[DNSfirewalls] rpz firewall + whitelisting
Vernon Schryver
vjs at rhyolite.com
Mon Aug 26 23:08:31 UTC 2019
> From: Brian Dickson <brian.peter.dickson at gmail.com>
> To: Bob Harold <rharolde at umich.edu>
> Cc: dnsfirewalls at lists.redbarn.org
> > If your local list and the third party list are separate RPZ zones, then
> > it should be almost fine, I think. Each zone is processed separately, and
> > the first zone that matches takes effect. The third party would not match,
> > but yours would. I know that sounds confusing, you might want to test it.
> >
> The implementation I am familiar with, uses a bit-field (32 bits) for zone
> membership.
Would that be my second implementation for ISC in BIND9? If so,
the 32-bit business was a speed-up based on assuming that no one would
want more than 32 policy zones. My first implementation was
based on the assumption that 2 or 3 zones would be more than enough
for anyone. It involved iteratively checking all policy zones for
hit, for each of the possible types of hit. It didn't work so well
for people who decided they needed a dozen zones, and the 3rd didn't
work for more than 32 policy zones and had performance problems when
things needed to be rebuilt. So it goes.
The 32-bit masks are in a separate tree/hash and say which, if any, of the
policy zones might have a hit for domain.
(Contrary to comments in the source about "red/black trees", BIND9
uses trees of hash tables, at least when I last looked at the code.)
My third implementation was the so call FastRPZ for Farsight Securities
and uses a different scheme that makes it significantly faster for
very large policy zones such as Spamhaus's and removes the 32 zone
limit. There is a separate deamon that maintains a database shared
with an 'RPZ client' such as BIND or Unbound. The RPZ client is not
impeded by the policy zone maintenance work of the separate daemon.
The database also lives on disk, which makes restarting almost painless.
There may be a way to get FastRPZ for BIND9 via ISC.
> And, it uses a well-defined ordering on the zones themselves.
>
> So, you can have up to 32 zones in a sequence to be used with a first-found
> matching, based on the order you use for the zones.
For a definitive description of the RPZ 'protocol' including the
precedence of zones and types of policy rules, see
https://datatracker.ietf.org/doc/draft-ietf-dnsop-dns-rpz/
or
https://www.ietf.org/archive/id/draft-ietf-dnsop-dns-rpz-00.txt
> Examples would be things like:
>
> - absolute whitelist
> - high-quality curated blacklist
> - high-value whitelist
> - high-trust, high-quality blacklist
> - internally generated high-quality whitelist
> - medium-trust, high-quality blacklist (possibly merged from multiple
> sources)
> - low-trust whitelist
> - low-quality blacklist
> - everything else passes by default, or everything else is blocked by
> default, whichever makes sense.
>
> IIRC there is a modest performance penalty based on the number of zones you
> use, but not based on the size of the zones themselves except at
> load/reload time.
I agree with that, with the caveats that:
- the 32-bit business almost entirely fixed the performance penalty of
having many zones (up to 32) but at some performance cost when
a policy zone must be reloaded.
- the cost of (re)loading a very large zone such as some of Spamhaus's,
including when the authority server expires the entire previous
version instead of sending DNS protocol 'incremental' changes,
can be a matter of several minutes(!) of CPU time.
Vernon Schryver vjs at rhyolite.com
More information about the DNSfirewalls
mailing list