[RPZ] RPZ / bind load bug?

Vernon Schryver vjs at rhyolite.com
Wed May 29 03:25:33 UTC 2013


> From: Francis Turner <francis at threatstop.com>

> Content-Transfer-Encoding: quoted-printable

> paypal.com.uk.cmd.cgi-bin.4c6da88992553d0d43ff7d8dbe19c1133279c9a98f445fff9=
> e2de3dd9a35cd.535125ee83828ec61a1888291c588fd9dc096297a1e972d037a14b1566349=
> 8.806a02ea02f2846dd2aee0300a20dfe587e5ed4f8d3fdc281cb36a171f0178.umedial.de

> May 27 01:04:14 rpz named[29830]: general: error: dns_master_load: /srv/www=
> /bind/rpz/includes/desktop.rpz.threatstop.local.include.txt:4787: ran out o=
> f space
>
> The actual FQDN including the RPZ header is 253 bytes long (it's the above =
> plus desktop.rpz.threatstop.local) and so far as I can tell this is an enti=
> rely legit FQDN (less that 255 total, max 63 chars per section). Moreover t=
> he error 'out of space' isn't one that implies an illegal name.
>
> We're running Bind version: 9.8.4-P1 (version.bind/txt/ch disabled)
> compiled with the following options:

In other cases, the output of `named -v` could be important, because
it contains the entire version number including the version of the
RPZ patch, if any.

In this case I think there is no RPZ load bug and that the problem is
that name is too long when the root is included.  When I try to a
simple (not mentioned in a response-policy statement) "local" text
zone file containing $TTL, an SOA, and this line:

paypal.com.uk.cmd.cgi-bin.4c6da88992553d0d43ff7d8dbe19c1133279c9a98f445fff9e2de3dd9a35cd.535125ee83828ec61a1888291c588fd9dc096297a1e972d037a14b15663498.806a02ea02f2846dd2aee0300a20dfe587e5ed4f8d3fdc281cb36a171f0178.umedial.de.desktop.rpz.threatstop.local. A 6.6.6.0

dns_name_fromtext() in lib/dns/name.c fails near line 1260:

        if (!done) {
                if (nrem == 0)
                        return (ISC_R_NOSPACE);

dns_name_fromtext() does what its name suggests, converts from a text
representation of a domain name.  It works if I remove the last "8".


I would have guessed that 
    806a02ea02f2846dd2aee0300a20dfe587e5ed4f8d3fdc281cb36a171f0178.umedial.de
and all its subdomains are evil and so I would have expected two, shorter
response-policy triggers,
    806a02ea02f2846dd2aee0300a20dfe587e5ed4f8d3fdc281cb36a171f0178.umedial.de
    *.806a02ea02f2846dd2aee0300a20dfe587e5ed4f8d3fdc281cb36a171f0178.umedial.de


Vernon Schryver    vjs at rhyolite.com




More information about the DNSfirewalls mailing list