BIND Patches Make Bad Situation Worse 280
An anonymous reader writes "After .COM and .NET started using a wildcard, the internet community busily started
creating patches to various pieces of software to circumvent this. It was
said that this was a grave problem to the internet. Several official BIND
patches were
announced over the next few days. However, it turns out they weren't necessarily
too well thought through. Usage of the patch unexpectedly
broke at least 7 Top Level Domains, ISC announced 3 weeks later, after
users
started having problems. The .NAME registry has sent a formal letter to ICANN's Security and Stability Advisory Comittee to warn against using the BIND patch, which they will look into in their next meeting. The intention may have been good, but...
Stability? Anyone?"
Isn't it unnecessary now? (Score:2)
No, Verislime is still working to get the ok (Score:2)
Re:No, Verislime is still working to get the ok (Score:2)
Re:Isn't it unnecessary now? (Score:3, Informative)
As I see it, Verisign is building a portfolio of legal positions that it will be using in what I belive is almost certain litigation between Verisign and ICANN and possibly involving the US Department of Commerce?
- Verisign is trying to engender a sufficient number of statements by technical experts that it can convince a judge that there is really a technical debate and that thus the judge ought to stay out of the m
Re:Isn't it unnecessary now? (Score:2)
Do I know anymore? (Score:2)
Re:Do I know anymore? (Score:2)
Software Development Cycle (Score:2)
Re:Software Development Cycle (Score:2)
Not ISC's fault (Score:2)
It seems appropriate for the Commerce Dept. to revoke the Verisign contract and award it to another entity that will be m
BIND crap (Score:2)
Re:BIND crap (Score:2)
Ba-doom, pssh!
Re:BIND crap (Score:2)
Re:BIND crap (Score:2)
Then again, this issue has nothing to do whatsoever with BINDs rotten codebase. Normally you can be pretty sure that they get the DNS part right and only fuck up in the C implementation part, this time it's the other way around.
Agreed - The patch works fine (Score:3, Informative)
Re:Not ISC's fault (Score:2)
Preach on, brother. None of this would have happened had Verislime decided that it wanted to 0wn teh i
Re:Not ISC's fault (Score:3, Insightful)
The problem is that some TLDs do more than just delegation. The article mentioned the .name domain specifically.
The problem with the BIND patch arose when people implemeting the patch decided to not allow wildcarding on all TLDs. If you used the patch to only set .com/.net to delegate-only, there wasn't a problem. If you also set .name to delegate-only, then you would have
Re:Not ISC's fault (Score:3, Insightful)
Re:Not ISC's fault (Score:2)
Boy, I wish my mod points hadn't expired. I'll quote this portion again;
Re:One doesn't lead to the other, I'm afraid (Score:2)
bad patches (Score:2)
My ISP installed another one and it is even worse: it does not return an error but it simply returns no answer for the wildcarded records.
Overblown (Score:5, Informative)
Re:Overblown (Score:2)
The
Personally I agree with that much.
Re:Overblown (Score:2)
Re:Overblown (Score:2)
Honestly, though, I do agree that the debate is overblown...change the defaults, and move on. Not using insurance against Verisign's nastiness because someone left a zone off a default list (since fixed), is crazy.
Re:Overblown (Score:2)
Quite frankly, a million sysadmins could configure themselves as the authority over '.', 'com', 'net', or any domain of their choosing and it would similarly break thousands (millions) of connections.
Misconfiguration is hardly the fault of the software package. It's not BIND's responsibility to inform you that you're not the proud owner of ".com" and that it won't start until you smarten up.
Re:Overblown (Score:2)
hmm.. (Score:2)
Re:hmm.. (Score:2)
oy vey (Score:2)
The procrastinator wins again... (Score:2)
I'll play the part of ICANN... (Score:4, Funny)
Dear (dot)name,
Since (dot)name provides such a useful and valuable service to the Internet community, we will immediately take action to address your--
Sounds like a good reason to use djbdns instead (Score:4, Interesting)
It's nowhere near as difficult to set up as BIND, it's more secure than BIND, and there's a patch [tinydns.org] available to block Verisign's wildcard lookups. I've been running the patched version at home and at work since shortly after Verisign added the wildcard records and haven't had issues with any DNS queries.
Re:Sounds like a good reason to use djbdns instead (Score:2)
Cool.
Is there a way to install and run it without having to install the rest of his daemon management stuff? I like to disrupt as few things as possible when making changes to my gateway.
Schwab
Re:Sounds like a good reason to use djbdns instead (Score:2)
I don't think so...but there's no reason why you couldn't use daemontools and ucspi-tcp only with djbdns and continue using whatever else for your other services. They're also useful to have on hand if you're using qmail (as I am).
(The only other publically-accessible services I usually run are httpd (Apache) and sshd (Op
Re:Sounds like a good reason to use djbdns instead (Score:2)
Re:Sounds like a good reason to use djbdns instead (Score:2)
Liar, axfrdns service does it, and daemontools is far easier and more convenient to use than init scripts. Typical anti-DJB troll. Yum.
Re:Sounds like a good reason to use djbdns instead (Score:2)
If you don't like daemontools then try runit or minit. They're GPLed too.
Re:Sounds like a good reason to use djbdns instead (Score:2)
Re:Sounds like a good reason to use djbdns instead (Score:2)
Your characterization of that patch is incorrect. It blocks A RRs which contain a specifc IPv4 address. This is not what the BIND patch does, it's far more general.
Re:Sounds like a good reason to use djbdns instead (Score:2)
How it goes about doing what it does, I think, is a minor point. For purposes of blocking sitefinder.verisign.com's IP address in response to a DNS lookup of some other domain, it gets the job done without affecting other lookups. (You can punch in http://sitefinder.verisign.com/ [verisign.com] and still go there, if that's what you want to do. It's only
Re:Sitefinder will move (Score:2)
Re:Sitefinder will move (Score:2)
Not to mention if they smartened up and put it on a round-robin. {hilarity ensues}
Re:Sounds like a good reason to use djbdns instead (Score:2)
Sorry, I prefer my DNS server package to include JUST the DNS server package, instead of trying to replace my OS with his own distro of network crap.
Re:Sounds like a good reason to use djbdns instead (Score:2)
Re:Sounds like a good reason to use djbdns instead (Score:2)
Re:Sounds like a good reason to use djbdns instead (Score:2)
The last few times I've installed djbdns, all I've had to do was type in emerge djbdns, go away for a few minutes, come back, and start adding data.
Last time I checked, DJB's usual license says you can't distribute modified versions without prior approval. BFD. Distribute an unmodified tarball, along with whatever patches you want to apply, and set up your install script to patch, compile, and in
So why doesn't he just use the QPL? (Score:2)
The last few times I've installed djbdns, all I've had to do was type in emerge djbdns, go away for a few minutes, come back, and start adding data.
emerge: Bad command or file name. Installing and configuring Gentoo Linux on a production system is not always an option.
Distribute an unmodified tarball, along with whatever patches you want to apply
Applying a patch to a copyrighted program prepares a derivative work of that program. Will it be lawful under all nations' copyright laws for end users of
Re:So why doesn't he just use the QPL? (Score:2)
So it ends up being a bit more work by not having the build process automated if you're stuck running Redh*t/SuSE/etc. For someone other than a paper MCSE, it shouldn't be a problem.
Re:Sounds like a good reason to use djbdns instead (Score:2)
Great, I'm sure some packager I trust will build a version of djbdns with the patch included so I can just install it and go...
Oh, wait, that will never happen be cause DJB's license forbids it.
Feh.
Of course, it's not really relevant since the problem isn't with BIND's patch, it's with users mis-configuring the new option that the BIND patch provides.
The BIND patch is way more flexible, the djbdns patch requires you to keep updating
Re:Sounds like a good reason to use djbdns instead (Score:2)
Re:Get the /. anti-DJB trolls ready (at +2) (Score:2)
Re:Get the /. anti-DJB trolls ready (at +2) (Score:2)
If sendmail & BIND didn't suck so hard, you wouldn't see so many people willing to mention alternatives (whether qmail & djbdns or some other MTA and/or DNS server).
Re:Sounds like a good reason to use djbdns instead (Score:2)
Rooted. Done.
Re:A good reason to use anything else instead (Score:2)
You ever release the code? Just curious, would like to see that.
blame verisign (Score:2)
There are two features (Score:4, Insightful)
The second feature is much more dangerous because you have to explicitly mark the TLD zones which contain records which aren't delegations--all other zones are assumed to be delegation-only. Some zones have lots of in-zone A and/or MX records (DE, for example), so you have to do some research before you can enable this feature.
If the second feature is incorrectly configured, there will be some local disruption of service. While it might contribute slightly to the instability of the Internet, it's just a localized configuration error (mind that BIND doesn't even have a default for the configuration option), and it's not comparable to what VeriSign did on a global scale.
Wildcarded TLD (Score:2)
Invader ZIM (Score:2)
Tallest: You made the DNS problem worse!
ZIM: Worse..? or better?
But... (Score:2)
But I thought, regression testing, hell testing at all, was a bad thing. Isn't it *good* that in the open source world, a patch gets slapped together and applied the world over, within an hour?
Re:But... (Score:2)
That response was far too reasoned and thoughtful for my sarcastic point.
You're right, of course, but when you get right down to it, the simple fact of the matter is that in OSS you have the properly done projects; the Linux kernel or apache, for example, then everything else.
ISC at fault? Not likely. (Score:3, Insightful)
Re:ISC at fault? Not likely. (Score:2)
Exactly. Verisign deliberately broke the systems of everyone using the
Yet Verisign, still unrepentant, waited weeks to
BIND considered harmful (Score:3, Insightful)
And every time, someone comes back and says no, it's really fixed this time, it's really finally stable, the developers really are both concerned and competent.
I no longer bother replying anymore. Usually CERT does it for me.
BIND must go. The only thing it does reliably is diminish the credibility of open source. (And make sendmail look good by comparison, which is no mean feat, either.)
Re:BIND considered harmful (Score:2)
Re:BIND considered harmful (Score:2)
Those statements are true of BIND 8. I challenge you to provide convincing support for any of these:
with regard to BIND 9.
Whether or not 9's over-complicated is entirely a judgement call, and not really a metric worthy of objective discussion.
BIND keeps getting maintained (Score:2)
the reason we still use it after 15+ years is because its maintainers evidently DO have the will to maintain it, in spite of all the features that people keep wanting added, and the reason that 48 hours after Verisign broke the DNS system you could install a BIND patch is ALSO because its maintainers have the will and ability to fix it.
Re:BIND considered harmful (Score:5, Informative)
Ok, so I want a authorative and recursive DNS server. It needs to be able to be distributed via. rpms, and patchable etc. I really want it to be my vendor of choice who packages and distributes it, but I that's more of a social thing.
So ... what do I use?
So I'll use bind 9 ... and when there's a security problem I hope it's the last. However this issue doesn't count, this is a minor configuration problem that is All verisigns fault.
Re:BIND considered harmful (Score:2)
You are confused (Score:2)
Re:You are confused (Score:2)
The third argument is actually very good. Can you say modularity? Without modular design you end up with shit like sendmail.
So what's the beef with running two services instead of one on your machine at home? It only takes several minutes to install both, and both are very low on memory usage.
Re:BIND considered harmful (Score:2)
You may or may not be correct. However, I'm left wondering why you posted your opinion in connection with this story, considering that
Re:BIND considered harmful (Score:2)
The patches allow -- wowee -- an administrator
to configure BIND in such a way that some TLDs
cease to function.
*plonk*
Re:BIND considered harmful (Score:2)
So, uhh.... you didn't write this?
Not safe to install patches? (Score:3, Insightful)
Hypocrits. (Score:3, Insightful)
How many times has slashdot bitched and moaned about a certain unnamed corporation doing something similar.
Some people say "this could have been avoided if your named.conf was written properly." Yes, and most viruses and worms could be prevented if people would patch their desktops.
So what we have:
A patch that caused a lot of problems.
Users that could have prevented the problem if they had known better.
Sounds a lot like the kind of users all you eleet unix junkies diss on so often.
Re:Hypocrits. (Score:2)
Open software is an essential part of the market, but it's not magic. Bad programmers will still write bad code, and lazy reviewers will still miss bugs.
Caught between the pan and the fire (Score:2)
some may have faced the same decision i did: Either you spend hours and hours in investigations if the sitefinder shit breaks some script of yours or your ancestors, or you take the risk applying a patch that can't be tested very throughly. Neither choice really seemed inviting.
As it turned out, the patch wasn't working very well (increased memory usage, was an unofficial patch for 8.4.somewhat) and we had a malfunctioning debug script.
Regards, Martin
BIND needs an overhaul (Score:2)
Since BIND doesn't support dynamic updates, it doesn't work well with DHCP, Mobile IP, Ad-Hoc IP or any other environment in which dynamic updates are, well, essential. (Incidently, as IPv6 mandates Mobile IP support, BIND cannot be considered IPv6-compliant.)
The API changes with BIND 9 meant t
Re:BIND needs an overhaul (Score:2)
That's news to me. On my Linux box, the DHCP server is dynamically updating the BIND 9 server with no problems.
Say it ain't so! (Score:2)
You're kidding!
- A.P.
Data Problem, Not a Code Problem. (Score:2)
Let the trolls begin (Score:2)
As much of the value of software is the LICENSE under which it is release as the source code itself.
If M$ didn't sell binary copies of their Windows O/S, it would have no value at all.
DJB's tools might be great for some people, and it might even become a standard for the Internet, but as long as DJB's license is so restrictive as to prevent Red Hat from releasing a QMail RPM, its value is greatly diminished. Despite the a
Re:Well (Score:2)
Patching bind only adds legitimacy to the actions of Virilentsin, er, Verisign. When the wicked do wrong, they are seen as evil. When you do something wrong to counter the wicked, YOU are seen as evil.
Re:Well (Score:2)
Re:Well (Score:2)
If ISC failed to give a proper list of domains that needed to have root-delegation in the sample configuration, then their configuration is to blame and not thier patch.
The people over at
Re:Well (Score:2)
BUNK!
There is NOTHING that says that it is illegal for me to do post processing on DNS data that I receive from the internet. My server, my rules and if I want to block all of .biz, .cn and .edu with a patch to bind, nothing can (legally) stop me.
Re:Well (Score:2)
Sued for what? It's a feature you can turn on or off and it's disabled by default in the config. What's the big deal? The only reason it's there is because people wanted it. That'd be like suing Microsoft for outlook viruses.
Re:OE viruses (Score:2)
Oh, we can only dream...
Re:Doh! (Score:2)
Re:This is exactly the reason why I did not used t (Score:2)
The BIND patch doesn't alter the contents of the root zone (small nitpick).
The path to follow was via ICANN, or if you still wanted to disable the sitefinder, just insert a route for the
Tampering with Internet routing could be viewed as damaging as dealing with DNS. Route manipulation is almost
Re:Do you not understand the issue at hand? (Score:2)
zone "net" { type delegation-only;};
So how it's breaking all these other zones is a farking mystery to me.
There's another option which makes delegation-only the default for top-level zones, and you have to list the exceptions explicitly. This can break all zones you fail to mention and which are not delegation-only.
Re:This is exactly the reason why I did not used t (Score:2)
The Internet is a collaborative network, i.e. it only functions because independent nodes agree to collaborate with each other. Conversely and by consequence, it is not only unneeded but undesirable to collaborate with a node that is not coll
Re:Must be a Unix thing (Score:2)
Re:Uh... (Score:2)
I dunno, man. It takes less than five minutes to compile DJBDNS on my P-pro 266. I'll take five minutes of grudging competence over BIND's half hearted tinkering every day of the week.
Re:This wouldn't be a problem... (Score:2)
Re:This wouldn't be a problem... (Score:2)
Re:The Problem with Decentralized Control... (Score:2)
There are already elections for the ICANN board, but they have proven to be completely useless even if you get "our" people in. You might want to google for some of the statements of Andy Muller-Maghun (the first "u" is supposed to be an umlaut, but /. seems to fuck it up), a german hacker, spokesman of the Chaos Computer Club and former elected member of the ICANN board, until
Great example of this... (Score:2)
Thanks Microsoft, for trying to introduce your very innovative "Smart Tags".
Anyone notice all of MS' true innovations merely annoy and hinder rather than help? MS Bob, HTML email, Clippy...
Re:Not ISC's fault, but a lot of misinformation. (Score:2)
Of course, VeriSign could conceivably do the same, which would break the patch.