re: .prod issues

2014-09-05 Thread Paul Vixie
 I have a subdomain prod.mydomain.com today all of our internal
 resources that use this prod subdomain stopped being able to reach
 eachother.  I believe the issue is related to the release of .prod as
 a TLD.  Is there a way I can block this TLD or point it back to my
 environment?

 Currently, I have added mdots:2 to resolv.conf as a workaround.

i think you probably mean ndots not mdots. that's a fine workaround as
long as you control all your stub resolvers (which is where the ndots
logic runs) and they are all running the BIND stub resolver (for which
ndots is a unique feature; see RFC 1535 for the history).

a likely better workaround is to use DNS RPZ (so, you'll need BIND 9.9
or later on your recursive servers) and put in a local rule like *.PROD
CNAME . to cause all of the search-path logic of all your stub
resolvers (whether they have ndots logic, or not) to never see the PROD
TLD, and thus, fall through to your local PROD.EXAMPLE.COM names.

sadly, i think a lot of people in a lot of places are going to do this
to a lot of the new GTLD's. but the new GTLD's have been on greased
rails since inception, and no amount of warnings about this kind of
damage did more than slow things down briefly. so, the hounds of DNS
hell are now loose. good thing we have RPZ i guess.

vixie
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: RPZ configuration examples

2011-11-21 Thread Paul Vixie
noting, first: there is documentation online for DNS RPZ, see the following:

https://deepthought.isc.org/article/AA-00525/0/Building-DNS-Firewalls-with-Response-Policy-Zones-RPZ.html

second, as to the particulars:

babu dheen babudh...@yahoo.co.in writes:

 We are new to BIND and would like to implement RPZ in BIND. I have a
 following queries with respect to RPZ in BIND.

 1. Do you have basic example/steps to configure RPZ in Bind? ( I need
 couple of examples like /etc/named.conf file and zone files for rpz

in my recursive server's named.conf file, in the options{} block, i have:

response-policy {
zone dns-policy.vix.com;
zone rpz.surbl.org;
zone rpz.spamhaus.org;
zone block.c2.rpz.umbradata.com;
zone hh.c2.rpz.umbradata.com;
zone active.nx.rpz.iidrpz.net;
zone dga.nx.rpz.iidrpz.net;
};

all but the first of these is a slave zone that i subscribe to. the first
one is my local policy, and that zone looks like:

$TTL 30
@ SOA nsa.vix.com. hostmaster.vix.com. 29 3600 1800 604800 30
  NS localhost.

; eric ziegast suggestions
11.156.21.46.32.rpz-ip  CNAME *.
96.177.58.207.32.rpz-ip CNAME *.

; pedro bueno suggestions
14.53.199.94.32.rpz-ip  CNAME *.

; android market scammer
softthrifty.com CNAME   .
*.softthrifty.com   CNAME   .

; spam houses
*.verticalresponse.com  CNAME   .

; imports
$INCLUDE drop/drop.inc
$INCLUDE drop/bogons.inc

the two $INCLUDE files are generated by a perl script using data imported
from Team Cymru and Spamhaus. that method is described at in blog post at:

http://www.circleid.com/posts/using_domain_filtering_to_effect_ip_address_filtering/

drop.inc begins as follows:

24.0.140.196.109.rpz-ip  CNAME  .
*.140.196.109.in-addr.arpa  CNAME  .
22.0.212.94.109.rpz-ip  CNAME  .
*.212.94.109.in-addr.arpa  CNAME  .
*.213.94.109.in-addr.arpa  CNAME  .
*.214.94.109.in-addr.arpa  CNAME  .
*.215.94.109.in-addr.arpa  CNAME  .

bogons.inc begins as follows:

8.0.0.0.0.rpz-ip  CNAME  .
*.0.in-addr.arpa  CNAME  .
10.0.0.64.5.rpz-ip  CNAME  .
*.64.5.in-addr.arpa  CNAME  .
*.65.5.in-addr.arpa  CNAME  .
*.66.5.in-addr.arpa  CNAME  .
*.67.5.in-addr.arpa  CNAME  .
*.68.5.in-addr.arpa  CNAME  .
*.69.5.in-addr.arpa  CNAME  .

a copy of the perl script that generates these is online at:

http://nsa.vix.com/~vixie/lasso2rpz.pl

 2. If I use RPZ, recursive DNS will contact remote RBL database for
 every DNS query?

no. all RPZ control plane information is held locally in the recursive
server. per the specification at:

https://deepthought.isc.org/article/AA-00512/0

we see this text:

A DNS Response Policy Zone (RPZ) is a DNS zone, and as such its
contents can be transferred between servers (DNS AXFR/IXFR),
protected by transaction signatures (DNS TSIG), and expedited by
real time change notifications (DNS NOTIFY), all subject to
familiar DNS access controls. An RPZ usually does not support query
access since it is never required for correct operation. Rather it
is the zone transfer of RPZ content from producers to subscribers
which effectively publishes the policy data, and it is the
transferee's server configuration which promotes RPZ payload data
into DNS control plane data.

 3. Is it possible to download DNS RBLs locally on the DNS server
 automatically daily and then allow RPZ query locally to give malware
 domain lookup response?

yes. that is one of the intended uses of DNS RPZ.

 If you can help on this, it will be very much helpful to understand
 and implement RPZ in our enterprise.

while this discussion is on-topic for bind-us...@isc.org (here), there
is also a mailing list specific to DNS RPZ. to subscribe, visit:

https://lists.isc.org/mailman/listinfo/dnsrpz-interest

noting, again: there is documentation online for DNS RPZ, see the following:

https://deepthought.isc.org/article/AA-00525/0/Building-DNS-Firewalls-with-Response-Policy-Zones-RPZ.html

thank you for your interest in DNS RPZ.
-- 
Paul Vixie
KI6YSY
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: disable dnssec in bind resolver

2010-06-04 Thread Paul Vixie
Doug Barton do...@dougbarton.us writes:

 I have a guess at why ISC would want to enable it by default, and even in
 the presence of an option to turn it off I'm still Ok with that default.
 But if it's not a standards requirement to have it on, giving the admin a
 choice would be a welcome thing.

this was, as you pointed out, a controversial decision. BIND implements the
DO bit as this requestor will not vomit or crash if you include DNSSEC
metadata in the response. we believe that this supports the eventual goal
of near-universal DNSSEC deployment, in which it's foolish to treat DO as
this requestor is explicitly interested in DNSSEC metadata on this answer.

the earlier we face the UDP fragmentation pain, the smaller that pain will
have been by the time we overcome it. same thing for validator bugs, zone
signing/resigning errors/expirations, and everything else that makes always
set DO seem unattractive today, to today's sysadmins, who aren't involved
in any DNSSEC deployment crusade and don't appreciate being co-opted for it.

unless a new IETF RFC comes along and disambiguates the meaning of DO such
that it's only to be set if the requestor thinks it has a reasonable shot at
validating the resulting metadata, i expect BIND to keep setting DO on all
EDNS requests it generates. and i don't think you can make a _public benefit_
argument that this is wrong even though there are _private benefit_ arguments.
-- 
Paul Vixie
KI6YSY
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: disable dnssec in bind resolver

2010-06-04 Thread Paul Vixie
Doug Barton do...@dougbarton.us writes:

 On 06/04/10 19:40, Paul Vixie wrote:
 ...
 
 unless a new IETF RFC comes along and disambiguates the meaning of DO
 such that it's only to be set if the requestor thinks it has a
 reasonable shot at validating the resulting metadata, i expect BIND to
 keep setting DO on all EDNS requests it generates. and i don't think
 you can make a _public benefit_ argument that this is wrong even though
 there are _private benefit_ arguments.

 ...

 With my business hat on though I can see at least 2 possible use cases for
 DO=0. The first being related to this thread, I can't/won't fix/remove the
 firewall today, I just want my resolver to work.

it works. it's just slower because it has to fall back. this is one of the
reasons we fall back to BUFSIZE=512 before falling all the way back to DNS
(that is, turning EDNS off all together.)

 The hapless user in that spot is either going to use another vendor, or
 go back to the old version of BIND that works. I know market share
 isn't a _primary_ concern for BIND, but I would argue that the go back
 to old version answer to this dilemma is something that we should all be
 concerned about.

that's been *very* rare on this point. ISC is concerned about relevance,
since we don't want to develop stuff that folks don't want to use. that's
*not* happening en masse in this case.

 ...
 
 In all fairness, I don't have any actual clients telling me that DO=1 is
 a problem for them, this is pure speculation on my part; ...

yes, i know that, because i'd see the other side of it if it was going on.
-- 
Paul Vixie
KI6YSY
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


[no subject]

2010-06-02 Thread Paul Vixie
Chris Thompson c...@cam.ac.uk writes:

 Nothing that I can see. Maybe dnsviz can't cope with multiple PTR
 records in an RRset, as your first case has? (On the other hand it
 handles multiple A records in forward zones OK.)

to be fair, multiple PTR RRs is something we added in BIND gethostbyaddr()
in more or less direct contravention to RFC 1034. if dnsviz doesn't handle
it (and i don't know if it doesn't) then it's not dnsviz's fault at all
since the DNS RFC's say that there will only be one PTR RR at an in-addr.
-- 
Paul Vixie
KI6YSY
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users