From: Arne Fitzenreiter <arne_f@ipfire.org>
To: development@lists.ipfire.org
Subject: Re: [PATCH v2] firewall: always allow outgoing DNS traffic to root servers
Date: Fri, 18 Oct 2019 09:08:49 +0200 [thread overview]
Message-ID: <56a2b6cb571d7c43b5a8e147b2733d3d@ipfire.org> (raw)
In-Reply-To: <6972e22e-fb8f-772d-42f0-a7fb0e5cbe3f@ipfire.org>
[-- Attachment #1: Type: text/plain, Size: 3323 bytes --]
this Code will not work:
> + for ip in "${rootserverips[@]}"; do
> + ipset add root-servers $ip
> + done
it call
ipset add ip1 ip2 ip3 ...
because the doublequotes.
And if i fix this
/etc/init.d/firewall restart
complains because the ipset was not cleaned up before!
Arne
Am 2019-10-01 17:22, schrieb peter.mueller(a)ipfire.org:
> Allowing outgoing DNS traffic (destination port 53, both TCP
> and UDP) to the root servers is BCP for some reasons. First,
> RFC 5011 assumes resolvers are able to fetch new trust ancors
> from the root servers for a certain time period in order to
> do key rollovers.
>
> Second, Unbound shows some side effects if it cannot do trust
> anchor signaling (see RFC 8145) or fetch the current trust anchor,
> resulting in SERVFAILs for arbitrary requests a few minutes.
>
> There is little security implication of allowing DNS traffic
> to the root servers: An attacker might abuse this for exfiltrating
> data via DNS queries, but is unable to infiltrate data unless
> he gains control over at least one root server instance. If
> there is no firewall ruleset in place which prohibits any other
> DNS traffic than to chosen DNS servers, this patch will not
> have security implications at all.
>
> The second version of this patch does not use unnecessary xargs-
> call nor changes anything else not related to this issue.
>
> Fixes #12183
>
> Cc: Michael Tremer <michael.tremer(a)ipfire.org>
> Suggested-by: Horace Michael <horace.michael(a)gmx.com>
> Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org>
> ---
> config/rootfiles/core/137/filelists/files | 1 +
> src/initscripts/system/firewall | 12 ++++++++++++
> 2 files changed, 13 insertions(+)
>
> diff --git a/config/rootfiles/core/137/filelists/files
> b/config/rootfiles/core/137/filelists/files
> index ce4e51768..a02840d12 100644
> --- a/config/rootfiles/core/137/filelists/files
> +++ b/config/rootfiles/core/137/filelists/files
> @@ -1,4 +1,5 @@
> etc/system-release
> etc/issue
> +etc/rc.d/init.d/firewall
> srv/web/ipfire/cgi-bin/credits.cgi
> var/ipfire/langs
> diff --git a/src/initscripts/system/firewall
> b/src/initscripts/system/firewall
> index ec396c708..602bd6c5b 100644
> --- a/src/initscripts/system/firewall
> +++ b/src/initscripts/system/firewall
> @@ -6,6 +6,7 @@
> eval $(/usr/local/bin/readhash /var/ipfire/ppp/settings)
> eval $(/usr/local/bin/readhash /var/ipfire/ethernet/settings)
> eval $(/usr/local/bin/readhash /var/ipfire/optionsfw/settings)
> +ROOTHINTS="/etc/unbound/root.hints"
> IFACE=`/bin/cat /var/ipfire/red/iface 2> /dev/null | /usr/bin/tr -d
> '\012'`
>
> if [ -f /var/ipfire/red/device ]; then
> @@ -307,6 +308,17 @@ iptables_init() {
> iptables -A INPUT -j TOR_INPUT
> iptables -N TOR_OUTPUT
> iptables -A OUTPUT -j TOR_OUTPUT
> +
> + # Allow outgoing DNS traffic (TCP and UDP) to DNS root servers
> + local rootserverips="$( awk '/\s+A\s+/ { print $4 }' ${ROOTHINTS} )"
> + ipset -N root-servers iphash
> +
> + for ip in "${rootserverips[@]}"; do
> + ipset add root-servers $ip
> + done
> +
> + iptables -A OUTPUT -m set --match-set root-servers dst -p tcp
> --dport 53 -j ACCEPT
> + iptables -A OUTPUT -m set --match-set root-servers dst -p udp
> --dport 53 -j ACCEPT
>
> # Jump into the actual firewall ruleset.
> iptables -N INPUTFW
next prev parent reply other threads:[~2019-10-18 7:08 UTC|newest]
Thread overview: 4+ messages / expand[flat|nested] mbox.gz Atom feed top
[not found] <d50c3626b3d4cc1552807e963d2acc168a37b2db.camel@ipfire.org>
2019-10-01 15:22 ` peter.mueller
2019-10-01 17:24 ` Michael Tremer
2019-10-18 7:08 ` Arne Fitzenreiter [this message]
2019-10-18 11:47 ` Arne Fitzenreiter
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=56a2b6cb571d7c43b5a8e147b2733d3d@ipfire.org \
--to=arne_f@ipfire.org \
--cc=development@lists.ipfire.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox