Open nescafe2002 opened 3 years ago
Well, problem is that this (tls host based) port knocking solution blocks acme-dns functionality if the api is exposed through the NS delegated domain as in the default setup.
E.g. api endpoint https://auth.example.org ACME-dns entry {GUID}.auth.example.org
File config.cfg:
records = [
# domain pointing to the public IP of your acme-dns server
"auth.example.org. A 192.0.2.1",
# specify that auth.example.org will resolve any *.auth.example.org records
"auth.example.org. NS auth.example.org.",
]
I have removed the configuration from my router and replaced it with a simple "no answer = no response" rule:
https://github.com/nescafe2002/acme-dns/commit/bfd0389aa7db7fa2702940f2d7cfc9590fac5f5e
Is there any info on how acme-dns contributes to DNS (amplification) attacks based on bogus (spoofed) requests?
Since my IP got hammered a lot with invalid DNS requests:
As ACME DNS is relevant during certificate only, I have configured my router to enable forwarding only on renewals:
(MikroTik rsc)
This works perfectly and the amount of bogus DNS requests to my ip has dropped significantly.
However, this poses a slight problem; if the requesting server has ipv6 access only and LE is using the ipv4 endpoint to verify DNS; i cannot address ipv4 address lists from the ipv6 firewall. Therefore I'd like to drop this here as a feature request:
Is there a way to enable the built in dns server only for a specified time after the /update endpoint has been addressed?