Yes, I have read that part of the FAQ, which concerns people asking whether they need to add escape characters manually in the DMARC record.
I do not add these myself. As shown by my examples below, the entry in the master zone is free of any escape characters. However, when an update is triggered, the escape characters are being added to the entry on the slave zone automatically. Why is this happening and how do I stop it? Chris Vaughan | Communications Officer, ICT Land and Property Information | Level 5, 1 Prince Albert Road Queens Square NSW 2000 e: chris.vaug...@lpi.nsw.gov.au | t: 02 92286884 | m: 0401 148061 | f: 02 92231271 | http://www.services.nsw.gov.au I http://www.lpi.nsw.gov.au -----Original Message----- From: bind-users-boun...@lists.isc.org [mailto:bind-users-boun...@lists.isc.org] On Behalf Of bind-users-requ...@lists.isc.org Sent: Monday, 5 January 2015 11:00 PM To: bind-users@lists.isc.org Subject: bind-users Digest, Vol 2012, Issue 1 Send bind-users mailing list submissions to bind-users@lists.isc.org To subscribe or unsubscribe via the World Wide Web, visit https://lists.isc.org/mailman/listinfo/bind-users or, via email, send a message with subject or body 'help' to bind-users-requ...@lists.isc.org You can reach the person managing the list at bind-users-ow...@lists.isc.org When replying, please edit your Subject line so it is more specific than "Re: Contents of bind-users digest..." Today's Topics: 1. Re: BIND DNSSEC Guide draft (Timothe Litt) 2. DMARC Record issue (Chris Vaughan) 3. Re: DMARC Record issue (Dave Warren) 4. Re: Unable to get AAAA for www.revk.uk from some of our servers (Phil Mayers) ---------------------------------------------------------------------- Message: 1 Date: Sun, 04 Jan 2015 16:13:40 -0500 From: Timothe Litt <l...@acm.org> To: jr...@isc.org Cc: bind-users@lists.isc.org Subject: Re: BIND DNSSEC Guide draft Message-ID: <54a9ad04.6010...@acm.org> Content-Type: text/plain; charset="windows-1252" On 31-Dec-14 21:00, Jeremy C. Reed wrote: > ISC is seeking feedback and review for our first public draft of the > BIND DNSSEC Guide. It was written in collaboration with DeepDive > Networking. I haven't had a chance to look in detail, but a quick scan resulted in several observations that I hope are useful. Also, I posted your note to dnssec-deployment, where there should be enthusiasm for the topic :-) The private network section 6.5.4 doesn't talk about how to configure views/stub zones so that authoritative (internal) zones on a shared resolver/authoritative server get validated. (point 1 in the section dismisses the possibility.) This can be done. Further, it's useful. People are much more likely to experiment on internal zones. More important, consider a typical scenario: my web server on the internal view has a different address from the external view. (Besides efficiency, some commercial routers don't do NAT on a stick - e.g. allow an internal client to NAT to an external address served by that router, which is NATed to an internal server.) So we want to train users to look for DNSSEC authentication. Unless one makes this work, a notebook on the road will authenticate, but the same notebook in the office will not. Don't bother trying to explain this to users; they'll simply ignore the distinction. Which is sort of a long way of saying: if the goal is to encourage people to adopt DNSSEC, your guide should make Private Networks and the corresponding recipes first class citizens, not a 'don't bother with this' afterthought. Both for admins to feel freer to experiment, and for users to have a consistent experience. On key rollover - this is still a major hassle. And while the recipes look pretty, the process is ugly. Key rollover really needs to be automated. There are too many steps that require too much indirection. And too many 'you could do this or you could do that' choices - that don't really matter, especially for getting started. I don't see why a person should have to change parameters, dates, manually generate keys, etc. You can work on the recipes, but I don't think they'll make the problem approachable - or safe. Computers are good at this stuff - and people aren't. It really needs something like a daily cron job with a simple config file that does all the work. Trigger based on dates, or a 'do it now' "emergency/manual" command. Key generation, date setting, permissions, etc. As for key uploads to external registrars, it can mail the new keys/DS records to the admin with 'please upload these by 'date'', and only proceed with the roll-over when it can 'dig' them. (The e-mail can - via the config file - include a hyperlink to the upload page...) For internal, it can update the trusted keys include file, rndc reconfig, etc. And the config file should come with reasonable default parameters, so it 'just works' oob. E.g. roll the zsks every 6 months and the ksks every 2 years. (Semi-random numbers, let's not fight about them.) Also, RE TLSA - I think it's better to match just the subject public key - there are several cases where this reduces management overhead. I know generating the hash for that with openssl isn't fun. But, https://www.huque.com/bin/gen_tlsa is the easiest way that I've found to generate TLSA records. And it supports SPKI selectors... So you might want to point to it. I'll try to have a closer look later. Timothe Litt ACM Distinguished Engineer -------------------------- This communication may not represent the ACM or my employer's views, if any, on the matters discussed. On 31-Dec-14 21:00, Jeremy C. Reed wrote: > ISC is seeking feedback and review for our first public draft of the > BIND DNSSEC Guide. It was written in collaboration with DeepDive > Networking. > > The document provides introductory information on how DNSSEC works, > how to configure BIND to support some common DNSSEC features, as well > as some basic troubleshooting tips. It has lots of interesting > content, including examples of using ISC's "delv" tool and using a > common provider's web-based interface to manage DS records. > > This is a beta edition of the guide. We'd appreciate any feedback or > suggestions, good or bad. You may email me directly, or to our > bind9-bugs@ bug tracker email, or back to this list as appropriate > (such as needing further community discussion). Or you may use the > GitHub to provide feedback (or fixes). We plan to announce the first > edition of this BIND DNSSEC Guide at the end of January. > > The guide also has a recipes chapter with step-by-step examples of > some common configurations. If you have any requests or would like to > contribute some content, please let us know. > > The beta of the guide is available in HTML and PDF formats at > > http://users.isc.org/~jreed/dnssec-guide/dnssec-guide.html > http://users.isc.org/~jreed/dnssec-guide/dnssec-guide.pdf > > The docbook source for the guide is at GitHub: > https://github.com/isc-projects/isc-dnssec-guide/ > > Happy New Year! > > Jeremy C. Reed > ISC > > -------------- next part -------------- A non-text attachment was scrubbed... Name: smime.p7s Type: application/pkcs7-signature Size: 4942 bytes Desc: S/MIME Cryptographic Signature URL: <https://lists.isc.org/pipermail/bind-users/attachments/20150104/d9f0929f/attachment-0001.bin> ------------------------------ Message: 2 Date: Mon, 5 Jan 2015 03:30:37 +0000 From: Chris Vaughan <chris.vaug...@lpi.nsw.gov.au> To: "bind-users@lists.isc.org" <bind-users@lists.isc.org> Subject: DMARC Record issue Message-ID: <09b65d824073fa4d8643feae7bdb36c023d43...@srv-qs-mail8.lands.nsw> Content-Type: text/plain; charset="us-ascii" I have been given the task of implementing DMARC in our BIND servers due the recommendation of a security audit on our systems. Whenever I create the record in the forward server, and refresh the zone, it comes out in the slave zone with escape characters inserted in the TXT record. This occurs in every version of BIND that I have tried, from 9.7 up to 9.10. Primary test zone record: _dmarc.<domain>. IN TXT "v=DMARC1; p=reject; rua=root@dns-test-1.<domain>; aspf=s; rf=afrf; sp=reject" Slave test zone record: _dmarc TXT "v=DMARC1\; p=reject\; rua=root@dns-test-1.<domain>\; aspf=s\; rf=afrf\; sp=reject" Chris Vaughan | Communications Officer, ICT Land and Property Information | Level 5, 1 Prince Albert Road Queens Square NSW 2000 e: chris.vaug...@lpi.nsw.gov.au | t: 02 92286884 | m: 0401 148061 | f: 02 92231271 | http://www.services.nsw.gov.au I http://www.lpi.nsw.gov.au *************************************************************** This message is intended for the addressee named and may contain confidential information. If you are not the intended recipient, please delete it and notify the sender. Views expressed in this message are those of the individual sender, and are not necessarily the views of the NSW Government. This email message has been swept by MIMEsweeper for the presence of computer viruses. *************************************************************** Please consider the environment before printing this email. ------------------------------ Message: 3 Date: Mon, 05 Jan 2015 01:53:17 -0800 From: Dave Warren <da...@hireahit.com> To: bind-users@lists.isc.org Subject: Re: DMARC Record issue Message-ID: <54aa5f0d.7060...@hireahit.com> Content-Type: text/plain; charset=ISO-8859-1; format=flowed On 2015-01-04 19:30, Chris Vaughan wrote: > I have been given the task of implementing DMARC in our BIND servers due the > recommendation of a security audit on our systems. > > Whenever I create the record in the forward server, and refresh the zone, it > comes out in the slave zone with escape characters inserted in the TXT record. > > This occurs in every version of BIND that I have tried, from 9.7 up to 9.10. > > Primary test zone record: > > _dmarc.<domain>. IN TXT "v=DMARC1; p=reject; rua=root@dns-test-1.<domain>; > aspf=s; rf=afrf; sp=reject" > > Slave test zone record: > > _dmarc TXT "v=DMARC1\; p=reject\; > rua=root@dns-test-1.<domain>\; aspf=s\; rf=afrf\; sp=reject" > http://www.dmarc.org/faq.html#s_12 has some information on what is happening here. -- Dave Warren http://www.hireahit.com/ http://ca.linkedin.com/in/davejwarren ------------------------------ Message: 4 Date: Mon, 05 Jan 2015 11:51:59 +0000 From: Phil Mayers <p.may...@imperial.ac.uk> To: bind-users@lists.isc.org Subject: Re: Unable to get AAAA for www.revk.uk from some of our servers Message-ID: <54aa7adf.8040...@imperial.ac.uk> Content-Type: text/plain; charset=ISO-8859-1; format=flowed On 24/12/14 17:08, Frank Bulk wrote: > Except queries from 96.31.0.5 and 199.120.69.24 reliably return the AAAA > while queries from 96.31.0.20 do not. And we're all the same ISP, and in > the one case, from the same /24. I don't think Google is that granular. And > we do have good IPv6 connectivity. Yes, Google are that granular. See: http://www.google.com/intl/en_ALL/ipv6/statistics/data/no_aaaa.txt ...which currently lists: 96.31.0.20/32 # AS53347 United States 96.31.0.31/32 # AS53347 United States Google have been, AFAICT, silent on the specifics of how they generate their blacklisting. Presumably it's the fairly standard approach of correlating a web-bug to a unique hostname embedded in the google search page, received http requests, and received DNS queries. Google undoubtedly then do some stats magic - that is their thing, after all - and down-score resolvers which make the AAAA query but whose clients don't finish the HTTP request, above some threshold. We had persistent problems in the past with our resolvers appearing in the Google blacklist, despite having excellent IPv6 connectivity. Google were unwilling to provide us any details that would have allowed us to identify the cause(s). We eventually stopped paying any attention to it, and the problem went away by itself. Possibly there are one or more clients with broken IPv6 using your resolvers, but without Google specifying the criteria which gets a resolver blacklisted, it's hard to know. Frankly, I wish Google would ditch the AAAA blacklist. It is hiding problems that responsible operators would like to see and fix, just so that Google don't lose eyeballs (and ad revenue) :o/ ------------------------------ _______________________________________________ bind-users mailing list bind-users@lists.isc.org https://lists.isc.org/mailman/listinfo/bind-users End of bind-users Digest, Vol 2012, Issue 1 ******************************************* *************************************************************** This message is intended for the addressee named and may contain confidential information. If you are not the intended recipient, please delete it and notify the sender. Views expressed in this message are those of the individual sender, and are not necessarily the views of the NSW Government. This email message has been swept by MIMEsweeper for the presence of computer viruses. *************************************************************** Please consider the environment before printing this email. _______________________________________________ Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list bind-users mailing list bind-users@lists.isc.org https://lists.isc.org/mailman/listinfo/bind-users