From nobody Wed Nov 26 16:13:20 2025 X-Original-To: dev-commits-src-all@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4dGl3N428lz6JGmZ for ; Wed, 26 Nov 2025 16:13:20 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R12" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4dGl3N3Qnnz3Z0f for ; Wed, 26 Nov 2025 16:13:20 +0000 (UTC) (envelope-from git@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1764173600; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=ZOu0S/IIRPGsCmCotxlOX+QZ4ZO5GKASGYU7bC0mcFA=; b=Si2VQ/qCs0UGLOjZuM0UGiICANtTkX+oat8Uu6wY1jO07YA00HgzIRLLwwdyHcIwRx07Pv BcKNW9wyAGSWQkVtHfshuOSjufZKAIijkTzuQsM0xMJajqxT0AaUbj0v7oNdhHurx2sHjX ZveKOYhl5QXK0S1lUOg9XLZzZMIIu9nLaK31zSHIRlHvIC3q+zfjKv80a0ifu6hHzOFahx Hhr77PFzW4I4HfecH+eNAbFjL1i7jOWq4sylQ1vDaQwnzbGZM5tDMueS8HI2w5eV1ypDjF hJjIQqvtnqXTtFC86+t2ekxvM6B6k1pXD69kTmhnvFS3usH6Zm2cWolrRI5k2w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1764173600; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=ZOu0S/IIRPGsCmCotxlOX+QZ4ZO5GKASGYU7bC0mcFA=; b=VyOcbhFAmNaQW2l9/+vPhAJwXSTHV7IVJaMaX3ojuJmt0wpiVoSGp8v+uUw1+u/kUxz0Fp 3rz7xTcaTMoLda8QvInPaukdhfuSxoy6AVpdtmG/l0BEYX69anlSR84YXirRmS/No+aNUe Yoj4bRsFhgO+U3hrHB/CvUfW3/5NS0eLcB3TlxK6LNGC0lvcR5Yd9oSTMPZV3u3jBQQJkk j/DqkqFb+9/HAZYvn2hu2rLe+ogKIKGvXfE4W5jbVg9uokmQ/5GNM96R1HS1nJIiiQp892 UG+g5oOENdvYa0N/s6klvjqiMRrBjzuJplv8/kncfbj9XQzxhNLq8end/9Ta4Q== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1764173600; a=rsa-sha256; cv=none; b=v58S1aGkm5Y1AurpVRiU/6XkMDyFlv1flRxZShIZwmVEpC0ISyMtn8u2cwgmBWEHqt0V9s upMbYCYcDG6Qc7E4tD6JT8txmPcXk4wGqEGr5bqo2geS8ShECencPhRzla+40fl/BjaB/7 yX2hA41CcbmOLFBOSJuW2EgUzh7sWHY7vcRdR4ZBHCy9a0zp/pL6qmXxlWOU18qwc5O1fg P+urYluIxUkohwwhrKKi9p0WPGekEnh4H+WlpeFIPhjE3IR2cxnnNb2OwcZsFltt+KxA8H aaJZBD5Bv90ib+4+X43sWZYD+zazq/M4abgqli4P9TkTzPzqAxHsNUtRDaYCeA== ARC-Authentication-Results: i=1; mx1.freebsd.org; none Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) by mxrelay.nyi.freebsd.org (Postfix) with ESMTP id 4dGl3N2whQztlD for ; Wed, 26 Nov 2025 16:13:20 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from git (uid 1279) (envelope-from git@FreeBSD.org) id 35c0c by gitrepo.freebsd.org (DragonFly Mail Agent v0.13+ on gitrepo.freebsd.org); Wed, 26 Nov 2025 16:13:20 +0000 To: src-committers@FreeBSD.org, dev-commits-src-all@FreeBSD.org, dev-commits-src-branches@FreeBSD.org From: Gordon Tetlow Subject: git: dabd406d99a9 - releng/15.0 - Mitigate YXDOMAIN and nodata non-referral answer poisoning. List-Id: Commit messages for all branches of the src repository List-Archive: https://lists.freebsd.org/archives/dev-commits-src-all List-Help: List-Post: List-Subscribe: List-Unsubscribe: X-BeenThere: dev-commits-src-all@freebsd.org Sender: owner-dev-commits-src-all@FreeBSD.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: gordon X-Git-Repository: src X-Git-Refname: refs/heads/releng/15.0 X-Git-Reftype: branch X-Git-Commit: dabd406d99a92ef88f3853e6093ba17d978a47ac Auto-Submitted: auto-generated Date: Wed, 26 Nov 2025 16:13:20 +0000 Message-Id: <69272720.35c0c.4936f62@gitrepo.freebsd.org> The branch releng/15.0 has been updated by gordon: URL: https://cgit.FreeBSD.org/src/commit/?id=dabd406d99a92ef88f3853e6093ba17d978a47ac commit dabd406d99a92ef88f3853e6093ba17d978a47ac Author: Gordon Tetlow AuthorDate: 2025-11-21 21:24:58 +0000 Commit: Gordon Tetlow CommitDate: 2025-11-26 16:04:39 +0000 Mitigate YXDOMAIN and nodata non-referral answer poisoning. Add a fix to apply scrubbing of unsolicited NS RRSets (and their respective address records) for YXDOMAIN and nodata non-referral answers. This prevents a malicious actor from exploiting a possible cache poison attack. Approved by: so Approved by: re (cperciva) Obtained from: NLnet Labs Security: FreeBSD-SA-25:10.unbound Security: CVE-2025-11411 --- contrib/unbound/iterator/iter_scrub.c | 39 +++++++++++++++++++++++++++++++---- 1 file changed, 35 insertions(+), 4 deletions(-) diff --git a/contrib/unbound/iterator/iter_scrub.c b/contrib/unbound/iterator/iter_scrub.c index 553d3655f0e3..8507a3fb65ac 100644 --- a/contrib/unbound/iterator/iter_scrub.c +++ b/contrib/unbound/iterator/iter_scrub.c @@ -418,12 +418,13 @@ shorten_rrset(sldns_buffer* pkt, struct rrset_parse* rrset, int count) * @param qinfo: original query. * @param region: where to allocate synthesized CNAMEs. * @param env: module env with config options. + * @param zonename: name of server zone. * @return 0 on error. */ static int scrub_normalize(sldns_buffer* pkt, struct msg_parse* msg, struct query_info* qinfo, struct regional* region, - struct module_env* env) + struct module_env* env, uint8_t* zonename) { uint8_t* sname = qinfo->qname; size_t snamelen = qinfo->qname_len; @@ -431,7 +432,8 @@ scrub_normalize(sldns_buffer* pkt, struct msg_parse* msg, int cname_length = 0; /* number of CNAMEs, or DNAMEs */ if(FLAGS_GET_RCODE(msg->flags) != LDNS_RCODE_NOERROR && - FLAGS_GET_RCODE(msg->flags) != LDNS_RCODE_NXDOMAIN) + FLAGS_GET_RCODE(msg->flags) != LDNS_RCODE_NXDOMAIN && + FLAGS_GET_RCODE(msg->flags) != LDNS_RCODE_YXDOMAIN) return 1; /* For the ANSWER section, remove all "irrelevant" records and add @@ -470,6 +472,11 @@ scrub_normalize(sldns_buffer* pkt, struct msg_parse* msg, &aliaslen, pkt)) { verbose(VERB_ALGO, "synthesized CNAME " "too long"); + if(FLAGS_GET_RCODE(msg->flags) == LDNS_RCODE_YXDOMAIN) { + prev = rrset; + rrset = rrset->rrset_all_next; + continue; + } return 0; } cname_length++; @@ -650,6 +657,29 @@ scrub_normalize(sldns_buffer* pkt, struct msg_parse* msg, "RRset:", pkt, msg, prev, &rrset); continue; } + /* Also delete promiscuous NS for other RCODEs */ + if(FLAGS_GET_RCODE(msg->flags) != LDNS_RCODE_NOERROR + && env->cfg->iter_scrub_promiscuous) { + remove_rrset("normalize: removing promiscuous " + "RRset:", pkt, msg, prev, &rrset); + continue; + } + /* Also delete promiscuous NS for NOERROR with nodata + * for authoritative answers, not for delegations. + * NOERROR with an_rrsets!=0 already handled. + * Also NOERROR and soa_in_auth already handled. + * NOERROR with an_rrsets==0, and not a referral. + * referral is (NS not the zonename, noSOA). + */ + if(FLAGS_GET_RCODE(msg->flags) == LDNS_RCODE_NOERROR + && msg->an_rrsets == 0 + && !(dname_pkt_compare(pkt, rrset->dname, + zonename) != 0 && !soa_in_auth(msg)) + && env->cfg->iter_scrub_promiscuous) { + remove_rrset("normalize: removing promiscuous " + "RRset:", pkt, msg, prev, &rrset); + continue; + } if(nsset == NULL) { nsset = rrset; } else { @@ -1060,7 +1090,8 @@ scrub_message(sldns_buffer* pkt, struct msg_parse* msg, /* this is not required for basic operation but is a forgery * resistance (security) feature */ if((FLAGS_GET_RCODE(msg->flags) == LDNS_RCODE_NOERROR || - FLAGS_GET_RCODE(msg->flags) == LDNS_RCODE_NXDOMAIN) && + FLAGS_GET_RCODE(msg->flags) == LDNS_RCODE_NXDOMAIN || + FLAGS_GET_RCODE(msg->flags) == LDNS_RCODE_YXDOMAIN) && msg->qdcount == 0) return 0; @@ -1074,7 +1105,7 @@ scrub_message(sldns_buffer* pkt, struct msg_parse* msg, } /* normalize the response, this cleans up the additional. */ - if(!scrub_normalize(pkt, msg, qinfo, region, env)) + if(!scrub_normalize(pkt, msg, qinfo, region, env, zonename)) return 0; /* delete all out-of-zone information */ if(!scrub_sanitize(pkt, msg, qinfo, zonename, env, ie, qstate))