You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
dnsmeter doesn't send queries nor spoof source ip addresses. Other tools like dig works fine in the same environment and ips.
Sending queries to 8.8.8.8 not getting any responce back.
[root@myhost ~]# dnsmeter -q 10.160.0.81 -z 8.8.8.8:53 -p qset.txt -n1 -r 10
INFO: Loading and precompile payload. This could take some time...
INFO: 14 queries loaded
###############################################################################
# Start Session with Threads: 1, Queryrate: 10, Timeslot: 100.000000 ms
runtime: 10 s, timeslice: 0.100000 s, total timeslices: 100, Qpts: 1, Source: 8.8.8.8:53
00:00:01 Queries send: 6, rcv: 0, Data send: 0 KB, rcv: 0 KB
00:00:02 Queries send: 10, rcv: 0, Data send: 0 KB, rcv: 0 KB
00:00:03 Queries send: 10, rcv: 0, Data send: 0 KB, rcv: 0 KB
00:00:04 Queries send: 10, rcv: 0, Data send: 0 KB, rcv: 0 KB
00:00:05 Queries send: 10, rcv: 0, Data send: 0 KB, rcv: 0 KB
00:00:06 Queries send: 10, rcv: 0, Data send: 0 KB, rcv: 0 KB
00:00:07 Queries send: 10, rcv: 0, Data send: 0 KB, rcv: 0 KB
00:00:08 Queries send: 10, rcv: 0, Data send: 0 KB, rcv: 0 KB
00:00:09 Queries send: 10, rcv: 0, Data send: 0 KB, rcv: 0 KB
00:00:10 Queries send: 10, rcv: 0, Data send: 0 KB, rcv: 0 KB
00:00:11 Queries send: 4, rcv: 0, Data send: 0 KB, rcv: 0 KB
00:00:12 Queries send: 0, rcv: 0, Data send: 0 KB, rcv: 0 KB
===============================================================================
network if Pkt send: 0, rcv: 0, Data send: 0 KB, rcv: 0 KB
DNS Queries send: 100, Qps: 10, Data send: 5 KB = 0 MBit
DNS Queries rcv: 0, Qps: 0, Data rcv: 0 KB = 0 MBit
DNS Queries lost: 100 = 100.000 %
DNS rtt average: 0.0000 ms, min: 0.0000 ms, max: 0.0000 ms
DNS truncated: 0
DNS RCODES:
tcpdump show packets in the interface, but not responses
[root@myhost ~]# tcpdump -i eth0 port 53 -nn
dropped privs to tcpdump
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), snapshot length 262144 bytes
21:20:36.529899 IP 10.160.0.81.47082 > 8.8.8.8.53: 5298+ AAAA? malicious.dnsfilter.zone. (42)
21:20:36.629992 IP 10.160.0.81.6642 > 8.8.8.8.53: 6299+ TXT? facebook.com. (30)
21:20:36.730030 IP 10.160.0.81.22291 > 8.8.8.8.53: 7299+ AAAA? google.com. (28)
21:20:36.829990 IP 10.160.0.81.21372 > 8.8.8.8.53: 8299+ AAAA? adult.dnsfilter.dev. (37)
21:20:36.929942 IP 10.160.0.81.1682 > 8.8.8.8.53: 9299+ A? www.Domain. (28)
21:20:37.029988 IP 10.160.0.81.30949 > 8.8.8.8.53: 10299+ A? linkedin.com. (30)
21:20:37.130004 IP 10.160.0.81.54237 > 8.8.8.8.53: 11299+ AAAA? instagram.com. (31)
21:20:37.229953 IP 10.160.0.81.20333 > 8.8.8.8.53: 12299+ AAAA? adult.dnsfilter.zone. (38)
21:20:37.329956 IP 10.160.0.81.19442 > 8.8.8.8.53: 13299+ TXT? googletagmanager.com. (38)
21:20:37.429968 IP 10.160.0.81.61902 > 8.8.8.8.53: 14299+ A? www.microsoft.com. (35)
21:20:37.529957 IP 10.160.0.81.48390 > 8.8.8.8.53: 15299+ A? www.twitter.com. (33)
21:20:37.629943 IP 10.160.0.81.38739 > 8.8.8.8.53: 16299+ TXT? www.apple.com. (31)
query set file has this content
[root@myhost ~]# head qset.txt
malicious.dnsfilter.zone AAAA
facebook.com TXT
google.com AAAA
adult.dnsfilter.dev AAAA
www.Domain A
linkedin.com A
instagram.com AAAA
adult.dnsfilter.zone AAAA
googletagmanager.com TXT
www.microsoft.com A
doing query with dig works, even using same IP for binding.
[root@myhost ~]# dig -b 10.160.0.81 @8.8.8.8 hola.com
; <<>> DiG 9.16.23-RH <<>> -b 10.160.0.81 @8.8.8.8 hola.com
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 12102
;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 512
;; QUESTION SECTION:
;hola.com. IN A
;; ANSWER SECTION:
hola.com. 60 IN A 18.100.128.101
hola.com. 60 IN A 51.92.114.144
hola.com. 60 IN A 51.94.42.156
;; Query time: 10 msec
;; SERVER: 8.8.8.8#53(8.8.8.8)
;; WHEN: Tue Mar 11 21:20:54 UTC 2025
;; MSG SIZE rcvd: 85
tcpdump show responce coming back for dig cmd
[root@myhost ~]# tcpdump -i eth0 port 53 -nn
dropped privs to tcpdump
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), snapshot length 262144 bytes
21:20:54.373559 IP 10.160.0.81.47665 > 8.8.8.8.53: 12102+ [1au] A? hola.com. (49)
21:20:54.383254 IP 8.8.8.8.53 > 10.160.0.81.47665: 12102 3/0/1 A 18.100.128.101, A 51.92.114.144, A 51.94.42.156 (85)
current OS and kernel
[root@myhost ~]# cat /etc/redhat-release
Red Hat Enterprise Linux release 9.4 (Plow)
[root@myhost ~]# uname -a
Linux myhost 5.15.0-206.153.7.el9uek.x86_64 #2 SMP Thu May 9 15:59:05 PDT 2024 x86_64 x86_64 x86_64 GNU/Linux
dnsmeter version
[root@myhost ~]# dnsmeter --help
dnsmeter 1.0.2
dnsmeter installed from corp repository
[root@myhost ~]# yum info dnsmeter
Installed Packages
Name : dnsmeter
Version : 1.0.2
Release : 1.el9
Architecture : x86_64
Size : 198 k
Source : dnsmeter-1.0.2-1.el9.src.rpm
Repository : @System
From repo : copr:copr.fedorainfracloud.org:group_dnsoarc:dnsmeter
Summary : DNS performance and infrastructure testing
URL : https://www.dns-oarc.net/tools/dnsmeter
License : GPL-3.0
Description : DNSMeter is a tool for testing performance of nameserver and/or
: infrastructure around it.
: It generates dns queries and sends them via UDP to a target nameserver
: and counts the answers.
I just tested from a VM that has nat'ed addresses and I am seeing the internal address being sent out without going through masq, this is on the host0/dom0/controller:
15:11:07.703693 IP (tos 0x0, ttl 63, id 65518, offset 0, flags [none], proto UDP (17), length 56)
192.168.122.20.10368 > 9.9.9.9.53: 16989+ AAAA? google.com. (28)
and of course that's not gonna find it's way back...
So even if -q is not spoofing, it's still sending RAW packets which are not nat/masq'ed. And it kinda fits because this tool was primarily written to do high performance testing inside a controlled and contained network which allows and routes the spoofed traffic correctly.
You are probably better of using other tools, such as dnsperf which is much better suited for use from normal userland.
dnsmeter doesn't send queries nor spoof source ip addresses. Other tools like dig works fine in the same environment and ips.
The text was updated successfully, but these errors were encountered: