Getting Data In

DNS debug log dns.log Format Review

landen99
Motivator

I am looking for a solid understanding of the fields in the DNS packet logs. I have included information from what I have already learned in the hopes that it helps others and that it helps with discovering the meanings of other fields. My primary fields of interest are: 710/714, 0000000028FB94C0/000000002CC599A0, Snd/Rcv, 8857/3434, 0080/1001, and "D". I understand UDP is the protocol and "R Q" means reply and " Q" means query.

Packet Log Examples

Date and Time             Type                     Prot Dir Query, Reply IP      R/Q             Flag     Record Domain
4/15/2014 3:16:00 PM 0710 PACKET  0000000028FB94C0 UDP  Rcv 69.160.33.71    8857 R Q [0080       NOERROR] A      .ns1.offeringsmislead.com.
4/21/2014 7:18:36 AM 0714 PACKET  000000002CC599A0 UDP  Snd 8.8.8.8         3434   Q [1001   D   NOERROR] A      .cdn-controltag.krxd.net.

The following code illustrates the format and location for the fields before and after the PACKET field, 0710/0714 and 0000000028FB94C0/000000002CC599A0:

0710 PACKET  0000000028FB94C0
0714 PACKET  000000002CC599A0

The following code reveals the fields before and after the DNS Type [R Q] field, 8857/3434, 0080/1001, and "D":

8857 R Q [0080 
3434   Q [1001   D
Tags (5)
1 Solution

landen99
Motivator

The resources at http://technet.microsoft.com/en-us/library/cc772774(v=ws.10).aspx have explained many of the fields but a few remain a mystery to me and may prove a useful resource to you.

Information: DNS Update Message Flags

0   (NOERROR)  No error; successful update.
1   (FORMERR)  Format error; DNS server did not understand the update request.
0x2 (SERVFAIL) DNS server encountered an internal error, such as a forwarding timeout
0x3 (NXDOMAIN) A name that should exist does not exist.
0x4 (NOTIMP)   DNS server does not support the specified Operation code.
0x5 (REFUSED)  DNS server refuses to perform the update because
0x6 (YXDOMAIN) A name that should not exist does exist.
0x7 (YXRRSET)  A resource record set that should not exist does exist.
0x8 (NXRRSET)  A resource record set that should exist does not exist.
0x9 (NOTAUTH)  DNS server is not authoritative for the zone named in the Zone section.
0xA (NOTZONE)  A name used in the Prerequisite or Update sections is not within the zone specified by the Zone section.

Information: Record Type

A     0x01 Host (A) record                    For mapping a DNS domain name to an IP address used by a computer.
NS    0x02 Name server (NS) record            For mapping a DNS domain name to the name of a computer that operates the network name service.
CNAME 0x05 Alias (CNAME) record               For mapping an alias DNS domain name to another primary or canonical name.
PTR   0x0C (12)  Reverse-lookup (PTR) record  For mapping a reverse DNS domain name based on the IP address of a computer that points to the forward DNS domain name of that computer.
MX    0x0F (15)  Mail exchange (MX) record    For mapping a DNS domain name to the name of a computer that exchanges or forwards mail.
SRV   0x21 (33)  Service (SRV) record         For mapping a DNS domain name to a specified list of DNS host computers that offer a specific type of service, such as Active Directory domain controllers.
IXFR  0xFB (251) Incremental zone transfer (IXFR) record
AXFR  0xFC (252) Standard zone transfer (AXFR) record
All   0xFF (255) All records Domain

Information: UDP and TCP Port Assignments for DNS Servers

Traffic Type                    Source of Transmission   Source Port     Destination of Transmission     Destination Port
Queries from local DNS server   Local DNS server          1023+           Any remote DNS server           53
Responses to local DNS server   Any remote DNS server     53              Local DNS server                1023+
Queries from remote DNS server  Any remote DNS server     1023+           Local DNS server                53
Responses to remote DNS server  Local DNS server          53              Any remote DNS server           1023+

http://stratumsecurity.com/2012/07/03/splunk-security/
Helping with the awkward domain formatting:

[MSAD:NT6:DNS]
 SEDCMD-win_dns = s/\(\d+\)/./g

View solution in original post

jmsiegma
Path Finder

In case this helps anyone for Microsoft DNS Logs:

props.conf:

EXTRACT-windows_dns_000001 = (?<thread_id>[0-9A-Fa-f]{4}) (?<Context>[^\s]+)\s+(?<internal_packet_id>[0-9A-Fa-f]+) (?<protocol>UDP|TCP) (?<direction_flag>Snd|Rcv) (?<client_ip>[0-9\.]+)\s+(?<xid>[0-9A-Fa-f]+) (?<type>[R\s]{1}) (?<opcode>[A-Z\?]{1}) \[(?<flags>[0-9A-Fa-f]+) (?<flagAuthoritativeAnswer>[A\s]{1})(?<flagTrucatedResponse>[T\s]{1})(?<flagRecursionDesire>[D\s]{1})(?<flagRecursionAvailable>[R\s]{1})\s+(?<response_code>[^\]]+)\]\s+(?<query_type>[^\s]+)\s+(?<query_name>[^/]+)

EXTRACT-windows_dns_000010 = ([a-zA-Z0-9\-\_]+)\([0-9]+\)(?<tld>[a-zA-Z0-9\-\_]+)\(0\)$
EXTRACT-windows_dns_000020 = \([0-9]+\)(?<domain>[a-zA-Z0-9\-\_]+\([0-9]+\)[a-zA-Z0-9\-\_]+)\(0\)$
EXTRACT-windows_dns_000030 = \s\([0-9]+\)(?<hostname>[a-zA-Z0-9\-\_]+)\(0\)$
EVAL-domain = replace(domain, "([\(0-9\)]+)", ".")
EVAL-query_domain = ltrim(replace(query_name, "(\([\d]+\))", "."),".")
EVAL-type_msg = case(type="R", "Response", isnull(type), "Query")
EVAL-opcode_msg = case(opcode="Q", "Standard Query", opcode="N", "Notify", opcode="U", "Update", opcode="?", "Unknown")
EVAL-direction = case(direction_flag="Snd", "Send", direction_flag="Rcv", "Received")
EVAL-decID = tonumber(xid, 16)

REPORT-win_dns = dns_string_lengths, dns_strings

FIELDALIAS-client_ip_src_ip = client_ip AS src_ip

transform.conf:

[dns_string_lengths]
REGEX = \((\d+)\)
FORMAT = strings_len::$1
MV_ADD = true
REPEAT_MATCH = true

[dns_strings]
REGEX = \([0-9]+\)([a-zA-Z0-9\-\_]+)\([0-9]+\)
FORMAT = strings::$1
MV_ADD = true
REPEAT_MATCH = true

aakwah
Builder

Thanks @jmsiegma !

0 Karma

seadawg
Engager
The following is the header printed at the top of a dns trace log:


Message logging key (for packets - other items use a subset of these fields):
        Field #  Information         Values
        -------  -----------         ------
           1     Date
           2     Time
           3     Thread ID
           4     Context
           5     Internal packet identifier
           6     UDP/TCP indicator
           7     Send/Receive indicator
           8     Remote IP
           9     Xid (hex)
          10     Query/Response      R = Response
                                     blank = Query
          11     Opcode              Q = Standard Query
                                     N = Notify
                                     U = Update
                                     ? = Unknown
          12     [ Flags (hex)
          13     Flags (char codes)  A = Authoritative Answer
                                     T = Truncated Response
                                     D = Recursion Desired
                                     R = Recursion Available
          14     ResponseCode ]
          15     Question Type
          16     Question Name

landen99
Motivator

The resources at http://technet.microsoft.com/en-us/library/cc772774(v=ws.10).aspx have explained many of the fields but a few remain a mystery to me and may prove a useful resource to you.

Information: DNS Update Message Flags

0   (NOERROR)  No error; successful update.
1   (FORMERR)  Format error; DNS server did not understand the update request.
0x2 (SERVFAIL) DNS server encountered an internal error, such as a forwarding timeout
0x3 (NXDOMAIN) A name that should exist does not exist.
0x4 (NOTIMP)   DNS server does not support the specified Operation code.
0x5 (REFUSED)  DNS server refuses to perform the update because
0x6 (YXDOMAIN) A name that should not exist does exist.
0x7 (YXRRSET)  A resource record set that should not exist does exist.
0x8 (NXRRSET)  A resource record set that should exist does not exist.
0x9 (NOTAUTH)  DNS server is not authoritative for the zone named in the Zone section.
0xA (NOTZONE)  A name used in the Prerequisite or Update sections is not within the zone specified by the Zone section.

Information: Record Type

A     0x01 Host (A) record                    For mapping a DNS domain name to an IP address used by a computer.
NS    0x02 Name server (NS) record            For mapping a DNS domain name to the name of a computer that operates the network name service.
CNAME 0x05 Alias (CNAME) record               For mapping an alias DNS domain name to another primary or canonical name.
PTR   0x0C (12)  Reverse-lookup (PTR) record  For mapping a reverse DNS domain name based on the IP address of a computer that points to the forward DNS domain name of that computer.
MX    0x0F (15)  Mail exchange (MX) record    For mapping a DNS domain name to the name of a computer that exchanges or forwards mail.
SRV   0x21 (33)  Service (SRV) record         For mapping a DNS domain name to a specified list of DNS host computers that offer a specific type of service, such as Active Directory domain controllers.
IXFR  0xFB (251) Incremental zone transfer (IXFR) record
AXFR  0xFC (252) Standard zone transfer (AXFR) record
All   0xFF (255) All records Domain

Information: UDP and TCP Port Assignments for DNS Servers

Traffic Type                    Source of Transmission   Source Port     Destination of Transmission     Destination Port
Queries from local DNS server   Local DNS server          1023+           Any remote DNS server           53
Responses to local DNS server   Any remote DNS server     53              Local DNS server                1023+
Queries from remote DNS server  Any remote DNS server     1023+           Local DNS server                53
Responses to remote DNS server  Local DNS server          53              Any remote DNS server           1023+

http://stratumsecurity.com/2012/07/03/splunk-security/
Helping with the awkward domain formatting:

[MSAD:NT6:DNS]
 SEDCMD-win_dns = s/\(\d+\)/./g

asieira
Path Finder

For the hostname regex, you need to handle the pointers in square brackets as well. See this for more details: http://stackoverflow.com/questions/20381717/windows-dns-server-debug-log-hostname-format

0 Karma

reswob4
Builder

Here is another resource: http://www.zytrax.com/books/dns/ch15/#name

0 Karma

johnebgood
Path Finder

Is there a way to log what IP was resolved from a DNS request?

0 Karma

landen99
Motivator

According to, http://arstechnica.com/civis/viewtopic.php?t=1171606 (hex to decimal conversions included in order to determine their meaning/significance):

The field before PACKET was not identified: 0710 is 1808 and 1714 is 1812
The field after PACKET may be "UDP dns info location": 0000000028FB94C0 is 687576256 and 000000002CC599A0 is 751147424
The field before the DNS type may be the "XID" (as in 0x8857 is 34903 and 0x3434 is 13364)
The field after the DNS type may be "flags" abcd as 0xcdab (as in 0x8000 is 32768 and 0x0110 is 272)

0 Karma
Get Updates on the Splunk Community!

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

Splunk is officially part of Cisco

Revolutionizing how our customers build resilience across their entire digital footprint.   Splunk ...

Splunk APM & RUM | Planned Maintenance March 26 - March 28, 2024

There will be planned maintenance for Splunk APM and RUM between March 26, 2024 and March 28, 2024 as ...