We’re proud to announce the first alpha release for the PowerDNS Recursor 4.3 release train. Two major features are introduced:
- A relaxed form of QName Minimization as described in rfc7816bis-01 has been implemented. To test this feature, do not forget to enable
qname-minimizationin the settings file.
- When the recursor is started by systemd, the recursor will no longer run as the
rootuser. Instead, it will start as the
pdns-recursoruser. Make sure directories and files needed by your specific recursor setup are readable by this user. For non-systemd and non-chroot cases, the default location of the control socket and pid file has changed to
We want to thank everyone that contributed to this and earlier releases, and invite you to contribute to the testing of this alpha release!
Soon to be released, PowerDNS Recursor 4.0.0 includes a lot of exciting features. We have already blogged about some of them, but apart from a post on our mailing-list, the new Response Policy Zone support has not received much love.
Response Policy Zone
First of all, what is RPZ? It’s a way to provide policies to a recursive name server, allowing the use of large, quickly changing data feeds to provide custom responses to queries. RPZ data is supplied as a DNS zone, and can be loaded from a file or retrieved over the network by AXFR/IXFR.
While RPZ was first implemented by the ISC BIND name server, it’s an open and vendor neutral mechanism. You can read more about it on dnsrpz.info.
Why use RPZ?
The most common use case of RPZ is to implement security measures based on a reputation feed provided by another party, such as:
- protect customers from accessing known malware-infected hosts
- prevent known spam sources from reaching your infrastructure
While some users are building their own RPZ feed using internal data, the greatest strength of RPZ is the capacity to use an external feed. Several providers are already offering interesting feeds, for example:
Setting it up in Recursor 4.0.0
PowerDNS Recursor has the capability to get RPZ data from two sources:
- a local file
- a remote server, using IXFR
While the first option is great for mostly static data and testing purposes, the second one is particularly suited for large and rapidly changing feeds.
RPZ support configuration is done via our Lua configuration mechanism, and as such requires a Recursor compiled with Lua support.
First, let’s set up a very basic RPZ zone in a local file, basic.rpz:
This file declares a simple zone, and instructs PowerDNS to respond to queries for example.net with the address 192.168.2.5. To be valid, the zone needs to have a SOA record and at least one NS one at its apex. A more complex example can be found here.
We now need to setup a Lua configuration file for PowerDNS, using the lua-config-file
Finally, in the Lua configuration file, we use the rpzFile() directive to load the RPZ zone:
As soon as the Recursor is started with this configuration, we can check whether it has been correctly loaded:
Loading RPZ from file ‘/etc/powerdns/basic.rpz’
Done loading RPZ from file ‘/etc/powerdns/basic.rpz’
Everything is fine. As expected, a query for http://www.example.net returns 192.168.2.5:
It’s time to try a setup a bit more complicated. To retrieve a RPZ zone rpz.example.net from a remote provider at 192.0.2.1 via IXFR, we would instead use:
The additional parameter policyName has no impact on the response the Recursor will send, but it sets the appliedPolicy of the protobuf message it will output, if configured to. This allows keeping track of the queries that have been modified because of a RPZ policy, for example to be able to detect and act on infected hosts.
This time, the Recursor is a bit more verbose on startup:
Loading RPZ zone ‘rpz.example.net.’ from 192.0.2.1:53
Loaded & indexed 375 policy records so far
Done: 375 policy records active, SOA: need.to.know.only. hostmaster.example.net. 1467033991 60 60 432000 60
We will also be able to check later that IXFR updates are correctly received:
Getting IXFR deltas for rpz.example.net. from 192.0.2.1:53, our serial: 1467033991
Processing 1 delta for RPZ rpz.example.net.
Had 23 RPZ removals, 1 addition for rpz.example.net. New serial: 1467034591
That’s it, we are all set!
We only covered so far the very basic possibilities offered by RPZ. In addition to altering the response, PowerDNS Recursor 4.0.0 is capable of the following actions:
- Forcing the query to TCP by sending a response with TC set
- Sending a NOData response
- Sending a NXDomain response
- Sending a custom CNAME
- Silently dropping the query
It also supports defining a default policy that will use the data found in the RPZ zone, but will override the action, making it possible to use a feed from a provider while customizing the recursor’s behavior.
The rpzMaster example above did not use TSIG to authenticate the server, but of course PowerDNS Recursor 4.0.0 supports that too.
The corresponding documentation can be found in the Response Policy Zone (RPZ) part of our documentation.