public inbox for development@lists.ipfire.org
 help / color / mirror / Atom feed
From: Paul Simmons <redneckmother@hughes.net>
To: development@lists.ipfire.org
Subject: Re: [PATCH] DNS: Fall back to permissive mode if recursor mode is unavailable
Date: Fri, 03 Mar 2017 14:54:20 -0600	[thread overview]
Message-ID: <1488574460.21412.1.camel@hughes.net> (raw)
In-Reply-To: <1488391234.8219.7.camel@hughes.net>

[-- Attachment #1: Type: text/plain, Size: 9439 bytes --]

On Wed, 2017-03-01 at 12:00 -0600, Paul Simmons wrote:
> On Wed, 2017-03-01 at 16:17 +0000, Michael Tremer wrote:
> > Hello,
> > 
> > so I wanted to highlight this patch a little which has been merged
> > into
> > next.
> > 
> > It will change fallback behaviour of DNS again which before
> > switched
> > to
> > recursor mode if no usable forwarder could be found. Now IPFire
> > will
> > test if any of the root servers is available and if so, fall back
> > to
> > recursor mode. If not, it will change DNSSEC into permissive mode
> > and
> > will use all given forwarders.
> > 
> > The idea behind this is to always be able to provide at least
> > *some*
> > DNS, although DNSSEC will be practically deactivated.
> > 
> > It is still missing that we show a big warning where necessary, but
> > at
> > least for some people who were forced by their providers to use
> > their
> > own name servers which do not support DNSSEC at all.
> > 
> > So, for the people who have been affected by this issue I can only
> > recommend to test this and give us feedback within about one week.
> > I
> > would like to close the merge window for the next core update
> > around
> > then.
> > 
> > Best,
> > -Michael
> > 
> > On Wed, 2017-03-01 at 16:11 +0000, Michael Tremer wrote:
> > > The tests when assigning DNS name servers has been extended so
> > > that
> > > if no working forwarder can be found, we will test if the local
> > > recursor
> > > mode is an option.
> > > 
> > > If not, we will configure unbound's validator module into
> > > permissive
> > > mode so that at least some DNS functionality is available.
> > > 
> > > Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>
> > > ---
> > >  config/rootfiles/core/110/filelists/files          |  1 +
> > >  lfs/unbound                                        |  1 +
> > >  src/initscripts/init.d/unbound                     | 67
> > > ++++++++++++++++++++--
> > >  ...ting-validator-permissive-mode-at-runtime.patch | 43
> > > ++++++++++++++
> > >  4 files changed, 107 insertions(+), 5 deletions(-)
> > >  create mode 100644 src/patches/unbound-allow-setting-validator-
> > > permissive-mode-at-runtime.patch
> > > 
> > > diff --git a/config/rootfiles/core/110/filelists/files
> > > b/config/rootfiles/core/110/filelists/files
> > > index 670b9ae..f4ce989 100644
> > > --- a/config/rootfiles/core/110/filelists/files
> > > +++ b/config/rootfiles/core/110/filelists/files
> > > @@ -1,5 +1,6 @@
> > >  etc/system-release
> > >  etc/issue
> > > +etc/rc.d/init.d/unbound
> > >  srv/web/ipfire/cgi-bin/index.cgi
> > >  srv/web/ipfire/cgi-bin/vpnmain.cgi
> > >  usr/lib/libssp.so.0
> > > diff --git a/lfs/unbound b/lfs/unbound
> > > index 2b7745c..f361f24 100644
> > > --- a/lfs/unbound
> > > +++ b/lfs/unbound
> > > @@ -70,6 +70,7 @@ $(subst %,%_MD5,$(objects)) :
> > >  $(TARGET) : $(patsubst %,$(DIR_DL)/%,$(objects))
> > >  	@$(PREBUILD)
> > >  	@rm -rf $(DIR_APP) && cd $(DIR_SRC) && tar axf
> > > $(DIR_DL)/$(DL_FILE)
> > > +	cd $(DIR_APP) && patch -Np1 <
> > > $(DIR_SRC)/src/patches/unbound-allow-setting-validator-
> > > permissive-
> > > mode-at-runtime.patch
> > >  	cd $(DIR_APP) && \
> > >  		./configure \
> > >  			--prefix=/usr \
> > > diff --git a/src/initscripts/init.d/unbound
> > > b/src/initscripts/init.d/unbound
> > > index 8802781..bbf9c00 100644
> > > --- a/src/initscripts/init.d/unbound
> > > +++ b/src/initscripts/init.d/unbound
> > > @@ -114,17 +114,38 @@ update_forwarders() {
> > >  			echo_warning
> > >  		fi
> > >  
> > > -		if [ -n "${broken_forwarders}" -a -z
> > > "${forwarders}"
> > > ]; then
> > > -			boot_mesg "Falling back to recursor
> > > mode"
> > > ${WARNING}
> > > -			echo_warning
> > > -
> > > -		elif [ -n "${forwarders}" ]; then
> > > +		if [ -n "${forwarders}" ]; then
> > >  			boot_mesg "Configuring upstream name
> > > server(s): ${forwarders:1}" ${INFO}
> > >  			echo_ok
> > >  
> > > +			# Make sure DNSSEC is activated
> > > +			enable_dnssec
> > > +
> > >  			echo "${forwarders}" >
> > > /var/ipfire/red/dns
> > >  			unbound-control -q forward ${forwarders}
> > >  			return 0
> > > +
> > > +		# In case we have found no working forwarders
> > > +		else
> > > +			# Test if the recursor mode is available
> > > +			if can_resolve_root
> > > +bufsize=${new_edns_buffer_size}; then
> > > +				# Make sure DNSSEC is activated
> > > +				enable_dnssec
> > > +
> > > +				boot_mesg "Falling back to
> > > recursor
> > > mode" ${WARNING}
> > > +				echo_warning
> > > +
> > > +			# If not, we set DNSSEC in permissive
> > > mode
> > > and allow using all recursors
> > > +			elif [ -n "${broken_forwarders}" ]; then
> > > +				disable_dnssec
> > > +
> > > +				boot_mesg "DNSSEC has been set
> > > to
> > > permissive mode" ${FAILURE}
> > > +				echo_failure
> > > +
> > > +				echo "${broken_forwarders}" >
> > > /var/ipfire/red/dns
> > > +				unbound-control -q forward
> > > ${broken_forwarders}
> > > +				return 0
> > > +			fi
> > >  		fi
> > >  	fi
> > >  
> > > @@ -370,6 +391,42 @@ ns_determine_edns_buffer_size() {
> > >  	return 1
> > >  }
> > >  
> > > +get_root_nameservers() {
> > > +	while read -r hostname ttl record address; do
> > > +		# Searching for A records
> > > +		[ "${record}" = "A" ] || continue
> > > +
> > > +		echo "${address}"
> > > +	done < /etc/unbound/root.hints
> > > +}
> > > +
> > > +can_resolve_root() {
> > > +	local ns
> > > +	for ns in $(get_root_nameservers); do
> > > +		if dig @${ns} +dnssec SOA . $@ >/dev/null; then
> > > +			return 0
> > > +		fi
> > > +	done
> > > +
> > > +	# none of the servers was reachable
> > > +	return 1
> > > +}
> > > +
> > > +enable_dnssec() {
> > > +	local status=$(unbound-control get_option val-
> > > permissive-
> > > mode)
> > > +
> > > +	# Don't do anything if DNSSEC is already activated
> > > +	[ "${status}" = "no" ] && return 0
> > > +
> > > +	# Activate DNSSEC and flush cache with any stale and
> > > unvalidated data
> > > +	unbound-control -q set_option val-permissive-mode: no
> > > +	unbound-control -q flush_zone .
> > > +}
> > > +
> > > +disable_dnssec() {
> > > +	unbound-control -q set_option val-permissive-mode: yes
> > > +}
> > > +
> > >  case "$1" in
> > >  	start)
> > >  		# Print a nicer messagen when unbound is already
> > > running
> > > diff --git a/src/patches/unbound-allow-setting-validator-
> > > permissive-
> > > mode-at-runtime.patch b/src/patches/unbound-allow-setting-
> > > validator-
> > > permissive-mode-at-runtime.patch
> > > new file mode 100644
> > > index 0000000..f476d08
> > > --- /dev/null
> > > +++ b/src/patches/unbound-allow-setting-validator-permissive-
> > > mode-
> > > at-
> > > runtime.patch
> > > @@ -0,0 +1,43 @@
> > > +diff --git a/validator/validator.c b/validator/validator.c
> > > +index 676dcdf..7c19f3d 100644
> > > +--- a/validator/validator.c
> > > ++++ b/validator/validator.c
> > > +@@ -113,7 +113,7 @@ val_apply_cfg(struct module_env* env, struct
> > > val_env* val_env,
> > > + 	int c;
> > > + 	val_env->bogus_ttl = (uint32_t)cfg->bogus_ttl;
> > > + 	val_env->clean_additional = cfg->val_clean_additional;
> > > +-	val_env->permissive_mode = cfg->val_permissive_mode;
> > > ++	val_env->permissive_mode = &cfg->val_permissive_mode;
> > > + 	if(!env->anchors)
> > > + 		env->anchors = anchors_create();
> > > + 	if(!env->anchors) {
> > > +@@ -170,7 +170,6 @@ val_init(struct module_env* env, int id)
> > > + 	}
> > > + 	env->modinfo[id] = (void*)val_env;
> > > + 	env->need_to_validate = 1;
> > > +-	val_env->permissive_mode = 0;
> > > + 	lock_basic_init(&val_env->bogus_lock);
> > > + 	lock_protect(&val_env->bogus_lock, &val_env-
> > > > num_rrset_bogus,
> > > 
> > > + 		sizeof(val_env->num_rrset_bogus));
> > > +@@ -2084,7 +2083,7 @@ processFinished(struct module_qstate*
> > > qstate,
> > > struct val_qstate* vq,
> > > + 			}
> > > + 		}
> > > + 		/* If we are in permissive mode, bogus gets
> > > indeterminate */
> > > +-		if(ve->permissive_mode)
> > > ++		if(*ve->permissive_mode)
> > > + 			vq->orig_msg->rep->security =
> > > sec_status_indeterminate;
> > > + 	}
> > > + 
> > > +diff --git a/validator/validator.h b/validator/validator.h
> > > +index 23d3072..f8464b8 100644
> > > +--- a/validator/validator.h
> > > ++++ b/validator/validator.h
> > > +@@ -104,7 +104,7 @@ struct val_env {
> > > + 	 * This allows an operator to run validation 'shadow'
> > > without
> > > + 	 * hurting responses to clients.
> > > + 	 */
> > > +-	int permissive_mode;
> > > ++	int* permissive_mode;
> > > + 
> > > + 	/**
> > > + 	 * Number of entries in the NSEC3 maximum iteration
> > > count
> > > table.
> 
> I have nightly commit c016773b9816ad9be4ffc8643c30457e87c094e3
> available locally, and will beg my users for downtime to test.
> 
> Thank you, and best regards,
> Paul
> 
> 

Bad juju - build c016773b couldn't resolve any hosts (other than those in "localdomain").

Provider is "hughes.net" and is the only ISP available (no hardlines or other LOS/NLOS WISPs available).

Tried assigning DNS servers 74.113.60.185 and 156.154.70.1 - no change.

Paul

> 

  reply	other threads:[~2017-03-03 20:54 UTC|newest]

Thread overview: 18+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2017-03-01 16:11 Michael Tremer
2017-03-01 16:17 ` Michael Tremer
2017-03-01 18:00   ` Paul Simmons
2017-03-03 20:54     ` Paul Simmons [this message]
2017-03-05 11:42       ` Michael Tremer
2017-03-06 18:18         ` Paul Simmons
2017-03-06 21:00           ` Michael Tremer
2017-03-06 21:47             ` Paul Simmons
2017-03-06 22:37               ` Michael Tremer
2017-03-06 23:29                 ` Paul Simmons
2017-03-07 12:06                   ` Michael Tremer
     [not found] <1488903324.21248.2.camel@hughes.net>
2017-03-08 12:09 ` Michael Tremer
2017-03-08 16:19   ` Paul Simmons
     [not found] <1490455220.20288.4.camel@hughes.net>
2017-03-30 16:51 ` Michael Tremer
2017-03-30 18:21   ` Paul Simmons
     [not found] <1490979195.2643.88.camel@ipfire.org>
2017-04-02 16:37 ` Paul Simmons
2017-04-02 18:03   ` Michael Tremer
2017-04-02 19:07     ` Paul Simmons

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1488574460.21412.1.camel@hughes.net \
    --to=redneckmother@hughes.net \
    --cc=development@lists.ipfire.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox