Scripting The Recursor
In the PowerDNS recursor, it is possible to modify resolving behaviour using simple scripts written in the Lua programming language. This page documents the Recursor 4.0.0 and beyond version of the scripting API.
Note: This describes the Lua scripts as supported by 4.x. They are very different than the ones from 3.x, but tend to be faster and more correct.
These scripts can be used to quickly override dangerous domains, fix things that are wrong, for load balancing or for legal or commercial purposes. The scripts can also protect you or your users from malicious traffic.
Lua is extremely fast and lightweight, easily supporting hundreds of thousands of queries per second. The Lua language is explained very well in the excellent book Programming in Lua. If you already have programming experience, Learn Lua in 15 Minutes is a great primer.
For extra performance, a Just In Time compiled version of Lua called LuaJIT is supported.
Queries can be intercepted in many places:
- before any packet parsing begins (
ipfilter
) - before any filtering policy have been applied (
prerpz
) - before the resolving logic starts to work (
preresolve
) - after the resolving process failed to find a correct answer for a domain (
nodata
,nxdomain
) - after the whole process is done and an answer is ready for the client (
postresolve
) - before an outgoing query is made to an authoritative server (
preoutquery
)
Configuring Lua scripts
In order to load scripts, the PowerDNS Recursor must have Lua support built in. The packages distributed from the PowerDNS website have this language enabled, other distributions may differ. By default, the Recursor's configure script will attempt to detect if Lua is available.
note: Only one script can be loaded at the same time. If you load a different script, the current one will be replaced (safely)!
If Lua support is available, a script can be configured either via the
configuration file, or at runtime via the rec_control
tool. Scripts can
be reloaded or unloaded at runtime with no interruption in operations. If a
new script contains syntax errors, the old script remains in force.
On the command line, or in the configuration file, the setting
lua-dns-script
can be used to supply a full path
to the Lua script.
At runtime, rec_control reload-lua-script
can be used to either reload the
script from its current location, or, when passed a new file name, load one
from a new location. A failure to parse the new script will leave the old
script in working order.
Note: It is also possible to precompile scripts using luac
, and have
PowerDNS load the result. This means that switching scripts is faster, and
also that you'll be informed about syntax errors at compile time.
Finally, rec_control unload-lua-script
can be used to remove the currently
installed script, and revert to unmodified behaviour.
Writing Lua PowerDNS Recursor scripts
To get a quick start, we have supplied a sample script that showcases all functionality described below. Please find it here.
Addresses and DNS Names are not passed as strings but as native objects. This
allows for easy checking against netmasks and domain sets.
It also means that to print such names, the :toString
method must be used
(or even :toStringWithPort
for addresses).
Comparing IP addresses and DNSNames is not done with '==' but with the :equal
method.
Once a script is loaded, PowerDNS looks for several functions, as detailed below. All of these functions are optional.
The DNSQuestion (dq
) object
Apart from the ipfilter
-function, all functions work on a dq
(DNSQuestion)
object. This object contains details about the current state of the question.
This state can be modified from the various hooks. If a function returns 'true',
it will indicate that it handled a query. If it returns false, the Recursor will
continue processing unchanged (with one minor exception).
The DNSQuestion object contains at least the following fields:
- qname - DNS native version of the name this query is for
- qtype - type this query is for, can be compared against pdns.A, pdns.AAAA etc
- rcode - current DNS Result Code, which can be overridden, including to several magical values
- isTcp - whether the query have been received over TCP or UDP
- remoteaddr - address of the requestor
- localaddr - address this query was received on
- variable - a boolean which, if set, indicates the recursor should not packet cache this answer. Honored even when returning 'false'! Important when providing answers that vary over time or based on sender details.
-
followupFunction - a string that signals the nameserver to take one of the following additional actions:
- followCNAMERecords: When adding a CNAME to the answer, this tells the recursor to follow that CNAME. See CNAME chain resolution
- getFakeAAAARecords: Get a fake AAAA record, see DNS64
- getFakePTRRecords: Get a fake PTR record, see DNS64
- udpQueryResponse: Do a UDP query and call a handler, see
udpQueryResponse
-
appliedPolicy - The decision that was made by the policy engine, see Modifying policy decisions. It has the following fields:
-
policyName: The name of the policy (used in e.g. protobuf logging)
- policyAction: The action taken by the engine
- policyCustom: The CNAME content for the
pdns.policyactions.Custom
response, a string - policyTTL: The TTL in seconds for the
pdns.policyactions.Custom
response - wantsRPZ - A boolean that indicates the use of the Policy Engine, can be set to
false
inprerpz
to disable RPZ for this query - data - a Lua object reference that is persistent throughout the lifetime of the
dq
object for a single query. It can be used to store custom data. Most scripts initialise this to an empty table early on so they can store multiple items. - requestorId - a string that will be used to set the
requestorId
field in protobuf messages (introduced in 4.1).
It also supports the following methods:
addAnswer(type, content, [ttl, name])
: add an answer to the record oftype
withcontent
. Optionally supply TTL and the name of the answer too, which defaults to the name of the questionaddPolicyTag(tag)
: add a policy tag.discardPolicy(policyname)
: skip the filtering policy (for example RPZ) namedpolicyname
for this query. This is mostly useful in theprerpz
hook.getDH()
- Returns the DNS Header of the query or nil.getPolicyTags()
: get the current policy tags as a table of strings.getRecords()
: get a table of DNS Records in this DNS Question (or answer by now)setPolicyTags(tags)
: update the policy tags, taking a table of strings.setRecords(records)
: after your edits, update the answers of this questiongetEDNSFlag(name)
: returns true if the EDNS flag withname
is set in the querygetEDNSFlags()
: returns a list of strings with all the EDNS flag mnemonics in the querygetEDNSOption(num)
: get the EDNS Option with numbernum
getEDNSOptions()
: get a map of all EDNS OptionsgetEDNSSubnet()
: returns the netmask specified in the EDNSSubnet option, or empty if there was noneaddPolicyTag(tag)
: Add policyTagtag
to the list of policyTagsgetPolicyTags()
: Get a list the policyTags for this messagesetPolicyTags(tags)
: Set the policyTags for this message totags
(a list)
A DNS header as returned by getDH()
offers the following methods:
getRD()
,getAA()
,getAD()
,getCD()
,getTC()
: query these bits from the DNS HeadergetRCODE()
: get the RCODE of the querygetOPCODE()
: get the OPCODE of the querygetID()
: get the ID of the query
function ipfilter ( remoteip, localip, dh )
This hook gets queried immediately after consulting the packet cache, but before parsing the DNS packet. If this hook returns something else than false, the packet is dropped. However, because this check is after the packet cache, the IP address might still receive answers that require no packet parsing.
With this hook, undesired traffic can be dropped rapidly before using precious CPU cycles for parsing.
remoteip
is the IP(v6) address of the requestor, localip
is the address on which the query arrived.
dh
is the DNS Header of the query, and it offers the same functions as the dq.getDH()
object described above.
As an example, to filter all queries coming from 1.2.3.0/24, or with the AD bit set:
badips = newNMG()
badips:addMask("1.2.3.0/24")
function ipfilter(rem, loc, dh)
return badips:match(rem) or dh:getAD()
end
This hook does not get the full DNSQuestion object, since filling out the fields
would require packet parsing, which is what we are trying to prevent with ipfilter
.
function gettag(remote, ednssubnet, local, qname, qtype, ednsoptions, tcp)
The gettag
function is invoked when the Recursor attempts to discover in which
packetcache an answer is available.
This function must return an integer, which is the tag number of the packetcache.
In addition to this integer, this function can return a table of policy tags.
The resulting tag number can be accessed via dq.tag
in the preresolve
hook,
and the policy tags via dq:getPolicyTags()
in every hook.
Starting with 4.1.0, it can also return a table whose keys and values are strings
to fill the upcoming DNSQuestion
's data
table, as well as a requestorId
value to fill the upcoming DNSQuestion
's requestorId
field.
The tagged packetcache can e.g. be used to answer queries from cache that have
e.g. been filtered for certain IPs (this logic should be implemented in the
gettag
function). This ensure that queries are answered quickly compared to
setting dq.variable to true
. In the latter case, repeated queries will pass
through the entire Lua script.
ednsoptions
is a table whose keys are EDNS option codes and values are
EDNSOptionView
objects, with the EDNS option content size in the size
member
and the content accessible as a NULL-safe string object via getContent()
.
This table is empty unless the gettag-needs-edns-options
parameter is set.
The tcp
value (added in 4.1) is a boolean indicating whether the query was
received over UDP
(false) or TCP
(true).
function prerpz(dq)
This hook is called before any filtering policy have been applied, making it
possible to completely disable filtering by setting wantsRPZ
to false.
Using the discardPolicy()
function, it is also possible to selectively disable
one or more filtering policy, for example RPZ zones, based on the content of the
dq
object.
As an example, to disable the malware
policy for example.com
queries:
function prerpz(dq)
-- disable the RPZ policy named 'malware' for example.com
if dq.qname:equal('example.com') then
dq:discardPolicy('malware')
end
return false
end
function preresolve(dq)
is called before any DNS resolution is attempted, and if this function indicates it, it can supply a direct answer to the DNS query, overriding the internet. This is useful to combat botnets, or to disable domains unacceptable to an organization for whatever reason.
The rcode can be set to pdns.DROP to drop the query. Other statuses are normal DNS return codes, like no error, NXDOMAIN etc.
function postresolve(dq)
is called right before returning a response to a client (and, unless
variable
is set, to the packet cache too). It allows inspection
and modification of almost any detail in the return packet.
function nxdomain(dq)
is called after the DNS resolution process has run its course, but ended in an 'NXDOMAIN' situation, indicating that the domain or the specific record does not exist. Works entirely like postresolve, but saves a trip through Lua for answers which are not NXDOMAIN.
function nodata(dq)
is just like nxdomain
, except it gets called when a domain exists, but the
requested type does not. This is where one would implement DNS64.
function preoutquery(dq)
This hook is not called in response to a client packet, but fires when the Recursor wants to talk to an authoritative server. When this hook sets the special result code -3, the whole DNS client query causing this outquery gets dropped.
However, this function can also return records like the preresolve query above.
Semantics
The functions must return true
if they have taken over the query and wish that
the nameserver should not proceed with its regular query-processing. When a
function returns false
, the nameserver will process the query normally until
a new function is called.
If a function has taken over a request, it should set an rcode (usually 0),
and specify a table with records to be put in the answer section of a
packet. An interesting rcode is NXDOMAIN (3, or pdns.NXDOMAIN
), which
specifies the non-existence of a domain.
The ipfilter
and preoutquery
hooks are different, in that ipfilter
can
only return a true of false value, and that preoutquery
can also set rcode -3
to signify that the whole query should be terminated.
A minimal sample script:
function nxdomain(dq)
print("Intercepting NXDOMAIN for: ",dq.qname:toString())
if dq.qtype == pdns.A
then
dq.rcode=0 -- make it a normal answer
dq:addAnswer(pdns.A, "192.168.1.1")
return true
end
return false
end
Warning: Please do NOT use the above sample script in production! Responsible NXDomain redirection requires more attention to detail.
Useful 'rcodes' include 0 for "no error", pdns.NXDOMAIN
for
"NXDOMAIN", pdns.DROP
to drop the question from further processing (since
3.6, and such a drop is accounted in the 'policy-drops' metric).
Helpful functions
Netmask Groups
IP addresses are passed to Lua in native format. They can be matched against netmasks objects like this:
nmg = newNMG()
nmg:addMask("127.0.0.0/8")
nmg:addMasks({"213.244.168.0/24", "130.161.0.0/16"})
nmg:addMasks(dofile("bad.ips")) -- contains return {"ip1","ip2"..}
if nmg:match(dq.remoteaddr) then
print("Intercepting query from ", dq.remoteaddr)
end
Prefixing a mask with !
excludes that mask from matching.
IP Addresses
We move IP addresses around in native format, called ComboAddress within PowerDNS.
ComboAddresses can be IPv4 or IPv6, and unless you want to know, you don't need
to. You can make a ComboAddress with: newCA("::1")
, and you can compare
it against a NetmaskGroup as described above.
To compare the address (so not the port) of two ComboAddresses, use :equal
.
To convert an address to human-friendly representation, use :toString()
or
:toStringWithPort()
. To get only the port number, use :getPort()
.
Other functions that can be called on a ComboAddress are:
isIPv4
- true if the address is an IPv4 addressisIPv6
- true if the address is an IPv6 addressgetRaw
- returns the bytestring representing the addressisMappedIPv4
- true if the address is an IPv4 address mapped into an IPv6 onemapToIPv4
- if the address is an IPv4 mapped into an IPv6 one, return the corresponding IPv4truncate(bits)
- truncate to the supplied number of bits
Netmask
IP addresses can be matched against a Netmask object, which can be created with
newNetmask("192.0.2.1/24")
and supports the following methods:
empty
- true if the netmask doesn't contain a valid addressgetBits
- the number of bits in the addressgetNetwork
- return a ComboAddress representing the network (no mask applied)getMaskedNetwork
- return a ComboAddress representing the network (truncating according to the mask)isIpv4
- true if the address is an IPv4 addressisIpv6
- true if the address is an IPv6 addressmatch(str)
- true if the address passed in str matchestoString
- human-friendly representation
DNSName
DNSNames are passed to various functions, and they sport the following methods:
:equal
: use this to compare two DNSNames in DNS native fashion. So 'PoWeRdNs.COM' matches 'powerdns.com':isPartOf
: returns true if a is a part of b. So:newDN("www.powerdns.com"):isPartOf(newDN("CoM."))
returns true:toString
and:toStringNoDot
: return a string representation of the name, with or without trailing dot.:chopOff
: removes the leftmost label from the name, returns true if this succeeded.:countLabels
: returns the number of labels:wirelength
: returns the length on the wire
You can compare DNSNames using :equal
or the ==
operator.
To make your own DNSName, use newDN("domain.name")
. To copy an existing DNSName (please remember to do this before using chopOff
), use newDN(mydn)
.
DNS Suffix Match groups
The newDS
function creates a "Suffix Match group" that allows fast checking if
a DNSName is part of a group. Add domains to this group with the :add(domain)
function of the object: myDS:add("example.net")
, or with a list:
`myDS:add({"example.net", "example.com"}).
To check e.g. the dq.qname against this list, use :check(dq.qname)
. This will
be true
if dq.qname is part of any of the Suffix Match group domains.
This could e.g. be used to answer questions for known malware domains.
To see the set of suffixes matched by a Suffix Match Group, use :toString()
.
DNS Record
DNS record objects are returned by dq:getRecords()
, and have the following members:
name
: the name of the record as a DNSNameplace
: the place where the record is located, 1 for the answer section, 2 for the authority and 3 for the additional onettl
: the TTL of the recordtype
: the type of the record, for example pdns.A
and the following methods:
changeContent(newcontent)
: replace the record content with the string representation passed asnewcontent
. The type and class cannot be changed.getCA()
: if the record type is A or AAAA, a ComboAddress representing the content is returned, nil otherwise.getContent()
: return a string representation of the record content
Metrics
You can custom metrics which will be shown in the output of 'rec_control get-all' and sent to the metrics server over the Carbon protocol, and also appear in the JSON HTTP API.
Create a custom metric with: myMetric= getMetric("name")
. This metric sports
the following metrics:
:inc()
: increase metric by 1:incBy(amount)
: increase metric by amount:set(to)
: set metric to value to:get()
: get value of metric
Metrics are shared across all of PowerDNS and are fully atomic and high performance. The myMetric object is effectively a pointer to an atomic value.
Note that metrics live in the same namespace as 'system' metrics. So if you generate one that overlaps with a PowerDNS stock metric, you will get double output and weird results.
Statistics
Since 4.1.0, statistics can be retrieved from Lua using the getStat("name")
call. For example,
to retrieve the number of cache misses:
cacheMisses = getStat("cache-misses")
Please be aware that retrieving statistics is a relatively costly operation, and as such should for example not be done for every query.
Logging
To log messages with the main PowerDNS Recursor process, use pdnslog(message)
.
pdnslog can also write out to a syslog loglevel if specified.
Use pdnslog(message, pdns.loglevels.LEVEL)
with the correct pdns.loglevels
entry. Entries are listed in the following table:
- All -
pdns.loglevels.All
- Alert -
pdns.loglevels.Alert
- Critical -
pdns.loglevels.Critical
- Error -
pdns.loglevels.Error
- Warning -
pdns.loglevels.Warning
- Notice -
pdns.loglevels.Notice
- Info -
pdns.loglevels.Info
- Debug -
pdns.loglevels.Debug
- None -
pdns.loglevels.None
pdnslog(message)
will write out to Info by default.
getregisteredname('www.powerdns.com')
returns powerdns.com.
, based on Mozilla's
Public Suffix List. In general it will tell you the 'registered domain' for a given
name.
getRecursorThreadId()
returns an unsigned integer identifying the thread
handling the current request.
DNS64
The getFakeAAAARecords
and getFakePTRRecords
followupFunctions can be used
to implement DNS64. See DNS64 support in the PowerDNS Recursor for
more information.
To get fake AAAA records for DNS64 usage, set dq.followupFunction to getFakeAAAARecords
,
dq.followupPrefix to e.g. "64:ff9b::" and dq.followupName to the name you want to
synthesize an IPv6 address for.
For fake reverse (PTR) records, set dq.followupFunction to getFakePTRRecords
and set dq.followupName to the name to look up and dq.followupPrefix to the
same prefix as used with getFakeAAAARecords
.
CNAME chain resolution
It may be useful to return a CNAME record for Lua, and then have the
PowerDNS Recursor continue resolving that CNAME. This can be achieved by
setting dq.followupFunction to followCNAMERecords
and dq.followupDomain to
"www.powerdns.com". PowerDNS will do the rest.
udpQueryResponse
The udpQueryResponse
dq.followupFunction allows you to query a simple key-value
store over UDP asynchronously.
Several dq variables can be set:
udpQueryDest
: destination IP address to send the UDP packet toudpQuery
: The content of the UDP payloadudpCallback
: The name of the callback function that is called when an answer is received
The callback function must accept the dq
object and can find the response to
the UDP query in dq.udpAnswer
.
In this callback function, dq.followupFunction
can be set again to any of the
available functions for further processing.
This example script queries a simple key/value store over UDP to decide on whether or not to filter a query:
--[[
This implements a two-step domain filtering solution where the status of an IP address
and a domain name need to be looked up.
To do so, we use the udpQuestionResponse answers which generically allows us to do asynchronous
lookups via UDP.
Such lookups can be slow, but they won't block PowerDNS while we wait for them.
To benefit from this hook,
..
To test, use the 'kvresp' example program provided.
--]]
function preresolve (dq)
print ("prereesolve handler called for: "..dq.remoteaddr:toString().. ", local: ".. dq.localaddr:toString()..", ".. dq.qname:toString()..", ".. dq.qtype)
dq.followupFunction="udpQueryResponse"
dq.udpCallback="gotdomaindetails"
dq.udpQueryDest=newCA("127.0.0.1:5555")
dq.udpQuery = "DOMAIN "..dq.qname:toString()
return true;
end
function gotdomaindetails(dq)
print("gotdomaindetails called, got: "..dq.udpAnswer)
if(dq.udpAnswer == "0")
then
print("This domain needs no filtering, not looking up this domain")
dq.followupFunction=""
return false
end
print("Domain might need filtering for some users")
dq.variable = true -- disable packet cache
local data={}
data["domaindetails"]= dq.udpAnswer
dq.data=data
dq.udpQuery="IP "..dq.remoteaddr:toString()
dq.udpCallback="gotipdetails"
print("returning true in gotipdetails")
return true
end
function gotipdetails(dq)
dq.followupFunction=""
print("So status of IP is "..dq.udpAnswer.." and status of domain is "..dq.data.domaindetails)
if(dq.data.domaindetails=="1" and dq.udpAnswer=="1")
then
print("IP wants filtering and domain is of the filtered kind")
dq:addAnswer(pdns.CNAME, "blocked.powerdns.com")
return true
else
print("Returning false (normal resolution should proceed, for this user)")
return false
end
end
Example Script
pdnslog("pdns-recursor Lua script starting!", pdns.loglevels.Warning)
blockset = newDS()
blockset:add{"powerdns.org", "xxx"}
dropset = newDS();
dropset:add("123.cn")
malwareset = newDS()
malwareset:add("nl")
magic2 = newDN("www.magic2.com")
magicMetric = getMetric("magic")
-- shows the various ways of blocking, dropping, changing questions
-- return false to say you did not take over the question, but we'll still listen to 'variable'
-- to selectively disable the cache
function preresolve(dq)
print("Got question for "..dq.qname:toString().." from "..dq.remoteaddr:toString().." to "..dq.localaddr:toString())
local ednssubnet=dq:getEDNSSubnet()
if(ednssubnet) then
print("Packet EDNS subnet source: "..ednssubnet:toString()..", "..ednssubnet:getNetwork():toString())
end
local a=dq:getEDNSOption(3)
if(a) then
print("There is an EDNS option 3 present: "..a)
end
loc = newCA("127.0.0.1")
if(dq.remoteaddr:equal(loc))
then
print("Query from loopback")
end
-- note that the comparisons below are CaSe InSensiTivE and you don't have to worry about trailing dots
if(dq.qname:equal("magic.com"))
then
magicMetric:inc()
print("Magic!")
else
print("not magic..")
end
if(dq.qname:__eq(magic2)) -- we hope to improve this syntax
then
print("Faster magic") -- compares against existing DNSName
end -- sadly, dq.qname == magic2 won't work yet
if blockset:check(dq.qname) then
dq.variable = true -- disable packet cache in any case
if dq.qtype == pdns.A then
dq:addAnswer(pdns.A, "1.2.3.4")
dq:addAnswer(pdns.TXT, "\"Hello!\"", 3601) -- ttl
return true;
end
end
if dropset:check(dq.qname) then
dq.rcode = pdns.DROP
return true;
end
if malwareset:check(dq.qname) then
dq:addAnswer(pdns.CNAME, "xs.powerdns.com.")
dq.rcode = 0
dq.followupFunction="followCNAMERecords" -- this makes PowerDNS lookup your CNAME
return true;
end
return false;
end
-- this implements DNS64
function nodata(dq)
if dq.qtype == pdns.AAAA then
dq.followupFunction="getFakeAAAARecords"
dq.followupName=dq.qname
dq.followupPrefix="fe80::"
return true
end
if dq.qtype == pdns.PTR then
dq.followupFunction="getFakePTRRecords"
dq.followupName=dq.qname
dq.followupPrefix="fe80::"
return true
end
return false
end
badips = newNMG()
badips:addMask("127.1.0.0/16")
-- this check is applied before any packet parsing is done
function ipfilter(rem, loc, dh)
print("ipfilter called, rem: ", rem:toStringWithPort(), "loc: ",loc:toStringWithPort(),"match:", badips:match(rem))
print("id: ",dh:getID(), "aa: ", dh:getAA(), "ad: ", dh:getAD(), "arcount: ", dh:getARCOUNT())
print("ports: ",rem:getPort(),loc:getPort())
return badips:match(rem)
end
-- postresolve runs after the packet has been answered, and can be used to change things
-- or still drop
function postresolve(dq)
print("postresolve called for ",dq.qname:toString())
local records = dq:getRecords()
for k,v in pairs(records) do
print(k, v.name:toString(), v:getContent())
if v.type == pdns.A and v:getContent() == "185.31.17.73"
then
print("Changing content!")
v:changeContent("130.161.252.29")
v.ttl=1
end
end
dq:setRecords(records)
return true
end
nxdomainsuffix=newDN("com")
function nxdomain(dq)
print("Hooking: ",dq.qname:toString())
if dq.qname:isPartOf(nxdomainsuffix)
then
dq.rcode=0 -- make it a normal answer
dq:addAnswer(pdns.CNAME, "ourhelpfulservice.com")
dq:addAnswer(pdns.A, "1.2.3.4", 60, "ourhelpfulservice.com")
return true
end
return false
end
Dropping all traffic from botnet-infected users
Frequently, DoS attacks are performed where specific IP addresses are attacked, often by queries coming in from open resolvers. These queries then lead to a lot of queries to 'authoritative servers' which actually often aren't nameservers at all, but just targets of attack.
The following script will add a requestor's IP address to a blocking set if they've sent a query that caused PowerDNS to attempt to talk to a certain subnet.
This specific script is, as of January 2015, useful to prevent traffic to ezdns.it related traffic from creating CPU load. This script requires PowerDNS Recursor 4.x or later.
lethalgroup=newNMG()
lethalgroup:addMask("192.121.121.0/24") -- touch these nameservers and you die
function preoutquery(dq)
print("pdns wants to ask "..dq.remoteaddr:toString().." about "..dq.qname:toString().." "..dq.qtype.." on behalf of requestor "..dq.localaddr:toString())
if(lethalgroup:match(dq.remoteaddr))
then
print("We matched the group "..lethalgroup:tostring().."!", "killing query dead & adding requestor "..dq.localaddr:toString().." to block list")
dq.rcode = -3 -- "kill"
return true
end
return false
end
Modifying Policy Decisions
The PowerDNS Recursor has a policy engine based on Response Policy Zones (RPZ).
Starting with version 4.0.1 of the recursor, it is possible to alter this decision inside the Lua hooks.
If the decision is modified in a Lua hook, false
should be returned, as the query is not actually handled by Lua so the decision is picked up by the Recursor.
The result of the policy decision is checked after preresolve
and postresolve
.
For example, if a decision is set to pdns.policykinds.NODATA
by the policy engine and is unchanged in preresolve
, the query is replied to with a NODATA response immediately after preresolve
.
Example script
-- Dont ever block my own domain and IPs
myDomain = newDN("example.com")
myNetblock = newNMG()
myNetblock:addMasks("192.0.2.0/24")
function preresolve(dq)
if dq.qname:isPartOf(myDomain) and dq.appliedPolicy.policyKind != pdns.policykinds.NoAction then
pdnslog("Not blocking our own domain!")
dq.appliedPolicy.policyKind = pdns.policykinds.NoAction
end
end
function postresolve(dq)
if dq.appliedPolicy.policyKind != pdns.policykinds.NoAction then
local records = dq:getRecords()
for k,v in pairs(records) do
if v.type == pdns.A then
local blockedIP = newCA(v:getContent())
if myNetblock:match(blockedIP) then
pdnslog("Not blocking our IP space")
dq.appliedPolicy.policyKind = pdns.policykinds.NoAction
end
end
end
end
end
The decision is contained in the dq
object under dq.appliedPolicy
and features 4 fields:
dq.appliedPolicy.policyName
A string with the name of the policy (set by polName=
in the rpzFile
and rpzMaster
configuration items).
It is advised to overwrite this when modifying the policyKind
dq.appliedPolicy.policyKind
The kind of policy response, there are several policy kinds:
pdns.policykinds.Custom
will return a NoError, CNAME answer with the value specified indq.appliedPolicy.policyCustom
pdns.policykinds.Drop
will simply cause the query to be droppedpdns.policykinds.NoAction
will continue normal processing of the querypdns.policykinds.NODATA
will return a NoError response with no value in the answer sectionpdns.policykinds.NXDOMAIN
will return a response with a NXDomain rcodepdns.policykinds.Truncate
will return a NoError, no answer, truncated response over UDP. Normal processing will continue over TCP
dq.appliedPolicy.policyCustom
and dq.appliedPolicy.policyTTL
These fields are only used when dq.appliedPolicy.policyKind
is set to pdns.policykinds.Custom
.
dq.appliedPolicy.policyCustom
contains the name for the CNAME target as a string.
And dq.appliedPolicy.policyTTL
is the TTL field (in seconds) for the CNAME response.
SNMP Traps
PowerDNS Recursor, when compiled with SNMP support, has the ability to act as a SNMP agent to provide SNMP statistics and to be able to send traps from Lua.
For example, to send a custom SNMP trap containing the qname from the preresolve
hook:
function preresolve(dq)
sendCustomSNMPTrap('Trap from preresolve, qname is '..dq.qname:toString())
return false
end