bind-9-packages: RPS and both '--enable-static' and '--disable-static'?

2018-09-25 Thread James via bind-users
Thank you for the https://www.isc.org/blogs/bind-9-packages/ blog post 
and various binary distributions mentioned in it.


I am an end user, not a programmer, and I rely on Linux distributions 
and application packages and so having up-to-date content from 
authoritative sources is both helpful and very reassuring.


As a result of this, I now have the "stable" currently-9.12.2 version 
from https://launchpad.net/~isc/+archive/ubuntu/bind installed on Ubuntu 
18.04 here on my home desktop in order to hack away at something.


***

And that something is RPS... slight wrinkle: it doesn't seem to be 
enabled in this build.


*Question:* Would it cause any problems to enable RPS the next time you 
have a reason to kick off a build for this package?


This is not a crisis.  However, over on my server, a year ago I learned 
how to use Perl to write nfqueue handlers for use with nftables and one 
of the things that I put in place was IPv4-and-IPv6 UDP DNS request 
filtering with PCRE patterns figuring prominently in the logic.


The scary part is how well it works.  12 months of real-world experience 
indicates that well over 99% of those requests that I do want to block 
a) arrive on UDP and b) fit into the first packet, and after that it's 
the amazing collection of Perl libraries that do all the heavy lifting 
so that I just need to glue it together with some pretty ugly script... 
but it works!


So I was looking forward to RPS having the effect of adding TCP to the 
mix and doing a much more respectable job of extracting the queries.


Which does lead to the question about some RPS documentation but that's 
sorta moot at this point.


***

Also, when running "named -V", I see both '--enable-static' and 
'--disable-static' in the output.  I have no idea if this is sensible or 
not but it sure looks a little funny:


user@pc:~$ named -V
BIND 9.12.2-P2-1+ubuntu18.04.1+deb.sury.org+1-Ubuntu 
running on Linux x86_64 4.15.0-34-generic #37-Ubuntu SMP Mon Aug 27 
15:21:48 UTC 2018
built by make with '--build=x86_64-linux-gnu' '--prefix=/usr' 
'--includedir=/usr/include' '--mandir=/usr/share/man' 
'--infodir=/usr/share/info' '--sysconfdir=/etc' '--localstatedir=/var' 
'--disable-silent-rules' '--libdir=/usr/lib/x86_64-linux-gnu' 
'--libexecdir=/usr/lib/x86_64-linux-gnu' '--disable-maintainer-mode' 
'--disable-dependency-tracking' '--libdir=/usr/lib/x86_64-linux-gnu' 
'--sysconfdir=/etc/bind' '--with-python=python3' '--localstatedir=/' 
'--enable-threads' '--enable-largefile' '--with-libtool' 
'--enable-shared' '--enable-static' '--with-gost=no' 
'--with-openssl=/usr' '--with-gssapi=/usr' '--with-libidn2' 
'--with-libjson=/usr' '--with-lmdb=/usr' '--with-gnu-ld' 
'--with-geoip=/usr' '--with-atf=no' '--enable-ipv6' '--enable-rrl' 
'--enable-filter-' '--disable-static' '--disable-native-pkcs11' 
'--enable-dnstap' 'build_alias=x86_64-linux-gnu' 'CFLAGS=-g -O2 
-fdebug-prefix-map=/build/bind-BNj4_3/bind-9.12.2.P2+dfsg=. 
-fstack-protector-strong -Wformat -Werror=format-security 
-fno-strict-aliasing -fno-delete-null-pointer-checks -DNO_VERSION_DATE 
-DDIG_SIGCHASE' 'LDFLAGS=-Wl,-Bsymbolic-functions -Wl,-z,relro 
-Wl,-z,now' 'CPPFLAGS=-Wdate-time -D_FORTIFY_SOURCE=2'

compiled by GCC 7.3.0
compiled with OpenSSL version: OpenSSL 1.1.0g  2 Nov 2017
linked to OpenSSL version: OpenSSL 1.1.0g  2 Nov 2017
compiled with libxml2 version: 2.9.4
linked to libxml2 version: 20904
compiled with libjson-c version: 0.12.1
linked to libjson-c version: 0.12.1
compiled with zlib version: 1.2.11
linked to zlib version: 1.2.11
threads support is enabled
user@pc:~$

--

 - James
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Recursion Question

2021-12-20 Thread LeBlanc, Daniel James via bind-users
Hello All.

I have a recursion via forwarder question.  Consider the following scenario:


-  A client sends a query to an internal recursive DNS server for the 
following A record: 'a.b.c.private.dns.com'

-  The Recursive DNS server is unaware of this domain and sends the 
request to its Forwarding DNS

-  The Forwarding DNS server has Internet access and begins the 
recursion process

o   It successfully determines the NS authoritative for 'private.dns.com'

o   It is unable to continue the resolution process as it does not have access 
to the NS authoritative for 'private.dns.com'

o   It times out and returns a failed response to the Recursive DNS

Is it possible to return the information that it has to the Recursive DNS 
server?  And if so, is it possible for the Recursive DNS server to complete the 
lookup against NS private.dns.com (it has network access)?  I have been unable 
to find any guidance on this and am concerned that this is not a supported 
scenario.  Alternatives under consideration are:


-  Allow Forwarding DNS access to NS responsible for 'private.dns.com'

-  Make Recursive DNS aware of zone 'private.dns.com' so that it does 
not use the Forwarding DNS

-  ?? (open to suggestions!)

Thanks in advance!

Daniel J. LeBlanc, P.Eng., MBA, DTME

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Response Policy Regular Expression Question

2022-01-14 Thread LeBlanc, Daniel James via bind-users
Hello All.

I am trying to create an NXDOMAIN response-policy for the following example 
domain:

x.yy.*.*.dns.*

I have reviewed RFC1034 & RFC4592 and many online articles and blog postings, 
but thus far have not found anything suggesting that this type of match is 
possible.  Am I expecting too much?  :)

Thanks and have a great weekend!

Daniel J. LeBlanc, P.Eng., MBA, DTME

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


RE: Response Policy Regular Expression Question

2022-01-24 Thread LeBlanc, Daniel James via bind-users
Thanks Havard.

Appreciate the candor.  This was my understanding given the articles and 
documentation that I reviewed.

Dan

-Original Message-
From: Havard Eidnes  
Sent: Monday, January 24, 2022 10:13 AM
To: LeBlanc, Daniel James 
Cc: bind-users@lists.isc.org
Subject: [EXT]Re: Response Policy Regular Expression Question

> I am trying to create an NXDOMAIN response-policy for the following 
> example domain:
>
> x.yy.*.*.dns.*
>
> I have reviewed RFC1034 & RFC4592 and many online articles and blog 
> postings, but thus far have not found anything suggesting that this 
> type of match is possible.  Am I expecting too much?
> :)

In a word: yes.

If I'm not terribly mistaken, the DNS response policy code uses normal DNS 
lookup mechanisms.  What you see sometimes in the DNS is '*' which is a 
"wildard".  It is not used to form Regular
Expressions(!)  Furthermore, it has the limitation that it can only occur once 
in a query, and match a single label at the leftmost edge of the looked-up 
name, and if registered in a zone, its data will be returned if the looked-up 
name doesn't otherwise exist in the zone (or if it's explicitly queried for).

Regards,

- HÃ¥vard
--
External Email: Please use caution when opening links and attachments / 
Courriel externe: Soyez prudent avec les liens et documents joints

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users