Today Xmission restricted recursive lookups for non Xmission network users. Essentially this broke DNS resolution for many individuals that I know. The solution is to simply change the DNS servers from 198.60.22.2, 198.60.22.22 to the DNS servers supplied by your ISP or one of the following;
- Google (8.8.8.8 and 8.8.4.4)
- OpenDNS (208.67.222.222, 208.67.220.220)
- DNSAdvantage (156.154.70.1, 156.154.71.1)
After contacting Xmission multiple times, it became apparent that they weren't interested in explaining what their rationale was for this change. They only indicated that it was in response to a "back end issue" that they were trying to resolve. This opens up speculation as to what may have been the cause, primarily a DDOS or Cache poisoning attack.
Technical Q&A
What is DNS?
DNS stands for Domain Name System. DNS servers are a critical part of
the network infrastructure and the Internet at large. These
servers contain information pertaining to every host on the Internet,
and are the mechanism that allows information on the Internet to be
available when you enter a URL in your Web browser. An example of recursive DNS is when
someone who subscribes to an ISP (e.g. Comcast) configures their
computer to use the Xmission DNS servers rather than their ISPs DNS
serves to access the Internet.
What is DNS Recursion?
DNS recursion is when the DNS server does not know the IP address of an
Internet name but queries other DNS servers to look up the name.
What security risks are involved in Recursive DNS?
- DDoS attacks. Name servers can be used as distributed denial of service (DDoS) attack amplifiers (the attacker sends a small spoofed UDP name service query to an open name server, forging the victim's IP address; the open name server then returns a large "answer" to the forged IP address even though the victim didn't actually make the DNS query in the first place). If this is done on an ongoing basis with a large number of open name servers, it can flood the victim's IP address with responses from thousands (or tens of thousands) of name servers, thereby exhausting the victim's available network bandwidth). Attacks of this sort can result in multi-Gbps flow volumes.
- Cache poisoning attacks. Attackers can generate spoofed traffic to open recursive DNS servers that can result in so-called "cache poisoning" attacks, whereby vulnerable caching name servers can be made to return bogus results for a user's name service queries.
In a nutshell: The attacker "primes" the caching name server to respond
to queries with an IP address of his/her choice, rather than the
real/normal IP address for that site. The innocent victim asks the
caching name server for the IP address of a site of interest, such as
the IP address of their bank's Website. If the domain name of that site
happens to be one that the attacker has poisoned, the victim is
automatically and transparently misdirected to a Website of the
attacker's choice rather than to their bank's real Web page, and
confidential data can then be stolen (some refer to this type of attack
as "pharming").
A variant of this attack uses cache poisoning to redirect queries for
popular sites (such as google.com or hotmail.com) to a site that
contains a virus or other malware. If your caching name server has been
poisoned, when you try to visit one of these popular sites you can
unknowingly be redirected to another site that stealthily tries to
infect your PC with malware.