-
Notifications
You must be signed in to change notification settings - Fork 759
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unbound: excessive private-address entries. #3692
Comments
|
I'm not sure how paranoid it is if multiple projects are doing it independently: pfsense/pfsense@afeb18ff0ec https://redmine.pfsense.org/issues/9708 even if it takes a while to land in other projects. You can use Dnscrypt-proxy or Bind to do the filtering, see https://docs.opnsense.org/manual/how-tos/dnscrypt-proxy.html and https://docs.opnsense.org/manual/how-tos/bind.html and both explicitly work fine with Unbound. Cheers, |
|
That's a recent commit for pfsense and they will discover that problem soon. |
|
Is there anything else we can help you with? I'm unsure what to do, because we're not simply removing a line that was put in for a reasons without a proper replacement strategy. |
|
There is no way to do that without removing a line or adding a toggle for administrator to disable that check. |
|
Ok. I've mentioned "proper replacement strategy" here to indicate that nothing is set in stone, but a toggle doesn't look very useful. It's not a fix, it's at best a workaround with real world security implications. @mimugmail wants to build an adblocker into unbound via plugin so I guess that would be a better course of action in the midterm. |
That's not a solution. Not even a workaround. |
I thought I have rspamd successfully running against spamcop with Unbound ... did you really check this or did you just copy from the man page? |
|
I've checked it. With default settings I get "No internal type for both IPv4 and IPv6 Addresses (A+AAAA) records available for 2.0.0.127.zen.spamhaus.org" on test requests. It returns correct 127.0.0.x addresses with correct settings. |
|
I've checked it again. The only line I change in config is 'private-address: 127.0.0.0/8'. First request done with default settings, second with line commented out. I've replaced my domain name to DOMAIN.TLD. |
|
A possible solution would be to add a editable list of domains which are allowed DNS-Rebinding. |
|
@ruffy91 how would this look like in unbound config? |
|
From https://nlnetlabs.nl/documentation/unbound/unbound.conf/: example: This allow sbl.spamhaus.org, xbl.spamhaus.org and bl.spamcop.net and all their subdomains (= DNSBL queries) to return private IPs. |
|
Did you try to set this in custom config? |
Yes, mail blocklists work after adding next lines to custom options field in opnsense unbound settings. First line is required. |
|
OK, will add this feature to unbound-plus plugin. :) |
Currently Unbound in OPNsense does not allow to query spamhaus/spamcop (and others) DNSBLs. That's because of entry
private-address: 127.0.0.0/8'that was added at fd00370That was a paranoid solution from https://forum.opnsense.org/index.php?topic=1416.0 that breaks RFC and it's effect is noted in unbound.conf(5) man.
Section "private-address: " clearly states:
That problem was raised a few times but no answer from developers was given. ( https://forum.opnsense.org/index.php?topic=9633.0 and #1783 )
Is it possible to remove that entry from configuration or add a way to override that entries completely? Manual editing of configuration on each update is not a good way to allow DNSBL requests.
The text was updated successfully, but these errors were encountered: