Bug 48996 - Support Response Policy Zone (RPZ)
Support Response Policy Zone (RPZ)
Status: NEW
Product: UCS
Classification: Unclassified
Component: DNS
UCS 4.4
Other Linux
: P5 normal (vote)
: ---
Assigned To: UCS maintainers
UCS maintainers
https://ftp.isc.org/isc/bind9/cur/9.1...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2019-03-14 15:56 CET by Christian Völker
Modified: 2024-01-26 18:31 CET (History)
4 users (show)

See Also:
What kind of report is it?: Feature Request
What type of bug is this?: 4: Minor Usability: Impairs usability in secondary scenarios
Who will be affected by this bug?: 2: Will only affect a few installed domains
How will those affected feel about the bug?: 2: A Pain – users won’t like this once they notice it
User Pain: 0.091
Enterprise Customer affected?: Yes
School Customer affected?: Yes
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number: 2019031321001001, 2020070621000417, 2020102921000083
Bug group (optional):
Max CVSS v3 score:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Christian Völker univentionstaff 2019-03-14 15:56:45 CET
We would like to use RPZ at school server level to intercept certain DNS queries and to replace with our configured entriese. For example, Google recommends that you use DNS queries to all Google domains (google.com, google.de, etc.) with a CNAME to forcesafesearch.google.com to make sure the "Safe Search" function in Google is used. (There is currently an acute need for this in a primary school).

The additional configuration required on a UCS school slave for this could be nearly completely via /etc/bind/local.conf.samba4, with the exception of the
additionally necessary "response-policy" option in the "options {...}" block of the named.conf.samba4.

Hence the question: Would it be conceivable to use a UCR variable in the future to Define a response policy zone in the options block?

Example:

options {
        tkey-gssapi-keytab "/var/lib/samba/private/dns.keytab";
        listen-on { any; };
        allow-query { localnets; };
        allow-recursion { localnets; };
        allow-query-cache { localnets; };
        allow-transfer { localhost; };
        listen-on-v6 { any; };
       response-policy { zone "rpz-google"; };
};
Comment 1 Christian Völker univentionstaff 2019-03-14 15:58:45 CET
There has been a thread at help.univention.com, too:
https://help.univention.com/t/wie-funktioniert-der-dns-forwarder/9464
Comment 2 Christian Völker univentionstaff 2020-06-23 12:55:10 CEST
It would be helpful in situations with certificates and public hostnames, too.

Thus, a hostname (ie server.public.external) could point to an internal hostname and prevent very common issues with certificates!
Comment 3 Christian Völker univentionstaff 2020-07-06 11:47:43 CEST
For a customer issue needing to overwrite the default UCS reverse zone this would have been helpful.