In message <[email protected]>, "Carsten Strotmann (private)" 
writes:
> Hello
> 
> I need opinions from the DNS community on an issue with default-local zones.
> 
> This was triggered by hosting an empty 'local' unicast zone to stop 
> unwanted local traffic to leak from local networks.
> 
> Avahi (multicast DNS and Autoconf for Linux/Unix) recommends to check 
> for the existence of an unicast "local." DNS Domain on startup and 
> disable Avahi when such an domain has been found ( 
> http://avahi.org/wiki/AvahiAndUnicastDotLocal ).
> 
> Ubuntu 9.04 implements this recommendation by querying for an SOA record 
> for "local." in the startscript and it disables Avahi when the query 
> returns an NOERROR answer. This is implemented so that Avahi (which used 
> the 'local' pseudo-TLD for mDNS) does not collide with an unicast Domain 
> of the same name that is used for real DNS resolution (this is often 
> found in Microsoft Windows AD deployments, as 'local' is used in some 
> documentation as an example and is copied by the administrators).
> 
> This scheme conflict however in a situation where the DNS admin has 
> configured zones for DNS namespace that should be kept local (that is, 
> should not reach out into the internet and reach the Internet Root) such 
> as 'local.', 'belkin.', 'onion.' on the perimeter resolving DNS servers.
> 
> I'm now searching for a good way to distinguish a pseudo TLD configured 
> to block local traffic from a real unicast TLD used internally, so that 
> Avahi (and maybe other mDNS implementations) can make a better decision.
> 
> I am aware of the problem of mDNS using the 'local.' pseudo-TLD, that 
> should not be the topic of this discussion.
> 
> draft-ietf-dnsop-default-local-zones-08 gives an example of an SOA 
> record with serial number "1", however it does not specifies the serial 
> number used. It only requires that the "empty zones one SHOULD NOT use 
> the same NS and SOA records as used on the public Internet servers as 
> that will make it harder to detect the origin of the responses and thus 
> any leakage to the public Internet servers."
> 
> The BIND DNS Server implements "default-local-zones" with an serial 
> number of "0" in the SOA record. Unbound implements the same with an 
> serial number of "1". I need to test how the Microsoft DNS Server is 
> handling this.
> 
> One possible solution for detecting an "default-local-zone" created to 
> stop local traffic at the perimeter is to define a standard SOA serial 
> of "0", so that Avahi and other mDNS implementations can check against 
> this serial. A unicast zone with real DNS content will most of the time 
> have a SOA serial != 0, whereas a "default-local-zone" will always have 
> a SOA serial of "0".
> 
> My questions:
> 
> Is it in general seen as a good practice to configure empty zones for 
> namespaces not used in the Internet which might appear in an local 
> (enterprise/university/ISP) network like "local." and "belkin." on 
> perimeter resolving DNS server to stop this names to leak out into the 
> Internet?
> 
> Would it make sense to define a SOA serial of "0" (or "1", but I would 
> prefer zero) in draft-ietf-dnsop-default-local-zones for this kind of zones?
> 
> Are there possible other ways of detecting "default-local-zones" (other 
> than looking at the serial)?

        There is no way to automatically detect this.  Note
        default-local-zones specifically excludes names tlds.

        Having a local copy of the root zone is a much better
        way to deal with queries to the root.

        Mark
 
> Best regards
> 
> Carsten Strotmann
> 
> _______________________________________________
> DNSOP mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/dnsop
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: [email protected]
_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to