There exists a project named nmcontrol to create an all-in-one tool that can, among other things, act as a DNS server for the .bit
zone. There is also a tool, NamecoinToBind, for offline conversion of namecoin data into BIND zone file.
Unlike those, this project is a single-purpose tool acting as a (real time) bridge between Namecoin and DNS. It is implemented as a pipe backend
to PowerDNS, which provides stable DNS frontend, and has simple backend interface.
The program is a single executable to be run by PowerDns's pipe backend. It is written in Haskell. If you have haskell installed on your system, run
cabal configure
followed by
cabal build
and hopefully it will tell you what packages are missing. You can install them either with your OS package manager (if they exist in your distribution) or with cabal install
.
In the powerdns configuration, you want to specify master=yes
. Enable pipe
backend by setting launch=pipe
. Wherever your pdns package keeps the backend configurations, set this for the pipe backend:
pipe-command=/path/to/pdns-pipe-nmc
pipe-timeout=10000
pipe-regex=.bit;.*$
pipebackend-abi-version=1 ## all versions supported, but extra data ignored
Copy pdns-pipe-nmc
to the place that you've set up as pipe-command
. Copy your namecoin cofig file to /etc/namecoin.conf
and make sure it is readable by the userid specified in the powerdns config. Entries recognized in the /etc/namecoin.conf
file (with default values) are:
rpcuser=
rpcpassword=
rpchost=localhost
rpcport=8336
They are the parameters needed to contact the namecoind
server over its JsonRPC interface. With default installation on localhost
, you will only need to specify rpcpassword
.
Configure your resolvers to use the PowerDns instance for queries in the .bit
zone. This is left as an exercise to the reader.
Namecoin per se has excellent non-repudiation characteristics. But once you've converted the data into (non-DNSSEC-protected) DNS format, all bets are off. If you intend to query your powerdns instance over public Internet, remember that nothing prevents evil hackers or ruthless governments from tampering with your queries and powerdns responses. There are two possible approaches to mitigation of this problem:
Beta. It is mostly feature-complete, but insufficiently tested. It implements the data format specification (SPEC.md in the source distribution) that slightly deviates from the official specification. I am using it to access some of the .bit
websites and it works for me.
Try at your risk.
The biggest problem by far is generating meaningful SOA
records.
DNS infrastructure (including PowerDNS implementation) relies on the "generation" field of the SOA
RR when it makes decision to invalidate the cache. So, if there is zone data in the DNS cache, and a DNS server needs to respond to a request about an object from that zone, it first checks if the TTL has expired. If it has not, the server takes the data from the cache. If it has expired, the server asks the "authoritative source" (which is in our case the dnamecoin daemon) for the SOA record and compares the generation count in the received response with the number kept in the cache. If the "authoritative" SOA does not have a greater generation count than the cached SOA, DNS server does not refresh its cache, presuming that the data there is still valid.
So, it is important that the generation count in the SOA record is incremented every time when the domain object, or any of the object that it "include"-s or to which it "delegate"-s is changed.
At present, there is no machanism for that. In most cases, simply summing the number of entries in name_history
-s of all domain object involved in resolution would work, but this approach would produce wrong result when an "import" entry is removed from a domain, because in such case the sum would decrease. It would also not notice the changes in an object "include"-ed in a subdomain, unless complete recursive resolution of the subdomain tree is enforced for when SOA record is requested. That would invalidate the reason to have caching in the first place.
One possible workaround, currently implemented in pdns-pipe-nmc
, is to use a derivative of absolute time, in our case the number of 10-munute intervals elapsed since Namecoin was concieved, as the SOA generation count.
There is no "reasonable" value that could be placed there. Except possibly the name of the host on which the PoweDNS instance is running, in the .bit
zone. Currently, pdns-pipe-nmc
just puts a dot "." there, and no problems where noticed so far.
Check the project homepage.
Git clone or browse, or use github mirror.
There is a binary built for x86_64 Linux with glibc6:
Eugene Crosser <crosser at average dot org>
http://www.average.org/~crosser/