[DNSfirewalls] rpz firewall + whitelisting

Lee ler762 at gmail.com
Wed Aug 28 07:00:35 UTC 2019


On 8/27/19, Paul Vixie <paul at redbarn.org> wrote:
> On Tuesday, 27 August 2019 16:30:09 UTC Lee wrote:
>> On 8/27/19, Paul Vixie <paul at redbarn.org> wrote:
> ...
>> > no. that would change the meaning of existing policy zones.
>>
>> First off, let's state the obvious - I _clearly_ do not understand rpz
>> policy zones.
>
> it's tricky stuff. i hope you have at least read the draft (-04) though.

I looked at draft-vixie-dnsop-dns-rpz-00, but I doubt I understood
even half of it.

Could you point out where in either draft it documents the
non-intuitive behavior one gets by configuring an rpz zone with
*.2o7.net CNAME .
bcbsks.com.102.112.2o7.net CNAME rpz-passthru.

>> That said.. my expectation is that if I have
>> *.2o7.net CNAME rpz-drop.
>> bcbsks.com.102.112.2o7.net CNAME rpz-passthru.
>>
>> Every <whatever>.2o7.net name will hit the rpz-drop. rule except for
>> bcbsks.com.102.112.2o7.net hitting the rpz-passthru.
>
> yes, that's the intuitive way of seeing/doing this.
>
>>
>> My guess is that people than understand the current implementation will
>> have
>> >>                    2o7.net CNAME .
>> >>                  *.2o7.net CNAME .
>> >>                112.2o7.net CNAME .
>> >>              *.112.2o7.net CNAME .
>> >>            102.112.2o7.net CNAME .
>> >>          *.102.112.2o7.net CNAME .
>> >>        com.102.112.2o7.net CNAME .
>> >>      *.com.102.112.2o7.net CNAME .
>> >> bcbsks.com.102.112.2o7.net CNAME rpz-passthru.
>>
>> which would be unaffected by any automagical fill & the noobs like me
>> that do
>> *.2o7.net CNAME rpz-drop.
>> bcbsks.com.102.112.2o7.net CNAME rpz-passthru.
>>
>> will get the behavior they expect.
>>
>> But there's probably a lot more to it than that.. <sigh>
>
> yes. violation of the principle of least astonishment is very rarely
> punishable by or answerable by more of the same. we won't break existing
> configurations, in which someone may be reliant, consciously or not, on the
> existing (astonishing) behaviour.

Most of the time I'd agree with that sentiment.

>> > this expansion
>> > should be done by the rpz generator or by some preprocessor you'd write
>> > in
>> > python or perl or whatever.
>>
>> Yeah, I totally get that.
>> But me having to write a preprocessor + not really understanding rpz
>> zones changes running a dns firewall from an interesting project to
>> holding a loaded shotgun aimed at my foot :(
>
> would it help if i crafted a perl script that did this preprocessing for
> you?

Thanks for the offer, but I'll learn a lot more if I do it myself.
And doing it myself will force me to go step-by-step instead of trying
to jump directly to what I think the desired end state is.

Regards,
Lee


More information about the DNSfirewalls mailing list