On Wednesday, March 19, 2025 4:05:29 PM CET you wrote:
> Michael,
> 
> you can hardly create a static list from all of the domains that can
> possibly exists.
> 
> I do understand the usefulness of dynamic classification.
> 
> There’s just not a straightforward interface for it now. Somebody will have
> to invest into writing this :shrug:
> 
> Ondrej

Hi Ondrej, I commend your productivity! I saw your work in both BIND-Users and 
DNSOP. 
No joke, we need more people like this, especially right now. Having had a 
productivity 
boost on the same day, fist-bump!

To be fair though, not all domains have to be recorded into an RPZ to be 
useful. For me 
right now, it's only a couple of domains related to Facebook, YouTube, Windows 
Update, 
and Tor. Wildcards being allowed, means that this zone is only 42 lines long.

> Thinking aloud - perhaps, we can extend the plugin API (and RPZ) in a way to 
> add the 
classification to the message processing and then the RPZ processing could read 
the 
classification and take an action?

> But that’s quite a huge chunk of work.

About that... I like the idea, but can you guarantee that it stays within BIND? 
How would 
you envision such traffic flow from threat analysis to zone inclusion? Would 
such additions 
to the protocol require standardization in DNSOP?

The way I envision it is as follows:

Suppose that a request is made to malicious01.nixmagic.com. Sentinel node on 
ns1.internal.nixmagic.com makes a report, and wraps it up into an intervention 
package. 
This is to be pushed into the RPZ zone, or whatever else is responsible for DNS 
rewrite 
through internal DNS - BIND here.

So that sentinel program made its call, classified it locally, and pushed new 
records 
accordingly. Does the DNS server and its zone file still need to know more than 
that? If so, 
how does that affect the protocol performed between sentinel and nameserver, as 
well as 
the protocol performed between nameserver and future clients? If not, could it 
redirect to 
different destinations based on such classification data?

My concern here is mostly with the protocol, and where these databases are 
held. My 
belief is that the DNS server does not need to know about the classification 
details of such 
a threat. That's the responsibility of the sentinel to determine, and keep 
records of.

That being said, I do like the idea of exploring this into further detail. As 
you may be able 
to tell by now, I have explored the idea of a sentinel as an SMTP edge before. 
Provided 
sufficient actionable rationale and/or code relevant to BIND, would ISC be 
willing to 
collaborate on such an ordeal?

> If this is something that is going to be open-source and the whole BIND 9 
> users 
community would benefit from this, I would love to hear and see more.

Out of curiosity, do you think that the code I wrote for building zone files 
may be useful 
here? I committed it locally as mkbind, similar in nature to keama. However, 
the JSON 
syntax is built only against my own infrastructure, which is not as complex as 
that of 
other members on this and the DNSOP list. Most importantly, it still deals with 
/24 only. 
Binary conversion to handle classless.. it's a roadmap item, but one I'd rather 
push down 
until needed. Nonetheless, it can handle zones and has several logic items for 
deduplication (e.g. A/PTR, mobility between zone suffixes, etc).

-- 
Met vriendelijke groet,
Michael De Roover

Mail: i...@nixmagic.com
Web: michael.de.roover.eu.org
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to