]> git.ipfire.org Git - people/ms/ipfire-2.x.git/commitdiff
Unbound: Enable DNS cache poisoning mitigation
authorPeter Müller <peter.mueller@link38.eu>
Mon, 10 Sep 2018 14:21:24 +0000 (16:21 +0200)
committerMichael Tremer <michael.tremer@ipfire.org>
Mon, 10 Sep 2018 15:34:18 +0000 (16:34 +0100)
By default, Unbound neither keeps track of the number of unwanted
replies nor initiates countermeasures if they become too large (DNS
cache poisoning).

This sets the maximum number of tolerated unwanted replies to
1M, causing the cache to be flushed afterwards. (Upstream documentation
recommends 10M as a threshold, but this turned out to be ineffective
against attacks in the wild.)

See https://nlnetlabs.nl/documentation/unbound/unbound.conf/ for
details. This version of the patch uses 1M as threshold instead of
5M and supersedes the first and second version.

Signed-off-by: Peter Müller <peter.mueller@link38.eu>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
config/unbound/unbound.conf

index 3f724d8f76a81027a3a2b6542fb086a149010229..ce9ddcd62fecab8900377b745d23c5ad6add8287 100644 (file)
@@ -61,6 +61,9 @@ server:
        harden-algo-downgrade: no
        use-caps-for-id: no
 
+       # Harden against DNS cache poisoning
+       unwanted-reply-threshold: 1000000
+
        # Listen on all interfaces
        interface-automatic: yes
        interface: 0.0.0.0