On Friday, 14 April 2023 00:28:24 CEST John Thurston wrote: > Due to a requirement to use something Microsoft crafted, we are being > asked to assert (internally) authority over 3rd-level names under > appserviceenvironment.net > > I've pushed back on this, because I don't think it's nice to publish > "authoritative" answers in domains we have not been delegated. But I'm > told it's all ok, because Microsoft says its ok* Having accepted that > the ship has sailed, it's now a question of how to deliver such answers. > > One obvious way is to define a zone for each 3rd level under > appserviceenvironment.net, and publish them in a way our resolvers can > find them. In the absence of catalog-zones, this could be a lot of > additional work (for me). > > Then I wondered if adding these 'hijacked' names to our RPZ would meet > the need. I first thought, "Yeah. It'll work.", but then I re-read the > statement from MS saying each 3rd level was going to need to have a 4th > level zone defined. A zone definition requires at least an SOA and NS > record . . and last time I checked, an RPZ would not deliver an NS > record. So it seems that idea may be squashed. > > Who else has need to publish locally-defined appserviceenvironment.net > names? Were you able to do it with your RPZ? > > * > https://learn.microsoft.com/en-us/azure/app-service/environment/create-ilb-a > se
Hello John, For what it's worth, I've been working on Microsoft related domains in an RPZ recently as well. The way I've done this is by defining a zone "rpz.local" in my named.conf, as shown below. // Response Policy Zone zone "rpz.local" { type master; file "/etc/bind/zones/rpz.local.db"; allow-update { none; }; allow-transfer { internal; }; allow-query { localhost; }; }; Then I define in this rpz.local.db file, entries like the ones below. $TTL 300 @ IN SOA localhost. need.to.know.only. ( 202303131 ; Serial number 60 ; Refresh every minute 60 ; Retry every minute 43200 ; Expire in 5 days 60 ) ; Negative cache TTL 1 minute IN NS LOCALHOST. ; Examples block.example.com IN CNAME . passthrough.example.com IN CNAME rpz-passthru. redirect.example.com IN CNAME example.com. Pay special attention to the lack of a final dot in the records themselves, this is important. As far as I understand, this makes them relative to your rpz.local zone, not the actual domain on the internet. The only major issue I've been facing with this so far, is that AXFR to secondary and tertiary name servers has some issues, and at least Windows 10 Home will query those when the primary name server does not give a satisfactory answer. -- Met vriendelijke groet / Best regards, Michael De Roover
-- Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list ISC funds the development of this software with paid support subscriptions. Contact us at https://www.isc.org/contact/ for more information. bind-users mailing list bind-users@lists.isc.org https://lists.isc.org/mailman/listinfo/bind-users