Jump to content

djbdns

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by InternetArchiveBot (talk | contribs) at 01:30, 29 November 2019 (Rescuing 1 sources and tagging 0 as dead.) #IABot (v2.0). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

djbdns
Developer(s)Daniel J. Bernstein
Stable release
1.05 / 2001; 23 years ago (2001)
Operating systemUnix-like
TypeDNS server
LicensePublic domain
Websitecr.yp.to/djbdns.html

The djbdns software package is a DNS implementation. It was created by Daniel J. Bernstein in response to his frustrations with repeated security holes in the widely used BIND DNS software. As a challenge, Bernstein offered a $1000 prize[1] for the first person to find a security hole in djbdns, which was awarded[2] in March 2009 to Matthew Dempsky.

As of 2004, djbdns's tinydns component was the second most popular DNS server in terms of the number of domains for which it was the authoritative server, and third most popular in terms of the number of DNS hosts running it.[3]

djbdns has never been vulnerable to the widespread cache poisoning vulnerability reported in July 2008,[4][5] but it has been discovered that it is vulnerable to a related attack.[6]

The source code has not been centrally managed since its release in 2001, and was released into the public domain in 2007.[7] As of March 2009, there are a number of forks, one of which is dbndns (part of the Debian Project), and more than a dozen patches to modify the released version.[8]

While djbdns does not directly support DNSSEC, there are third party patches to add DNSSEC support to djbdns' authoritative-only tinydns component.[9]

Components

The djbdns software consists of servers, clients, and miscellaneous configuration tools.

Servers

  • dnscache — the DNS resolver and cache.
  • tinydns — a database-driven DNS server.
  • walldns — a "reverse DNS wall", providing IP address-to-domain name lookup only.
  • rbldns — a server designed for DNS blacklisting service.
  • pickdns — a database-driven server that chooses from matching records depending on the requestor's location. (This feature is now a standard part of tinydns.)
  • axfrdns — a zone transfer server.

Client tools

  • axfr-get — a zone-transfer client.
  • dnsip — simple address from name lookup.
  • dnsipq — address from name lookup with rewriting rules.
  • dnsname — simple name from address lookup.
  • dnstxt — simple text record from name lookup.
  • dnsmx — mail exchanger lookup.
  • dnsfilter — looks up names for addresses read from stdin, in parallel.
  • dnsqr — recursive general record lookup.
  • dnsq — non-recursive general record lookup, useful for debugging.
  • dnstrace (and dnstracesort) — comprehensive testing of the chains of authority over DNS servers and their names.

Design

In djbdns, different features and services are split off into separate programs. For example, zone transfers, zone file parsing, caching, and recursive resolving are implemented as separate programs. The result of these design decisions is a reduction in code size and complexity of the daemon program that provides the core function of answering lookup requests. Bernstein asserts that this is true to the spirit of the Unix operating system, and makes security verification much simpler.[citation needed]

On December 28, 2007, Bernstein released djbdns into the public domain.[10] Previously the package was distributed free of charge as license-free software. However this did not permit the distribution of modified versions of djbdns, which was one of the core principles of open-source software. Consequently, it was not included in Linux distributions which required all components to be open-source.

See also

References

  1. ^ "The djbdns security guarantee". Retrieved 2008-09-02.
  2. ^ "The djbdns prize claimed". Archived from the original on 2009-03-05. Retrieved 2009-03-04.
  3. ^ Moore, Don (2004). "DNS server survey". Retrieved 2005-01-06.
  4. ^ "Multiple DNS implementations vulnerable to cache poisoning". Retrieved 2008-08-05.
  5. ^ "An Astonishing Collaboration". Retrieved 2008-08-05.
  6. ^ Day, Kevin (2009). "Rapid DNS Poisoning in djbdns". Retrieved 2009-02-23.
  7. ^ "djbdns is placed in the public domain".
  8. ^ "Detailed overview of DNS server software by Rick Moen". Retrieved 2009-07-13.
  9. ^ http://www.tinydnssec.org/
  10. ^ "Frequently asked questions from distributors". Retrieved 2007-12-31.