• The APS Catalog has been deprecated and removed from all Plesk Obsidian versions.
    Applications already installed from the APS Catalog will continue working. However, Plesk will no longer provide support for APS applications.
  • Please be aware: with the Plesk Obsidian 18.0.78 release, the support for the ngx_pagespeed.so module will be deprecated and removed from the sw-nginx package.

Resolved Open DNS resolver in Plesk opens up for reflection attacks?

andreios

Regular Pleskian
I live in Germany and got an mail today from the "Bundesamt für Sicherheit in der Informationstechnik (BSI)" stating that my IP servers an open DNS resolver and I should fix this issue because this can be used for reflection attacks.
In named.conf I see this in the options section:

Code:
options {
        allow-recursion {
                any;
        };
                listen-on-v6 { any; };
        version "none";
        directory "/var";
        auth-nxdomain no;
        pid-file "/var/run/named/named.pid";
};
Is allow-recusion for all addresses really needed?

And how do I modify the options section in the right way?
When I understand right according to this article I just have to add in options setting:
Code:
hostname none;
And in this way I can override and set any options in the options section and it won't be removed by Plesk?

And what are the best settings to prevent reflection attacks?

My Bind Version:
BIND 9.16.1-Ubuntu (Stable Release)
Ubuntu 20.04.2 LTS
 
I found posts even from 2006 where this issue is already stated. But I couldn't find any official looking answer from Plesk for this.
How is it possible that Plesk has no interests in solving this issue for such a long period oft time?
 
Back
Top