I meant quad9 below, not cloud9. Apologies. Gerben Wierda (LinkedIn <https://www.linkedin.com/in/gerbenwierda>) R&A IT Strategy <https://ea.rna.nl/> (main site) Book: Chess and the Art of Enterprise Architecture <https://ea.rna.nl/the-book/> Book: Mastering ArchiMate <https://ea.rna.nl/the-book-edition-iii/>
> On 5 Mar 2022, at 13:27, Gerben Wierda via Unbound-users > <unbound-users@lists.nlnetlabs.nl> wrote: > > No, this is about certain DNS servers not accepting queries from public > resolvers, such as DNS servers that are used to disseminate information about > bad actors. DNS blacklists and all that. > > My standard LAN resolver (unbound) forwards to cloud9 (9.9.9.9) so I am > protected by their filtering of bad domains. But requests from rspamd and > postfix cannot use that setup. rspamd does not accept requests from a public > DNS such as 9.9.9.9. And neither does zen.apamhaus.org > <http://zen.apamhaus.org/> that provides a DNSBL that can be used in the > postfix setup. > > main.cf: postscreen_dnsbl_sites = zen.spamhaus.org > <http://en.spamhaus.org/> =127.0.0.[2..11] > > rspamd has a setting to direct it to a different DNS. To make use of that but > still offer the 9.9.9.9 protection to all clients in my LAN, I had to set up > a second unbound running on a different port (1053) on localhost. That way, I > can tell rspamd > > options.inc: nameserver = "127.0.0.1:1053"; > > And rspamd is now not indirectly using 9.9.9.9 while the rest is. But postfix > doesn’t have such a setting. So, zen.spamhaus.org <http://zen.spamhaus.org/> > doesn’t work. I was able to use > > forward-zone: > name: "spamhaus.org <http://spamhaus.org/>" > forward-addr: 127.0.0.1@1053 # do not resolve spamhaus via public DNS > resolvers > > Because I already had that second non-forwarding unbound running on port 1053 > for rspamd. > > I also am running NSD for the local private addresses, but that doesn’t end > up here, other than that NSD wants to run on the same port as unbound (53) so > my NSD runs on port 54 and unbound has: > > # The authorative NSD for rna.nl/192.168.2.x <http://rna.nl/192.168.2.x> is > on this machine (127.0.0.1@54) > stub-zone: > name: "rna.nl <http://rna.nl/>" > stub-addr: 127.0.0.1@54 > stub-zone: > name: "2.168.192.in-addr.arpa" > stub-addr: 127.0.0.1@54 > > Basically, that gies me the split-DNS, where external resolving of rna.nl > <http://rna.nl/> and internal resolving of anything on rna.nl work, some more > hosts internally than externally of course. > > My question about local addresses was directed at another possible scenario: > make sure that requests to unbound from one set of addresses does forwarding > and another (the server itself) does not. But the solution I now have is > better. For instance, domains not resolved by 9.9.9.9 because they are bad > actors also do not resolve in postfix and get dropped because they do not > have a decent DNS/reverse set up, even if they have. > > Gerben Wierda (LinkedIn <https://www.linkedin.com/in/gerbenwierda>) > R&A IT Strategy <https://ea.rna.nl/> (main site) > Book: Chess and the Art of Enterprise Architecture > <https://ea.rna.nl/the-book/> > Book: Mastering ArchiMate <https://ea.rna.nl/the-book-edition-iii/> > >> On 5 Mar 2022, at 07:17, Steven Wills <ste...@swills.me >> <mailto:ste...@swills.me>> wrote: >> >> I re read your emails and you mention "local" IP addresses. Maybe a >> stub-zone is what you're after? But I don't think that is the case since a >> stub zone is meant to point to an authoritative server. Maybe someone with a >> better idea of what you're asking can weigh in. >> >> I use a stub-zone to point to my NSD server. >> >> stub-zone: >> name: "swills.org <http://swills.org/>" >> stub-addr: 10.0.10.25 >> >> >> https://unbound.docs.nlnetlabs.nl/en/latest/manpages/unbound.conf.html?highlight=stub%20zone#stub-zone-options >> >> <https://unbound.docs.nlnetlabs.nl/en/latest/manpages/unbound.conf.html?highlight=stub%20zone#stub-zone-options> >> >> Thanks again, >> Steven >> >> >> ------- Original Message ------- >> On Friday, March 4th, 2022 at 20:14, Gerben Wierda <gerben.wie...@rna.nl >> <mailto:gerben.wie...@rna.nl>> wrote: >> >>> Yes, that is what I thought a while back, so I decided at the time to test >>> with this: >>> >>> forward-zone: >>> name: "apple.com <http://apple.com/>." >>> forward-addr: 8.8.8.8@53 # testing if I can forward based on fqdn >>> >>> forward-zone: >>> name: "." >>> # If the forwarding fails, do your own recursion >>> forward-first: yes >>> # Quad9 phising/malware site blocking DNS 9.9.9.9 >>> forward-addr: 9.9.9.9 >>> >>> to see if that worked, but all the request kept being forwarded to 9.9.9.9 >>> at the time. I gave up at the time (for another reason) but now I need it >>> again. >>> >>> Gerben Wierda (LinkedIn <https://www.linkedin.com/in/gerbenwierda>) >>> R&A IT Strategy <https://ea.rna.nl/> (main site) >>> Book: Chess and the Art of Enterprise Architecture >>> <https://ea.rna.nl/the-book/> >>> Book: Mastering ArchiMate <https://ea.rna.nl/the-book-edition-iii/> >>> >>>> On 5 Mar 2022, at 03:03, Steven Wills <ste...@swills.me >>>> <mailto:ste...@swills.me>> wrote: >>>> >>>> Hello, >>>> >>>> I think what you want is a Forward Zone. >>>> >>>> >>>> https://docs.netgate.com/tnsr/en/latest/dns/fwd-zone.html >>>> <https://docs.netgate.com/tnsr/en/latest/dns/fwd-zone.html> >>>> >>>> Thank you, >>>> Steven >>>> >>>> >>>> >>>> >>>> >>>> >>>> -------- Original Message -------- >>>> On Mar 4, 2022, 19:36, Gerben Wierda via Unbound-users < >>>> unbound-users@lists.nlnetlabs.nl >>>> <mailto:unbound-users@lists.nlnetlabs.nl>> wrote: >>>> >>>> I am using unbound and it is configured to use cloud9 as a forwarder. >>>> >>>> But spamhaus.org <http://spamhaus.org/> DNSBL will not answer requests for >>>> IP addresses from public DNS, such as cloud9. >>>> >>>> So, what I would like to do is configure unbound in such a way that it >>>> always goes to cloud9, except when the query is about spamhaus.org >>>> <http://spamhaus.org/>. Can I do that? >>>> >>>> If that is not possible, I would like to configure unbound that is >>>> forwards everything to cloud9, unless it comes from a specific set of >>>> local IP addresses. Is that possible? >>>> >>>> Thanks, >>>> >>>> Gerben Wierda (LinkedIn <https://www.linkedin.com/in/gerbenwierda>) >>>> R&A IT Strategy <https://ea.rna.nl/> (main site) >>>> Book: Chess and the Art of Enterprise Architecture >>>> <https://ea.rna.nl/the-book/> >>>> Book: Mastering ArchiMate <https://ea.rna.nl/the-book-edition-iii/> >>>> >>> >> >