Re: Implementing the bogon list

2010-04-10 Thread Alex
Hi,

 EMARKETINGHYPE :)  You still haven't specified what exactly you want to
 implement. ACLs? Empty zones for things that should not resolve?
 Something else? And more importantly, what is the _reason_ you're trying
 to do what you're trying to do?

Heh :-) Sure didn't mean that, but guess that's how it sounded :-)

I think primarily my interest is with integration with postfix and
email. Anything that I can do to reduce the amount of processing
required would help. I'm also just generally interested in learning
about it.

At the same time, I do understand that it doesn't do much good to
spoof an email that you'd like to actually have received, since it's
TCP, so I'm not sure how it applies. I still have to figure that out
:-)

 Yes, that's why the zone transfer idea was so compelling to me, or
 perhaps even a once-monthly rsync of the config file?

 This is where I continue to be confused. I have no idea what a zone
 transfer would accomplish in this context.

I understood that you could download the latest bogon list by querying the zone:

http://www.team-cymru.org/Services/Bogons/#dns

 It seems from other posts that you want to implement ACLs of some sort
 related to bogons. My suggestion is that unless you have a really
 clear idea of a specific security goal that will be served by doing this
 that you don't do it.

I guess I understand that the primary use is to prohibit internal
networks from leaving the organization and some rogue external bogus
network from entering as it relates to routing and networking in
general, but I also thought it somehow related to SMTP, and that's
what I'd like to make sure.

Thanks so much.
Best regards,
Alex
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Implementing the bogon list

2010-04-09 Thread Bryan Irvine
I think that's really designed for router ACL's.

Most reliable method might be to subscribe to their BGP feed.

I'm not sure what you'd do with regards to BIND or even why you'd want
to handle it there.

.



On Fri, Apr 9, 2010 at 1:27 PM, Alex mysqlstud...@gmail.com wrote:
 Hi,

 I'm interested in implementing an updated Cymru bogon list, but would
 like some examples on how best to do this. Much of my searching has
 resulted in old configurations that weren't complete and seemed to
 contain errors.

 Where is the best place to go to find a template on how best to do
 this? I understand it's a combination of creating a zone with the IP
 ranges in an ACL, but which IPs should actually go in that ACL? There
 is a list of four or five different sets here:

 http://www.cymru.com/Documents/bogon-dd.html

 Is there an actual zone file with the contents of these IPs, or is it
 all implemented by listing them in the ACL in named.conf?

 Once I've implemented it in bind, could it then be used somehow at
 smtp connect time to reject spoofed connections? How exactly do you
 use it?

 Thanks,
 Alex
 ___
 bind-users mailing list
 bind-users@lists.isc.org
 https://lists.isc.org/mailman/listinfo/bind-users

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Implementing the bogon list

2010-04-09 Thread Doug Barton
On 04/09/10 13:27, Alex wrote:
 Hi,
 
 I'm interested in implementing an updated Cymru bogon list, 

Why don't you take a step back and let us know what you're trying to
accomplish first.


Doug

-- 

... and that's just a little bit of history repeating.
-- Propellerheads

Improve the effectiveness of your Internet presence with
a domain name makeover!http://SupersetSolutions.com/

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Implementing the bogon list

2010-04-09 Thread Stefan Schmidt


On 09.04.2010, at 22:32, Bryan Irvine wrote:


I think that's really designed for router ACL's.


Not exclusively, hence http://www.cymru.com/Documents/secure-bind-template.html


I'm not sure what you'd do with regards to BIND or even why you'd want
to handle it there.


Well, for example for a recursive nameserver it pays performancewise  
if BIND (or any other recursive nameserver) does not need to go out to  
the world an try to reach 192.168.0.1 just because some idiot chose  
this IP as his IN NS for some subdomain.


Alex,

you'll find the aggregated version of the bogon list at
http://www.cymru.com/Documents/bogon-bn-agg.txt

options {
blackhole {
# echo bogons |perl -nle 'print \t\t$_;;'
0.0.0.0/8;
5.0.0.0/8;
10.0.0.0/8;
23.0.0.0/8;
31.0.0.0/8;
36.0.0.0/7;
39.0.0.0/8;
42.0.0.0/8;
49.0.0.0/8;
100.0.0.0/6;
104.0.0.0/7;
106.0.0.0/8;
127.0.0.0/8;
169.254.0.0/16;
172.16.0.0/12;
176.0.0.0/7;
179.0.0.0/8;
181.0.0.0/8;
185.0.0.0/8;
192.0.0.0/24;
192.0.2.0/24;
192.168.0.0/16;
198.18.0.0/15;
198.51.100.0/24;
203.0.113.0/24;
224.0.0.0/3;
}
}

 Stefan
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Implementing the bogon list

2010-04-09 Thread Kevin Oberman
 Date: Fri, 9 Apr 2010 16:27:38 -0400
 From: Alex mysqlstud...@gmail.com
 Sender: bind-users-bounces+oberman=es@lists.isc.org
 
 Hi,
 
 I'm interested in implementing an updated Cymru bogon list, but would
 like some examples on how best to do this. Much of my searching has
 resulted in old configurations that weren't complete and seemed to
 contain errors.
 
 Where is the best place to go to find a template on how best to do
 this? I understand it's a combination of creating a zone with the IP
 ranges in an ACL, but which IPs should actually go in that ACL? There
 is a list of four or five different sets here:
 
 http://www.cymru.com/Documents/bogon-dd.html
 
 Is there an actual zone file with the contents of these IPs, or is it
 all implemented by listing them in the ACL in named.conf?
 
 Once I've implemented it in bind, could it then be used somehow at
 smtp connect time to reject spoofed connections? How exactly do you
 use it?

The FreeBSD default configuration does this, though it does not include
unassigned space as it will get assigned soon.

You can see the config at:
http://www.freebsd.org/cgi/cvsweb.cgi/~checkout~/src/etc/namedb/named.conf?rev=1.31;content-type=text%2Fplain

You can add the unassigned space to those fairly easily, but make sure
that you update it as space is assigned.
-- 
R. Kevin Oberman, Network Engineer
Energy Sciences Network (ESnet)
Ernest O. Lawrence Berkeley National Laboratory (Berkeley Lab)
E-mail: ober...@es.net  Phone: +1 510 486-8634
Key fingerprint:059B 2DDF 031C 9BA3 14A4  EADA 927D EBB3 987B 3751
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Implementing the bogon list

2010-04-09 Thread Doug Barton
On 04/09/10 14:23, Kevin Oberman wrote:
 The FreeBSD default configuration does this,

Let's be clear on what this is please, since I don't think the OP's
post was clear about what he wanted to implement. :)

The default named.conf for FreeBSD implements local, empty zones for
various things that should not be live on the Internet. I started with
http://tools.ietf.org/html/draft-ietf-dnsop-default-local-zones and
expanded the list to include other things referenced in RFCs. The goal
is to provide fast local resolution for answers that should not be sent
out to the Internet anyway. A pleasant side effect is that it reduces
the amount of garbage queries received by the roots, etc.

 though it does not include unassigned space as it will get assigned soon.

That's a conscious choice, given the historical problems with admins not
keeping such lists up to date. OTOH I think that the included examples
give an interested admin more than enough information to do that on her
own, if desired.

In any case, I welcome comments and suggestions on improving this config.

 You can see the config at:
 http://www.freebsd.org/cgi/cvsweb.cgi/~checkout~/src/etc/namedb/named.conf?rev=1.31;content-type=text%2Fplain
 
 You can add the unassigned space to those fairly easily, but make sure
 that you update it as space is assigned.

Yes, this is worth saying again, and I agree with it (again). :)


Doug

-- 

... and that's just a little bit of history repeating.
-- Propellerheads

Improve the effectiveness of your Internet presence with
a domain name makeover!http://SupersetSolutions.com/

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Implementing the bogon list

2010-04-09 Thread Joseph S D Yao
On Fri, Apr 09, 2010 at 11:41:09PM -0400, Alex wrote:
...
 Ah,. I was expecting it to be a lot more involved than that, I guess.
...


It is.  Do not expect to implement ANYTHING involving a bogon list
without it requiring CONSTANT MAINTENANCE.

The Bogon list as it is today has shrunk greatly from what it started
out with.  IPv4 addresses are constantly being allocated off, requiring
that they be removed from the Bogon list.

Many years ago a network on which I'm still working was allocated a set
of IP addresses that was STILL [due to clerical oversight] on the Bogon
list.  Too many were still blocking it even after it came off that list.
To this VERY DAY there are people blocking it who will not update their
lists.

I strongly recommend that anyone wanting some degree of security use
look at the lists of IPv4 networks in RFC 5735/6/7 and the list of IPv6
networks in RFC 5156.  Decide which of those networks you want to block
or blackhole.

For any other networks, you may want to do something that flags you if
they appear on either part of a query.  But, for the love of all that
may be holy in DNS, do NOT NOT NOT blackhole a network that is in the
bogon list just because it is not YET allocated!


--
/*\
**
** Joe Yao  j...@tux.org - Joseph S. D. Yao
**
\*/
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Implementing the bogon list

2010-04-09 Thread Joseph S D Yao
On Sat, Apr 10, 2010 at 01:08:16AM -0400, Joseph S D Yao wrote:
...
 I strongly recommend that anyone wanting some degree of security use
 look at the lists of IPv4 networks in RFC 5735/6/7 and the list of IPv6
 networks in RFC 5156.  Decide which of those networks you want to block
 or blackhole.
...


OBTW, glancing around the Web on the Internet, it looks like a lot of
folks don't realize that option { blackhole{} } cuts both ways.  Nobody
can query from those IP addresses, but you can't query into those IP
addresses.  I saw a serious proposal to blackhole the root IP addresses
so that queries to the root might be reduced - presumably on a recursive
resolver.


--
/*\
**
** Joe Yao  j...@tux.org - Joseph S. D. Yao
**
\*/
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Implementing the bogon list

2010-04-09 Thread Doug Barton
On 04/09/10 20:50, Alex wrote:
 Hi,
 
 Let's be clear on what this is please, since I don't think the OP's
 post was clear about what he wanted to implement. :)
 
 I'm really interested in security, reducing resources, and making sure
 the server is current with today's standards. I'd like to make sure
 it's properly set up and there aren't any configuration errors and
 that anything I can do to improve it's overall performance is being
 done.

EMARKETINGHYPE :)  You still haven't specified what exactly you want to
implement. ACLs? Empty zones for things that should not resolve?
Something else? And more importantly, what is the _reason_ you're trying
to do what you're trying to do?

 In any case, I welcome comments and suggestions on improving this config.

 You can see the config at:
 http://www.freebsd.org/cgi/cvsweb.cgi/~checkout~/src/etc/namedb/named.conf?rev=1.31;content-type=text%2Fplain
 
 It's very good, but I think it also depends on what you're trying to
 achieve.

My point exactly. :)  Your suggestions were all good, but go well beyond
the goal of good default configuration for a local resolver with some
basic guidance on other common tasks. I'm not aiming for a
comprehensive DNS howto in the conf file.

 You can add the unassigned space to those fairly easily, but make sure
 that you update it as space is assigned.

 Yes, this is worth saying again, and I agree with it (again). :)
 
 Yes, that's why the zone transfer idea was so compelling to me, or
 perhaps even a once-monthly rsync of the config file?

This is where I continue to be confused. I have no idea what a zone
transfer would accomplish in this context.

It seems from other posts that you want to implement ACLs of some sort
related to bogons. My suggestion is that unless you have a really
clear idea of a specific security goal that will be served by doing this
that you don't do it.


hth,

Doug

-- 

... and that's just a little bit of history repeating.
-- Propellerheads

Improve the effectiveness of your Internet presence with
a domain name makeover!http://SupersetSolutions.com/

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users