Community discussions

MikroTik App
 
gladstonreis
just joined
Topic Author
Posts: 17
Joined: Wed Jun 04, 2008 3:43 am

DNS ghost traffic

Sun May 26, 2019 4:00 pm

Dear, my router OS generate ghost traffic from my users! I changed the DNS for my DNS servers, but the traffic is yet, theys generate traffic to googles DNS and my DNS servers. I'll like anybody help me about this?

Router OS version: 6.44.3
Hardware: CCR1009-7G-1C-1S+


Thankyou
You do not have the required permissions to view the files attached to this post.
 
msatter
Forum Guru
Forum Guru
Posts: 2945
Joined: Tue Feb 18, 2014 12:56 am
Location: Netherlands / Nīderlande

Re: DNS ghost traffic

Sun May 26, 2019 5:31 pm

The usrrs are free to use a different DNS and Android and APP want to use the DNS of Google itself.

You can stop that by blocking that traffic to what I call Rouge DNS servers by putting them in a addresslist and drop that traffic.
You can choose to put a NAT enforcer to lesd that trafgic to your own DNS server.

I am not that nice and drop those request by putting them on the addresslist.
 
User avatar
ingdaka
Trainer
Trainer
Posts: 457
Joined: Thu Aug 30, 2012 3:06 pm
Location: Albania
Contact:

Re: DNS ghost traffic

Sun May 26, 2019 9:48 pm

Also for security issues you need to disable DNS remote request, because your router will respond to requests from WAN! Just with a small command somebody can send you syn requests to porte 53 of your router and within 2 minutes your router will get 100% of processor usage!
 
User avatar
mkx
Forum Guru
Forum Guru
Posts: 13647
Joined: Thu Mar 03, 2016 10:23 pm

Re: DNS ghost traffic

Mon May 27, 2019 8:32 am

Also for security issues you need to disable DNS remote request, because your router will respond to requests from WAN!

Not necessarily. "DNS remote requests" are needed if router is to be DNS server for LAN devices. DNS service will, by default, answer to requests regardless of their origin (LAN or WAN) and thus comes the threat @ingdaka is mentioning. To avoid that, one should use firewall rule which drops any WAN requests to DNS port. Either a general "drop all from WAN" rule or (less recommended) "drop DNS from WAN" rule such as the following pair (one needs both!)
/ip firewall filter
add chain=input action=drop protocol=tcp port=53 comment="drop TCP DNS requests from WAN" in-interface-list=WAN
add chain=input action=drop protocol=udp port=53 comment="drop UDP DNS requests from WAN" in-interface-list=WAN
 
User avatar
Jotne
Forum Guru
Forum Guru
Posts: 3372
Joined: Sat Dec 24, 2016 11:17 am
Location: Magrathean

Re: DNS ghost traffic

Mon May 27, 2019 8:37 am

I am not that nice and drop those request by putting them on the addresslist.
Devices like Chromecast would then stop work. So I do redirect all DNS to my DNS server.