BIND Strikes Back Against VeriSign's Site Finder 582
BrunoC writes "Following the story about VeriSign's new Site Finder, the Internet Software Consortium promises to release a patch to its (in)famous BIND that will block the controversial Site Finder. Wired News has full coverage of the ISC initiative against this name resolving atrocity."
the patch (Score:3, Informative)
I'm asking because the wording is quite hard to understand as my main language isn't english
Here is ISC's web page for delegation Only zones (Score:5, Informative)
http://www.isc.org/products/BIND/delegation-onl
Re:Yeah, only SPAM, sure. (Score:5, Informative)
I hope some large ISP's bring action against Verisign for breaking their email systems like that.
In the meantime, if you want to help keep Verisigns SiteFinder off the internet, try this simple script in a while loop:
Re:Bug your ISP (Score:3, Informative)
Or they are like me and use djbdns, and won't go back..
There is a patch for djbdns, but they're not official so I wouldn't reccomend blindly using them.
Re:Bug your ISP (Score:4, Informative)
Re:very cool.. dnscache? (Score:5, Informative)
tinydns.org/djbdns-1.05-ignoreip.patch [tinydns.org]
Re:Bug your ISP (Score:5, Informative)
Patches (Score:5, Informative)
Patches for DJBDNS and lots of other daemons here [imperialviolet.org].
link to patch and example (Score:5, Informative)
http://www.isc.org/products/BIND/delegatio
There is no need to create a com or net data file. Just the
entries to the named.conf file is enough
zone "com" { type delegation-only; };
zone "net" { type delegation-only; };
Ofcourse, if you use views, this needs to be provided within the relevant
view (the one performing recursive lookups).
quote from:
http://marc.theaimsgroup.com/?l=bind9-user
Re:How will this work? (Score:5, Informative)
No, the patch doesn't do filtering in that sense. It just allows you to mark some zones in your BIND config file (such as .com and .net), that should only contain delegation information. So basically if your BIND server recieves back A record(s) rather than NS delegation records from a server authoritative for .com , BIND simply ignores it.
Simple and elegant, and nothing Verislime can do about it. (I hope.)
For TinyDNS / dnscache users (Score:5, Informative)
Russell Nelson has a patch [tinydns.org] for tinydns [tinydns.org] which does the same thing.
He also notes that several other TLD operators for the same thing and has another patch [tinydns.org] that allows you to do the same thing to several naughtly tld operators at once.
The new versions of BIND are already available (Score:5, Informative)
Although the news are not on the BIND page [isc.org] yet, patches for the current versions 9.2.2 and 9.1.3 are already available. Only 9.2.3rc2 is currently listed on the page (as of this writing).
You can get the details from the bind-announce list archives:
All versions were released a few hours ago. Here is the common paragraph at the top of these three messages:
Have fun downloading and installing!
Re:very cool.. dnscache? (Score:5, Informative)
Unfortunately the djbdns patch at that URL is not as elegant as the official patch from ISC for BIND. Unlike the ISC BIND patch, the djbdns patch does not support the declaration of "delegation-only" zones. Instead, it adds support for the rather crude technique of converting an A record response containing an operator specified IP address (which you would currently set to 64.94.110.11) into a NXDOMAIN response.
Re:Soundex into BIND! (Score:3, Informative)
Bind should just return NXDOMAIN and the application (Mozilla, IE, BitchX, whatever) can then sort it out in this fashion. Hell, we can even make handy BSD-licensed shared libraries that do this for easy integration.
The matter is that the application must be informed when a domain does not exist, not spammed with guesses that may be right.
Re:Soundex into BIND! (Score:4, Informative)
The most important one, IMHO, is to compute a list of close matches and present these choices to the user. They may use the Soundex algorithm or some other tricks to see if characters are transposed, if one characters is wrong, if one is missing, etc. If well implemented, this would solve 60% of the problem.
BIND (and other Domain Name Servers) are given the simple task of turning a string into set of 4 octets (aka an IP address), using a massively distributed lookup table that maps strings to IP address.
The reason people are pissed off about Verisign's wildcard entry is that they have depended on their DNS saying "I can't find an IP address" when it can't find an IP address.
In general BIND is a program that talks to other programs via a very stable and well understood interface. Now, how would enhance BIND to do a soundex and return multiple possible results to programs that have been written to expect either a response in the form of a single IP address, or a "domain not found" error?
Sounds to me like this is something that should be handled in the application, if at all.
-josh
Re:The new versions of BIND are already available (Score:5, Informative)
DaC
Re:Lot of fuss about nothing (Score:5, Informative)
Other services are also shit out of luck; Verisign only allowed for HTTP and SMTP. Anything else trying to connect to a non-existent domain is out of luck and will sit around until the connection timesout. Of course, if the server had just returned NXDOMAIN in the first place, as it should, you wouldn't have that problem.
I am glad you're not patching (Score:2, Informative)
And what good would that do? If VeriSlime changes the ip hourly, you'd have to edit the config file hourly: bwilliant patching Holmes.
I prefer the patch as it will be supplied by the ISC: Patch bind and add the following snippet to named.conf:
zone "com" { type delegation-only; };
zone "net" { type delegation-only; };
Tada. Let VeriSlime work around *that*.
Re:Soundex into BIND! (Score:3, Informative)
DNS is a directory service for god's sake, not a god damn search engine.
Right
DNS maps domain names to IP addresses and vice versa, nothing more
Wrong [dns.net]
Re:How will this work? (Score:2, Informative)
Why? Glue records. You are _meant_ to receive certain As from the parent servers of a domain delegated to nameservers which live within its own namespace.
But glue records are very specific, and can be easily checked for. Only if an A record matches one of the names in the NS records need it be kept.
Re:hmmm don't want to be alarmist (Score:1, Informative)
Nope, no chance of that. You hace to actively define the zones for delegation-only.
From a post by Paul Vixie [merit.edu]:
> And make it default configuration for new bind releases...
never. not for your example, nor for any set of tld's. the default for
bind will be what it's always been -- to respect the autonomy of the
zone administrator/publisher. overriding that autonomy has to be a
local act by a local name server administrator who is fully conscious of
the impact of their configuration change. once, with "check-names", isc
was accused of "legislating from the bench". never again.
Re:What about the other 20%? (Score:5, Informative)
Re:Good for BIND (Score:3, Informative)
It's a federal offence to redirect a misspelling to a porn site as it's "illegal to deceive children into viewing harmful material". This is a provision of the "Amber Alert" legislation and will land you in jail for 4 years.
Relevant Link [geek.com]
Re:ISC ROCKS (Score:2, Informative)
The root servers do not serve
Moreover, alternative root servers would have to delegate .com & .net to some other trusted(?) party...
Re:Yeah, only SPAM, sure. (Score:3, Informative)
*Sigh*. I never get to have any fun...
Re:But for how long (Score:3, Informative)
Re:could NOT care less you idiot (Score:4, Informative)
It's the other way around. Hormel has a trademark on 'SPAM' and would prefer UBE to be called 'spam'. See the SPAM website [spam.com] for more info.
Re:Have your say (Score:4, Informative)
Re:How will this work? (Score:5, Informative)
Why? Glue records. You are _meant_ to receive certain As from the parent servers of a domain delegated to nameservers which live within its own namespace.
However, you're missing a crucial part: when you ask the delegating server for the NS records, the glue A records are given out in the additional section, not in the answer section.
The ISC patch disregards
Re:Lot of fuss about nothing (Score:2, Informative)
The internal 404 usually is some sort of program to track down and redirect you to where you should be so instead of saying "This page no longer exists" it's saying "Hay maybe you want THIS page instead."
Also read the 404 page more carefully. If something has gone wrong with the website your given contact information (presumming the web admin did his job and put the admin contact e-mail into the server) in the 404 message so that you can contact the person or persons responsable for maintanence and tell them what went wrong.
But again you won't get that contact information under Microsoft Windows IE "helpful" page.
That page is IEs best guess as to what happend and being familure with the Internet I'm usually aware of what is wrong and what is really going on and quite frankly IE has yet to guess the real cause of the 404 message.
However the big diffrence between Microsoft IEs replacement "Hay quit complaining I'm only trying to help" and Verisons search website is that IE is on YOUR computer and if you don't like how IE works download Netscape, Opra, Mozilla or one of the many other web browsers that are out there and you get the REAL 404 message but Verison is basicly changing the Internet inferstructure to do this so we all get screwed reguardless of the programs and os we use.
Re:Lot of fuss about nothing (Score:5, Informative)
You don't get to see a "404 No Found" response if the server doesn't even exist. You'd usually get an error message (generated by IE) that says something like "www.invaliddomain.com doesn't exist." (that's what Mozilla displays, I don't know IE's message).
The 404 response is what you get when your browser could send a HTTP request to the web server, but the server couldn't find the page you were requesting. The response page is generated by the web server, so how helpful it is depends on what the web server admins have configured. Some pages will not simply return an error message but also include a search box, for example.
Well, yes, I expect a somewhat helpful error message. But that's not actually the point. The main problem with Verisign's move is that they are assuming (like you seem to do) that the purpose of the Domain Name System is to find the web server that a user is trying to contact when he types an URL into his browser. But DNS isn't used for the web only, it is used to associate names with IP addresses. You can then use the returned IP address for whatever protocol you want, DNS doesn't tell you whether or not the server with the returned IP supports that protocol.
For all protocols that run non-interactively (i.e. without a human sitting in front of the computer and interactively deciding what server should be contacted next, and interpreting the responses), Verisign's action means that if contacting a remote system fails, the computer can now no longer find out if it's due to a misconfiguration and will likely never work (if the other computer doesn't exist), or if it's just a temporary problem (if the other computer does exist but does not respond).
Re:very cool.. dnscache? (Score:3, Informative)
names.tinydns.org/djbdns-1.05-ignoreip2.patch.
For Windows Users (Score:-1, Informative)
216.239.51.99 can be any IP.
216.239.51.99 is Google.com.
OK, it's not strictly regulation, but with any luck Verisgn will find that "controlling" the underlying technology of the Internet is not as easy as they first though
Yes, Google is in control.
It bears repeating (Score:0, Informative)
Simply locate your "root.servers" file (/var/named for RedHat installations) and run:
dig @131.161.247.226 > root.servers
and restart named. To verify that things are then working correctly:
> host ns0.opennic.glue
ns0.opennic.glue. has address 131.161.247.226
From that point onwards, you can update your root server file by adding something like this to your weekly cron:
Easy! (Score:2, Informative)
do
echo VerisignSucks${RANDOM}Times.com \
| nslookup >
done
Re:Good for BIND (Score:3, Informative)
Read this amendment to H.R. 1104 [gop.gov]:
Re:Good for BIND (Score:2, Informative)
--
Petition Verisign to change (Score:5, Informative)
Re:For Windows Users (Score:2, Informative)
It will only work if you manually try and goto sitefinder.verigisn.com (www, ping, trace, whatever).
Do you really understand how DNS works? If I make a query to iudsbfkjdf.com, verisign redirects me to their IP using the wildcard 'A' record, in which the webpage at that IP CLAIMS to be www.iudsbfkjdf.com.
Adding that to hosts will only redirect you to (in your stated case - google) if you attempt to connect to sitefinder.verisign.com.
Re:Lot of fuss about nothing (Score:2, Informative)
I called their number and got this... (Score:5, Informative)
sitefinder@verisign-grs.com
Re:Good for BIND (Score:1, Informative)
zone "cc" { type delegation-only; };
The fix provided by isc even allows for denying wildcard records for subdomains only. This has been thought out.
Re:Good for BIND (Score:2, Informative)
And since Whitehouse is a company, and the White House isn't (although there has been some discussion of that recently), whitehouse.com is much better pointing to the magazine
Re:Yeah, only SPAM, sure. (Score:2, Informative)
*.sourceforge.com
How do you think they keep on top of that many DNS entries that constantly come and go? You see it at ISPs that do third level (and higher) DNS virtual hosting and and group systems where the URL might be in the form of username.domain.com instead of domain.com/~username/
DNS supports it because it is a legitimate
feature. And less you think removing wildcard support would fix the issue, as it has already been mentioned in this discussion, all Verisign has to do is modify their DNS server to supply responses that appear to make the domain legitimate. They already use non-standard DNS software, why not make a few more changes to enhance their bottom line?
Even after the ISC makes the patch to disable wildcards at the TLD level, Verisign can as mentioned above work around it if they really want to by modifying how their servers respond.
Re:Good for BIND (Score:3, Informative)
Let's see...
gamefaq.com leads to a page for gamefaqs.com... no pr0n there.
whitehouse.com is the site for a pr0n magazine which predated the internet. The act wouldn't cover that case.
As for resonatorsoft.com, it's not pr0n either.
So you're 0-3 thus far...
Re:It bears repeating (Score:5, Informative)
It's amazing how many super cool random people are running around suggesting using OpenNIC, which, of course, won't do a DAMN FUCKING THING. Anyone who suggests an alternate root has demonstrated they have no knowledge of how DNS works at the topmost level.
Please, someone go around and find all the posts that mention this and moderate them up! I've posted at least three posts pointing this out, and other people have also.
I'm starting to think everyone should have a few emergency -1: Wrong mod points to get rid of information that is just flatout incorrect.
Re:use their T&C against them... (Score:1, Informative)
for plenty of toll-free (in US) contact numbers.
Re:Bug your ISP (Score:4, Informative)
include "named.delegation-only [clubneon.com]";
Re:Yeah, only SPAM, sure. (Score:5, Informative)
Doesn't work for me...then again, I've already fixed djbdns [cr.yp.to] here to return NXDOMAIN when a lookup resolves to Verisign's squatter page. (A copy of the patch is here [alfter.us] (the patch isn't mine, but the only place I've seen it is buried in bugs.gentoo.org) and an ebuild for your local Portage tree is here [alfter.us]. To use the ebuild, you'll also need to copy Manifest and files/1.05-errno.patch from /usr/portage/net-dns/djbdns.)
Re:Yeah, only SPAM, sure. (Score:3, Informative)
It doesn't care WHAT you type, you get the same garbage no matter what.
Better petition (Score:2, Informative)
offtopic? i think not. (Score:5, Informative)
generates a random string of characters.
performs a "wget" to look up that string as a domain name, and fetch the url returned and dump contents to
this accomplishes two things. first, or course, is wasting verisign bandwidth. more interestingly, however, it causes dns servers upstream from you to cache the address of all these garbage domains. when their dns cache fills up, they start discarding older entries they have had in there. basically, this is forcing dns servers to constantly flush their caches of any useful data. this, in turn, makes every valid dns query have to cascade all the way down to the root servers. that is, "slashdot.org" is no longer cached in your isp's dns cache, so every user on you isp trying to get to slashdot is contributing to a DDOS of verisign's root servers.
well done.
Re:One more dnsmasq patch (Score:3, Informative)
while( bogus_addrs[i].addr.addr4.s_addr != (in_addr_t)-1 )
with
while( bogus_addrs[n].addr.addr4.s_addr != (in_addr_t)-1 )
or you'll be sorry.
Re:Who should I write? (Score:2, Informative)
VeriSign ICANN DoC (Department of Commerce)
Patched BIND is an elegant solution (Score:4, Informative)
The new feature just needed this bit added to named.conf to get it working:
When its running, it will put message like this to