]> git.ipfire.org Git - people/pmueller/ipfire-2.x.git/commit - config/unbound/unbound.conf
Unbound: Enable DNS cache poisoning mitigation
authorPeter Müller <peter.mueller@link38.eu>
Mon, 10 Sep 2018 14:21:24 +0000 (16:21 +0200)
committerMichael Tremer <michael.tremer@ipfire.org>
Mon, 10 Sep 2018 15:34:18 +0000 (16:34 +0100)
commitffba3c98bac2675f19f32541f5e1ebe61419e7bd
treefaf5f465241e0d2e7d9baf5f912f70608f87732c
parent4ca0cb33543e780f02142cd70b18bb341d2eabad
Unbound: Enable DNS cache poisoning mitigation

By default, Unbound neither keeps track of the number of unwanted
replies nor initiates countermeasures if they become too large (DNS
cache poisoning).

This sets the maximum number of tolerated unwanted replies to
1M, causing the cache to be flushed afterwards. (Upstream documentation
recommends 10M as a threshold, but this turned out to be ineffective
against attacks in the wild.)

See https://nlnetlabs.nl/documentation/unbound/unbound.conf/ for
details. This version of the patch uses 1M as threshold instead of
5M and supersedes the first and second version.

Signed-off-by: Peter Müller <peter.mueller@link38.eu>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
config/unbound/unbound.conf