]> git.ipfire.org Git - people/ms/ipfire-2.x.git/commit
Add Fast Flux detection in DNS unbound-python
authorMichael Tremer <michael.tremer@ipfire.org>
Fri, 25 Apr 2025 10:10:42 +0000 (11:10 +0100)
committerMichael Tremer <michael.tremer@ipfire.org>
Fri, 25 Apr 2025 12:34:37 +0000 (14:34 +0200)
commit17f0a474171554a4b39b358780208aff40d361f8
tree67f292ca120b3f2f4ea159b06b3d8d9a74bf624c
parent050f65be6c9ba42e3741bd4ce72bbb6844e9bd33
Add Fast Flux detection in DNS

This has been implemented because of a request on the forum. Since the
proxy is generally outgoing technology it makes sense to enable this
kind of filtering in DNS.

This patch adds a Python script which processes every query and its
response and extracts all IP addresses from it. Those IP addresses will
then be resolved to their origin AS. If there are more then THRESHOLD
different ASes, the request will be blocked.

The AS lookups will only be performed when there is enough IP addresses
to actually hit the threshold. So there should be next to no performance
impact here except the overhead of the Python module itself.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
16 files changed:
config/rootfiles/common/unbound
config/unbound/fastflux-detection.py [new file with mode: 0644]
config/unbound/unbound.conf
doc/language_issues.en
doc/language_issues.es
doc/language_issues.fr
doc/language_issues.it
doc/language_issues.nl
doc/language_issues.pl
doc/language_issues.ru
doc/language_issues.tr
doc/language_missings
html/cgi-bin/dns.cgi
langs/de/cgi-bin/de.pl
langs/en/cgi-bin/en.pl
lfs/unbound