Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    BLACKLIST DNS rules question

    Scheduled Pinned Locked Moved IDS/IPS
    4 Posts 2 Posters 1.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • A
      athurdent
      last edited by

      I'm a Snort noob and I'm doing something wrong.

      I'm running Snort on my WAN interfaces (no NAT, they each have a private IP behind another router that does NAT for my home) and was just testing if Snort would block properly.

      So I picked an easy test from the Snort Ruleset, just issue

      dig secuurity.net
      

      from within my LAN. Snort recognizes this as
      "BLACKLIST DNS request for known malware domain secuurity.net"
      and on the blocklist amongst others there are:
      192.52.178.30 (k.gtld-servers.net.) and 192.5.6.30 (a.gtld-servers.net)

      This poses a little problem for Unbound.
      Plus Unbound already cached that lookup and it still works.
      As there are quite a few of those BLACKLIST DNS rules in the Balanced IPS Policy, it's a little hard to disable them all by hand.
      How are you guys dealing with this? Am I "holding it wrong"? ;)

      1 Reply Last reply Reply Quote 0
      • D
        doktornotor Banned
        last edited by

        Well if you do not want to disable those rules, you can create a custom passlist and add all root DNS servers there.

        https://www.iana.org/domains/root/servers

        1 Reply Last reply Reply Quote 0
        • A
          athurdent
          last edited by

          @doktornotor: Thanks!
          But I guess I might have to find a way to mass-disable all those rules. Or I have to refrain from using the IPS policies altogether and build my own ruleset.
          Because the root DNS servers are only amongst the blocked DNS servers, as Unbound walks the chain down to the actual server responsible and everything in that path gets blocked…

          1 Reply Last reply Reply Quote 0
          • D
            doktornotor Banned
            last edited by

            Well, the way to mass-disable rules is called SIG Mgmt.

            1 Reply Last reply Reply Quote 0
            • First post
              Last post
            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.