具体操作请看此文:https://briteming.blogspot.com/2020/01/unbounddns-over-tls.html
----------------------------------------------------------------------
(先读基础文章:https://briteming.blogspot.com/2012/11/unbound-dns-tcp-dns.html)
----------------------------------------------------------------------
(先读基础文章:https://briteming.blogspot.com/2012/11/unbound-dns-tcp-dns.html)
Use at least version 1.5.5 of Unbound if you want to configure your server with a certificate (as support for intermediate certificates was introduced in this version).
Version 1.6.7 or later is recommended.
Config file
An example configuration file for Unbound that runs DNS-over-TLS on port 853 is below.
Depending on how your certificate is issued you may to add the intermediate certificate to your certificate file for clients to be able to validate. For example, if you use Let's encrypt to create your certificate you will need to add the intermediate certificate (found in the
/etc/letsencrypt/certs/000
_chain.pem
file) to the cert file.
If you are using a version earlier than 1.6.7 then Unbound listens on UDP on port 853 with the above configuration. If want to disable UDP both upstream and downstream then use
do_udp: no
however this means all queries authoritative resolvers use TCP which may lead to resolution failures.
Also in older versions of unbound the
tls-*
parameters where called ssl-*
Docker Image
A docker image kindly provided by Lard de Bruin is also available.
from https://dnsprivacy.org/wiki/display/DP/Using+Unbound+as+a+DNS+Privacy+server
-----------------------------------
https://appliedprivacy.net/services/dns/
-----------------------------------
https://appliedprivacy.net/services/dns/
-----------------------------------
Unbound-DNSSEC-DNS-over-TLS
Configuration files for Unbound as a caching DNS server with DNSSEC validation and DNS over TLS forwarding.
This repository is associated with the following blog post (in Japanese).
-----
Our home network is connected to more than 10 terminals including smartphones, tablets, client PCs and server machines.
Because of the large number, it is troublesome to use an IP address to access the terminal. I can not remember. Therefore, in order to manage the correspondence between machine names (host names) and IP addresses, we are constructing and operating a DNS (Domain Name System) server dedicated to the home network using BIND, an open source software. .
So far, the "authoritative DNS server function" which mainly manages the correspondence between host names and IP addresses, and "cache DNS servers" for resolving IP addresses from host names mainly when accessing services on the Internet Function has been co-resident on a single BIND server.
However, it is widely known that combining the functions of the authoritative DNS server and the cache DNS server with one server is a bad practice, mainly from the viewpoint of security.
How to improve the security and stability of DNS ~ Is your DNS server OK? ... (Japan Registry Services)
It was used only in the home LAN and was not accessible from the Internet.
By the way, in the article of the other day, we introduced that the next Android P supports DNS over TLS, and Intra, which is an Android application that provides secure DNS service.
As its name suggests, DNS over TLS uses a secure protocol called Transport Layer Security (TLS) instead of UDP or TCP as a transport when resolving IP addresses from host names. By using TLS, you can protect DNS communication from security threats such as eavesdropping and tampering.
On this occasion, I decided to make DNS server of home LAN correspond to DNS over TLS. There are three points below.
Separate functions of authoritative server and cache server and make them separate servers
→ Create a new cache server, leaving only the function of the authoritative server for home LAN in BIND
Cache server sends name resolution request to public DNS server supporting DNS over TLS
→ Protect DNS communication from eavesdropping and tampering
The cache server verifies the name resolution result signature using DNSSEC
→ Protect DNS resource records (results of name resolution) from tampering
Below is a block diagram that summarizes the three points.
Unbound-DNSSEC + DNS over TLS
I decided to use open source software called Unbound instead of BIND for the cache server to be newly built.
In this article, we will explain the steps to build a DNSSEC & DNS over TLS compatible cache server using Unbound on FreeBSD. The following two articles were taken into consideration for construction.
Unbound DNS Tutorial (CALOMEL)
Actually secure DNS over TLS in Unbound (Ctrl blog)
Unbound installation
The first step is to install the required packages.
Note: The FreeBSD base system already includes unbound (unbound 1.5.10 is included with FreeBSD 11.2-RELEASE). However, this version does not seem to support DNS over TLS, so we will install unbound 1.7.3 (as of July 23, 2018) from the package.
pkg install unbound ca_root_nss
In addition to the unbound package, also install the ca_root_nss package. The ca_root_nss package is a collection of root certification authority certificates (root certificates), and is required when unbound authenticates a public DNS server.
Unbound settings
When the unbound package is installed, the sample configuration file (unbound.conf.sample) is placed under / usr / local / etc / unbound. Copy this sample and change the contents as needed, referring to the two sites mentioned above.
cp /usr/local/etc/unbound/unbound.conf.sample /usr/local/etc/unbound/unbound.conf
Let's look at the main parts of the configuration file. (In the following example, the configuration file is divided into sections, and a total of four files are created. Division of the file is optional, so you may combine them into a single configuration file to your liking. Configuration file will be put together in unbound.conf.)
The complete configuration file is stored in the following GitHub repository, so please refer to it as needed.
Unbound-DNSSEC-DNS-over-TLS-Configuration files for Unbound as a DNS server with DNSSEC validation and DNS over TLS forwarding
/usr/local/etc/unbound/unbound.conf
Unbound's main configuration file. (If the file is divided) Specify include: at the end of this file to read other files.
L24-30: Standby address
interface: :: 0
interface: 0.0.0.0
This is the address that Unbound listens for queries (name resolution requests) from clients. By specifying ::: 0 and 0.0.0.0, both IPv6 and IPv4 listen for queries on all network interfaces.
L53-67: Access control
access-control: 0.0.0.0/0 refuse
access-control: 127.0.0.0/8 allow
access-control: 192.168.0.0/24 allow
access-control: :: / 0 refuse
access-control: :: 1 allow
access-control: :: ffff: 127.0.0.1 allow
access-control: 2001: db8 :: / 64 allow
The cache server constructed in this article is for home LAN only and access from the Internet is not accepted. Let's control access appropriately so that access is possible only from home LAN. In the above settings, only local host and home LAN addresses are allowed. (Please refer to the figure above for the address of the home LAN. This address is for illustration only, so please replace as appropriate for your environment.)
You may think that "access control is unnecessary because it is a server that can not be accessed from the Internet", but be sure to set up access control so that you are not an open resolver.
L88-96: Trust anchor
auto-trust-anchor-file: "/usr/local/etc/unbound/root.key"
Specify the file path of the trust anchor required when verifying the resource record (result of name resolution) by DNSSEC. This file is automatically updated by unbound according to the provisions of RFC 5011. (Please refer to the acquisition of the trust anchor mentioned later.)
L102-103: Root certificate
tls-cert-bundle: "/etc/ssl/cert.pem"
Specify the file path of the root certificate necessary to authenticate the DNS server when establishing a TLS connection with the public DNS server to which the query (name resolution request) from the client is transferred. . If you installed the ca_root_nss package, specify the above path.
The following is required only if you are operating a private domain used only in the home LAN and an authoritative server for this domain.
L105-119: Private domain
private-domain: "example.jp" # Specify private domain
domain-insecure: "example.jp" # Do not perform DNSSEC signature verification
domain-insecure: "0.0.0.0.0.0.0.0.8.b.d.0.1.0.0.2.ip6.arpa" # Do not perform DNSSEC signature verification
local-zone: "168.192.in-addr.arpa." nodefault # Disable default record of address in LAN
Specify that example.jp is a private domain name that operates only on the home LAN. Also specify that this domain does not use DNSSEC. Queries from clients related to this domain will be forwarded to the DNS server specified in stub-zone described later. (This domain name is for illustration only, so please replace as appropriate for your environment.)
/usr/local/etc/unbound/remote-control.conf
Settings related to control of unbound using unbound-control (8) command. In the example of this article, it is set to enable control only from the same host as running unbound.
remote-control:
control-enable: yes
control-interface: /var/run/unbound.ctl
control-use-cert: no
/usr/local/etc/unbound/forward-zone.conf
Specify the DNS server (s) to which the query received from the client is forwarded for each domain name.
In this article's configuration, queries for. (Root domain), that is, all domains are forwarded to the DNS server listed by forward-addr. forward-tls-upstream: By specifying yes, TLS is used to connect to the DNS server.
We selected the servers provided by Cloudflare and Quad 9 from the following articles as public DNS servers. Note that port 853 for DNS over TLS is specified as the port number, not port 53 of DNS standard.
DNS over TLS-Public DNS Servers (Wikipedia)
forward-zone:
name: "."
forward-first: no
forward-tls-upstream: yes # Connect to upstream server with TLS
forward-addr: 2606: 4700: 4700 :: 1111 @ 853 # CloudFlare primary
forward-addr: 2606: 4700: 4700 :: 1001 @ 853 # CloudFlare secondary
forward-addr: 2620: fe :: fe @ 853 # Quad9 primary
forward-addr: 2620: fe :: 9 @ 853 # Quad9 secondary
forward-addr: 1.1.1.1@853 # CloudFlare primary
forward-addr: 1.0.0.1@853 # CloudFlare secondary
forward-addr: 9.9.9.9@853 # Quad9 primary
forward-addr: 149.112.112.112@853 # Quad9 secondary
/usr/local/etc/unbound/stub-zone.conf
Add this file when using a private domain dedicated to home LAN. Queries from clients related to private domain (forward lookup and reverse lookup) are sent to the authoritative server for home LAN specified in this file.
Note: It is assumed that DNSSEC and DNS over TLS are not supported for DNS servers configured in the home network.
stub-zone:
name: "example.jp" # For private domain name resolution
stub-addr: 2001: db8 :: 53 # query authority server for home LAN
stub-addr: 192.168.0.53 #
stub-zone:
name: "0.168.192.in-addr.arpa" # The same applies to reverse lookup (IPv4)
stub-addr: 2001: db8 :: 53
stub-addr: 192.168.0.53
stub-zone:
name: "0.0.0.0.0.0.0.0.8.b.d.0.1.0.0.2.ip6.arpa" # The same applies to reverse lookup (IPv6)
stub-addr: 2001: db8 :: 53
stub-addr: 192.168.0.53
Acquisition of trust anchor
As mentioned in the configuration file section, a trust anchor file is required to validate resource records using DNSSEC. Before starting Unbound, execute the following command to get the initial file of trust anchor. Also, since this file is updated as needed by unbound, change the owner to unbound user.
/ usr / local / sbin / unbound-anchor -a /usr/local/etc/unbound/root.key
chown unbound /usr/local/etc/unbound/root.key
Automatic startup settings
Finally, let's set up unbound to start automatically when FreeBSD starts.
sysrc unbound_enable = YES
Once configured, reboot the FreeBSD machine, or run the following command to start unbound.
service unbound start
Operation check
Finally we were able to start the unbound server. Let's check whether the name resolution can be done correctly. In the following example, we try to resolve the A record (IP address) corresponding to the host name (domain name) www.nic.ad.jp.
The confirmation points are as follows.
Confirm using drill command bundled with Unbound
Specify -D option to enable DNSSEC signature verification
About the result of command execution,
rcode is NOERROR
that ad is included in flags
ANSWER SECTION contains A record (IP address) and signature (RRSIG record) corresponding to this record
Note: For domains that do not support DNSSEC, the latter two (checks regarding RRSIG in flags and ANSWER SECTION) about the command execution result do not apply.
$ drill -D www.nic.ad.jp. A @ 192.168.0.1
;;->> HEADER <<-opcode: 10041="" div="" id:="" noerror="" query="" rcode:="">-opcode:>
flags: qr rd ra ad; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 0
;; QUESTION SECTION:
;; www.nic.ad.jp. IN A
ANSWER SECTION:
www.nic.ad.jp. 269 IN A 192.41.192.145
www.nic.ad.jp. 269 IN RRSIG A 8 4 300 20181018010414 20180720010414 34431 nic.ad.jp. qcrwMmDJb9mZjusNAZ8nQk4Oq6C / N7me9Skvmso1vhtW0YMObCa2 + C + MD / 6koAljbeHAGpA4u5BzvEPflPmzvqhSMP8jv + 4dUYc5Gghkor5GPcgsBPyoz870oJ9De7BRJZke4vfpzDE4 + bcbzAaQ998 / XUDKVcUv3GPctIJlRdVCwkNoxKsksmAAuHM9sNTuPhr4Sd08wmtqxEFJViRlpbH4CDBP329TkQq4JEiw3eVvr4tpoMgjaDLgUF54CIS / M21FzWyn1xOeq4K0lyPl8qYDbqTaN9rycaTxnqd4XdhJDXIbP923oGrOZqO61yx3HTyk588MtvSEF3oUWBeDvA ==
;; AUTHORITY SECTION:
;; ADDITIONAL SECTION:
;; Query time: 1 msec
;; EDNS: version 0; flags: do; udp: 4096
;; SERVER: 192.168.0.1
;; WHEN: Sun Jul 22 19:16:12 2018
;; MSG SIZE rcvd: 355
Client settings
Finally, let's review the client side configuration to use the cache DNS server we built this time. The configuration file for DNS clients is generally /etc/resolv.conf. Let's specify the address of nameserver as the address of cache DNS server.
/etc/resolv.conf
domain example.jp
search example.jp
nameserver 2001: db8 :: 1 # Specify the address of the constructed cache server
nameserver 192.168.0.1 # (same as above)
options edns0
This completes the construction of the DNSSEC & DNS over TLS-enabled cache DNS server using Unbound.
参考文献
- BIND, https://www.isc.org/downloads/bind/
- DNSの安全性・安定性向上のためのキホン~お使いのDNSサーバーは大丈夫ですか?~, https://jprs.jp/related-info/guide/020.pdf
- RFC 7858, Specification for DNS over Transport Layer Security (TLS), https://tools.ietf.org/html/rfc7858
- DNSSEC, https://www.nic.ad.jp/ja/newsletter/No43/0800.html
- Unbound, https://www.unbound.net/
- Unbound DNS Tutorial, https://calomel.org/unbound_dns.html
- Actually secure DNS over TLS in Unbound, https://www.ctrl.blog/entry/unbound-tls-forwarding
- トラストアンカーとは, https://www.nic.ad.jp/ja/basics/terms/trust-anchor.html
- RFC 5011, Automated Updates of DNS Security (DNSSEC) Trust Anchors, https://tools.ietf.org/html/rfc5011
- DNS over TLS - Public DNS Servers, https://en.wikipedia.org/wiki/DNS_over_TLS#DNS_over_TLS_-_Public_DNS_Servers
以上系用translate.google.com翻译自https://blog.c6h12o6.org/post/unbound-dnssec-dns-over-tls/
-----------
安装和配置unbound
-----------
安装和配置unbound
1.新建一个系统用户以运行unbound:
adduser -r unbound
chown unbound:root /usr/local/etc/unbound
[关于chown命令 : Linux/Unix 是多人多工作业系统,所有的档案皆有拥有者。利用 chown 可以将档案的拥
有者加以改变。一般来说,这个指令只有是由系统管理者(root)所使用,一般使用者没有权限可以
改变别人的档案拥有者,也没有权限可以自己的档案拥有者改设为别人。
有者加以改变。一般来说,这个指令只有是由系统管理者(root)所使用,一般使用者没有权限可以
改变别人的档案拥有者,也没有权限可以自己的档案拥有者改设为别人。
chown命令格式为: chown [-cfhvR] [--help] [--version] user[:group] file...
参数格式 :
user : 新的档案拥有者的使用者
IDgroup : 新的档案拥有者的使用者群体(group)
-c : 若该档案拥有者确实已经更改,才显示其更改动作
-f : 若该档案拥有者无法被更改也不要显示错误讯息
-h : 只对于连结(link)进行变更,而非该 link 真正指向的档案
-v : 显示拥有者变更的详细资料
-R : 对目前目录下的所有档案与子目录进行相同的拥有者变更(即以递回的方式逐个变更)
--help : 显示辅助说明 ]
user : 新的档案拥有者的使用者
IDgroup : 新的档案拥有者的使用者群体(group)
-c : 若该档案拥有者确实已经更改,才显示其更改动作
-f : 若该档案拥有者无法被更改也不要显示错误讯息
-h : 只对于连结(link)进行变更,而非该 link 真正指向的档案
-v : 显示拥有者变更的详细资料
-R : 对目前目录下的所有档案与子目录进行相同的拥有者变更(即以递回的方式逐个变更)
--help : 显示辅助说明 ]
2.用unbound-control命令生成证书文件:
cd /usr/local/sbin
unbound-control-setup
3.建立dnssec信任锚(root trust anchor),生成root.ley:
cd /usr/local/sbin/
unbound-anchor
[备注:你可以指定生成root.key的位置,如 unbound-anchor -a “/usr/root.key”,不指定位置则默认生成在/usr/local/etc/unbound/下]
4. 配置unbound:
cd /usr/local/etc/unbound
vim /usr/local/etc/unbound/unbound.conf
查找替换以下内容并去掉前面的 # 注释记号(以下是unbound.conf内容):
[注:vim查找命令 / ,编辑命令 i,保存退出命令 :wq]
verbosity: 1
[纪录扩展统计信息(可选)]
extended-statistics: yes
num-threads: 2 [设定线程数:双核CPU可设为2,四核可设为4]
interface: 127.0.0.1@53 [接口地址,从设定的地址接收其他客户端的请求。这里指定用本机53端口用于应答dnsscript-wrapper的请求]
port: 53 [默认应答端口,dig命令的默认端口]
[打开端口数(数量越多占用内存越大,但可接受并发查询越多)]
outgoing-range:256
[指定发送查询的端口范围(默认1024之后)]
outgoing-port-permit:63001-65500
[指定不发送查询的端口范围。在本例中65001-65500若其中有一端口被其他程序占用,如65002,则可在这里指定不从65002发送查询。(可选)]
outgoing-port-avoid:65002
[设置缓存细节]
msg-cache-size: 50m
msg-cache-slabs: 4
rrset-cache-size: 100m
rrset-cache-slabs: 4
cache-min-ttl: 1800
cache-max-ttl: 86400
do-ip4: yes
do-ip6: yes
do-udp: yes
do-tcp: yes
do-ip6: yes
do-udp: yes
do-tcp: yes
[启用tcp查询,启用会增加可靠性,但会降低效率(可选)]
tcp-upstream: yes
[以后台运行]
do-daemonize: yes
[记录日志,不需要可忽略(可选)]
logfile: “unbound.log” [日志在 /usr/local/etc/unbound/ 下]
log-queries: yes
[pid文件位置]
pidfile: "/tmp/unbound.pid"
[允许本机查询]
do-not-query-localhost: no [务必改为no,否则无法使用局域网服务器作为上游DNS Server]
prefetch: yes
[打开DNSSEC验证]
module-config: “validator iterator”
[设定第5步生成root.key的路径]
auto-trust-anchor-file: “/usr/local/etc/unbound/root.key”
[启用远程控制(可选)]
control-enable: yes
[设定上游 DNS 服务器]
forward-zone:
name:"." [代表所有域名]
forward-addr:8.8.4.4
forward-addr:8.8.8.8
forward-addr:208.67.222.222
forward-addr:208.67.220.220
forward-addr:8.8.8.8
forward-addr:208.67.222.222
forward-addr:208.67.220.220
修改后:wq保存退出。
5.使用unbound-checkconf 检查配置文件是否有错误:
/usr/local/sbin/unbound-checkconf /usr/local/etc/unbound/unbound.conf
[注:若无错误则显示 unbound-checkconf: no errors in /usr/local/etc/unbound/unbound.conf]
6.运行unbound:
/usr/local/sbin/unbound -c /usr/local/etc/unbound/unbound.conf
--------------
Actually secure DNS over TLS in Unbound
You’ll find quite a few blog posts and tutorials on how to configure encrypted DNS over TLS forwarding in Unbound. I’ve yet to find a single one that sets up TLS securely with certificate domain validation, however. Without TLS certificate domain validation your DNS can still be intercepted, monitored, or manipulated by a man-in-the-middle attacker with nothing more than a self-signed certificate. Here is how you set it up more securely.
I’ve already covered the use and configuration of a local and remote DNS caching service in my Knot Resolver tutorial. I’ll not go over those parts again, but I’ll focus exclusively on the required Unbound configuration and, of course, the necessary parts everyone else skips.
Here is a minimal example configuration for Unbound,
/etc/unbound/unbound.conf
, that uses both Quad9 and Cloudflare Resolver as the forwarding resolvers and validates their TLS certificates against the expected domain names for each service:
The blue highlighted sections of the above configuration example highlights which parts are missing from most other tutorials and thus the focus of my tutorial.
The first thing you’ll notice is the
tls-cert-bundle
option that points to the local system’s root certificate authority bundle; including all the trusted root certificates of the operating system. You’ll get this bundle by installing the ca-certificates
package in most Linux distributions.
The default location of the root certificate bundle is
/etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem
on Fedora, and /etc/ssl/certs/ca-certificates.crt
on Debian/Ubuntu. Refer to the documentation of your distribution if you can’t locate their root certificate bundle.
If you haven’t setup the
tls-cert-bundle
option correctly, you may end up with certificate validation errors (below) and Unbound refusing to connect to the remove resolver:
The domain names to validate the certificates against may appear as comments behind the
forward-addr
configuration lines at first glance. The syntax for forward-addr
is IP address of the resolver an @ sign and then the resolver’s port number followed by a # sign and then the expected TLS domain name to validate the certificate the resolver will present.
It’s important that you get these domain names right or otherwise you’ll end up with the same error messages as shown above. Unfortunately, Unbound doesn’t produce different error messages when the certificate domain mismatch, is expired, or when the root certificate is missing or otherwise not trusted.
You should keep an eye on your logs and watch out for any certificate errors. It may be an indication that someone is trying to intercept, monitor, or modify your DNS requests. You can add an additional layer of protection against this by enabling DNSSEC validation.
I’ve added both IPv4 and IPv6 addresses in the above configuration example. Unbound will figure out which protocol is available and which is faster on its own. You can get better reliability from your DNS server by configuring more routes and more options to cover for outages or routing disruptions.
I also wrote about randomizing DNS forwarding servers with Knot Resolver a few weeks back. This ensures you’re not sending all your DNS traffic to one provider; making it more difficult for any one provider to build a complete profile on your online activities and behavior.
Unbound will do this by default with no additional configuration assuming each of your configured DNS forwarders respond within 400 milliseconds. Note that you’re not limited to just four DNS forwarders as you are with Knot Resolver. You can configure as many DNS forwarders as you want with Unbound and it will spread your forwarding requests out among each of them automatically.
Sources
- unbound.conf man page, version 1.7.1, , NLnet Labs, Unbound project
- DNS over TLS, , Cloudflare Resolver, Developer Documentation, Cloudflare
- Frequently Asked Questions, , Quad9