Package: bind9 Version: 1:9.3.2-P1-2 Severity: wishlist Tags: patch Hi,
This follows on from #393003, it adds another ACL (bogons) and denies service to any of the IP addresses listed within. This is a very minimal list of network ranges; they are all from RFC3330. Cheers, Anand -- System Information: Debian Release: testing/unstable APT prefers testing APT policy: (650, 'testing'), (600, 'unstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.17-2-686 Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8) Versions of packages bind9 depends on: ii adduser 3.97 Add and remove users and groups ii libbind9-0 1:9.3.2-P1-2 BIND9 Shared Library used by BIND ii libc6 2.3.6.ds1-4 GNU C Library: Shared libraries ii libdns21 1:9.3.2-P1-2 DNS Shared Library used by BIND ii libisc11 1:9.3.2-P1-2 ISC Shared Library used by BIND ii libisccc0 1:9.3.2-P1-2 Command Channel Library used by BI ii libisccfg1 1:9.3.2-P1-2 Config File Handling Library used ii liblwres9 1:9.3.2-P1-2 Lightweight Resolver Library used ii libssl0.9.8 0.9.8c-3 SSL shared libraries ii lsb-base 3.1-15 Linux Standard Base 3.1 init scrip ii netbase 4.25 Basic TCP/IP networking system bind9 recommends no packages. -- no debconf information
--- named.conf.options.orig 2006-10-15 02:49:14.000000000 +1000 +++ named.conf.options 2006-10-15 02:50:04.000000000 +1000 @@ -20,5 +20,13 @@ auth-nxdomain no; # conform to RFC1035 listen-on-v6 { any; }; + + blackhole { + // Deny anything from the bogon networks as + // detailed in the "bogon" ACL. + bogon; + }; + + };
--- named.conf.acls.orig 2006-10-15 03:16:59.000000000 +1000 +++ named.conf.acls 2006-10-15 03:10:39.000000000 +1000 @@ -12,3 +12,20 @@ //192.168.0.0/16 }; + +acl "bogons" { + // Filter out the bogon networks. These are networks + // listed by IANA as test, RFC1918, Multicast, experi- + // mental, etc. If you see DNS queries or updates with + // a source address within these networks, this is likely + // of malicious origin. + 0.0.0.0/8; + 10.0.0.0/8; + 169.254.0.0/16; + 172.16.0.0/12; + 192.0.2.0/24; + 192.168.0.0/16; + 198.18.0.0/15; + 224.0.0.0/4; + 255.255.255.255/32; +};