Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

os-bind: ACLs don't accept negative match #4435

Open
3 tasks done
Leseratte10 opened this issue Dec 30, 2024 · 0 comments
Open
3 tasks done

os-bind: ACLs don't accept negative match #4435

Leseratte10 opened this issue Dec 30, 2024 · 0 comments

Comments

@Leseratte10
Copy link

Leseratte10 commented Dec 30, 2024

Important notices
Before you add a new report, we ask you kindly to acknowledge the following:

Describe the bug

In a normal bind configuration, anywhere where you can enter IP ranges (like in an ACL), you can use an exclamation mark to invert a match.

For example, you could do 10.0.0.0/8; !10.0.1.0/24 to refer to everything inside 10.0.0.0/8 except for clients that are in 10.0.1.0/24.

When I try to enter any network preceded by an exclamation mark in the ACL config, it refuses to let me save the ACL, stating "Please specify a valid network segment or IP address."

This bug also applies to other places where an ACL can be entered, like for the "ACL for filter-aaaa" entry

To Reproduce
Steps to reproduce the behavior:

  1. Go to Services -> BIND -> Configuration -> ACLs, click the "+" icon.
  2. Enter 10.0.0.0/8, !10.0.1.0/24 for the network list
  3. Click Save and see the error message.

Expected behavior

It should add the ACL.

Screenshots
Bildschirmfoto von 2024-12-30 18-52-21

Additional context
The plugin also doesn't allow the short syntax for IPv4 subnets (like "10/8" to refer to 10.0.0.0/8") which is supported by bind. Not a big issue, though, since you can just write the full network. But I haven't found a workaround to exclude single IPs or network ranges from an ACL like you could with an exclamation mark in the bind config.

(Sidenote, I'm also wondering why "ACL for filter-aaaa" requires a list of addresses while "Recursion", "Allow Transfer" and "Allow Query" are nice drop-downs to select one or many ACLs? Why isn't the filter-aaaa one a dropdown to select an ACL as well?)

Environment

OPNsense 24.7.11_2
os-bind 1.33_1

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

No branches or pull requests

1 participant