faq.txt 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228
  1. The pdnsd FAQ
  2. Q: There are complete and well-tested name servers around, such as the BIND.
  3. These do also perform caching. Why should I use pdnsd?
  4. pdnsd does not aim to be a complete name server implementation, such as the
  5. BIND. It is optimized for caching, and you can only specify a small subset
  6. of all dns record types pdnsd knows in your local "zone" definitions. This
  7. of course reduces the code size drastically, and such the memory footprint.
  8. There are some features especially interesting for dialin networks,
  9. ordinary (non-server) internet hosts and computers that are often not
  10. connected to to their network, e.g. notebooks (I originally wrote this
  11. program for use with my notebook). These features are:
  12. A:
  13. * permanent disk cache (useful for frequent power-offs/reboots)
  14. * usually smaller memory footprint (depends on cache size) (see next
  15. question)
  16. * offline-detection prevents hangs (e.g. the typical hang on startup of
  17. some Netscape Navigator versions if not dialled in)
  18. * better control about timeouts (also to prevent hangs)
  19. * better control over the cache
  20. * better run-time control
  21. -------------------------------------------------------------------------------
  22. When I look at the process size with ps, top, gtop, or a similar tool, I
  23. Q: see some processes with a total size well above 3.5 MB. This is much more
  24. than e.g. BIND named (about 1.4 MB). Why?
  25. Really, it is not. pdnsd uses multithreading, not multiprocessing. That
  26. means that the processes share most of their process space. In the
  27. LinuxThreads library or NPTL (Native Posix Thread Libary), which are used
  28. by pdnsd on Linux, in fact the total process address space is shared
  29. A: (although the processes have different stacks, these are in one process
  30. address space). You may check this by looking at the at the process sizes
  31. of the pdnsd threads: all should be the same. The effective size that pdnsd
  32. occupies is thus the size of any of the processes, not the sum of those.
  33. So, pdnsd with empty cache occupies about 800 kB, and the maximum size
  34. should be about the cache size plus this size (in fact, ca 5-10% more).
  35. -------------------------------------------------------------------------------
  36. Q: What do I need the status control (option -s) for?
  37. It enables you to do some things you might or might not need. With it, you
  38. can:
  39. * query pdnsd's settings at runtime to debug configuration files and see
  40. which servers are regarded to be available
  41. A: * mark servers as available or unavailable, or force a status retest -
  42. very handy if you want to control which servers pdnsd queries, e.g for
  43. muliple dial-up accounts
  44. * delete, invalidate or add DNS records - useful e.g. when you want to
  45. build records for dynamically assigned IP addresses or domain names
  46. * reload pdnsd's configuration file without restarting pdnsd
  47. * print information about the contents of pdnsd's cache.
  48. -------------------------------------------------------------------------------
  49. Q: What do I need local records (rr- and source-sections in the config file)
  50. for?
  51. Some resolver programs, e.g. nslookup, want to look up the name of the
  52. server they are using before doing anything else. This option is for
  53. defining a PTR record for your IP such that those programs get an answer
  54. even if the name server you are caching is not available or does not offer
  55. these records. By extension, you may also define A and SOA records. This
  56. allows you to build very small zones without having to use a "big" name
  57. server. It is NOT intended to replace such a complete server in anything
  58. but VERY small networks. Alternatively, you may start a named on another
  59. host or on the same host on another port and cache it with pdnsd in
  60. addition to other (more distant) name servers.
  61. A: The source section allows you to let pdnsd read in your /etc/hosts file on
  62. startup and serve its contents. This file is used by your local resolver
  63. before it even tries the name servers and usually contains fully-qualified
  64. domain names (FQDNs) for all of the internet addresses your host has. If
  65. you source this file, you usually won't need any additional rr sections.
  66. Sourcing it also allows other hosts (eg. in your local network) to access
  67. the names defined in your hosts file. You can of course just add other
  68. hosts in your local network to the servers hosts file, thus making them
  69. known to your server's resolver and pdnsd (if you sourced that file).
  70. If you don't know what this answer was all about, you should just take the
  71. source section in the sample config file that comes with pdnsd, copy it
  72. into your config file and forget about it.
  73. -------------------------------------------------------------------------------
  74. When compiling, I get an error message like
  75. Q: Please define __BYTE_ORDER to be __LITTLE_ENDIAN or __BIG_ENDIAN
  76. What's up?
  77. Normally, this macros should be defined in your C library's header files.
  78. There are two different methods, most C libraries support both (and pdnsd
  79. honors both): either __BYTE_ORDER is set to __LITTLE_ENDIAN or
  80. __BIG_ENDIAN, or __LITTLE_ENDIAN or __BIG_ENDIAN are directly defined as
  81. macros.
  82. Linux glibc, for example, does set those macros correctly. Never mind. You
  83. just have to know whether your machine is little-endian or big-endian, this
  84. means wheter your machine saves the least significant byte of a word or
  85. double-word first in memory (little-endian) or the most significant first
  86. A: (big-endian). All intel x86 and Alpha machines are little-endian, for
  87. example, while SPARC and PowerPC architectures are big-endian. If your
  88. machine is little-endian, add the following line to your config.h:
  89. #define __BYTE_ORDER __LITTLE_ENDIAN
  90. Likewise, if your machines byte order is big-endian:
  91. #define __BYTE_ORDER __BIG_ENDIAN
  92. Pathological byte orders like pdp-endian are not yet supported really;
  93. However, for the place the endianess is needed, __LITTLE_ENDIAN should do
  94. (it deals only with 16 bits; for all other occurances, ntoh[sl]/hton[sl] is
  95. used).
  96. -------------------------------------------------------------------------------
  97. At startup, I get a warning saying:
  98. Q: Uptest command [...] will implicitly be executed as root
  99. What does that mean?
  100. This warning only occurs if you use the uptest=exec option in your
  101. configuration. It means that the uptest command is run as root because
  102. pdnsd is running as root, and this was not explicitely specified. The idea
  103. is that it may introduce security holes (in the programs being run) when
  104. A: they run as root, and so they shouldn't do that if possible. You can
  105. specify the user that shall run the command by appending its name
  106. comma-separated as string to the uptest_cmd line:
  107. uptest_cmd="<your command>","<user>";
  108. If it is correctly running as root, just append the user string "root" to
  109. the command and the warning will not occur again.
  110. -------------------------------------------------------------------------------
  111. Q: I cannot run my uptest_cmd command as root (it says permission denied),
  112. although the pdnsd executable is setuid root. Why?
  113. pdnsd will drop privileges gained through setuid/setgid before executing
  114. the uptest commands (you shouldn't set the pdnsd executable setuid/setgid
  115. A: anyway). The reason is clear: if you install the pdnsd executable as setuid
  116. root and this wouln't be done, any user could execute shellcode with root
  117. privileges using that option!
  118. -------------------------------------------------------------------------------
  119. At startup, I get an error saying:
  120. Q: Bad config file permissions: the file must be only writeable by the user
  121. Why is that?
  122. pdnsd has an option (uptest=exec) that allows the execution of arbitrary
  123. shell code (for testing whether an interface is up). This must be of course
  124. secured against unauthorized use. One of these protection is the one that
  125. produces the error message: if you routinely run pdnsd, e.g. at system
  126. startup, and your config file is editable for others, someone could change
  127. A: it and insert shell code that is executed in the next pdnsd run -- with
  128. your user privileges! To prevent this, pdnsd will exit if the config file
  129. is writeable by others than the owner. To get rid of this message, just do
  130. chmod go-w <filename>
  131. on your config file (for the default file: chmod go-w /etc/pdnsd.conf). You
  132. should also check that the ownership is set correct.
  133. -------------------------------------------------------------------------------
  134. Q: serve_aliases does not seem to work.
  135. Some resolvers (e.g. of the glibc 2.1) seem sometimes not to look up
  136. unmodified names, but the names with an entry of the search path already
  137. A: appended. Since pdnsd will serve short names with this option anyway, you
  138. can delete the search an domain options from your /etc/resolv.conf. This is
  139. reported to work in some cases.
  140. -------------------------------------------------------------------------------
  141. Q: Some queries for domains that have many records (e.g. www.gmx.de) fail
  142. mysteriously.
  143. pdnsd versions prior to 1.1.0 had the tcp server thread disabled by
  144. default. Most resolvers repeat their query using tcp when they receive a
  145. A: truncated answer (the answer is truncated when it exceeds a length of 512
  146. bytes). You need to recompile pdnsd with the option --enable-tcp-server to
  147. fix this.
  148. -------------------------------------------------------------------------------
  149. I am behind some kind of firewall. In the configuration file I have only
  150. Q: listed addresses of name servers on the local (ISP's) network, but pdnsd is
  151. slow and DNS queries frequently time out.
  152. In some cases pdnsd will not consider the answer of the local name server
  153. authoritative enough, and will try to get answers from the name servers
  154. listed in the authority section of the reply message. If pdnsd is behind a
  155. firewall that blocks the UDP reply packets from remote name servers, pdnsd
  156. will wait in vain for a reply. One solution is to set proxy_only=on in the
  157. A: servers sections of the configuration file. This will prevent pdnsd from
  158. querying name servers that are not listed in the configuration file.
  159. Another solution that can be tried is specifying query_method=tcp_only in
  160. the global section of the configuration file, because a firewall that
  161. blocks UDP packets from outside might still allow outgoing TCP connections
  162. to port 53.
  163. -------------------------------------------------------------------------------
  164. Q: Is pdnsd vulnerable to DNS cache poisoning as described in CERT
  165. vulnerability note VU#800113?
  166. Short answer: Yes.
  167. Somewhat longer answer: The problem is not so much that pdnsd's
  168. implementation is flawed but rather that the DNS protocol currently being
  169. used is fundamentally flawed from a security viewpoint. As long as a more
  170. secure protocol is not in place, all that the developers of pdnsd can do is
  171. to try to tweak the current implementation to make it as difficult as
  172. possible for an attacker to succeed.
  173. From version 1.2.7 onwards, the default for the query_port_start option is
  174. A: 1024, which means that the pdnsd resolver will randomly select source ports
  175. in the range 1024-65535. (In previous versions the default was to let the
  176. kernel select the source ports, which will often result in a more or less
  177. predictable sequence of ports.) It also helps to use a good quality source
  178. of random numbers. On platforms where this is supported, it is preferable
  179. to configure with --with-random-device=/dev/urandom. There is still more
  180. that can be done to make pdnsd less vulnerable, but this remains (as of
  181. this writing) a work in progress.
  182. Please note that pdnsd was designed for small (private) networks, and that
  183. it is generally not recommended to let untrusted users access pdnsd.
  184. -------------------------------------------------------------------------------
  185. Thomas Moestl and Paul Rombouts
  186. Last revised: 18 August 2008 by Paul Rombouts