Access to update.ixsystems.com blocked by ThreatSTOP and Quad9

Quad9 DNS (9.9.9.9) and ThreatSTOP network are currently blocking access to update.ixsystemscom (or to be exact, its CNAME link.storjshareio).

This currently blocks TrueNAS updates from networks using IPS, Malware filtered DNS or other network protection utilizing ThreatSTOP originated lists:

Quad9 blocked domain tester can be used to view current status of link.storjshareio blocking.

ixSystems should work with ThreatSTOP to delist their servers and services from malware blocklist status. And maybe change the system update DNS/URL to be served from bit more reliable in-house resource dedicated for that purpose.

I had to mangle the DNS names and URL in previous post due to forum limitations but its .com and .io for aforementioned DNS names.

I use Q9. Problem confirmed.

I really think ixSystems should not use link.storjshare dot io for their system updates.

That link domain seems to be used by storj for many purposes. One being links to user originated content (which can be malware). These kind of link/share URLs are prone to be blacklisted and limited.

System update URLs should be dedicated only for that purpose.

Seems to be a systemic problem

Sounds like idiotic policy on the part of the blacklists, then.

1 Like

If domain/URL is source for malware distribution they really do not have a choice. If you forgivingly leave safe havens for malware distribution the bad actors will immediately rush to use (/abuse) it. The policy is not idiotic.

One solution would be to use hashed subdomain names such as (hash).link.storjshare for customer originated content. Then domain based blacklisting could be more accurately applied to each of those individual subdomains.

In this case I suspect that StorJ linksharing facilitated distribution of something malicious using only a hashed path under the main domain link.storjshare dot io.

Blocking Storj is kind of like blocking DropBox, or Google Drive.
Just because someone might be able to upload something bad there, it in no way means the domain itself is malicious. Drive and Dropbox can be (and are) used for malware delivery.

I’ve raised a support case with Quad9 to get this removed as there’s not really any reason they should be blocking it.

There is one workaround for those with internal nameservers that can be used to spoof address resolution.

Problem is not with update.ixsystems dot com domain, but rather with the CNAME record that it points to: link.storjshare dot io - its blocked. That however further resolves to single IPv4 address. By bypassing this CNAME and resolving the update.ixsystems domain directly to A record bypasses the blocking issue.

With unbound DNS resolver I used this configuration to bypass the problematic CNAME record that has been blacklisted by malware guards:

server:
    local-zone: "update.ixsystems.com." redirect
    local-data: "update.ixsystems.com. 360 IN A 185.244.226.2"

(note that IPv4 above is region specific and not be the correct one in your case)

This way I was successful in upgrading TrueNAS SCALE devices in our internal network while still maintaining Quad9 DNS filtering.

Maybe ixSystems can also bypass the CNAME and link directly to their server with A record? And solve this quickly.

To add some context, iXSystems has a partnership with Storj, hence why they are used:

They are not some small company that would facilitate the distribution of malware, so far more likely to be a mistake on Quad9’s part.

Thank you. It may take a while.

I still think that sharing domain/URL for customer originating content URLs and internal system update URLs is not good practice. TrueNAS OS update checks should have more robust infrastructure for their domains that is not subject to be blocked by content published by others.

I’ve pinged Storj on this as well. The linksharing service is how you use Storj as a CDN, and shouldn’t be blocked any more than other CDN providers are.

2 Likes

Thank you for this report. We have filed a block removal request with Quad9 DNS and will get a request out to ThreatSTOP asap.

2 Likes

ThreatSTOP have added an exclusion and the domain should be unblocked globally within the next few hours, per Quad9.

Quad9 have also told me that they are in contact with Storj to see if they can get them qualified for a global exclusion on their end.

2 Likes

Quick turn-around Storj! Thanks everybody bringing it to our attention. If you find others blocking incorrectly, please let us know!

1 Like

Wonderful! Thank you for your quick response on the issue.

Still an issue as of 2025-01-31 10:25 UTC

I submitted a request to unblock the domain

As of 2025-01-31 15:00 UTC, it appears to be resolved.

1 Like