be to assess if any of our DNS resolvers are connected to the Internet or are reachable from the Internet.<\/p>\n<p>In most enterprise environments, the DNS resolvers are on the internal network and provide recursive DNS query support to internal hosts.\u00a0 However, today\u2019s networks aren\u2019t so clear cut with all resources safely tucked away inside the internal IT environment behind a tightened down firewall.\u00a0 Today\u2019s networks are turned inside out so that external mobile workers, partners, and customers can reach the services in the data center.\u00a0 Cloud-based services also virtualize the location of services that historically were located within the internal server farms.<\/p>\n<p>Another way to determine if you have an open DNS resolver that is susceptible to this type of attack is by leveraging tools like <a href=\"https:\/\/www.infoblox.com\/products\/netmri\/\" target=\"_blank\"><strong>NetMRI<\/strong><\/a> to analyze your DNS traffic patterns for anomalies.\u00a0As Thomas Jefferson might have said, \u201c<a href=\"http:\/\/www.monticello.org\/site\/jefferson\/eternal-vigilance-price-liberty-quotation\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Eternal vigilance is the price of liberty<\/a>\u201d.\u00a0 Therefore, we need to be aware of how our IT systems are behaving.<\/p>\n<p>If your DNS resolvers are exposed to the Internet and reachable by an attacker as described above, then you will definitely need to take steps to lock it down and prevent it from being used for a DoS attack.<\/p>\n<h2 id=\"toc-hId-707047236\">Internet Community Support<\/h2>\n<p>There are several sources of information on this issue publically available.<\/p>\n<p>The\u00a0<a href=\"http:\/\/openresolverproject.org\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Open Resolver Project<\/a>\u00a0is attempting to document the list of DNS servers that accept recursive queries from the Internet.\u00a0 They have a detailed\u00a0<a href=\"http:\/\/openresolverproject.org\/breakdown.cgi\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">breakdown<\/a>\u00a0of the number of DNS servers that are misconfigured or exhibiting specific behaviors.\u00a0 Their data shows that there are over 20 million open DNS resolvers on the Internet.<\/p>\n<p>If you don\u2019t know what DNS Resolver you are using, you can open up a browser and go to\u00a0<a href=\"http:\/\/myresolver.info\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">http:\/\/myresolver.info<\/a>\u00a0and it will output your public IP address and what DNS recursive resolver you seem to be using.<\/p>\n<p>US-CERT has provided guidance for U.S. federal government organizations to help them secure their DNS servers from behaving as open recursive DNS resolvers.\u00a0 This\u00a0<a class=\" bf_ungated_init\" href=\"http:\/\/www.us-cert.gov\/sites\/default\/files\/publications\/DNS-recursion033006.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">helpful guide<\/a>\u00a0goes into how to secure many of the popular DNS services.<\/p>\n<p>Team Cymru also has a\u00a0<a href=\"http:\/\/www.team-cymru.org\/Services\/Resolvers\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">page<\/a>\u00a0dedicated to this security issue and they have a good 5-minute\u00a0<a href=\"https:\/\/www.youtube.com\/watch?v=XhSTlqYIQnI\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">video<\/a>\u00a0that covers DNS Amplification Attacks.\u00a0 Team Cymru also provides a secure BIND configuration\u00a0<a href=\"http:\/\/www.cymru.com\/Documents\/secure-bind-template.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">template<\/a>\u00a0that compiles many DNS security best practices into one document.<\/p>\n<p>The\u00a0<a href=\"http:\/\/dns.measurement-factory.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">DNS Measurement Factory<\/a>\u00a0has a\u00a0<a href=\"http:\/\/dns.measurement-factory.com\/surveys\/openresolvers.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">page<\/a>\u00a0dedicated to open DNS resolvers and how they perform testing along these lines.\u00a0 This site contains a good paper by Duane Wessels on \u201c<a class=\" bf_ungated_init\" href=\"http:\/\/dns.measurement-factory.com\/writings\/wessels-netts2004-paper.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Is Your Caching Resolver Polluting the Internet?<\/a>\u201d\u00a0 The DNS Measurement Factory also provides several\u00a0<a href=\"http:\/\/dns.measurement-factory.com\/tools\/third-party-validation-tools\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">resources and tools<\/a>\u00a0to test your DNS server externally to your organization.<\/p>\n<h2 id=\"toc-hId-735676387\">Preventing Open DNS Resolver Vulnerabilities<\/h2>\n<p>There are several ways to prevent these types of attacks if your organization has a DNS resolver that is reachable from the Internet or other untrusted networks.<\/p>\n<p>One way to prevent these attacks is to restrict your DNS resolvers to only accept queries from specific IP addresses.\u00a0 For example, if the DNS resolver is on the internal network and only services internal clients, then it should be configured to use a filter to only those specific IP address ranges.\u00a0 In a typical enterprise network, this would likely be the private RFC 1918 IPv4 address space or your organization\u2019s assigned global IPv6 address block.<\/p>\n<p>If you are using a DNS resolver that straddles the internal and external network using two different physical or logical network interfaces, then you could also configure the DNS resolver to only allow queries on the internal interface from internal hosts.\u00a0 It could be configures such that its external interface would drop all DNS queries.<\/p>\n<p>Another method of helping prevent these types of DoS attacks is to use Best Current Practice (BCP) #38 network ingress filtering on your network perimeter.\u00a0 If your DNS resolver is on your DMZ, then you can use filters on an external Internet router or firewall to prevent clients on the Internet from querying the DNS resolver.\u00a0 Regardless of the DNS server topology,\u00a0<a href=\"http:\/\/tools.ietf.org\/html\/bcp38\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">BCP38<\/a>\u00a0ingress\/egress filtering is strongly recommended for the many other security benefits it provides.<\/p>\n<h2 id=\"toc-hId-764305538\">Securing BIND 9.X DNS Servers<\/h2>\n<p>If your organizations uses the Internet Systems Consortium (ISC) implementation of\u00a0<a href=\"https:\/\/www.isc.org\/downloads\/bind\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">BIND<\/a>\u00a0for your DNS servers, then there are simple steps you can take to prevent these types of attacks.\u00a0 ISC has a page titled \u201c<a href=\"https:\/\/www.isc.org\/blogs\/is-your-open-dns-resolver-part-of-a-criminal-conspiracy-2\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Is Your Open DNS Resolver Part of a Criminal Conspiracy?<\/a>\u201d which contains several good links.\u00a0 Following are the configuration settings to help secure your ISC BIND 9.x DNS servers:<\/p>\n<p>BIND version\u00a0<a href=\"https:\/\/www.isc.org\/blogs\/bind-9-9-4-released\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">9.9.4<\/a>\u00a0now includes Response Rate Limiting (<a class=\" bf_ungated_init\" href=\"https:\/\/conference.apnic.net\/data\/37\/apricot-2014-rrl_1393309768.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RRL<\/a>), which limits the number of responses returned by a DNS resolver to help mitigate these DNS amplification attacks.\u00a0 If you are running a new version of BIND (and you should always keep your software updated and patches), then you may already have this feature.\u00a0 To enable it, you would need to make this type of configuration setting in your \/etc\/named.conf file.<\/p>\n<pre>options {\r\n  rate-limit {\r\n    responses-per-second 5;\r\n  };\r\n};<\/pre>\n<p>If you have an authoritative DNS server exposed to the Internet, you should implement <a href=\"https:\/\/www.infoblox.com\/dns-security-resource-center\/dns-security-solutions\/dns-security-solutions-dns-security-extensions-dnssec\/\" target=\"_blank\"><strong>DNSSEC<\/strong><\/a> and disable recursion to mitigate security risks effectively. Here is the configuration settings you need to make in the \/etc\/named.conf file.<\/p>\n<pre>options {\r\n  recursion no;\r\n  additional-from-cache no;\r\n};<\/pre>\n<p>If you have an internal caching DNS Resolver running BIND, then the following configuration settings in the \/etc\/named.conf file can help you secure these servers.\u00a0 This configuration uses BIND views to allow queries only from the networks in the \u201callowed\u201d ACL and denies queries outside that view.<\/p>\n<pre>acl \"allowed\" {\r\n      192.168.0.0\/16;\r\n};\r\noptions {\r\n  recursion no;\r\n  additional-from-cache no;\r\n  allow-query { none; };\r\n};\r\nview \"allowed\" in {\r\n  match-clients { allowed; };\r\n  allow-query { allowed; };\r\n  recursion yes;\r\n  additional-from-cache yes;\r\n};<\/pre>\n<p>Starting in BIND version\u00a0<a href=\"https:\/\/kb.isc.org\/article\/AA-00269\/11\/What-has-changed-in-the-behavior-of-allow-recursion-and-allow-query-cache.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">9.4<\/a>, ISC the configuration options for controlling queries and recursion.\u00a0 Now there are allow-recursion, allow-query, and allow-query-cache settings in the \/etc\/named.conf file.\u00a0 BIND 9.4 also introduced the settings allow-query-on, allow-recursion-on, allow-query-cache-on to specify the network interface used for DNS queries.\u00a0 For newer BIND caching DNS Resolvers, the following configuration would help secure against open DNS resolver attacks.<\/p>\n<pre>acl \"allowed\" {\r\n  192.168.0.0\/16;\r\n  localhost;\r\n  localnets;\r\n };\r\noptions {\r\n     allow-query { any; };\r\n     allow-recursion { allowed; };\r\n     allow-query-cache { allowed; };\r\n};<\/pre>\n<h2 id=\"toc-hId-792934689\">Restricting DNS Queries and Recursion on Infoblox<\/h2>\n<p>Infoblox DNS Serves, equipped with <a href=\"https:\/\/www.infoblox.com\/products\/advanced-dns-protection\/\" target=\"_blank\"><strong>Advanced DNS protection<\/strong><\/a>, have always had a focus on security.\u00a0 If you are lucky enough to have Infoblox DNS appliances with Infoblox\u00a0<a href=\"http:\/\/www.infoblox.com\/products\/infrastructure-security\/advanced-dns-protection?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Advanced DNS Protection<\/a>\u00a0then you have many DNS attack mitigation options at your fingertips.\u00a0 Regardless, you will still want to make sure that your Infoblox DNS servers are configured to only allow query access from the systems that you require.\u00a0 Here are the steps to restrict queries and deny recursion to an Infoblox Grid member.<\/p>\n<ul>\n<li>Open up the Infoblox management GUI on your Grid Master.<\/li>\n<li>Navigate to Members\/Servers.<\/li>\n<li>Click the box next to the DNS server you wish to modify.<\/li>\n<li>Down in the lower left pane click \u201cGrid DNS Properties\u201d<\/li>\n<li>In the Basic mode, click on the right menu pane on \u201cQueries\u201d.<\/li>\n<li>You will see information on allowing queries from specific IP addresses on top.<\/li>\n<li>You can select None, a Named ACL, or configure a set of ACEs.<\/li>\n<li>On the bottom of that window you will see a checkbox labeled \u201cAllow recursion\u201d<\/li>\n<li>You can disable recursion by unchecking that box.<\/li>\n<li>Or you can check that box, but then in the \u201cAllow recursive queries from\u201d table list the IP addresses of your internal networks that you want recursion to function.<\/li>\n<li>In environments leveraging <a href=\"https:\/\/www.infoblox.com\/products\/bloxone-ddi\/\" target=\"_blank\"><strong>BloxOne DDI<\/strong><\/a>, you can configure recursion to allow only specific Named ACLs or a set of ACEs, enhancing query security.<\/li>\n<\/ul>\n<p>Infoblox also provides \u201c<a class=\" bf_ungated_init\" href=\"http:\/\/www.infoblox.com\/sites\/infobloxcom\/files\/resources\/infoblox-note-cache-poisoning-checklist.pdf?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">A Checklist for Guarding Against Cache Poisoning Attacks<\/a>\u201d authored by Cricket Liu, and point #5 covers how to restrict recursion as much as possible.<\/p>\n<p>There are also other Infoblox Community blogs on this topic, like those written by Renuka Nadkarni (<a href=\"https:\/\/community.infoblox.com\/blogs\/2013\/12\/09\/part-1-should-you-care-about-ddos-yes\" target=\"_blank\" rel=\"noopener noreferrer\">part 1<\/a>,\u00a0<a href=\"https:\/\/community.infoblox.com\/blogs\/2013\/12\/10\/part-2-dns-meets-ddos%E2%80%94and-rest-they-say-history\" target=\"_blank\" rel=\"noopener noreferrer\">part 2<\/a>)that give good advice to Infoblox administrators.<\/p>\n<p>There are also other helpful Infoblox guides available such as the\u00a0<a href=\"http:\/\/infobloxfaq.blogspot.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Infoblox FAQ<\/a>.\u00a0 Fred Farkle wrote a short-but-sweet blog on \u201c<a href=\"http:\/\/infobloxfaq.blogspot.com\/2009\/01\/how-do-i-keep-my-authoritative-public.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">How do I keep my authoritative public nameserver from answering any queries other than for the domai&#8230;<\/a>\u201d that tells you how to disable recursion when using DNS Views.<\/p>\n<h2 id=\"toc-hId-821563840\">Summary<\/h2>\n<p>Each of us who are responsible for maintaining an IT infrastructure should configure our systems using industry best practices.\u00a0 We should strive to be \u201cgood Internet citizens\u201d and make sure that we are not contributing to Internet security issues.\u00a0 Protecting our external authoritative DNS servers is easy and there is no downside to securing our DNS infrastructure.\u00a0 We should take a few moments and secure our DNS Resolvers to protect against the widespread DoS attacks against Open DNS Resolvers and do our part to help make the Internet a safer place.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>DoS Attacks Leveraging Open DNS Resolvers The Domain Name System (DNS) has been the target of many types of attacks in recent years.\u00a0 Authoritative DNS servers are exposed to the Internet and generally allow queries from all IP addresses.\u00a0 However, DNS resolvers are typically internal to an organization and allow queries only from the internal [&hellip;]<\/p>\n","protected":false},"author":321,"featured_media":3187,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[17],"tags":[16,38,15],"class_list":{"0":"post-3625","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ipv6-coe","8":"tag-infoblox","9":"tag-ipv6","10":"tag-security","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Finding and Fixing Open DNS Resolvers<\/title>\n<meta name=\"description\" content=\"DNS server infrastructures must remain intact so that that the vulnerability to DoS attacks is lessened. Learn how to protect yourself against DoS attacks here.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/finding-and-fixing-open-dns-resolvers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Finding and Fixing Open DNS Resolvers\" \/>\n<meta property=\"og:description\" content=\"DNS server infrastructures must remain intact so that that the vulnerability to DoS attacks is lessened. Learn how to protect yourself against DoS attacks here.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/finding-and-fixing-open-dns-resolvers\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-05-13T21:16:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-02T18:32:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Scott Hogg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Scott Hogg\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/finding-and-fixing-open-dns-resolvers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/finding-and-fixing-open-dns-resolvers\\\/\"},\"author\":{\"name\":\"Scott Hogg\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/ee71ac61fe2ea349f6e991e628d22f4c\"},\"headline\":\"Finding and Fixing Open DNS Resolvers\",\"datePublished\":\"2014-05-13T21:16:16+00:00\",\"dateModified\":\"2025-04-02T18:32:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/finding-and-fixing-open-dns-resolvers\\\/\"},\"wordCount\":1826,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/finding-and-fixing-open-dns-resolvers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/IPv6-ARIN.jpg\",\"keywords\":[\"Infoblox\",\"IPv6\",\"Security\"],\"articleSection\":[\"IPv6 CoE\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/finding-and-fixing-open-dns-resolvers\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/finding-and-fixing-open-dns-resolvers\\\/\",\"name\":\"Finding and Fixing Open DNS Resolvers\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/finding-and-fixing-open-dns-resolvers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/finding-and-fixing-open-dns-resolvers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/IPv6-ARIN.jpg\",\"datePublished\":\"2014-05-13T21:16:16+00:00\",\"dateModified\":\"2025-04-02T18:32:06+00:00\",\"description\":\"DNS server infrastructures must remain intact so that that the vulnerability to DoS attacks is lessened. Learn how to protect yourself against DoS attacks here.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/finding-and-fixing-open-dns-resolvers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/finding-and-fixing-open-dns-resolvers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/finding-and-fixing-open-dns-resolvers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/IPv6-ARIN.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/IPv6-ARIN.jpg\",\"width\":660,\"height\":454,\"caption\":\"The IPv6 Tipping Point Effect\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/finding-and-fixing-open-dns-resolvers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IPv6 CoE\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/ipv6-coe\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Finding and Fixing Open DNS Resolvers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/ee71ac61fe2ea349f6e991e628d22f4c\",\"name\":\"Scott Hogg\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_321_1574118215-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_321_1574118215-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_321_1574118215-96x96.jpg\",\"caption\":\"Scott Hogg\"},\"description\":\"Scott Hogg has 30 years of network and security experience and is president of Hogg Networking with. Scott Hogg specializes in teaching Internet Protocol version 6 (IPv6) and providing implementation guidance. Scott is CCIE #5133 (Emeritus) and CISSP #4610. Scott is Chair Emeritus of the Rocky Mountain IPv6 Task Force (RMv6TF), a member of the IPv6 Center of Excellence (COE), and co-author of the Cisco Press book on IPv6 Security.\",\"sameAs\":[\"https:\\\/\\\/hexabuild.io\"],\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/scott-hogg\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Finding and Fixing Open DNS Resolvers","description":"DNS server infrastructures must remain intact so that that the vulnerability to DoS attacks is lessened. Learn how to protect yourself against DoS attacks here.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/finding-and-fixing-open-dns-resolvers\/","og_locale":"en_US","og_type":"article","og_title":"Finding and Fixing Open DNS Resolvers","og_description":"DNS server infrastructures must remain intact so that that the vulnerability to DoS attacks is lessened. Learn how to protect yourself against DoS attacks here.","og_url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/finding-and-fixing-open-dns-resolvers\/","og_site_name":"Infoblox Blog","article_published_time":"2014-05-13T21:16:16+00:00","article_modified_time":"2025-04-02T18:32:06+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg","type":"image\/jpeg"}],"author":"Scott Hogg","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Scott Hogg","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/finding-and-fixing-open-dns-resolvers\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/finding-and-fixing-open-dns-resolvers\/"},"author":{"name":"Scott Hogg","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/ee71ac61fe2ea349f6e991e628d22f4c"},"headline":"Finding and Fixing Open DNS Resolvers","datePublished":"2014-05-13T21:16:16+00:00","dateModified":"2025-04-02T18:32:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/finding-and-fixing-open-dns-resolvers\/"},"wordCount":1826,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/finding-and-fixing-open-dns-resolvers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg","keywords":["Infoblox","IPv6","Security"],"articleSection":["IPv6 CoE"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/finding-and-fixing-open-dns-resolvers\/","url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/finding-and-fixing-open-dns-resolvers\/","name":"Finding and Fixing Open DNS Resolvers","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/finding-and-fixing-open-dns-resolvers\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/finding-and-fixing-open-dns-resolvers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg","datePublished":"2014-05-13T21:16:16+00:00","dateModified":"2025-04-02T18:32:06+00:00","description":"DNS server infrastructures must remain intact so that that the vulnerability to DoS attacks is lessened. Learn how to protect yourself against DoS attacks here.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/finding-and-fixing-open-dns-resolvers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/ipv6-coe\/finding-and-fixing-open-dns-resolvers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/finding-and-fixing-open-dns-resolvers\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg","width":660,"height":454,"caption":"The IPv6 Tipping Point Effect"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/finding-and-fixing-open-dns-resolvers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"IPv6 CoE","item":"https:\/\/www.infoblox.com\/blog\/category\/ipv6-coe\/"},{"@type":"ListItem","position":3,"name":"Finding and Fixing Open DNS Resolvers"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/ee71ac61fe2ea349f6e991e628d22f4c","name":"Scott Hogg","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_321_1574118215-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_321_1574118215-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_321_1574118215-96x96.jpg","caption":"Scott Hogg"},"description":"Scott Hogg has 30 years of network and security experience and is president of Hogg Networking with. Scott Hogg specializes in teaching Internet Protocol version 6 (IPv6) and providing implementation guidance. Scott is CCIE #5133 (Emeritus) and CISSP #4610. Scott is Chair Emeritus of the Rocky Mountain IPv6 Task Force (RMv6TF), a member of the IPv6 Center of Excellence (COE), and co-author of the Cisco Press book on IPv6 Security.","sameAs":["https:\/\/hexabuild.io"],"url":"https:\/\/www.infoblox.com\/blog\/author\/scott-hogg\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3625","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/321"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=3625"}],"version-history":[{"count":4,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3625\/revisions"}],"predecessor-version":[{"id":11351,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3625\/revisions\/11351"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/3187"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=3625"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=3625"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=3625"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}