Re: Securing bind..

2002-03-06 Thread Karl M. Hegbloom
 [ The quoted email is dated last December... I hope nobody minds me ]
 [ reviving the conversation.  I'm catching up on a few mail groups. ]

 Russell == Russell Coker [EMAIL PROTECTED] writes:

Russell On Sun, 30 Dec 2001 16:17, Jor-el wrote:
 On Sun, 30 Dec 2001, Russell Coker wrote:
  Also don't allow recursion from outside machines.
 
 Why does this help?

Russell When someone sends a recursive query to your server then they know 
(with a 
Russell good degree of accuracy) what requests are going to be made by 
that server 
Russell and what responses will be expected.  So you can send a recursive 
query for 
Russell www.microsoft.com, then send a dozen packets appearing to be 
responses from 
Russell the Microsoft DNS servers giving an IP address of one of your 
servers.  While 
Russell you're at it you make sure that the false packets you sent had 
long TTL 
Russell entries so that they stay in the cache for a while.  Then suddenly 
you have 
Russell all clients of that DNS server thinking that the MS servers are on 
your IP 
Russell addresses (with lots of potential for abuse).

 {Internal network}[firewall/gateway router]-+{Internet}
 |
 +---[Nameserver]

  The nameserver is configured to allow recursive queries only from
  hosts coming from inside, through the firewall/gateway router (Linux
  2.4 w/iptables).  What if someone on the internal network trys to
  poison the DNS like this?  They could be a student on a school
  network, a contract employee, a misbehaving full timer, or whatever.

  To prevent that, you should have some sort of egress filtering on
  the firewall router, to prevent DNS replies (spoofed) from being
  sent out through the gateway.

  That still does not prevent them from logging into an outside host
  they own -- their home computer, a co-located machine someplace out
  on the net -- and sending the spoofed responses from there.

  My question is; is this scenario possible, and is there any way to
  prevent it from occuring?

Russell Recursive requests go to port 53 (getting a DNS client to even 
talk to 
Russell another port is difficult or impossible depending on the client).

Russell iptables/ipchains blocks access to port 53 from untrusted IPs (IE 
everything 
Russell outside your LAN or dialup pool).

 But then how will anyone on the network access your domain's primary
 name server?

Russell Bind will not be expecting any data other than replies to it's 
requests on 
Russell port 54 (the port that is open to the outside world) so even if 
you screw up 
Russell in your configuration of bind to not allow recursion from the 
outside world 
Russell you're still protected.

 But it's an inside job.  By an expert.  How do I win the chess game
 then?

Russell Smart people NEVER rely on only one layer of protection if they 
can avoid it.

 And they never rely solely on their OWN knowledge and experience.

-- 
mailto: (Karl M. Hegbloom) [EMAIL PROTECTED]
Free the Software  http://www.debian.org/social_contract
http://www.microsharp.com
phone://USA/WA/360-260-2066



Re: Securing bind..

2002-03-06 Thread Russell Coker
On Wed, 6 Mar 2002 19:04, Karl M. Hegbloom wrote:
  [ The quoted email is dated last December... I hope nobody minds me ]
  [ reviving the conversation.  I'm catching up on a few mail groups. ]

OK, but I've trimmed the CC list.

  Russell == Russell Coker [EMAIL PROTECTED] writes:

 Russell On Sun, 30 Dec 2001 16:17, Jor-el wrote:
  On Sun, 30 Dec 2001, Russell Coker wrote:
   Also don't allow recursion from outside machines.
 
  Why does this help?

[snip my description of the classic cache poisoning attack]

  {Internal network}[firewall/gateway router]-+{Internet}

  +---[Nameserver]

   The nameserver is configured to allow recursive queries only from
   hosts coming from inside, through the firewall/gateway router (Linux
   2.4 w/iptables).  What if someone on the internal network trys to
   poison the DNS like this?  They could be a student on a school
   network, a contract employee, a misbehaving full timer, or whatever.

That is a problem.  Also there's a problem if they send you email and doing a 
reverse lookup of the origin IP address, resolving the header address as part 
of spam filtering, or looking up the MX record for a bounce results in a DNS 
query to a poisoning server.

   To prevent that, you should have some sort of egress filtering on
   the firewall router, to prevent DNS replies (spoofed) from being
   sent out through the gateway.

   That still does not prevent them from logging into an outside host
   they own -- their home computer, a co-located machine someplace out
   on the net -- and sending the spoofed responses from there.

That's right.

   My question is; is this scenario possible, and is there any way to
   prevent it from occuring?

Get your name server to only accept replies to your exact queries and no 
extra data.

I'm not sure which DNS servers support this.

 Russell iptables/ipchains blocks access to port 53 from untrusted IPs
 (IE everything Russell outside your LAN or dialup pool).

  But then how will anyone on the network access your domain's primary
  name server?

Have a different instance of your name server process for primary zones than 
the one used for caching.  That's standard policy on most large installations 
anyway, for performance if for nothing else.

  But it's an inside job.  By an expert.  How do I win the chess game
  then?

Get a better name server that doesn'thave this flaw.

-- 
If you send email to me or to a mailing list that I use which has 4 lines
of legalistic junk at the end then you are specifically authorizing me to do
whatever I wish with the message and all other messages from your domain, by
posting the message you agree that your long legalistic sig is void.



Re: Securing bind..

2002-03-06 Thread nate
quote who=Karl M. Hegbloom
 [ The quoted email is dated last December... I hope nobody minds me
 ] [ reviving the conversation.  I'm catching up on a few mail
 groups. ]

 {Internal network}[firewall/gateway router]-+{Internet}
 |
 +---[Nameserver]

  The nameserver is configured to allow recursive queries only from
  hosts coming from inside, through the firewall/gateway router


I don't know about others, I run about maybe 15 or 20 nameservers,
and in all cases, if there is a firewall, I run a dedicated nameserver
for public queries and another for private.  My home network
is the most basic setup, my firewall (P3-800 1GB), is also many
other things including NAT/SMTP/IMAP/DNS/ETC. I have 2 copies
of bind running, 1 I have set to bind to 127.0.0.1 and 10.10.10.1 (my
internal addresses), and another copy set to bind to 216.39.174.24(my
external address). Most of this is because there is stuff I have
resolvingon my internal LAN (including stuff that goes accross a vpn to my
work) that I do not want outsiders to resolve.

so, its just easier for me then trying to setup something based
on query source to just bind to an IP that is not routable
past the firewall ..

on my networks at work, I have all machines operating behind
static (1:1) NAT. So if i wanted to i could put a buncha stuff out
there in the wild, but I don't have to route the IP from the internet
to the machine if I don't want to. Cisco's ipnat functions work
quite well. Though they take up a lot of CPU, my 2500s can
just barely keep up with a single t1 going full blast in and out
full duplex, cpu goes to 100%. if its full blast in one direction cpu
is at 50%.

nate





Re: Securing bind..

2002-01-28 Thread Javier Fernández-Sanguino Peña
On Thu, Jan 03, 2002 at 03:34:32PM +0100, martin f krafft wrote:
(...)
 
 but more importantly, if the question was how to secure bind, then let's
 not secure it by substituting... bind is still the #1 nameserver, and a
 thread like this (even though argued a million times) can be quite
 informative.
 

The way to avoid this kind of threads over and over again is to 
*document*
them. I find that there are quite a number of people willing to answer emails 
in the
list but not willing to take some time and *write* about it.

If anyone feels like writting a few paragraphs on how to secure BIND, 
improving
the existing documentation (of course, the Debian Security HOWTO), feel free to 
send me
any material worth adding.

Regards

Javi



Re: Securing bind..

2002-01-28 Thread Dave Kline
BIND should be treated with the utmost caution, as CERT has listed it as 
the #1 way to break into a computer and Im sure some of us have had 
k1dd13z on our systems because of it.  I know I have seen this 
discussion before in old USENET posts, but I do think it would be a good 
idea to maybe include a debconf option that lets the user choose whether 
or not BIND would run as root.  That way, upgrades of BIND could respect 
the setup and users could have safer defaults on their system.


Even if that doesn't happen, I think that should be in the Security HOWTO.
-A. Dave  




Javier Fernández-Sanguino Peña wrote:


On Thu, Jan 03, 2002 at 03:34:32PM +0100, martin f krafft wrote:
(...)


but more importantly, if the question was how to secure bind, then let's
not secure it by substituting... bind is still the #1 nameserver, and a
thread like this (even though argued a million times) can be quite
informative.



The way to avoid this kind of threads over and over again is to 
*document*
them. I find that there are quite a number of people willing to answer emails 
in the
list but not willing to take some time and *write* about it.

If anyone feels like writting a few paragraphs on how to secure BIND, 
improving
the existing documentation (of course, the Debian Security HOWTO), feel free to 
send me
any material worth adding.

Regards

Javi







Re: Securing bind..

2002-01-04 Thread George Karaolides

Hi Craig,

This BIND vs. djbdns thing has strayed off topic.

It started with a Debian user asking for a solution to a problem.  One of
the answers given was that a solution could be achieved by using djbdns,
which is packaged in the testing and unstable distributions of Debian.  I
suggested, and still maintain, that the original poster's needs could be
met by using djbdns.

Craig, you make some comments about djbdns which just aren't true.  I'll
try my best to rectify these so that anyone following this on debian-user
does not come away with the wrong impression about the capabilities of one
of the packages in Debian.  But let's take this elsewhere.  You are most
welcome to continue this discussion directly with me.  You could also
subscribe to the djbdns users' list at [EMAIL PROTECTED]

On Thu, 3 Jan 2002, Craig Sanders wrote:

 what's so difficult about bind's zone files or configuration files?

 they're simple, straight-forward, and intuitively obvious to anyone with
 a functioning brain.  they're also extremely well-documented, with
 numerous books available (_DNS  Bind_ published by ORA being the
 must-have book for *any* DNS administrator)

All I said was that djbdns' config and data files are, IMHO, easier to
deal with than the ones for BIND.  I never stated or implied that the BIND
files are obscure or incomprehensible.  After all, I understood them when
I was using them, which definitely means that they are comprehensible to a
person with a definitely-no-better-than-average, occasionally functioning
brain :)  But I wouldn't go as far as intuitively obvious.

 in other words, it works for the single scenario of one domain and one
 set of IP addresses, with DNS for both hosted on the same server.  fine
 for a leafnode site...no use at all for an ISP.

Er, no, it certainly works for setups more complex than that.  You can
definitely have more than one subnet, more than one domain and host it all
on more than one server.  I know.  I do it.  I don't run an ISP but my
net is definitely not a toy net.

I never claimed that djbdns can handle tens of tousands of domains, or run
an ISP.  People who use it in that kind of setup (and they do exist) may
be able to make that claim, but not I.  The original poster (remember
him?) wanted to do name resolution for his internal net and host a few
domains, which is exactly what I do, easily, securely and successfully
with djbdns.

  You don't have to worry about keeping A and PTR records in sync.

 frankly, anyone who thinks that this is difficult should not be trusted
 to have anything to do with managing DNS.

No it's not difficult, but it's tedious.  What's wrong with having the
option of a single-entry two-way map and making your life simpler?
Deleting files individually is also not difficult, but was that a reason
not to put recursive functionality into the rm command?

 a) the relationship between forward and reverse mapping(s) is completely
 arbitrary,

With djbdns, you can have your arbitrary A and PTR records, and you also
have a choice of a single entry that generates both:

# This maps address to name and name to address (both A and PTR records).
=a-name.my-domain:ipaddress1:TTL
# This maps name to address only (A record only).
+another-name-for-the-same-ip.my-domain:ipaddress1:TTL
# This maps a subdomain of in-addr.arpa to a name only (PTR record only).
^reversenetaddress.in-addr.arpa:another-name.mydomain:TTL

 b) the .in-addrp.arpa zone isn't always hosted on the same server as the
 forward zone(s) - it isn't at all unusual for a NS which is
 authoritative for a domain to NOT be authoritative for any corresponding
 .in-addr.arpa domain(s).

So if the servers are running djbdns, one of them will host the data for
the domain(s), which will consist of forward mappings only (lines in the
data file starting with +), and the other will host the data for the
subdomains of in-addr.arpa, which will consist of reverse mappings only
(lines starting with ^).  It can be done.  It's simple.

 leafnode sites may have simple configurations which suit djb's
 assumptions but they're also the sites *least* likely to be
 authoritative for the .in-addr.arpa zones for their IP addresses...most
 leafnode sites don't own their own addresses, they rent or borrow them
 from their ISP.

As I illustrate above, djb doesn't assume that the forward domains and the
subdomains of in-addr.arpa are hosted on the same server.

With djbdns, you can have your forward and in-addr.arpa data in separate
places, *if you need to*.

But for domains where both the forward and in-addr.arpa data can be hosted
on the same server, djbdns gives you the option of a single-entry two-way
(A and PTR) map.

 no, it is NOT open source.  the source may be available but it doesn't
 meet the criteria of the Open Source Definition, which requires that the
 source code be freely modifiable and redistributable AND that binaries
 compiled from modified sources be redistributable.

Point taken.  Sorry, I meant 

Re: Securing bind..

2002-01-04 Thread George Karaolides


Hi Martin,

On Thu, 3 Jan 2002, martin f krafft wrote:

snip djbdns data example

 i find this horrible. BIND zonefiles at least allow for usage of tabs to
 organize your zone into tabular data.

Everyone has their favourite wokrkign techniques.  You like your tabular
BIND zone files.  I like my line-based djbdns data files.  Fine.

  I know there are management tools that automate synchronisation of
  forward and reverse mappings in BIND zone files, but why should the
  reverse-mapping information be in a file separate from the forward
  information?

 why does the DNS protocol even allow this? keeping them in sync is
 really what you should do, but there are cases, where they may need to
 be out of sync. for instance, domain.com and mail.domain.com for small
 domains usually get the same A record on my servers, if what i
 delegate to mydomain.com is a single IP address. that's not a CNAME,
 that's an A record. but what does the IP map to? *not* mail.domain.com.
 i find it very handy to have explicit control over the mappings.

As I've written to Craig, you can do all this with djbdns.  But where you
can keep the foward and reverse data on the same server, djbdns allows you
to make a single entry that takes care of both the A nd PTR record.  I
like the convenience of that, and the reduction of the potential for
mistakes.

 priorities or preferences. i find BIND does it's job. it might not be
 optimal, but it's free, and it works.

No arguments there.  BIND is free.  BIND works.  But I suggested that with
djbdns, you get the security by default that you have to configure into
BIND, and that for a setup as needed by the original poster, djbdns could
be easier to administer.


 djbdns might even be better,
 smaller, faster, more secure. but my nameservers are not going to be
 running a piece of software because of either of two reasons: (a) the
 author is braindead in many aspects; and (b) it's non-free.

I use djbdns.  It works.  I can administer it.  I didn't need to read a
HOWTO about how to run it securely.  It's packaged in Debian, and the
above benefits are available to Debian users.  Issues to do with its
license and the brain-deadedness or otherwise of its author are off-topic
so I agree with you; this discussion is best continued elsewhere.

 we'd like to package it, not require the end-user to download the
 -source package, which includes voodoo magic to compile djbdns without
 the user ever knowing what gcc is. the problem is that this is an
 aweful job for the maintainer, and that it requires some -dev libraries
 on the target system, as well as the entire gcc family, which might not
 be needed otherwise...

This too finds me in perfect agreement.  I would love it if djb would GPL
his software.

 let's take this discussion somewhere else.

As stated above, agreed.

Best regards,

|  George Karaolides   8, Costakis Pantelides St., |
|  tel:   +357 99 68 08 86  Strovolos, |
|  email: [EMAIL PROTECTED]   Nicosia CY 2057, |
|  web:   www.karaolides.com  Republic  of Cyprus  |




Re: Securing bind..

2002-01-03 Thread martin f krafft
also sprach P Prince [EMAIL PROTECTED] [2001.12.31.0652 +0100]:
 Perhaps, but BIND invented its own zonefiles too.  What you fail to realize is
 how bad BIND zone files suck.

why? sure, you have to understand them, and discipline is needed to
maintain one, but they are so much more powerful than djb's files...

they are explicit, and that's important.

i tried djbdns and had to give up simply because it *couldn't* do a lot
of the things that i need my BINDs to do...

  unfortunately, bernstein's software is severely limited by his
  views. he's a fairly good programmerbut a lousy systems
  administrator, with no concept of how real world sysadmins use tools
  or how they automate them.
 
 I hope you don't consider youself a good systems administrator,

i hope you aren't always as negative.

   If conformance to standards is interesting to you, then check this
   out.
 
  djbdns does not conform to standards.  he proudly ignored any aspects of
  the standards that were inconvenient to him.
 
 There is no RFC BIND!!!  Christ, man...

dude, noone ever spoke of a BIND RFC. but there are numerous RFCs around
DNS, IXFR, and AXFR. kind of relevant to a nameserver, don't you think?

-- 
martin;  (greetings from the heart of the sun.)
  \ echo mailto: !#^.*|tr * mailto:; [EMAIL PROTECTED]
  
i am willing to make the mistakes
if someone else is willing to learn from them.


pgpQd9GLJr05U.pgp
Description: PGP signature


Re: Securing bind..

2002-01-03 Thread martin f krafft
also sprach P Prince [EMAIL PROTECTED] [2001.12.30.1846 +0100]:
 The eaisest and most failsafe way to secure bind is to install djbdns.

you are kidding me, right? the question was how to secure bind. the
asker wasn't in need of other religious beliefs.

while i strongly believe that djb is a real pain and a man with many
problems, his software is good. despite the license. and despite the
configuration. qmail or djbdns, i find configuring postfix and bind9 to
be a lot more straight forward than using djb's paradigm of touched
files...

but more importantly, if the question was how to secure bind, then let's
not secure it by substituting... bind is still the #1 nameserver, and a
thread like this (even though argued a million times) can be quite
informative.

-- 
martin;  (greetings from the heart of the sun.)
  \ echo mailto: !#^.*|tr * mailto:; [EMAIL PROTECTED]
  
-BEGIN GEEK CODE BLOCK-
Version: 3.12
GCS/IT d- s: a-- C++() UL+++() P+ L+++ E--- W- N+ o?
K? !w O- M- V PS+(+++) PE-- Y+ PGP++ t- !5 !X R-(+) !tv b+(++)
DI--(++) D++(+++) G(++) e++ h* r+++ :) y++(++)
--END GEEK CODE BLOCK--


pgp4DnWqUcSeH.pgp
Description: PGP signature


Re: Securing bind..

2002-01-03 Thread martin f krafft
also sprach Russell Coker [EMAIL PROTECTED] [2001.12.30.2258 +0100]:
 Perhaps a discussion of the relative merits of djbdns and bind is in
 order.

no, not on debian-user and not on debian-* either. djbdns might be fine
software, but his author is a negative representative of the software
industry in general, open source specifically. and he's probably the
most arrogant and egocentric person i shall ever meet.

don't discuss nameservers here.

 I disagree with the supposed security benefits of disabling zone transfers, 
 it's just security by obscurity.  Also when idiots read such advice and take 
 it to heart it gets in the way when you have a genuine need for zone 
 transfers.


uhm. so are password. security through obscurity. what's your point?

-- 
martin;  (greetings from the heart of the sun.)
  \ echo mailto: !#^.*|tr * mailto:; [EMAIL PROTECTED]
  
i'd give my right arm to be ambidextrous.


pgpB6MkQtIDRf.pgp
Description: PGP signature


Re: Securing bind..

2002-01-03 Thread martin f krafft
also sprach George Karaolides [EMAIL PROTECTED] [2002.01.02.1423 +0100]:
 # Nameserver for my network addesses...
 .my-network-in-reverse-order.in-addr.arpa:my-nameserver-ip-address:TTL
 # ... and for addresses in my other network...
 .my-other-network-in-reverse-order.in-addr.arpa:my-nameserver-ip-address:TTL
 # ... and for names in my domain...
 .my-domain:my-nameserver-ip-address:TTL
 # ... and for names in my other domain...
 .my-other-domain:my-nameserver-ip-address:TTL
 # Now to get on with mapping names to addresses, and vice versa
 =i-want-this-to-map-both-reverse-and-forward.my-domain:ipaddress1:TTL
 +i-only-want-this-to-map-forward-cos-its-an-alias.my-domain:ipaddess1:TTL
 =another-bothways-map.my-domain:ipaddress2:TTL
 +and-this-too-has-an-alias.my-domain:ipaddress2:TTL
 =a-bothways-map.my-other-domain:ipaddress3:TTL
 +an-alias.my-other-domain:ipaddress3:TTL
 
 Surely that's not all bad?

i find this horrible. BIND zonefiles at least allow for usage of tabs to
organize your zone into tabular data. sure, it requires a little thought
at first, but in the end, you have aligned columns that are easy to
search and modify. with djbdns, you are left with /bin/ls unless you
provide a new tool that sort of abstracts above that structure...

 You don't have to worry about keeping A and PTR records in sync.

how often do you worry about that in a productive environment? how often
do you move your subnets around???

and aside, there are many tools that write BIND config files for you. i
wrote one myself, which really just allows me to have 120 byte config
files for a complete zone, and it's all in sync.

i still maintain that BIND's zonefiles are much easier to read and
understand than a directory with inode entries named in such a way so as
to represent the most information in the least amount of space, and
making sure that noone can understand what's going on by glancing at it.

 I know there are management tools that automate synchronisation of
 forward and reverse mappings in BIND zone files, but why should the
 reverse-mapping information be in a file separate from the forward
 information? Once the three conditions above areet, why should we need
 to administer the forward and reverse mappings separately?  BTW these
 are not rhetorical questions; I'd love to hear input on this.

why does the DNS protocol even allow this? keeping them in sync is
really what you should do, but there are cases, where they may need to
be out of sync. for instance, domain.com and mail.domain.com for small
domains usually get the same A record on my servers, if what i
delegate to mydomain.com is a single IP address. that's not a CNAME,
that's an A record. but what does the IP map to? *not* mail.domain.com.
i find it very handy to have explicit control over the mappings.

 In the end, it's all a question of priorities.  If compatibility with
 existing config. and zone files is an issue, then djbdns may well be a
 non-starter, my recall that there's a way to get it to read BIND zone
 files notwithstanding.  If managing a DNS name space painlessly,
 securely and reliably is, then it could well be.  It was for me.

priorities or preferences. i find BIND does it's job. it might not be
optimal, but it's free, and it works. djbdns might even be better,
smaller, faster, more secure. but my nameservers are not going to be
running a piece of software because of either of two reasons: (a) the
author is braindead in many aspects; and (b) it's non-free.

 For all the arguments against djb's attitude re. development and
 licensing, it must be acknowledged that his keeping tight control of the
 software has prevented it from suffering from feature bloat.

well, as opposed to postfix, for instance, you are right. wietse dared
to put RBL support into postfix. djb simply writes another program and
then tells you how to integrate that. sure, it's unix philosophy...

nevertheless, between postfix and qmail, i'd say i'll install postfix
from source in a fifth of the time as i'd need for qmail with all it's
features. and i can't really see how that could change for
BIND/djbdns...

 And since it's open-source and you can distribute patches to it,
 there's no shortage of patches to get it to do what you want.

we'd like to package it, not require the end-user to download the
-source package, which includes voodoo magic to compile djbdns without
the user ever knowing what gcc is. the problem is that this is an
aweful job for the maintainer, and that it requires some -dev libraries
on the target system, as well as the entire gcc family, which might not
be needed otherwise...

let's take this discussion somewhere else.

-- 
martin;  (greetings from the heart of the sun.)
  \ echo mailto: !#^.*|tr * mailto:; [EMAIL PROTECTED]
  
the only real advantage to punk music is
that nobody can whistle it.


pgp05BeBwxuCk.pgp
Description: PGP signature


Re: Securing bind..

2002-01-03 Thread martin f krafft
also sprach P Prince [EMAIL PROTECTED] [2001.12.30.2314 +0100]:
 I strongly *strongly* suggest that anyone considering setting up DNS, be it
 BIND or djbdns, check out Daniel Bernstein's site on the subject,
 http://cr.yp.to/djbdns.html

or just subscribe to bind-users or bind9-users, where bernstein will sit
and reply to every problem someone asks about: this would not be the
case with djbdns, or see how easy this is with djbdns...

sorry, but that form of behaviour, IMHO, belongs into kindergarten.
look at his site, how he compares why djbdns is better than BIND. and
then compare how he and wietse venema go about their functionally
equivalent and absolutely comptetive products qmail and postfix. djb has
more than simple problems with his ego...

  2.4.x kernels support the --bind option to mount which avoids the syslogd
  hackery described in this URL.  Also the authbind method supported by Debian
  is much more powerful and useful than using the chuid() functionality in
  bind.  Both these things aren't mentioned.

because 2.4.x kernels are far from stable, no real sysadmin would use
them on a productive nameserver, and because the paper isn't about
debian. but do tell about authbind. where do i get info?

  I disagree with the supposed security benefits of disabling zone transfers,
  it's just security by obscurity.  Also when idiots read such advice and take
  it to heart it gets in the way when you have a genuine need for zone
  transfers.
 
 What is wrong with security by obscurity?  It's an excellent strategy, albeit
 not a complete one.

yes, precisely. it's not a universal security method, but it's also
wrong to believe what the rest of the world seems to believe: that
security through obscurity is bad because unsafe. bollocks. you must not
rely on it ever, but it's always a nice addition. or else, seriously,
we'll have to make way without one-time passwords... now *that* would
suck.

zone transfers are not that much of a deal, i find, unless of course you
have a huge zone and want to minimize volume. i stand behind the opinion
that you should be able to post a complete topology of your company
network, along with all DMZs, server configurations, firewall rules, and
other information onto the net. that's zero security by obscurity then,
but your network must still be able to withstand all attacks. once you
reached that status, it doesn't hurt to hide information from others.

-- 
martin;  (greetings from the heart of the sun.)
  \ echo mailto: !#^.*|tr * mailto:; [EMAIL PROTECTED]
  
you grabbed my hand and we fell into it,
like a daydream - or a fever.
 -- godspeed you black emperor


pgpClzO006yGm.pgp
Description: PGP signature


Re: Securing bind..

2002-01-02 Thread George Karaolides

Hi,

On Tue, 1 Jan 2002, Craig Sanders wrote:

 someday soon, someone's going to take the good ideas from djbdns,
 combine it with the good stuff from bind (including backwards
 compatibility with bind config  zonefile formats), add a few useful new
 ideas (e.g. an RXFR protocol that embedded the rsync protocol
 directly) to produce a fast, secure DNS daemon, and release it with a
 GPL-compatible license.  this will blow both bind  djbdns out of the
 water.

Roll on the day!  When such a godsend appears, I'll grab it with both
hands, provided of course that besides reverse compatibility with BIND
config. files, it also gives you a new, simpler config. scheme.

In the meantime, I submit that djbdns is OK unless you really, really want
to stick to the BIND zonefile format, though I seem to recall hearing it
can be made to read BIND zone files.  IMHO once you're used to it, the
djbdns data file format is actually quite nice.  I've worked on both BIND
and djbdns and I find the latter easier to use.  For example, the
following ten entries would require four entries in named.conf and four
zone files:

# Nameserver for my network addesses...
.my-network-in-reverse-order.in-addr.arpa:my-nameserver-ip-address:TTL
# ... and for addresses in my other network...
.my-other-network-in-reverse-order.in-addr.arpa:my-nameserver-ip-address:TTL
# ... and for names in my domain...
.my-domain:my-nameserver-ip-address:TTL
# ... and for names in my other domain...
.my-other-domain:my-nameserver-ip-address:TTL
# Now to get on with mapping names to addresses, and vice versa
=i-want-this-to-map-both-reverse-and-forward.my-domain:ipaddress1:TTL
+i-only-want-this-to-map-forward-cos-its-an-alias.my-domain:ipaddess1:TTL
=another-bothways-map.my-domain:ipaddress2:TTL
+and-this-too-has-an-alias.my-domain:ipaddress2:TTL
=a-bothways-map.my-other-domain:ipaddress3:TTL
+an-alias.my-other-domain:ipaddress3:TTL

Surely that's not all bad?

You don't have to worry about keeping A and PTR records in sync.  In fact,
you don't have to worry about subdomains of in-addr.arpa at all, beyond
making sure that your clients are querying the right servers (which you'd
do anyway), that any delegations to your server are done correctly by your
parent (ditto) and that your data includes a nameserver entry for the
appropriate in-addr.arpa subdomains (again ditto).

I know there are management tools that automate synchronisation of forward
and reverse mappings in BIND zone files, but why should the
reverse-mapping information be in a file separate from the forward
information?  Once the three conditions above are met, why should we need
to administer the forward and reverse mappings separately?  BTW these are
not rhetorical questions; I'd love to hear input on this.  Myself, I
haven't thought about any subdomain of in-addr.arpa since installing
djbdns, besides the three points mentioned above.

In the end, it's all a question of priorities.  If compatibility with
existing config. and zone files is an issue, then djbdns may well be a
non-starter, my recall that there's a way to get it to read BIND zone
files notwithstanding.  If managing a DNS name space painlessly, securely
and reliably is, then it could well be.  It was for me.

For all the arguments against djb's attitude re. development and
licensing, it must be acknowledged that his keeping tight control of the
software has prevented it from suffering from feature bloat.  And since
it's open-source and you can distribute patches to it, there's no shortage
of patches to get it to do what you want.

Heppy new year,

|  George Karaolides   8, Costakis Pantelides St., |
|  tel:   +357 99 68 08 86  Strovolos, |
|  email: [EMAIL PROTECTED]   Nicosia CY 2057, |
|  web:   www.karaolides.com  Republic  of Cyprus  |





Re: Securing bind..

2002-01-02 Thread Craig Sanders
On Wed, Jan 02, 2002 at 03:23:01PM +0200, George Karaolides wrote:
 On Tue, 1 Jan 2002, Craig Sanders wrote:
  someday soon, someone's going to take the good ideas from djbdns,
  combine it with the good stuff from bind (including backwards
  compatibility with bind config  zonefile formats), add a few useful new
  ideas (e.g. an RXFR protocol that embedded the rsync protocol
  directly) to produce a fast, secure DNS daemon, and release it with a
  GPL-compatible license.  this will blow both bind  djbdns out of the
  water.
 
 Roll on the day!  When such a godsend appears, I'll grab it with both
 hands, provided of course that besides reverse compatibility with BIND
 config. files, it also gives you a new, simpler config. scheme.

what's so difficult about bind's zone files or configuration files?

they're simple, straight-forward, and intuitively obvious to anyone with
a functioning brain.  they're also extremely well-documented, with
numerous books available (_DNS  Bind_ published by ORA being the
must-have book for *any* DNS administrator)


 In the meantime, I submit that djbdns is OK unless you really, really
 want to stick to the BIND zonefile format, 

or unless you need something more than what djbdns's simplistic
limitations can provide.

 though I seem to recall hearing it can be made to read BIND zone
 files.  IMHO once you're used to it, the djbdns data file format is
 actually quite nice.  I've worked on both BIND and djbdns and I find
 the latter easier to use.  

 For example, the following ten entries
 would require four entries in named.conf and four zone files:

that would be because there's actually four different zones involved.

four zones == four config entries, four zone filesnot one file and a
bunch of half-arsed assumptions.


 # Nameserver for my network addesses...
 [djbdns config example deleted]
 
 Surely that's not all bad?

yes.  there's too much magic - i.e. fixed assumptions that may or may
not actually correspond to what you need. 

in other words, if what you need is *exactly* what DJB in his infinite
wisdom has catered for then you'll have no problem.  if you need
something even slightly different then you're screwed...and don't bother
complaining or asking to be accomodated because that's just evidence
that you're an idiot.

in other words, it works for the single scenario of one domain and one
set of IP addresses, with DNS for both hosted on the same server.  fine
for a leafnode site...no use at all for an ISP.

i.e. djbdns is only a toy, and something that works fine at the toy end
of the scale doesn't necessarily work at all when you need to scale it
up to a professional system catering for hundreds or thousands of
domains.


 You don't have to worry about keeping A and PTR records in sync. 

frankly, anyone who thinks that this is difficult should not be trusted
to have anything to do with managing DNS.


 I know there are management tools that automate synchronisation of
 forward and reverse mappings in BIND zone files, but why should the
 reverse-mapping information be in a file separate from the forward
 information?  Once the three conditions above are met, why should we
 need to administer the forward and reverse mappings separately?  

because :

a) the relationship between forward and reverse mapping(s) is completely
arbitrary,

and

b) the .in-addrp.arpa zone isn't always hosted on the same server as the
forward zone(s) - it isn't at all unusual for a NS which is
authoritative for a domain to NOT be authoritative for any corresponding
.in-addr.arpa domain(s).

leafnode sites may have simple configurations which suit djb's
assumptions but they're also the sites *least* likely to be
authoritative for the .in-addr.arpa zones for their IP addresses...most
leafnode sites don't own their own addresses, they rent or borrow them
from their ISP.




 For all the arguments against djb's attitude re. development and
 licensing, it must be acknowledged that his keeping tight control of
 the software has prevented it from suffering from feature bloat.  

prevents it from suffering from features too.

even worse, it prevents anyone other than djb from fixing or enhancing
it.

 And since it's open-source 

no, it is NOT open source.  the source may be available but it doesn't
meet the criteria of the Open Source Definition, which requires that the
source code be freely modifiable and redistributable AND that binaries
compiled from modified sources be redistributable.


 and you can distribute patches to it, there's no shortage of patches
 to get it to do what you want.

the rest of the unix world got sick of hunting for obscure patches to
programs ages ago - hunt for the original source, then hunt for half a
dozen patches to fix various problems or add required features and hope
that the patches will actually apply cleanly without any conflict.  that
was the way we had to do things back in the bad old days.  it sucked
then, and it still sucks now.

OTOH, djb thinks 

Re: Securing bind..

2002-01-02 Thread Craig Sanders
On Mon, Dec 31, 2001 at 12:52:23AM -0500, P Prince wrote:
  there are two major problems with all of bernstein's software.  the
  first is that it requires you to throw away your existing
  configuration...no big deal for a caching only name-server or if you
  only have one or two domains to serve.  a severe pain in the arse if
  you have hundreds or thousands of domains.
 
 This is crazy.  Anytime you change software packages, you must rewrite
 your configuration.  

it's not at all crazy to expect a new package which is supposed to
replace an existing service to provide some level of backwards
compatibility in order to facilitate the migration.

if not compatibility with the config or zonefile format, then at the
very least it should provide a 100% accurate automated translator.

djb refuses to understand that software migrations need to be planned,
they need to work smoothly with minimum fuss and minimum downtime, and
that backwards-compatibility with existing standards (de-facto or
otherwise) is mandatory. what he thinks of as legacy crap that should
be thrown away is actually working configuration that is serving the
needs of hundreds or thousands of users, all of whom will be extremely
pissed off if it stops working for a few days because of migration
difficulties.

until he understands this, most professional systems administrators are
going to ignore his code no matter how superior it is theoretically.
theoretical superiority is completely worthless in the face of practical
inability to use it.

i won't use his software for this reason, and because it's non-free.
both issues are show-stoppers as far as i'm concerned.


 And, if you or anyone you know manages thousands of domains, I'll mail
 you a crisp, clean 20 dollar bill.  (In order to be eligible, you must
 provide the name of your employer, so that I can avoid their service.)

i manage hundreds of domains myself.  around 700 primary domains and
around 950 secondaries.

i know several people who manage thousands of domains.

not everyone has tiny toy systems to design, develop, and manage.  some
people have real systems to look after.

and you know what? even though i don't personally look after tens of
thousands of domains, or know anyone who does, i'm still able to
recognise that someone, somewhere might do exactly that and not dismiss
the idea as crazy or ridiculous.  i can actually imagine a world bigger
than my current immediate needs.


  named.conf doesn't work with djbdns - a minor problem.
 
 This is a stupid argument.  httpd.conf doesn't work well with thttpd,
 and proftpd.conf doesn't work well at all with wu-ftpd.

as i said, named.conf is only a minor problem.  it doesn't matter much.

the real problem is that bind's zone files don't work with djbdns.
that's beyond a mere problem, that's idiotic.


  more importantly, bind style zonefiles don't work with djbdns - the
  idiot invented his own stupid format for zone files.  if djbdns had
  been backwards-compatible with bind zonefiles then it might have
  had some vague chance of replacing bind.
 
 Perhaps, but BIND invented its own zonefiles too.  What you fail to
 realize is how bad BIND zone files suck.

yes, i do fail to realise that because they don't suck.

what, exactly, is wrong with them?


  unfortunately, bernstein's software is severely limited by his
  views.
 
  he's a fairly good programmerbut a lousy systems administrator,
  with no concept of how real world sysadmins use tools or how they
  automate them.
 
 I hope you don't consider youself a good systems administrator,

i do, actually.  i'm only a mediocre programmer, but i'm a damn good
systems admin - which requires a completely different set of skills and
aptitudes than programming.  i've only met a few people who are as good
as me at systems admin stuff, and even fewer who are better.


craig

-- 
craig sanders [EMAIL PROTECTED]

Fabricati Diem, PVNC.
 -- motto of the Ankh-Morpork City Watch



Re: Securing bind..

2001-12-31 Thread nate
quote who=P Prince

 This is crazy.  Anytime you change software packages, you must
 rewrite your configuration.  And, if you or anyone you know manages
 thousands of domains, I'll mail you a crisp, clean 20 dollar bill.
 (In order to be eligible, you must provide the name of your
 employer, so that I can avoid their service.)

even if you don't change software packages you may have
to rewrite the config. i remember now when bind 8.2.3
or 8.3.2 or whatever came out about 2 years ago and they
started enforcing a new configuration change, was it
the $TTL at the top of the zone file? argh it caused
so many problems. i would not expect such a change
to be required in such a minor revision of the software.
i know it broke several dozen of my domains for
about a week while i tried to track down what was
wrong with it. and i think the kicker to upgrade
was a security problem in the previous version
so i rushed to upgrade, only to later find it
break almost everything :(

besides that though, bind has been pretty good to me.
it can be a chore to setup securely though.(at least
under debian 2.2)

nate





Re: Securing bind..

2001-12-31 Thread Thomas Seyrat
Russell Coker wrote:
 DNS cache machine sents out requests from source port 54 (not obscure - every 
 administrator of every DNS server on the net can easily discover this).
 Recursive requests go to port 53 (getting a DNS client to even talk to 
 another port is difficult or impossible depending on the client).

  By forcing the source port for recursive requests to a given fixed
  one, do you not make yourself more vulnerable to the spoofing attacks
  you were talking about, because the attacker does not have to predict
  the source port of the query ?

-- 
Thomas Seyrat.



Re: Securing bind..

2001-12-31 Thread Russell Coker
On Mon, 31 Dec 2001 05:31, Jor-el wrote:
  DNS cache machine sents out requests from source port 54 (not obscure -
  every administrator of every DNS server on the net can easily discover
  this).

   Not sure I follow what you are saying here. Are you saying that it
 is pretty easy for a DNS admin to figure out what port you are running the
 DNS server on (if so how?) or are you saying that port 54 is a well agreed
 upon port for this purpose. I doubt very much that it is the latter, since
 http://www.iana.org/assignments/port-numbers states that port 54 is
 assigned to XNS (whatever that is).

When a request has a source port of 54 the reply MUST have a destination port 
of 54.

A DNS request is allowed to have any address as a source address (as the 
client program may be a non-root application which gets the first UDP port it 
can find which will be somewhat random).

The ability to configure which source port is used for queries is a newer 
feature in bind (wasn't there in 4.x at least - not sure when it was added).

Having the same port used for sending out queries and receiving queries from 
other machines (pretty much a default setup) just makes things more difficult 
to manage, secure, and analyse.

-- 
http://www.coker.com.au/bonnie++/ Bonnie++ hard drive benchmark
http://www.coker.com.au/postal/   Postal SMTP/POP benchmark
http://www.coker.com.au/projects.html Projects I am working on
http://www.coker.com.au/~russell/ My home page



Re: Securing bind..

2001-12-31 Thread Russell Coker
On Mon, 31 Dec 2001 01:20, jernej horvat wrote:
 On Sunday 30 December 2001 22:58, Russell Coker wrote:
  2.4.x kernels support the --bind option to mount which avoids the syslogd

 yep. linux v2.4.x and bind v9.x are easier to set up. debian has almost
 out-of-the box chroot solution.

Are the root servers using bind9 yet?

  I disagree with the supposed security benefits of disabling zone
  transfers,

 Why? Do you need the whole zone when you just need to resolve one host or
 IP ?

Sometimes getting a copy of the zone helps to discover problems.

 Do you give away all your personal data when someone asks you for your name
 ?

I give away data that's publically available anyway.  If data isn't public 
then it shouldn't be in a public place such as a DNS zone file.  Knowing 
which IP addresses are in use is no secret, you can always check on IP 
address block assignments and scan them all.

 And this is what djb has to say for zone transfers :-)

 Zone transfers are an archaic alternative mechanism for copying DNS
 information.

When djb starts releasing his software under better license agreements that 
make it realistically possible to use it, and when he makes his software 
interoperate better with the rest of the world then people will take more 
notice of him.

-- 
http://www.coker.com.au/bonnie++/ Bonnie++ hard drive benchmark
http://www.coker.com.au/postal/   Postal SMTP/POP benchmark
http://www.coker.com.au/projects.html Projects I am working on
http://www.coker.com.au/~russell/ My home page



Re: Securing bind..

2001-12-31 Thread Russell Coker
On Mon, 31 Dec 2001 06:52, P Prince wrote:
  there are two major problems with all of bernstein's software.  the
  first is that it requires you to throw away your existing
  configuration...no big deal for a caching only name-server or if you
  only have one or two domains to serve.  a severe pain in the arse if you
  have hundreds or thousands of domains.

 This is crazy.  Anytime you change software packages, you must rewrite your
 configuration.

If two programs perform the same task then why can't they use the same config 
file?  Writing a program to support two different formats of config file 
isn't so difficult.

 And, if you or anyone you know manages thousands of
 domains, I'll mail you a crisp, clean 20 dollar bill.  (In order to be
 eligible, you must provide the name of your employer, so that I can avoid
 their service.)

Please mail a $20 bill to Craig and one to me as well.

While working for Versatel Telecom BV in Amsterdam I was running the 
24hoursnet service.  That service had over 4000 domains setup in bind (with 
scripts to create bind zone files from LDAP).

Why would you want to avoid such a service?  It doesn't make sense for every 
small company that wants a web site to have to run their own DNS etc.  It 
makes sense for a telco to run the sites for thousands of small companies, 
telcos can afford to pay people such as Craig and myself to run their servers 
in a reliable and secure fashion instead of having the secretary try to setup 
a set of ISP servers (with all the security and reliability problems you'd 
expect).

   Broken as many of them are, they still work quite well with djbdns,
   thank you.
 
  named.conf doesn't work with djbdns - a minor problem.

 This is a stupid argument.  httpd.conf doesn't work well with thttpd, and
 proftpd.conf doesn't work well at all with wu-ftpd.

Consider mail servers.  Currently there is a range of mail servers that can 
deliver to /var/mail/user-name or ~/Maildir/ storage and which honour 
.forward files, Postfix being a good example.  I can change a Postfix 
installation to use Procmail for delivery and it'll deliver mail in the same 
way.  If I choose to switch from Postfix to another server then it's not 
difficult to find another server using .forward files and /etc/aliases etc 
(NB Qmail does not do this).

Then there's about 6 POP servers and about 3 IMAP servers I can choose from 
(actually there's probably more, I'm just thinking of ones I've used or heard 
good reports about) which all use the same data store.

Contrast this to using Cyrus, Netscape iPlanet mail server, Exchange, Notes, 
or another mail server which has it's own strange and unique format for 
everything.

an additional part of the price you pay is djb's moronic non-free
software license
  
   Really?
  
 http://cr.yp.to/distributors.html
 
  yes, really.  non-free.
 
  if you don't understand WHY it's non-free then read the DFSG again.

 This doesn't deserve a response.

There is no response.  DJB software is not in Debian for a reason...

  To UNSUBSCRIBE, email to [EMAIL PROTECTED]
  with a subject of unsubscribe. Trouble? Contact
  [EMAIL PROTECTED]

PS  When quoting messages please trim out the .sig lines etc.  It just wastes 
bandwidth and doesn't gain anything.

-- 
http://www.coker.com.au/bonnie++/ Bonnie++ hard drive benchmark
http://www.coker.com.au/postal/   Postal SMTP/POP benchmark
http://www.coker.com.au/projects.html Projects I am working on
http://www.coker.com.au/~russell/ My home page



Re: Securing bind..

2001-12-31 Thread George Karaolides


On Mon, 31 Dec 2001, Petre Daniel wrote:

 thank you all very much.
 you're right.if one doesn't have anything useful to say i'll recommand him
 to let others help..
 thx guys.

Hi Petre,

Maybe the initial suggestion to use djbdns wasn't worded in the best
possible way, but might I suggest that you consider the possibilities
djbdns, which could perhaps make your life a bit simpler?

Your requirement was for a DNS server which does name resolution for
clients on your internal net and serves out names for a few .ro domains to
the Internet at large.  So here are my points:

- djbdns comes with the security features you require out of the box.

- Yours does not sound like a large and complex setup with years of BIND
configuration development behind it, so you have little to lose if you do
try djbdns.

- In my experience, it is very easy to set up a system like the one
you describe using djbdns.

- It also sounds like you're busy enough, so In My Humble Opinion(tm) you
will save time administering djbdns.

Sources of djbdns debs:

potato:

Gerrit Pape has some unofficial debs at the following apt source:

deb ftp://ftp.innominate.org/pub/pape/Debian potato unofficial innominate

apt-get install djbdns

woody or sid:

There are official installer packages:

apt-get install djbdns-installer

If you do decide to try it out, then I am at your disposal to help with
any setup queries you may have.

Best regards and a happy new year,

|  George Karaolides   8, Costakis Pantelides St., |
|  tel:   +357 99 68 08 86  Strovolos, |
|  email: [EMAIL PROTECTED]   Nicosia CY 2057, |
|  web:   www.karaolides.com  Republic  of Cyprus  |



Re: Securing bind..

2001-12-31 Thread Dimitri Maziuk
* Craig Sanders ([EMAIL PROTECTED]) spake thusly:
...
 
 unfortunately, bernstein's software is severely limited by his views.
 
 he's a fairly good programmerbut a lousy systems administrator, with
 no concept of how real world sysadmins use tools or how they automate
 them.

Did he finally figure out how to use subdirectories in his 
source tree?

Dima (just curious)
-- 
The wombat is a mixture of chalk and clay used for respiration.  -- MegaHal



Re: Securing bind..

2001-12-31 Thread Donovan Baarda
On Mon, Dec 31, 2001 at 04:15:18AM +0100, jernej horvat wrote:
 On Monday 31 December 2001 03:34, Michael D. Schleif wrote:
 
  http://cr.yp.to/distributors.html
 
 Because of that policy there are no precompiled packages of djbdns, because:
 
 You may distribute a precompiled package if 
  - installing your package produces exactly the same files, in exactly the 
 same locations, that a user would obtain by installing one of my packages 
 listed above etc.
 
 Free?
 
  If you are pleased with chasing the complexities inherent in overly
  complex tools, then, please, keep them uptodate . . .
 
 compiling the whole package [1], installing it in paths that djb thinks are 
 ok. complex?
[...]
 there is an alternative = http://dnrd.nevalabs.org/

An interesting thing about djb is he does have knack for identifying real
problems with existing defacto standard software and re-inventing it.

What then follows is fierce flamewars about the relative merits of the old
vs djb software/licence/etc. In summary the djb implementation is full of
good ideas and raises valid concerns about the original implementation, but
is crippled by a crappy licence, disrespect for standards, and wierd
configuration paradigm.

Eventually, this leads to yet another implementation or three that takes
djb's ideas and addresses the licence, standards, and configuration issues.

sendmail - qmail - postfix,exim,etc
bind - djbdns - ??

The sad thing is if djb stopped using his crappy licence, there would be no
need for the n+1 implementations his re-invention spawns, because the
community could adopt his software and resolve the other issues to their own
satisfaction.


-- 
--
ABO: finger [EMAIL PROTECTED] for more info, including pgp key
--



Re: Securing bind..

2001-12-31 Thread Craig Sanders
On Tue, Jan 01, 2002 at 01:18:43PM +1100, Donovan Baarda wrote:
 An interesting thing about djb is he does have knack for identifying
 real problems with existing defacto standard software and re-inventing
 it.

he also reinvents things that don't have any significant problems,
sometimes just because he won't admit that a particular programmer has
ever done anything of worth.  ucspi-tcp, for example...this abomination
is a clumsy mess compared to the inetd + tcpd that everyone else uses.

 What then follows is fierce flamewars about the relative merits of the
 old vs djb software/licence/etc. In summary the djb implementation is
 full of good ideas and raises valid concerns about the original
 implementation, but is crippled by a crappy licence, disrespect for
 standards, and wierd configuration paradigm.

well said!


 Eventually, this leads to yet another implementation or three that
 takes djb's ideas and addresses the licence, standards, and
 configuration issues.

while it's true that he's sometimes the first to actually write code to
provide alternative implementations (and action is worth a lot more than
mere talk), it's not true that they're solely his ideas.  people had
been bitching about sendmail for many years before qmail came along,
many of the flaws (both implementation detail AND design) were well
known.


 The sad thing is if djb stopped using his crappy licence, there would
 be no need for the n+1 implementations his re-invention spawns,
 because the community could adopt his software and resolve the other
 issues to their own satisfaction.

well said, again.

you've hit the nail right on the head.

while his stuff can often be used as a sign-post pointing out
directions to take (and to avoid), but it can't be used unless you're
willing to trap yourself into a dead-end...i almost fell into that trap
with qmail (actually did on a few servers), but won't fall for it again.
djb's software isn't free, and can't/won't evolve to meet future needs.


someday soon, someone's going to take the good ideas from djbdns,
combine it with the good stuff from bind (including backwards
compatibility with bind config  zonefile formats), add a few useful new
ideas (e.g. an RXFR protocol that embedded the rsync protocol
directly) to produce a fast, secure DNS daemon, and release it with a
GPL-compatible license.  this will blow both bind  djbdns out of the
water.

...kind of like postfix did to sendmail  qmail.

i had high hopes for the DENTS project a few years back they looked like
they were really going to solve many of bind's problems, and their stuff
was GPLed.  it got off to a great start but unfortunately, the project
seems to have died.


maybe there's still some hope...sourceforge lists several DNS daemon
projects: 

http://sourceforge.net/softwaremap/trove_list.php?form_cat=149discrim=238

moodns  CustomDNS are two that i hadn't heard of before.  moodns sounds
a bit like what DENTS was going to be.  CustomDNS is in java so i can't
bring myself to take it seriously.

La MaraDNS i looked at about a year ago and it has an even dumber
zonefile format than djbdns (if that's possible).


craig

-- 
craig sanders [EMAIL PROTECTED]

Fabricati Diem, PVNC.
 -- motto of the Ankh-Morpork City Watch



Securing bind..

2001-12-30 Thread Petre Daniel
Well,i know Karsten's on my back and all,but i have not much time to 
learn,and too many things to do at my firm,so i am asking if one of you has 
any idea how can bind be protected against that DoS attack and if someone 
has some good firewall for a dns server ( that resolves names for internal 
clients and also keeps some .ro domains) please post it to the list.. both 
ipchains and iptables variants are welcome..

thank you.

Petre L. Daniel,System Administrator
Canad Systems Pitesti Romania,
http://www.cyber.ro, email:[EMAIL PROTECTED]
Tel:+4048220044, +4048206200



Re: Securing bind..

2001-12-30 Thread nate
quote who=Petre Daniel
 Well,i know Karsten's on my back and all,but i have not much time
 to  learn,and too many things to do at my firm,so i am asking if
 one of you has  any idea how can bind be protected against that DoS
 attack and if someone  has some good firewall for a dns server (
 that resolves names for internal  clients and also keeps some .ro
 domains) please post it to the list.. both  ipchains and iptables
 variants are welcome..
 thank you.

i ran a search for dos in my recent debian-user archives
and did not come up with anything(related), which DOS attack?
i monitor bugtraq and vuln-dev closely and have not seen
any mention of bind for a REAL long time.

i run BIND 8 as all my nameservers. i change the
configuration from what debian has significantly.
everything resides under /etc/bind. everything
is chowned named.named everything is readable by
only user named/group named. named runs in chroot
in /etc/bind and runs as user named group named.
i restrict zone transfers to authorized servers only.
if needed(like on a firewall or gateway), i have
it bind to a specific interface(the internal one,
or the loopback or both depending on your needs).
more recently i have started working with syslog-ng
and remote logging, i configured syslogd on
the debian systems to create a log socket inside
the bind chroot enviornment so i can send the named
logs to the syslog server(because it cannot access
/dev/log otherwise). before that i had bind log
to a file inside the chroot enviornment.

bind has worked good for me for years. if its configured
good it can be quite secure. i reccomend the book
from oreilley(sp?) DNS  Bind, thats where i initially
learned about the chroot and running as non root
uid/gid and access lists. the information is elsewhere
as well but i found that book very interesting and
useful. you can go farther by restricting queries
via access lists as well, but this(in my experience)
will break any nameserver that is primary or
secondary for a domain, as nobody but those in
the access lists will be able to query for the
domain info. useful for the more paranoid
in a caching-only enviornment(or at least
a non-public DNS).

hope this helps!

nate





Re: Securing bind..

2001-12-30 Thread Russell Coker
On Sun, 30 Dec 2001 11:18, Petre Daniel wrote:
 Well,i know Karsten's on my back and all,but i have not much time to
 learn,and too many things to do at my firm,so i am asking if one of you has
 any idea how can bind be protected against that DoS attack and if someone
 has some good firewall for a dns server ( that resolves names for internal
 clients and also keeps some .ro domains) please post it to the list.. both
 ipchains and iptables variants are welcome..
 thank you.

Which DOS attack are you referring to?

For making bind secure I suggest running it as non-root using authbind and 
build your kernel with OpenWall, LSM, or GRSecurity so that stack overflows 
don't get anywhere.  Then have a script to restart it if it dies.

Also don't allow recursion from outside machines.

Another possibility is to have the port for outgoing connections be something 
other than 53 (54 seems unused) and use iptables or ipchains to block data 
from the outside world coming to port 53.

-- 
http://www.coker.com.au/bonnie++/ Bonnie++ hard drive benchmark
http://www.coker.com.au/postal/   Postal SMTP/POP benchmark
http://www.coker.com.au/projects.html Projects I am working on
http://www.coker.com.au/~russell/ My home page



Re: Securing bind..

2001-12-30 Thread Petre Daniel
Hello Nate,it seems i cant get the link of the advisory.Its about some sort 
of amplyfing flood,when an ousider makes spoofed queries to the bind daemon 
and another one ,the victim is flooded along with me the attacked..

Thx..
At 02:56 AM 12/30/01 -0800, nate wrote:

quote who=Petre Daniel
 Well,i know Karsten's on my back and all,but i have not much time
 to  learn,and too many things to do at my firm,so i am asking if
 one of you has  any idea how can bind be protected against that DoS
 attack and if someone  has some good firewall for a dns server (
 that resolves names for internal  clients and also keeps some .ro
 domains) please post it to the list.. both  ipchains and iptables
 variants are welcome..
 thank you.

i ran a search for dos in my recent debian-user archives
and did not come up with anything(related), which DOS attack?
i monitor bugtraq and vuln-dev closely and have not seen
any mention of bind for a REAL long time.

i run BIND 8 as all my nameservers. i change the
configuration from what debian has significantly.
everything resides under /etc/bind. everything
is chowned named.named everything is readable by
only user named/group named. named runs in chroot
in /etc/bind and runs as user named group named.
i restrict zone transfers to authorized servers only.
if needed(like on a firewall or gateway), i have
it bind to a specific interface(the internal one,
or the loopback or both depending on your needs).
more recently i have started working with syslog-ng
and remote logging, i configured syslogd on
the debian systems to create a log socket inside
the bind chroot enviornment so i can send the named
logs to the syslog server(because it cannot access
/dev/log otherwise). before that i had bind log
to a file inside the chroot enviornment.

bind has worked good for me for years. if its configured
good it can be quite secure. i reccomend the book
from oreilley(sp?) DNS  Bind, thats where i initially
learned about the chroot and running as non root
uid/gid and access lists. the information is elsewhere
as well but i found that book very interesting and
useful. you can go farther by restricting queries
via access lists as well, but this(in my experience)
will break any nameserver that is primary or
secondary for a domain, as nobody but those in
the access lists will be able to query for the
domain info. useful for the more paranoid
in a caching-only enviornment(or at least
a non-public DNS).

hope this helps!

nate




--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]


Petre L. Daniel,System Administrator
Canad Systems Pitesti Romania,
http://www.cyber.ro, email:[EMAIL PROTECTED]
Tel:+4048220044, +4048206200



Re: Securing bind..

2001-12-30 Thread Alvin Oga

hi ya petra

lots of different kind of floods...and DoS attacks...
what kind of attack are oyu under ???
-- what shows up in tcpdump when monitoring all traffic 
on the wire ???

if you're an amplifier .. you have to turn off icmp broadcasts 
at your incoming cisco router/fw

to test if you are a smurf amplifier.. see the links at
http://www.Linux-Sec.net/harden/smurf.fix.txt

to test your DNS config
http://www.Linux-Sec.net/Audit/audit_tools.gwif.html#DNS

to harden your dns servers... and spoof protecting etc ..
http://www.Linux-Sec.net/Harden/server.gwif.html#DNS

and lot of other stuff to harden too in addition to dns
http://www.Linux-Sec.net/Harden/

have fun
alvin

On Sun, 30 Dec 2001, Petre Daniel wrote:

 Hello Nate,it seems i cant get the link of the advisory.Its about some sort 
 of amplyfing flood,when an ousider makes spoofed queries to the bind daemon 
 and another one ,the victim is flooded along with me the attacked..
 Thx..



Re: Securing bind..

2001-12-30 Thread Petre Daniel

thankz a lot.
Well the thing is,after i've read that advisory,2 days laterz my network 
was flooded,like the the traffic was very slow and nothing resolved anymore..
I noticed the stranged thing that the main ns/mailserver (bind 9.1)had 
difficulties resolving things around,even internally,so mail was kindof 
blocked..

Thx for links..
its Daniel..


At 06:12 AM 12/30/01 -0800, Alvin Oga wrote:


hi ya petra

lots of different kind of floods...and DoS attacks...
what kind of attack are oyu under ???
-- what shows up in tcpdump when monitoring all traffic
on the wire ???

if you're an amplifier .. you have to turn off icmp broadcasts
at your incoming cisco router/fw

to test if you are a smurf amplifier.. see the links at
http://www.Linux-Sec.net/harden/smurf.fix.txt

to test your DNS config
http://www.Linux-Sec.net/Audit/audit_tools.gwif.html#DNS

to harden your dns servers... and spoof protecting etc ..
http://www.Linux-Sec.net/Harden/server.gwif.html#DNS

and lot of other stuff to harden too in addition to dns
http://www.Linux-Sec.net/Harden/

have fun
alvin

On Sun, 30 Dec 2001, Petre Daniel wrote:

 Hello Nate,it seems i cant get the link of the advisory.Its about some 
sort
 of amplyfing flood,when an ousider makes spoofed queries to the bind 
daemon

 and another one ,the victim is flooded along with me the attacked..
 Thx..


Petre L. Daniel,System Administrator
Canad Systems Pitesti Romania,
http://www.cyber.ro, email:[EMAIL PROTECTED]
Tel:+4048220044, +4048206200



Re: Securing bind..

2001-12-30 Thread Jor-el
Russell,

On Sun, 30 Dec 2001, Russell Coker wrote:

 
 Also don't allow recursion from outside machines.

Why does this help?

 
 Another possibility is to have the port for outgoing connections be something 
 other than 53 (54 seems unused) and use iptables or ipchains to block data 
 from the outside world coming to port 53.
 
Security through obscurity? Quite frankly, I find this strategy
annoying. Nothing annoys me more than finding out that I have to open up
yet another hole in my firewall so that I can access another idiot who has
set up his webserver at port 1080, or 8080 or whatever his fancy pleases.
If your service isnt secure at the IANA designated port, why would it be
secure at the new one?

Of course, in the case of DNS servers, you could be OK, since you
do want to lessen the number of folks who use your services (right?). But
in general, I consider this to be poor advice.

Regards,
Jor-el



Re: Securing bind..

2001-12-30 Thread P Prince
The eaisest and most failsafe way to secure bind is to install djbdns.

Google is your friend.

-Tech

On Sun, 30 Dec 2001, Petre Daniel wrote:

 Well,i know Karsten's on my back and all,but i have not much time to
 learn,and too many things to do at my firm,so i am asking if one of you has
 any idea how can bind be protected against that DoS attack and if someone
 has some good firewall for a dns server ( that resolves names for internal
 clients and also keeps some .ro domains) please post it to the list.. both
 ipchains and iptables variants are welcome..
 thank you.

 Petre L. Daniel,System Administrator
 Canad Systems Pitesti Romania,
 http://www.cyber.ro, email:[EMAIL PROTECTED]
 Tel:+4048220044, +4048206200


 --
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Securing bind..

2001-12-30 Thread Thomas Seyrat
Jor-el wrote:
  Another possibility is to have the port for outgoing connections be 
  something 
  other than 53 (54 seems unused) and use iptables or ipchains to block data 
  from the outside world coming to port 53.
[...]
   Of course, in the case of DNS servers, you could be OK, since you
 do want to lessen the number of folks who use your services (right?). But
 in general, I consider this to be poor advice.

  That is perfectly true.

  In fact, restricting access to the (recursive) nameserver should be
  considered not only in a matter of IP filtering but also in BIND's own
  configuration (using allow-query and allow-recursion sets).

  Authoritative name serving is a totally different matter, since you
  can not predict the source adress.

-- 
Thomas Seyrat.



Re: Securing bind..

2001-12-30 Thread Jacob Elder
On Sun, Dec 30, 2001 at 12:46:55PM -0500, P Prince wrote:
 The eaisest and most failsafe way to secure bind is to install djbdns.

Troll.

 
 Google is your friend.
 
 -Tech
 
 On Sun, 30 Dec 2001, Petre Daniel wrote:
 
  Well,i know Karsten's on my back and all,but i have not much time to
  learn,and too many things to do at my firm,so i am asking if one of you has
  any idea how can bind be protected against that DoS attack and if someone
  has some good firewall for a dns server ( that resolves names for internal
  clients and also keeps some .ro domains) please post it to the list.. both
  ipchains and iptables variants are welcome..
  thank you.
 
  Petre L. Daniel,System Administrator
  Canad Systems Pitesti Romania,
  http://www.cyber.ro, email:[EMAIL PROTECTED]
  Tel:+4048220044, +4048206200
 
 
  --
  To UNSUBSCRIBE, email to [EMAIL PROTECTED]
  with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
 
 
 
 -- 
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
 
 

-- 
Jacob Elder
http://www.lucidpark.net/



Re: Securing bind..

2001-12-30 Thread jernej horvat
On Sunday 30 December 2001 18:46, P Prince wrote:
 The eaisest and most failsafe way to secure bind is to install djbdns.

If you have nothing to say - do not speak.
--
Configuration options for BIND are listed on  
http://www.isc.org/products/BIND/docs/config/

List of URL that might be usefull is here:
http://www.isc.org/products/BIND/contributions.html

Cricket Liu's presentation on how to secure BIND:
http://www.acmebw.com/papers/securing.pdf

Securing DNS:
http://www.psionic.com/papers/dns/
-
acl defines hosts or networks that you can either allow or deny access

version defines version number that bind answers if asked for it. 
(like: 'this space for rent. contact hostmaster' ;])

blackhole defines hosts or networks that bind will not answer at all. 
(ie.: 10.x.x.x, 192.168.x.x, 224.x)

allow-recursion/allow-query defines hosts or networks that can use your 
server to get non-auth answers or do recursive queries.

listen-on defines interfaces and ports bind will listen on. If you don't 
have any domains to server to the outside world, you just list the intranet 
(NAT) interface in here.

forward only means that you will forward all request (and work ;]) to the 
dns servers listed in forwarders.
-- 
BOFH excuse #57:

Groundskeepers stole the root password



Re: Securing bind..

2001-12-30 Thread Russell Coker
On Sun, 30 Dec 2001 16:17, Jor-el wrote:
 On Sun, 30 Dec 2001, Russell Coker wrote:
  Also don't allow recursion from outside machines.

 Why does this help?

When someone sends a recursive query to your server then they know (with a 
good degree of accuracy) what requests are going to be made by that server 
and what responses will be expected.  So you can send a recursive query for 
www.microsoft.com, then send a dozen packets appearing to be responses from 
the Microsoft DNS servers giving an IP address of one of your servers.  While 
you're at it you make sure that the false packets you sent had long TTL 
entries so that they stay in the cache for a while.  Then suddenly you have 
all clients of that DNS server thinking that the MS servers are on your IP 
addresses (with lots of potential for abuse).

Another issue is that if at some future time a bug is discovered in bind that 
results in a security hole when doing recursion then you want to only be 
vulnerable to your own network (who you can hunt down if they abuse it) 
rather than the rest of the world.

  Another possibility is to have the port for outgoing connections be
  something other than 53 (54 seems unused) and use iptables or ipchains to
  block data from the outside world coming to port 53.

   Security through obscurity? Quite frankly, I find this strategy

Please read my messages carefully before flaming me.

DNS cache machine sents out requests from source port 54 (not obscure - every 
administrator of every DNS server on the net can easily discover this).

Recursive requests go to port 53 (getting a DNS client to even talk to 
another port is difficult or impossible depending on the client).

iptables/ipchains blocks access to port 53 from untrusted IPs (IE everything 
outside your LAN or dialup pool).

Bind will not be expecting any data other than replies to it's requests on 
port 54 (the port that is open to the outside world) so even if you screw up 
in your configuration of bind to not allow recursion from the outside world 
you're still protected.

Smart people NEVER rely on only one layer of protection if they can avoid it.

-- 
http://www.coker.com.au/bonnie++/ Bonnie++ hard drive benchmark
http://www.coker.com.au/postal/   Postal SMTP/POP benchmark
http://www.coker.com.au/projects.html Projects I am working on
http://www.coker.com.au/~russell/ My home page



Re: Securing bind..

2001-12-30 Thread Russell Coker
On Sun, 30 Dec 2001 22:02, jernej horvat wrote:
 On Sunday 30 December 2001 18:46, P Prince wrote:
  The eaisest and most failsafe way to secure bind is to install djbdns.

 If you have nothing to say - do not speak.

Perhaps a discussion of the relative merits of djbdns and bind is in order.

I wanted to move to djbdns at one time, but it was too painful.  Everything 
had to be redone (the config files were all incompatible), the documentation 
was inadequate, and there was no good amount of support on the net.

Has djbdns improved since then?

 Securing DNS:
 http://www.psionic.com/papers/dns/

2.4.x kernels support the --bind option to mount which avoids the syslogd 
hackery described in this URL.  Also the authbind method supported by Debian 
is much more powerful and useful than using the chuid() functionality in 
bind.  Both these things aren't mentioned.

 Cricket Liu's presentation on how to secure BIND:
 http://www.acmebw.com/papers/securing.pdf

I disagree with the supposed security benefits of disabling zone transfers, 
it's just security by obscurity.  Also when idiots read such advice and take 
it to heart it gets in the way when you have a genuine need for zone 
transfers.

-- 
http://www.coker.com.au/bonnie++/ Bonnie++ hard drive benchmark
http://www.coker.com.au/postal/   Postal SMTP/POP benchmark
http://www.coker.com.au/projects.html Projects I am working on
http://www.coker.com.au/~russell/ My home page



Re: Securing bind..

2001-12-30 Thread Petre Daniel

thank you all very much.
you're right.if one doesn't have anything useful to say i'll recommand him 
to let others help..

thx guys.

At 10:02 PM 12/30/01 +0100, jernej horvat wrote:

On Sunday 30 December 2001 18:46, P Prince wrote:
 The eaisest and most failsafe way to secure bind is to install djbdns.

If you have nothing to say - do not speak.
--
Configuration options for BIND are listed on
http://www.isc.org/products/BIND/docs/config/

List of URL that might be usefull is here:
http://www.isc.org/products/BIND/contributions.html

Cricket Liu's presentation on how to secure BIND:
http://www.acmebw.com/papers/securing.pdf

Securing DNS:
http://www.psionic.com/papers/dns/
-
acl defines hosts or networks that you can either allow or deny access

version defines version number that bind answers if asked for it.
(like: 'this space for rent. contact hostmaster' ;])

blackhole defines hosts or networks that bind will not answer at all.
(ie.: 10.x.x.x, 192.168.x.x, 224.x)

allow-recursion/allow-query defines hosts or networks that can use your
server to get non-auth answers or do recursive queries.

listen-on defines interfaces and ports bind will listen on. If you don't
have any domains to server to the outside world, you just list the intranet
(NAT) interface in here.

forward only means that you will forward all request (and work ;]) to the
dns servers listed in forwarders.
--
BOFH excuse #57:

Groundskeepers stole the root password


Petre L. Daniel,System Administrator
Canad Systems Pitesti Romania,
http://www.cyber.ro, email:[EMAIL PROTECTED]
Tel:+4048220044, +4048206200



Re: Securing bind..

2001-12-30 Thread P Prince
Hello,

On Sun, 30 Dec 2001, Russell Coker wrote:

 On Sun, 30 Dec 2001 22:02, jernej horvat wrote:
  On Sunday 30 December 2001 18:46, P Prince wrote:
   The eaisest and most failsafe way to secure bind is to install djbdns.
 
  If you have nothing to say - do not speak.

Heh, I didn't send a blank message.  The point was clear.  It was not a
'troll'.

 Perhaps a discussion of the relative merits of djbdns and bind is in order.

Certainly.

 I wanted to move to djbdns at one time, but it was too painful.  Everything
 had to be redone (the config files were all incompatible), the documentation
 was inadequate, and there was no good amount of support on the net.

Of course the config files are incompatible - djbdns's file format is far
simpler.

The documentation is excellent - and simple, because the system is simple.

 Has djbdns improved since then?

I don't think djbdns has ever been at the level you suggest.

I strongly *strongly* suggest that anyone considering setting up DNS, be it
BIND or djbdns, check out Daniel Bernstein's site on the subject,
http://cr.yp.to/djbdns.html

  Securing DNS:
  http://www.psionic.com/papers/dns/

 2.4.x kernels support the --bind option to mount which avoids the syslogd
 hackery described in this URL.  Also the authbind method supported by Debian
 is much more powerful and useful than using the chuid() functionality in
 bind.  Both these things aren't mentioned.

  Cricket Liu's presentation on how to secure BIND:
  http://www.acmebw.com/papers/securing.pdf

 I disagree with the supposed security benefits of disabling zone transfers,
 it's just security by obscurity.  Also when idiots read such advice and take
 it to heart it gets in the way when you have a genuine need for zone
 transfers.

What is wrong with security by obscurity?  It's an excellent strategy, albeit
not a complete one.

 --
 http://www.coker.com.au/bonnie++/ Bonnie++ hard drive benchmark
 http://www.coker.com.au/postal/   Postal SMTP/POP benchmark
 http://www.coker.com.au/projects.html Projects I am working on
 http://www.coker.com.au/~russell/ My home page

Yours,
-Tech

 --
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Securing bind..

2001-12-30 Thread nate
quote who=Petre Daniel
 Hello Nate,it seems i cant get the link of the advisory.Its about
 some sort  of amplyfing flood,when an ousider makes spoofed queries
 to the bind daemon  and another one ,the victim is flooded along
 with me the attacked.. Thx..


if you do find it please pass it along to me, i am interested
in what it has to say especially if its something recent.
if you can send it to my real email address:
aphro.at.aphroland.dot.org

if its sent to debian-user@ it may get lost in that inbox
so many messages go there :)

thanks!!

nate





Re: Securing bind..

2001-12-30 Thread jernej horvat
On Sunday 30 December 2001 22:58, Russell Coker wrote:

 2.4.x kernels support the --bind option to mount which avoids the syslogd
yep. linux v2.4.x and bind v9.x are easier to set up. debian has almost 
out-of-the box chroot solution.

 I disagree with the supposed security benefits of disabling zone transfers,
Why? Do you need the whole zone when you just need to resolve one host or IP ?

Do you give away all your personal data when someone asks you for your name ? 

And this is what djb has to say for zone transfers :-)

Zone transfers are an archaic alternative mechanism for copying DNS 
information.

http://cr.yp.to/djbdns/faq/axfrdns.html#what
-
 iptables/ipchains blocks access to port 53 from untrusted IPs 

What you can also do with bogus option in BIND.
Or with ACLs and allow-query.
-- 



Re: Securing bind..

2001-12-30 Thread Michael D. Schleif

jernej horvat wrote:
 

[ snip ]

 And this is what djb has to say for zone transfers :-)
 
 Zone transfers are an archaic alternative mechanism for copying DNS
 information.
 
 http://cr.yp.to/djbdns/faq/axfrdns.html#what

``Zone transfers are an archaic alternative mechanism for copying DNS
information. Instead of immediately sending new data to the slaves, you
run a zone-transfer service that accepts periodic connections from the
slaves; your users complain while they're waiting for the slaves to
check for new data. The zone-transfer protocol isn't a modular
file-transfer system; it is an ad-hoc system tied to the details of DNS.
The protocol has terrible compression and no security. Every new zone on
the master requires manual reconfiguration of the slaves. Zone transfers
lose all information about client differentiation and scheduled record
changes.''

It is always amazing to me how *intelligent* people try to make their
point by taking other people's words out of context . . .

Notice, that bind, current or not, has no answers to djb's concerns, as
expressed in his complete paragraph ;

[ snip ]

-- 

Best Regards,

mds
mds resource
888.250.3987

Dare to fix things before they break . . .

Our capacity for understanding is inversely proportional to how much we
think we know.  The more I know, the more I know I don't know . . .



Re: Securing bind..

2001-12-30 Thread jernej horvat
On Monday 31 December 2001 01:29, Michael D. Schleif wrote:

...
 It is always amazing to me how *intelligent* people try to make their
 point by taking other people's words out of context . . .
...
  http://cr.yp.to/djbdns/faq/axfrdns.html#what
i added the URL so i that everyone could look it up. the WHOLE text.

i added another quote from that URL..

 Notice, that bind, current or not, has no answers to djb's concerns, as
 expressed in his complete paragraph ;

There has been some work on improving the zone-transfer protocol: a NOTIFY 
mechanism that wakes up the slaves (after a delay, and without a failure 
notice when something goes wrong); an experimental IXFR mechanism for 
incremental zone transfers (although the BIND implementation doesn't work for 
zone files modified by hand or by external tools); and several proposed 
security mechanisms, notably TSIG. BIND's May 2001 IXFR and TSIG 
implementations are supposedly free of the bugs that caused crashes, data 
corruption, and root exploits in previous versions of BIND. The BIND company 
occasionally mumbles about imaginary tools to handle new zones and client 
differentiation. By combining all these tools, you can finally approach the 
functionality of a trivial rsync script. Wow.

Wow.  May 2001.it is 30.12.2001 now and BIND 9.2.0 is out.

http://www.isc.org/products/BIND/bind9.html   

DNS Security 
 DNSSEC (signed zones)
 TSIG (signed DNS requests) 
 IP version 6 

 Answers DNS queries on IPv6 sockets 
IPv6 resource records (A6, DNAME, etc.) 
Bitstring Labels 
Experimental IPv6 Resolver Library 
 DNS Protocol Enhancements 

 IXFR, DDNS, Notify, EDNS0 
Improved standards conformance 
Views 
 One server process can provide multiple views of the DNS namespace, e.g. 
an inside view to certain clients, and an outside view to others. 
 Multiprocessor Support 
Improved Portability Architecture 
-
djb should update his security concerned pages.
-- 



Re: Securing bind..

2001-12-30 Thread Michael D. Schleif

jernej horvat wrote:
 
 On Monday 31 December 2001 01:29, Michael D. Schleif wrote:
 
 ...
  It is always amazing to me how *intelligent* people try to make their
  point by taking other people's words out of context . . .
 ...
   http://cr.yp.to/djbdns/faq/axfrdns.html#what
 i added the URL so i that everyone could look it up. the WHOLE text.
 
 i added another quote from that URL..
 
  Notice, that bind, current or not, has no answers to djb's concerns, as
  expressed in his complete paragraph ;
 
 There has been some work on improving the zone-transfer protocol: a NOTIFY
 mechanism that wakes up the slaves (after a delay, and without a failure
 notice when something goes wrong); an experimental IXFR mechanism for
 incremental zone transfers (although the BIND implementation doesn't work for
 zone files modified by hand or by external tools); and several proposed
 security mechanisms, notably TSIG. BIND's May 2001 IXFR and TSIG
 implementations are supposedly free of the bugs that caused crashes, data
 corruption, and root exploits in previous versions of BIND. The BIND company
 occasionally mumbles about imaginary tools to handle new zones and client
 differentiation. By combining all these tools, you can finally approach the
 functionality of a trivial rsync script. Wow.
 
 Wow.  May 2001.it is 30.12.2001 now and BIND 9.2.0 is out.
 
 http://www.isc.org/products/BIND/bind9.html
 
 DNS Security
  DNSSEC (signed zones)
  TSIG (signed DNS requests)
  IP version 6
 
  Answers DNS queries on IPv6 sockets
 IPv6 resource records (A6, DNAME, etc.)
 Bitstring Labels
 Experimental IPv6 Resolver Library
  DNS Protocol Enhancements
 
  IXFR, DDNS, Notify, EDNS0
 Improved standards conformance
 Views
  One server process can provide multiple views of the DNS namespace, e.g.
 an inside view to certain clients, and an outside view to others.
  Multiprocessor Support
 Improved Portability Architecture
 -
 djb should update his security concerned pages.

improved != resolved

By-the-by, what does ``Improved standards conformance'' mean?  Does it
or does it *not* conform?  Or, is it just a little bit pregnant?

``By combining all these tools, you can finally approach the
functionality of a trivial rsync script. Wow.''

Enough said . . .

-- 

Best Regards,

mds
mds resource
888.250.3987

Dare to fix things before they break . . .

Our capacity for understanding is inversely proportional to how much we
think we know.  The more I know, the more I know I don't know . . .



Re: Securing bind..

2001-12-30 Thread Craig Sanders
On Sun, Dec 30, 2001 at 07:31:30PM -0600, Michael D. Schleif wrote:
 ``By combining all these tools, you can finally approach the
 functionality of a trivial rsync script. Wow.''
 
 Enough said . . .

by throwing away all your existing zonefiles, DNS configuration, DNS
tools and a bunch of features which djbdns doesn't support, you get to
use rsync to transfer zonefiles around.  an additional part of the price
you pay is djb's moronic non-free software license and his rabid
reinvent-the-wheel-as-a-square-because-it-wasn't-invented-here attitude.

big deal.

bind can do rsync zone transfers merely by writing a wrapper script for
named-xfer. i've done it.  it works.

craig

-- 
craig sanders [EMAIL PROTECTED]

Fabricati Diem, PVNC.
 -- motto of the Ankh-Morpork City Watch



Re: Securing bind..

2001-12-30 Thread Michael D. Schleif

Craig Sanders wrote:
 
 On Sun, Dec 30, 2001 at 07:31:30PM -0600, Michael D. Schleif wrote:
  ``By combining all these tools, you can finally approach the
  functionality of a trivial rsync script. Wow.''
 
  Enough said . . .
 
 by throwing away all your existing zonefiles, DNS configuration, DNS
 tools and a bunch of features which djbdns doesn't support, you get to
 use rsync to transfer zonefiles around.

And, perhaps, your point?

Broken as many of them are, they still work quite well with djbdns,
thank you.  I have nothing against bind, having setup various dns
servers over the years; rather, I'll opt for simplicity wherever I can
find it, if that simplicity is both functional and secure.  To each his
own . . .

 an additional part of the price
 you pay is djb's moronic non-free software license

Really?

http://cr.yp.to/distributors.html

 and his rabid
 reinvent-the-wheel-as-a-square-because-it-wasn't-invented-here attitude.

As you know, the software does *not* espouse his nor anybody else's
views.  So what?

If conformance to standards is interesting to you, then check this out. 
If you are pleased with chasing the complexities inherent in overly
complex tools, then, please, keep them uptodate . . .

 big deal.

And, why would anybody want an overly complicated system to do something
that is really, really quite simple?

I don't.

If you do, enjoy it; but, please, keep it uptodate and, somehow, get it
to conform to the standards that are agreed upon so that simpletons like
me can do something else with their lives, rather than be concerned over
the simplest function of networks -- name resolution ;

 bind can do rsync zone transfers merely by writing a wrapper script for
 named-xfer. i've done it.  it works.

That, too, is my point -- glad you found it . . .

-- 

Best Regards,

mds
mds resource
888.250.3987

Dare to fix things before they break . . .

Our capacity for understanding is inversely proportional to how much we
think we know.  The more I know, the more I know I don't know . . .



Re: Securing bind..

2001-12-30 Thread John Galt
On Sun, 30 Dec 2001, P Prince wrote:

The eaisest and most failsafe way to secure bind is to install djbdns.

Because after djbdns, bind 4.2 looks like a pinnacle of security...

Google is your friend.

Apparently it didn't get you a clue...

-Tech

On Sun, 30 Dec 2001, Petre Daniel wrote:

 Well,i know Karsten's on my back and all,but i have not much time to
 learn,and too many things to do at my firm,so i am asking if one of you has
 any idea how can bind be protected against that DoS attack and if someone
 has some good firewall for a dns server ( that resolves names for internal
 clients and also keeps some .ro domains) please post it to the list.. both
 ipchains and iptables variants are welcome..
 thank you.

 Petre L. Daniel,System Administrator
 Canad Systems Pitesti Romania,
 http://www.cyber.ro, email:[EMAIL PROTECTED]
 Tel:+4048220044, +4048206200


 --
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]





-- 
Artificial intelligence is no match for natural stupidity.

Who is John Galt?  [EMAIL PROTECTED], that's who!  



Re: Securing bind..

2001-12-30 Thread jernej horvat
On Monday 31 December 2001 03:34, Michael D. Schleif wrote:

   http://cr.yp.to/distributors.html

Because of that policy there are no precompiled packages of djbdns, because:

You may distribute a precompiled package if 
 - installing your package produces exactly the same files, in exactly the 
same locations, that a user would obtain by installing one of my packages 
listed above etc.

Free?

 If you are pleased with chasing the complexities inherent in overly
 complex tools, then, please, keep them uptodate . . .

compiling the whole package [1], installing it in paths that djb thinks are 
ok. complex?

 And, why would anybody want an overly complicated system to do something
 that is really, really quite simple?

You have a point there.  Most users don't need an dns server. They should use 
their isp's nameserver in /etc/resolv.conf. :]

there is an alternative = http://dnrd.nevalabs.org/

-- 
[1] from: http://cr.yp.to/djbdns/install.html

djbdns uses daemontools to start, monitor, and control the DNS services. 
Before running djbdns you need to install daemontools 0.70 or above. Make 
sure that the daemontools programs are in your system's default path. 

You will also need to install ucspi-tcp if you want to use axfrdns or 
axfr-get. 

So...i need daemontools and  ucspi-tcp prior to installing djbdns.



Re: Securing bind..

2001-12-30 Thread Craig Sanders
On Sun, Dec 30, 2001 at 08:34:32PM -0600, Michael D. Schleif wrote:
 Craig Sanders wrote:
  On Sun, Dec 30, 2001 at 07:31:30PM -0600, Michael D. Schleif wrote:
   ``By combining all these tools, you can finally approach the
   functionality of a trivial rsync script. Wow.''
  
   Enough said . . .
  
  by throwing away all your existing zonefiles, DNS configuration, DNS
  tools and a bunch of features which djbdns doesn't support, you get to
  use rsync to transfer zonefiles around.
 
 And, perhaps, your point?

that throwing away all your existing configurations and starting from
scratch just to get a trivial feature (which can easily be had with a
shell script wrapper around named-xfer) is NOT a good idea.

there are two major problems with all of bernstein's software.  the
first is that it requires you to throw away your existing
configuration...no big deal for a caching only name-server or if you
only have one or two domains to serve.  a severe pain in the arse if you
have hundreds or thousands of domains.

the second is that it is incredibly inflexible - you can only use it in
the particular way that bernstein wants you to use it...and if you
actually need to use it some other way then you are, according to djb,
an idiot because he is never wrong.


bind is far from perfect.  but it's a lot better than all of the
alternatives.  if something actually better (as opposed to just loud 
grandiose claims of being better) came along, i'd switch to it in an
instant.

 Broken as many of them are, they still work quite well with djbdns,
 thank you.  

named.conf doesn't work with djbdns - a minor problem.

more importantly, bind style zonefiles don't work with djbdns - the
idiot invented his own stupid format for zone files.  if djbdns had been
backwards-compatible with bind zonefiles then it might have had some
vague chance of replacing bind.


  an additional part of the price you pay is djb's moronic non-free
  software license
 
 Really?
 
   http://cr.yp.to/distributors.html

yes, really.  non-free.

if you don't understand WHY it's non-free then read the DFSG again.


  and his rabid
  reinvent-the-wheel-as-a-square-because-it-wasn't-invented-here
  attitude.
 
 As you know, the software does *not* espouse his nor anybody else's
 views.  So what?

unfortunately, bernstein's software is severely limited by his views.

he's a fairly good programmerbut a lousy systems administrator, with
no concept of how real world sysadmins use tools or how they automate
them.


 If conformance to standards is interesting to you, then check this
 out. 

djbdns does not conform to standards.  he proudly ignored any aspects of
the standards that were inconvenient to him.

  bind can do rsync zone transfers merely by writing a wrapper script for
  named-xfer. i've done it.  it works.
 
 That, too, is my point -- glad you found it . . .

so your point is that it's better to throw away years of configuration
work so you can use djbdns than it is to write a simple wrapper script.

right.  good thinking.


craig

-- 
craig sanders [EMAIL PROTECTED]

Fabricati Diem, PVNC.
 -- motto of the Ankh-Morpork City Watch



Re: Securing bind..

2001-12-30 Thread Jor-el
Russell,

On Sun, 30 Dec 2001, Russell Coker wrote:

Lots of good stuff snipped

 Please read my messages carefully before flaming me.
Ack! My apologies. Poor reading and poor wording.
 
 DNS cache machine sents out requests from source port 54 (not obscure - every 
 administrator of every DNS server on the net can easily discover this).
 
Not sure I follow what you are saying here. Are you saying that it
is pretty easy for a DNS admin to figure out what port you are running the
DNS server on (if so how?) or are you saying that port 54 is a well agreed
upon port for this purpose. I doubt very much that it is the latter, since
http://www.iana.org/assignments/port-numbers states that port 54 is
assigned to XNS (whatever that is).

Regards,
Jor-el



Re: Securing bind..

2001-12-30 Thread P Prince
One phrase, sir:

WTF?!

You fail to make sense.

-Tech

On Sun, 30 Dec 2001, Michael D. Schleif wrote:


 jernej horvat wrote:
 

 [ snip ]

  And this is what djb has to say for zone transfers :-)
 
  Zone transfers are an archaic alternative mechanism for copying DNS
  information.
 
  http://cr.yp.to/djbdns/faq/axfrdns.html#what

 ``Zone transfers are an archaic alternative mechanism for copying DNS
 information. Instead of immediately sending new data to the slaves, you
 run a zone-transfer service that accepts periodic connections from the
 slaves; your users complain while they're waiting for the slaves to
 check for new data. The zone-transfer protocol isn't a modular
 file-transfer system; it is an ad-hoc system tied to the details of DNS.
 The protocol has terrible compression and no security. Every new zone on
 the master requires manual reconfiguration of the slaves. Zone transfers
 lose all information about client differentiation and scheduled record
 changes.''

 It is always amazing to me how *intelligent* people try to make their
 point by taking other people's words out of context . . .

 Notice, that bind, current or not, has no answers to djb's concerns, as
 expressed in his complete paragraph ;

 [ snip ]

 --

 Best Regards,

 mds
 mds resource
 888.250.3987

 Dare to fix things before they break . . .

 Our capacity for understanding is inversely proportional to how much we
 think we know.  The more I know, the more I know I don't know . . .


 --
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Securing bind..

2001-12-30 Thread P Prince
Hey,

On Mon, 31 Dec 2001, Craig Sanders wrote:

 On Sun, Dec 30, 2001 at 07:31:30PM -0600, Michael D. Schleif wrote:
  ``By combining all these tools, you can finally approach the
  functionality of a trivial rsync script. Wow.''
 
  Enough said . . .

 by throwing away all your existing zonefiles, DNS configuration, DNS
 tools and a bunch of features which djbdns doesn't support, you get to
 use rsync to transfer zonefiles around.  an additional part of the price
 you pay is djb's moronic non-free software license and his rabid
 reinvent-the-wheel-as-a-square-because-it-wasn't-invented-here attitude.

Please, what features?

 big deal.

 bind can do rsync zone transfers merely by writing a wrapper script for
 named-xfer. i've done it.  it works.

Well, DUH.

 craig

 --
 craig sanders [EMAIL PROTECTED]

 Fabricati Diem, PVNC.
  -- motto of the Ankh-Morpork City Watch

-Tech

 --
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Securing bind..

2001-12-30 Thread nate
quote who=Michael D. Schleif

 jernej horvat wrote:

 ``Zone transfers are an archaic alternative mechanism for copying
 DNS information. Instead of immediately sending new data to the
 slaves, you run a zone-transfer service that accepts periodic
 connections from the slaves; your users complain while they're
 waiting for the slaves to check for new data. The zone-transfer

i may be missing the point here, but in BIND 8 the
'also-notify' command combined with notify yes option
for me insures instantaneous transfers to all the
slave servers. at my company i have 1 master and
about 7 slave nameservers spread accross the various
offices/regions, after i added the also-notify options
with the ips of the slave nameservers zone transfers
were immediate. before adding the also-notify bind
only notified one or 2 of the nameservers in the
allow-transfer ACL.

works extremely well. now this does NOT work in
some cases where you may have an ISP slave off
of you, some systems only do zone transfers
at specific times but that is a administrative
decision(probably a good one for the larger
isps). if you control both master and slave
though its quite possible.

i restrict zone transfers because there is no
need for anyone other then the slave nameservers
to do a zone transfer. that and a couple years
ago there was a DOS against bind 8 that could
be triggered by hosts that were able to do
a zone transfer(this is long fixed of course..).

nate





Re: Securing bind..

2001-12-30 Thread P Prince
This is well out of hand, and I've delt with it before, so this is my less
mailing on teh subject.

On Mon, 31 Dec 2001, Craig Sanders wrote:

 On Sun, Dec 30, 2001 at 08:34:32PM -0600, Michael D. Schleif wrote:
  Craig Sanders wrote:
   On Sun, Dec 30, 2001 at 07:31:30PM -0600, Michael D. Schleif wrote:
``By combining all these tools, you can finally approach the
functionality of a trivial rsync script. Wow.''
   
Enough said . . .
  
   by throwing away all your existing zonefiles, DNS configuration, DNS
   tools and a bunch of features which djbdns doesn't support, you get to
   use rsync to transfer zonefiles around.
 
  And, perhaps, your point?

 that throwing away all your existing configurations and starting from
 scratch just to get a trivial feature (which can easily be had with a
 shell script wrapper around named-xfer) is NOT a good idea.

I am *NOT* suggesting that you use djbdns *just for* rsync zone transfers.
Either you're confused, which is OK, or you're pretending to have missed teh
point because you have nothing left to stand on.

These are my reasons for preferring djbdns, and mine alone.
1) djbdns is orders of magnitude smaller, simpler, and more elegant
   than BIND will ever be.  I believe that this makes it more likely to
   be much more secure.
2) djbdns' file format is much simpler, and works much more like one now
   imagines the DNS system itself.  Very few sites need any real concept of
   zones - we just don't setup dns like that.
3) djbdns is lighter - you only run the programs that do they things you
   need, rather than running `djbdns --options`.
4) Following from above, djbdns has the Unix philosophy.
5) I find that I really like Daniel Bernstien's code.  He's an excellent
   programmer, and he really understands specifications, documentation,
   and how to really define a good solution, and a coherent system.  I
   am not familiar with the group that codes BIND, but somehow they've
   taken one of the Internet's simplest protocols, and made it the second
   most difficult basic service to configure (the first, IMO, being your
   MTA).

 there are two major problems with all of bernstein's software.  the
 first is that it requires you to throw away your existing
 configuration...no big deal for a caching only name-server or if you
 only have one or two domains to serve.  a severe pain in the arse if you
 have hundreds or thousands of domains.

This is crazy.  Anytime you change software packages, you must rewrite your
configuration.  And, if you or anyone you know manages thousands of domains,
I'll mail you a crisp, clean 20 dollar bill.  (In order to be eligible, you
must provide the name of your employer, so that I can avoid their service.)

 the second is that it is incredibly inflexible - you can only use it in
 the particular way that bernstein wants you to use it...and if you
 actually need to use it some other way then you are, according to djb,
 an idiot because he is never wrong.

This too, is crazy.  DJB desiged djbdns to work correctly.  It does everything
that BIND does.  Everything.  No feature is left out, excepet the redundant
and archaic, which all have a newer, better solution.  DJB sees a lot of
stupidity out there from the BIND zealots, and I don't see where he's wrong.

 bind is far from perfect.  but it's a lot better than all of the
 alternatives.  if something actually better (as opposed to just loud 
 grandiose claims of being better) came along, i'd switch to it in an
 instant.

I bet you wouldn't.

  Broken as many of them are, they still work quite well with djbdns,
  thank you.

 named.conf doesn't work with djbdns - a minor problem.

This is a stupid argument.  httpd.conf doesn't work well with thttpd, and
proftpd.conf doesn't work well at all with wu-ftpd.

 more importantly, bind style zonefiles don't work with djbdns - the
 idiot invented his own stupid format for zone files.  if djbdns had been
 backwards-compatible with bind zonefiles then it might have had some
 vague chance of replacing bind.

Perhaps, but BIND invented its own zonefiles too.  What you fail to realize is
how bad BIND zone files suck.

   an additional part of the price you pay is djb's moronic non-free
   software license
 
  Really?
 
  http://cr.yp.to/distributors.html

 yes, really.  non-free.

 if you don't understand WHY it's non-free then read the DFSG again.

This doesn't deserve a response.

   and his rabid
   reinvent-the-wheel-as-a-square-because-it-wasn't-invented-here
   attitude.
 
  As you know, the software does *not* espouse his nor anybody else's
  views.  So what?

 unfortunately, bernstein's software is severely limited by his views.

 he's a fairly good programmerbut a lousy systems administrator, with
 no concept of how real world sysadmins use tools or how they automate
 them.

I hope you don't consider youself a good systems administrator,

  If conformance to