Hi,

On Aug 8, 2013, at 19:13 , Joe Abley wrote:

> On 2013-08-08, at 12:39, Havard Eidnes <h...@uninett.no> wrote:
> 
>>> Why not configure regular nameserver on the same host as
>>> opendnssec instead of replicating full functionality in
>>> opendnssec itself?
>> 
>> Well...  This may at least partly stem from my local wishes for
>> deployment.  I wanted to not touch the current originating name
>> server, and continue to maintain the zones there, and use
>> OpenDNSSEC as a "bump on the wire" between the now hidden master
>> and the new distribution master name server.
>> 
>> In other words, I wanted to use "DNS in", and at the same time
>> "DNS out" for transferring respectively unsigned and signed
>> zones.  After all, that is supposed to be a supported feature,
>> now, with 1.4?
> 
>> If I want to use the "DNS in" adapter, it seems to me that
>> OpenDNSSEC lays claim to port 53, so that presents an additional
>> challenge if you want to run a real name server in parallel with
>> OpenDNSSEC.
> 
> Well, there's nothing to say you have to bind a private-use nameserver to 
> port 53. You can bind to a different port, and configure your origin masters 
> (for the unsigned zones) to notify a different port.
> 
>> (Even though you can configure the signer to listen
>> to another port than 53, I don't immediately see a way for me to
>> configure BIND to send notify messages to another port than port
>> 53.)
> 
> also-notify {
>    target-address port target-port;
> };
> 
> I'm not suggesting that what you say doesn't make sense, just that there are 
> workarounds that might well be acceptable.

Speaking of tweaking the ports used... what about the source address used?

I'm playing with a setup similar to what Håvard has. In my case I have a hidden 
master on address 10.1.0.1, ODS on 10.1.0.2 and a slave for the signed version 
of the zone on 10.1.0.3. The problem is that 10.1.0.1 and 10.1.0.2 are two IP 
aliases on the same box. So I have tweaked the nameserver on 10.1.0.1 to Notify 
10.1.0.2 which began to work when I realised I had to lock the source address 
used (otherwise it will Notify 10.1.0.2 with a source of 10.1.0.2, which ODS 
correctly ignores).

However, that just caused me to bump my head on the same thing going in the 
opposite direction: when ODS requests a zone transfer from 10.1.0.1 it is 
refused by the ACL on the hidden master, due to the request coming *from* 
10.1.0.1:

OpenDNSSEC logs:
Sep  5 20:37:27 master ods-signerd: [xfrd] bad packet: zone bravo.dnslab 
received error code REFUSED from 10.1.0.1
Sep  5 20:42:07 master ods-signerd: [xfrd] bad packet: zone bravo.dnslab 
received error code REFUSED from 10.1.0.1

Master nameserver logs (in this case it was Knot, but that's obviously 
irrelevant):
2013-09-05T20:37:27 [notice] Outgoing AXFR of 'bravo.dnslab.' to 
'10.1.0.1@60434': Operation not permitted.
2013-09-05T20:37:27 [notice] Outgoing AXFR of 'bravo.dnslab.' to 
'10.1.0.1@60433': Operation not permitted.
2013-09-05T20:37:28 [notice] Outgoing AXFR of 'bravo.dnslab.' to 
'10.1.0.1@60432': Operation not permitted.
2013-09-05T20:42:07 [notice] Outgoing AXFR of 'bravo.dnslab.' to 
'10.1.0.1@60431': Operation not permitted.
2013-09-05T20:42:07 [notice] Outgoing AXFR of 'bravo.dnslab.' to 
'10.1.0.1@60430': Operation not permitted.
2013-09-05T20:42:08 [notice] Outgoing AXFR of 'bravo.dnslab.' to 
'10.1.0.1@60429': Operation not permitted.

Could we please have an option to force the source address that ODS uses? Or, 
quite possibly, am I just hopelessly confused here and there is some way to do 
that already?

Regards,

Johan

PS. Sure, I realise that this could be done in several other ways, using 
separate boxes, different ports, ACLs based on keys rather than addresses, etc. 
But still, this ought to work. There's a reason why all nameservers these days 
have options for forcing the source address used, and the same needs apply to 
ODS now that it is starting to behave like a nameserver.

_______________________________________________
Opendnssec-user mailing list
Opendnssec-user@lists.opendnssec.org
https://lists.opendnssec.org/mailman/listinfo/opendnssec-user

Reply via email to