problem resolving domains with bind9.5.0-P2

2009-09-09 Thread Matthias Brehm
Dear all,

 

we use bind9.5.0-P2 for the internet dns server. 

Sometimes we get no response for some domains, like this:

 

; <<>> DiG 9.3.2 <<>> cluster3.eu.messagelabs.com

;; global options:  printcmd

;; Got answer:

;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 34869

;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0

 

;; QUESTION SECTION:

;cluster3.eu.messagelabs.com.   IN  A

 

;; Query time: 166 msec

;; SERVER: 195.145.31.131#53(195.145.31.131)

;; WHEN: Fri Aug 21 11:00:01 2009

;; MSG SIZE  rcvd: 45

 

If we ask the same question a few seconds later, we get a correct
answer. ( e.g. two out-of ten we get an error)

Then we stop and start the named daemon and it works fine for a while.

 

Any ideas?

How can we debug this issue? 

 

Thanks in advance.

 

Greets, Matthias

 

 

 

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: problem resolving domains with bind9.5.0-P2

2009-09-09 Thread Jeremy C. Reed
> ;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 34869

While it doesn't help you with your 9.5.0-P2 version, BIND 9.6.1 and newer 
provide a new query-errors logging category that can be helpful by logging 
details about various errors.
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: problem resolving domains with bind9.5.0-P2

2009-09-09 Thread Dave Sparro
Based on the answer size for the query you presented, I'd focus on
looking for an upstream filter/device that is blocking answers that
are > 512 bytes.



On Wed, Sep 9, 2009 at 5:34 AM, Matthias Brehm wrote:
> Dear all,
>
>
>
> we use bind9.5.0-P2 for the internet dns server.
>
> Sometimes we get no response for some domains, like this:
>
>
>
> ; <<>> DiG 9.3.2 <<>> cluster3.eu.messagelabs.com
>
> ;; global options:  printcmd
>
> ;; Got answer:
>
> ;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 34869
>
> ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
>
>
>
> ;; QUESTION SECTION:
>
> ;cluster3.eu.messagelabs.com.   IN  A
>
>
>
> ;; Query time: 166 msec
>
> ;; SERVER: 195.145.31.131#53(195.145.31.131)
>
> ;; WHEN: Fri Aug 21 11:00:01 2009
>
> ;; MSG SIZE  rcvd: 45
>
>
>
> If we ask the same question a few seconds later, we get a correct answer. (
> e.g. two out-of ten we get an error)
>
> Then we stop and start the named daemon and it works fine for a while.
>
>
>
> Any ideas?
>
> How can we debug this issue?
>
>
>
> Thanks in advance.
>
>
>
> Greets, Matthias
>
>
>
>
>
>
>
> ___
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users
>
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: root and in-addr.arpa zone transfers

2009-09-09 Thread Rich Goodson

Michael,

Here's a snippet from my named.conf which does what you're talking  
about.  I use this in our recursive resolvers, but for authoritative  
servers, I find the hints file to be somewhat more robust.
FYI, I stole this originally from the default FreeBSD named.conf file  
that got pushed out with a 6.something update. There was some  
controversy in the FreeBSD mailing lists about it, so I have no idea  
whether it's still used or not.


zone "." {
type slave;
file "slave/root.slave";
masters {
192.33.4.12;// C.ROOT-SERVERS.NET.
192.112.36.4;   // G.ROOT-SERVERS.NET.
193.0.14.129;   // K.ROOT-SERVERS.NET.
};
notify no;
};
zone "arpa" {
type slave;
file "slave/arpa.slave";
masters {
192.33.4.12;// C.ROOT-SERVERS.NET.
192.112.36.4;   // G.ROOT-SERVERS.NET.
193.0.14.129;   // K.ROOT-SERVERS.NET.
};
notify no;
};
zone "in-addr.arpa" {
type slave;
file "slave/in-addr.arpa.slave";
masters {
192.33.4.12;// C.ROOT-SERVERS.NET.
192.112.36.4;   // G.ROOT-SERVERS.NET.
193.0.14.129;   // K.ROOT-SERVERS.NET.
};
notify no;
};


Rich Goodson
Sr. Unix Administrator
Mediacom Communications

On Sep 9, 2009, at 1:23 AM, Michael Monnerie wrote:


Hello,

right now I'm using scripts to download root.zone and in-addr.arpa  
from

internic.net. But this is a non-standard way, I'd prefer to directly
slave and zone-transfer those 2 zones.
Is it possible, and can you show the bind config for these?

Thanks a lot,

mfg zmi
--
// Michael Monnerie, Ing.BSc-  http://it-management.at
// Tel: 0660 / 415 65 31  .network.your.ideas.
// PGP Key: "curl -s http://zmi.at/zmi.asc | gpg --import"
// Fingerprint: AC19 F9D5 36ED CD8A EF38  500E CE14 91F7 1C12 09B4
// Keyserver: wwwkeys.eu.pgp.net  Key-ID: 1C1209B4

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: root and in-addr.arpa zone transfers

2009-09-09 Thread Rick Dicaire
On Wed, Sep 9, 2009 at 10:51 AM, Rich Goodson  wrote:
> zone "." {
>        type slave;
>        file "slave/root.slave";
>        masters {
>                192.33.4.12;    // C.ROOT-SERVERS.NET.
>                192.112.36.4;   // G.ROOT-SERVERS.NET.
>                193.0.14.129;   // K.ROOT-SERVERS.NET.
>        };
>        notify no;
> };

Interestingcan any of the root servers be used, or must it be just
these three?

-- 
aRDy Music and Rick Dicaire present:
http://www.ardynet.com
http://www.ardynet.com:9000/ardymusic.ogg.m3u
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


one DNS names to multiple IP Addresses(Round Robin DNS)

2009-09-09 Thread Balanagaraju Munukutla
Hi

Anybody can help to explain the side effect of configuring the DNS name to 
multiple IP addresses(Round Robin DNS).

Thanks & Regards
Nagaraj ___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: one DNS names to multiple IP Addresses(Round Robin DNS)

2009-09-09 Thread Sam Wilson
In article ,
 Balanagaraju Munukutla <9ba...@sg.ibm.com> wrote:

> Hi
> 
> Anybody can help to explain the side effect of configuring the DNS name to 
> multiple IP addresses(Round Robin DNS).

If you're planning to use it for load sharing, then the effect is very 
basic - requests get shared equally among the addresses irrespective of 
load on the target system or whether the system is offering the service 
or not.  If one of the target systems goes down then clients which are 
directed to that system will either get rejected or time out, depending 
on the type of failure.  You can mitigate this by using watchdog 
scripts, short TTLs and dynamic DNS updates.

In short it's cheap and cheerful load balancing.  A large commercial 
organisation might not want to rely on it, but depending on the 
application it can work well enough.

Sam
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


9.2.2 vs 9.5.1

2009-09-09 Thread Riccardo Castellani

I'm using 3 dns servers with Bind bind-9.2.2.P3-9

Master A (domain1 + domain2)
Slave B (domain1)
Slave C (domain2)


Now I'm migrating master A to Bind 9.5.1.dfsg.P3-1 together OS (Debian 
Lenny) so I'm interesting to know if there is some incompatible settings 
from/to slave servers.
For example in slave B,C there is no setting about "auth-nxdomain directive" 
while in server A I found set "auth-nxdomain no"; I have to specify in 
server A these 2  options to permit only zones transfer to these only 2 
servers ?


allow-transfer { IpServerB }
allow-transfer { IpServerC } 


___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: 9.2.2 vs 9.5.1

2009-09-09 Thread Kevin Darcy

Riccardo Castellani wrote:

I'm using 3 dns servers with Bind bind-9.2.2.P3-9

Master A (domain1 + domain2)
Slave B (domain1)
Slave C (domain2)


Now I'm migrating master A to Bind 9.5.1.dfsg.P3-1 together OS (Debian 
Lenny) so I'm interesting to know if there is some incompatible 
settings from/to slave servers.
For example in slave B,C there is no setting about "auth-nxdomain 
directive" while in server A I found set "auth-nxdomain no"; 
According to the ARM, no change from 9.2.x to 9.5.x. The default is 
still "no", so "auth-nxdomain no" is technically redundant. Some folks 
like to make everything explicit, while others like to keep their 
configs as minimal as possible and therefore go with default settings 
wherever possible; it's a matter of personal preference.
I have to specify in server A these 2 options to permit only zones 
transfer to these only 2 servers ?


allow-transfer { IpServerB }
allow-transfer { IpServerC }
According to the ARM, no change from 9.2.x to 9.5.x. The default is 
still to allow all zone transfers. Note that if you use TSIG keys for 
authenticating zone transfers, you can re-address your slaves at will 
without having to keep your allow-transfer clauses up to date to match. 
Generally speaking, key-based security is stronger than 
source-address-based security anyway.


- Kevin


___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Bind 9.6.1-P1 ignoring listen-on directive

2009-09-09 Thread John Center

Hi,

I'm testing Bind 9.6.1-P1 on Solaris 10 SPARC (64bit/Sun Studio 12.1) & 
I noticed this in the logs:


Sep  9 13:15:31 ns3a/ns3a named[23042]: [ID 873579 daemon.info] 
listening on IPv4 interface lo0, 127.0.0.1#53
Sep  9 13:15:31 ns3a/ns3a named[23042]: [ID 873579 daemon.info] 
listening on IPv4 interface bge0, 153.104.92.2#53
Sep  9 13:15:31 ns3a/ns3a named[23042]: [ID 873579 daemon.info] 
listening on IPv4 interface bge0:1, 153.104.92.4#53
Sep  9 13:15:31 ns3a/ns3a named[23042]: [ID 873579 daemon.info] 
listening on IPv4 interface bge1, 10.104.36.20#53


I only wanted named to listen on one interface + the loopback, so I 
added a listen-on statement in named.conf:


acl testnets { 153.104.244.0/24; 153.104.248.0/24; };
options {
directory "/opt/isc/bind/var/db";
allow-query { testnets; };
listen-on { localhost; 153.104.92.2; };
listen-on-v6 { none; };
};
zone "0.0.127.in-addr.arpa" in {
type master;
file "db.127.0.0";
notify no;
};

But, I still have the same log entries when I start named.  I then 
modified named.conf to specifically exclude the other interfaces:


listen-on { localhost; 153.104.92.2; !153.104.92.4; !10.104.36.20; };

But, again, I'm still seeing it state that it is listening on the 
excluded interfaces.  I tried increasing the debug level, but I didn't 
see any additional info pertaining to this.  I know that it is listening 
on the excluded interfaces because I see a queries on the 10.104.36.20 
interface:


Sep  9 13:09:16 ns3a/ns3a named[22867]: [ID 873579 daemon.info] client 
10.104.109.0#1041: query (cache) 'ATF/A/IN' denied
Sep  9 13:09:16 ns3a/ns3a named[22867]: [ID 873579 daemon.info] client 
10.104.109.0#1046: query (cache) 'ATP.villanova.edu/A/IN' denied


Is this a known problem?  It's an issue for us because we restrict DNS 
queries to particular interfaces.  If it isn't a known bug, I'd be glad 
to help troubleshoot this problem.


Thanks.

-John

--
John Center
Villanova University
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Bind 9.6.1-P1 ignoring listen-on directive

2009-09-09 Thread John Center
Of course, right after hitting enter on this message, I came across a 
message from last year about localhost mapping to all interfaces, not 
just 127.0.0.1.  I created a "loopback" acl & used it instead that 
worked.  Sorry for the noise.


-John


On 09/09/2009 03:04 PM, John Center wrote:

Hi,

I'm testing Bind 9.6.1-P1 on Solaris 10 SPARC (64bit/Sun Studio 12.1)&
I noticed this in the logs:

Sep  9 13:15:31 ns3a/ns3a named[23042]: [ID 873579 daemon.info]
listening on IPv4 interface lo0, 127.0.0.1#53
Sep  9 13:15:31 ns3a/ns3a named[23042]: [ID 873579 daemon.info]
listening on IPv4 interface bge0, 153.104.92.2#53
Sep  9 13:15:31 ns3a/ns3a named[23042]: [ID 873579 daemon.info]
listening on IPv4 interface bge0:1, 153.104.92.4#53
Sep  9 13:15:31 ns3a/ns3a named[23042]: [ID 873579 daemon.info]
listening on IPv4 interface bge1, 10.104.36.20#53

I only wanted named to listen on one interface + the loopback, so I
added a listen-on statement in named.conf:

acl testnets { 153.104.244.0/24; 153.104.248.0/24; };
options {
  directory "/opt/isc/bind/var/db";
  allow-query { testnets; };
  listen-on { localhost; 153.104.92.2; };
  listen-on-v6 { none; };
};
zone "0.0.127.in-addr.arpa" in {
  type master;
  file "db.127.0.0";
  notify no;
};

But, I still have the same log entries when I start named.  I then
modified named.conf to specifically exclude the other interfaces:

listen-on { localhost; 153.104.92.2; !153.104.92.4; !10.104.36.20; };

But, again, I'm still seeing it state that it is listening on the
excluded interfaces.  I tried increasing the debug level, but I didn't
see any additional info pertaining to this.  I know that it is listening
on the excluded interfaces because I see a queries on the 10.104.36.20
interface:

Sep  9 13:09:16 ns3a/ns3a named[22867]: [ID 873579 daemon.info] client
10.104.109.0#1041: query (cache) 'ATF/A/IN' denied
Sep  9 13:09:16 ns3a/ns3a named[22867]: [ID 873579 daemon.info] client
10.104.109.0#1046: query (cache) 'ATP.villanova.edu/A/IN' denied

Is this a known problem?  It's an issue for us because we restrict DNS
queries to particular interfaces.  If it isn't a known bug, I'd be glad
to help troubleshoot this problem.

Thanks.

-John


___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Bind 9.6.1-P1 ignoring listen-on directive

2009-09-09 Thread Kevin Darcy
Syntax. The parser is matching on "localhost" before it sees the negated 
elements.


- Kevin

John Center wrote:

Hi,

I'm testing Bind 9.6.1-P1 on Solaris 10 SPARC (64bit/Sun Studio 12.1) 
& I noticed this in the logs:


Sep 9 13:15:31 ns3a/ns3a named[23042]: [ID 873579 daemon.info] 
listening on IPv4 interface lo0, 127.0.0.1#53
Sep 9 13:15:31 ns3a/ns3a named[23042]: [ID 873579 daemon.info] 
listening on IPv4 interface bge0, 153.104.92.2#53
Sep 9 13:15:31 ns3a/ns3a named[23042]: [ID 873579 daemon.info] 
listening on IPv4 interface bge0:1, 153.104.92.4#53
Sep 9 13:15:31 ns3a/ns3a named[23042]: [ID 873579 daemon.info] 
listening on IPv4 interface bge1, 10.104.36.20#53


I only wanted named to listen on one interface + the loopback, so I 
added a listen-on statement in named.conf:


acl testnets { 153.104.244.0/24; 153.104.248.0/24; };
options {
directory "/opt/isc/bind/var/db";
allow-query { testnets; };
listen-on { localhost; 153.104.92.2; };
listen-on-v6 { none; };
};
zone "0.0.127.in-addr.arpa" in {
type master;
file "db.127.0.0";
notify no;
};

But, I still have the same log entries when I start named. I then 
modified named.conf to specifically exclude the other interfaces:


listen-on { localhost; 153.104.92.2; !153.104.92.4; !10.104.36.20; };

But, again, I'm still seeing it state that it is listening on the 
excluded interfaces. I tried increasing the debug level, but I didn't 
see any additional info pertaining to this. I know that it is 
listening on the excluded interfaces because I see a queries on the 
10.104.36.20 interface:


Sep 9 13:09:16 ns3a/ns3a named[22867]: [ID 873579 daemon.info] client 
10.104.109.0#1041: query (cache) 'ATF/A/IN' denied
Sep 9 13:09:16 ns3a/ns3a named[22867]: [ID 873579 daemon.info] client 
10.104.109.0#1046: query (cache) 'ATP.villanova.edu/A/IN' denied


Is this a known problem? It's an issue for us because we restrict DNS 
queries to particular interfaces. If it isn't a known bug, I'd be glad 
to help troubleshoot this problem.


Thanks.

-John



___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


salting NSEC3

2009-09-09 Thread Casey Deccio
Hello,

I'm trying to better understand NSEC3.  I have a signed zone for which
I periodically resign expiring RRs with expiring RRSIGs using
dnssec-signzone.  When I do so, I use a different salt each time,
which results in multiple salts being used in the zone.  According to
RFC 5155:
   This is harmless, since each RR stands
   alone (that is, it denies the set of owner names whose hashes, using
   the salt in the NSEC3 RR, fall between the two hashes in the NSEC3
   RR) -- it is only the server that needs a complete set of NSEC3 RRs
   with the same salt in order to be able to answer every possible
   query.

Also, according to RFC 5155:
   There MUST be at least one complete set of NSEC3 RRs for the zone
   using the same salt value.
and:
   If an NSEC3PARAM RR is present at the apex of a zone with a Flags
   field value of zero, then there MUST be an NSEC3 RR using the same
   hash algorithm, iterations, and salt parameters present at every
   hashed owner name in the zone.  That is, the zone MUST contain a
   complete set of NSEC3 RRs with the same hash algorithm, iterations,
   and salt parameters.

So from what I gather, each time a new salt (and therefore NSEC3PARAM)
is introduced to the mix, a new NSEC3 chain is generated, so given n
distinct owner names in the zone, there are n*(num NSEC3PARAM RRs)
NSEC3 RRs and covering RRSIGs.

I'm looking for a sanity check here.  Aside from the increase in zone
size, there shouldn't be any resolution/validation problems with this,
correct?  Is it more reasonable to use the same salt until the zone is
completely (i.e., all RRs) resigned?

Casey
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: root and in-addr.arpa zone transfers

2009-09-09 Thread Matus UHLAR - fantomas
On 09.09.09 11:00, Rick Dicaire wrote:
> On Wed, Sep 9, 2009 at 10:51 AM, Rich Goodson  
> wrote:
> > zone "." {
> >        type slave;
> >        file "slave/root.slave";
> >        masters {
> >                192.33.4.12;    // C.ROOT-SERVERS.NET.
> >                192.112.36.4;   // G.ROOT-SERVERS.NET.
> >                193.0.14.129;   // K.ROOT-SERVERS.NET.
> >        };
> >        notify no;
> > };
> 
> Interestingcan any of the root servers be used, or must it be just
> these three?

you can try dig axfr from all of them but many of them don't allow
transfers. I guess he already did it and above is list of servers that do
allow transfers...
-- 
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
Due to unexpected conditions Windows 2000 will be released
in first quarter of year 1901
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: one DNS names to multiple IP Addresses(Round Robin DNS)

2009-09-09 Thread Joseph S D Yao
On Wed, Sep 09, 2009 at 05:47:34PM +0100, Sam Wilson wrote:
> In article ,
>  Balanagaraju Munukutla <9ba...@sg.ibm.com> wrote:
> > Hi
> > 
> > Anybody can help to explain the side effect of configuring the DNS name to 
> > multiple IP addresses(Round Robin DNS).
> 
> If you're planning to use it for load sharing, then the effect is very 
> basic - requests get shared equally among the addresses irrespective of 
> load on the target system or whether the system is offering the service 
> or not.  If one of the target systems goes down then clients which are 
> directed to that system will either get rejected or time out, depending 
> on the type of failure.  You can mitigate this by using watchdog 
> scripts, short TTLs and dynamic DNS updates.
> 
> In short it's cheap and cheerful load balancing.  A large commercial 
> organisation might not want to rely on it, but depending on the 
> application it can work well enough.


There are several problems with using this for load balancing.

The first is, simply, it will not work unless the name server that is
authoritative for this zone is also your resolving name server.  If
there are ANY resolving name servers between the user and the
authoritative name server - as there usually is/are - then it's the
"round robin" policy - or lack thereof - of the last caching name server
before your stub resolver that will dictate how the addresses are
delivered.

Second, if one of the system goes down, then its IP address is still in
the rotation, again, unless some clever dynamic-DNS insertion and
deletion strategy is used.  This means that users will get frustrated
when their Web browser sometimes gets the Web site and sometimes
doesn't; or some automatic process that is trying to get your
information will not fail cleanly.

ISTM, it's better to try and do failover some other way, such as with
high-availability Linux, than to try to get DNS to do load balancing.


-- 
/*\
**
** Joe Yao  j...@tux.org - Joseph S. D. Yao
**
\*/
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users