Re: dnsquery for Solaris

2010-03-10 Thread Sam Wilson
In article ,
  wrote:

> dig was added to Solaris 9. It is not native to Solaris 8 or older.

That would explain why it's only where Chris found it on some of our 
range of Solarises (vintage or only slightly worn).

>  Chris Thompson  wrote: 
> > On Mar 9 2010, Sam Wilson wrote:
> > 
> > ...  I don't know whether [dig is] there [/usr/local/bin] if you use the 
> > >Solaris-supplied BIND.
> > 
> > Sure it is:
> > 
> > $ ls -l /usr/sbin/dig
> > -r-xr-xr-x   1 root bin75208 Jul 29  2008 /usr/sbin/dig
> > $ fgrep /usr/sbin/dig /var/sadm/install/contents
> > /usr/sbin/dig f none 0555 root bin 75208 48119 121715 SUNWbind
> > 
> > (that's a 9.3.5-P1 dig, from a not very up-to-date Solaris 10 installation,
> > but it's been around in Solaris distributions much longer than that).

Sam
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: strange behaviour of resolving nameserver

2010-03-10 Thread Sam Wilson
In article ,
 Mark Andrews  wrote:

> In message <20100309154017.4801c...@the-damian.de>, Torsten writes:
> > Am Wed, 10 Mar 2010 00:44:46 +1100
> > schrieb Mark Andrews :
> > 
> > > 
> > > In message <20100309142153.016c7...@the-damian.de>, Torsten writes:
> > > > Hi,
> > > > 
> > > > I'm a bit clueless about what's happening here exactly.
> > > > I have a server (9.6.1-P3) that tries resolving
> > > > ws.mobilecdn.verisign.com. Queries for this host permanently fail
> > > > with SERVFAIL.
> > > > 
> > > > I've narrowed the problem down to answers from c2.nstld.net 
> > > > 
> > > > 
> > > > dig @c2.nstld.com mobilecdn.verisign.com 
> > > > ;; Got referral reply from 192.26.92.31, trying next server
> > > 
> > > Fix /etc/resolv.conf to point to recursive nameservers.  192.26.92.31
> > > is not a recursive nameserver.
> > 
> > /etc/resolv.conf already points to recursive nameservers. Since these
> > nameservers can't resolve ws.mobilecdn.verisign.com I tried every
> > single nameserver found by dig +trace and ended up with the behaviour
> > of c2.nstld.net.
> 
> I mis-read.  192.26.92.31 is c2.nstld.net so someone at RedHat has
> hacked dig to return " ;; Got referral reply from 192.26.92.31,
> trying next server" when it see a referral and move onto the next
> address which is a IPv6 addresss which presumably you don't have
> connectivity for.
> 
> Try "dig -4 @c2.nstld.com mobilecdn.verisign.com".  Then yell at
> RedHat.  Dig is not supposed to move on when it sees a referral.
> Dig is a diagnostic tool first and foremost, not a general hostname
> lookup tool.  One needs to see the answers to queries in a diagnostic
> tool not have them skipped.

There's also a lame delegation.  Here's an extract from "dig 
ws.mobilecdn.verisign.com +trace":

   :
   :
mobilecdn.verisign.com. 900 IN  NS  dns2-auth.m-qube.com.
mobilecdn.verisign.com. 900 IN  NS  dns1-auth.m-qube.com.
;; Received 98 bytes from 192.5.6.31#53(a2.nstld.com) in 119 ms

ws.mobilecdn.verisign.com. 1800 IN  A   64.14.95.24
mobilecdn.verisign.com. 1800IN  NS  dns2-auth.m-qube.com.
mobilecdn.verisign.com. 1800IN  NS  dns3-auth.m-qube.com.
mobilecdn.verisign.com. 1800IN  NS  ns1.savvis.net.
mobilecdn.verisign.com. 1800IN  NS  ns2.savvis.net.
mobilecdn.verisign.com. 1800IN  NS  ns3.savvis.net.
;; Received 178 bytes from 64.14.95.64#53(dns2-auth.m-qube.com) in 90 ms

dns1-auth.m-qube.com does not respond, at least to me, and will also 
cause delays or failures because it is a CNAME for dns1.m-qube.com.


Sam
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: dnsquery for Solaris

2010-03-10 Thread Chris Thompson

On Mar 10 2010, Sam Wilson wrote:


In article ,
 wrote:


dig was added to Solaris 9. It is not native to Solaris 8 or older.


That would explain why it's only where Chris found it on some of our 
range of Solarises (vintage or only slightly worn).


Yes, I did overestimate how long it's been there. (Also, of course, some
people will exclude/remove package SUNWbind so that they can use the same
path names for their own BIND installations.)

But if you are still using Solaris 8 or earlier... well it's not quite
as bad as still running BIND 8. Not *quite* ... :-)

--
Chris Thompson
Email: c...@cam.ac.uk
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Zone Statistics in Bind9.7.0

2010-03-10 Thread Dangl, Thomas
Hello,
 
in Bind 9.6.2 the zone statistics looked like that:
 

  4.3.2.1.e164.arpa/IN
  IN
  3
  
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
2
4
0
0
0
0
0
2
0
0
0
0
1
0
0
0
0
0
0
  



Now with Bind9.7.0 it only covers 

  4.3.2.1.e164.arpa/IN
  IN
  8


Is there some way to get the full scope of counters that came with the
Bind9.6.2? 
I tried activating zone-statistics in each zone statement, but that
didnt change anything.  
 
Best regards
 
 
Thomas Dangl

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

recursion

2010-03-10 Thread ic.nssip
If there is no option "recursion yes (or no);" specified in named.conf, is the 
server still recursive?
Is "recursion" activated by default if option recursion (yes|no) is missing in 
named.conf?

Thank you,
Julian


___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: recursion

2010-03-10 Thread Kevin Darcy

On 3/10/2010 11:37 AM, ic.nssip wrote:
If there is no option "recursion yes (or no);" specified in 
named.conf, is the server still recursive?
Is "recursion" activated by default if option recursion (yes|no) is 
missing in named.conf?
Yes, recursion is "activated" by default, but who is or is not allowed 
to recurse in a default configuration, depends on the version of BIND 
you're running. Older versions allow *open* recursion by default. The 
default for modern versions of BIND, if none of the following are set:


recursion
allow-recursion
allow-query-cache
allow-query

is to restrict recursion to { localnets; localhost; }.

But there is cross-inheritance and override behavior among the options 
mentioned above. All of this is explained in the ARM.



- Kevin


___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: recursion

2010-03-10 Thread Alan Clegg
ic.nssip wrote:
> If there is no option "recursion yes (or no);" specified in named.conf,
> is the server still recursive?
> Is "recursion" activated by default if option recursion (yes|no) is
> missing in named.conf?

In modern BIND, "allow-recursion" defaults to:

   "{ localhost; localnets; };"

so, yes it is enabled and no, it's not available to everyone.

AlanC



signature.asc
Description: OpenPGP digital signature
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

RE: recursion

2010-03-10 Thread Lightner, Jeff
Modern being?

-Original Message-
From: bind-users-bounces+jlightner=water@lists.isc.org
[mailto:bind-users-bounces+jlightner=water@lists.isc.org] On Behalf
Of Alan Clegg
Sent: Wednesday, March 10, 2010 2:25 PM
To: bind-users@lists.isc.org
Subject: Re: recursion

ic.nssip wrote:
> If there is no option "recursion yes (or no);" specified in
named.conf,
> is the server still recursive?
> Is "recursion" activated by default if option recursion (yes|no) is
> missing in named.conf?

In modern BIND, "allow-recursion" defaults to:

   "{ localhost; localnets; };"

so, yes it is enabled and no, it's not available to everyone.

AlanC
 
Proud partner. Susan G. Komen for the Cure.
 
Please consider our environment before printing this e-mail or attachments.
--
CONFIDENTIALITY NOTICE: This e-mail may contain privileged or confidential 
information and is for the sole use of the intended recipient(s). If you are 
not the intended recipient, any disclosure, copying, distribution, or use of 
the contents of this information is prohibited and may be unlawful. If you have 
received this electronic transmission in error, please reply immediately to the 
sender that you have received the message in error, and delete it. Thank you.
--
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: recursion

2010-03-10 Thread Alan Clegg
Lightner, Jeff wrote:
> Modern being?

According to CHANGES file:

--- 9.5.0a6 released ---

2206. [security] "allow-query-cache" and "allow-recursion" now
 cross inherit from each other.

 If allow-query-cache is not set in named.conf then
 allow-recursion is used if set, otherwise allow-query
 is used if set, otherwise the default (localnets;
 localhost;) is used.

 If allow-recursion is not set in named.conf then
 allow-query-cache is used if set, otherwise allow-query
 is used if set, otherwise the default (localnets;
 localhost;) is used.

AlanC



signature.asc
Description: OpenPGP digital signature
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: recursion

2010-03-10 Thread Alan Clegg
Lightner, Jeff wrote:
> Modern being?

Actually

In the 9.4 CHANGES file I find:

--- 9.4.0a4 released ---
[...]
2006.   [security]Allow-query-cache and allow-recursion now default
  to the builtin acls "localnets" and "localhost".

  This is being done to make caching servers less
  attractive as reflective amplifying targets for
  spoofed traffic.  This still leave authoritative
  servers exposed.

  The best fix is for full BCP 38 deployment to
  remove spoofed traffic.

So, "modern" (in this case) is any currently supported version of BIND.

9.4, 9.5, 9.6, 9.7

AlanC



signature.asc
Description: OpenPGP digital signature
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

return address for failed DNSSEC validation

2010-03-10 Thread Gilles Massen
Hello all,

If a the validation of a signed RR fails, the answer from the validating
resolver to the requestor is SERVFAIL, if I understood correctly. To the
average end user who isn't aware that DNS exists this translates to
"it's broken". Possibly even "my ISP is broken" if the neighbor's ISP
does not validate.

So wouldn't a be an interesting option to allow Bind to be configured to
return an IP address in case of failed validation (if a A/ record
was queried). This would allow the provider to set up a webpage with a
small explanation on what went wrong.

The obvious limitation of this feature would be that it assumes
internet=http, even though you could go as far as set up a few services
reacting appropriately on that "fail-host". On the other hand it would
allow to lessen the fear from the unexplainable failure and return
something to a large part of the users (if only who is to blame).

Thoughts?


Best regards,
Gilles


-- 
Fondation RESTENA - DNS-LU
6, rue Coudenhove-Kalergi
L-1359 Luxembourg
tel: (+352) 424409
fax: (+352) 422473
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: recursion

2010-03-10 Thread ic.nssip

I've got the idea!
So even I have no statement "recursion yes", the server is still recursive 
as time I dont specify "recursion no;"

It is going to make no difference if I'll add "recursion yes;" on options.

Is "localnets" a term I really need to use?

Currently I'm using an ACL defined for "acl custnets { x.x.x.x; };" and 
"allow-query { custnets; };"


Should I change the name "custnets" to "localnets"?
Is my customized name "custnets" going to affect recursion in any way if I 
use it instead of "localnets"?

It sounds to me that is fine using "custnets" too.

Thank you!
Julian 



___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: return address for failed DNSSEC validation

2010-03-10 Thread imfel...@gmail.com
Hi Gilles,

this question came up as well at a DNSSEC workshop I attended recently. IMHO 
redirecting to a website will cause similar misuse to what wildcard records 
have caused. One might argue a new RCODE would be the right thing but really, 
the SERVFAIL is actually correct. The server at the other end did actually fail 
by not passing DNSSEC validation. End users will get confused by this, but then 
there are plenty of other possibilities with and without DNS they may get 
confused about. I think providing help to them should be dealt with by the OS 
instead of bloating DNS. Upon return of any error by DNS (or any other 
subsystem) it can show them a useful, platform-dependent message how to fix it.

-mat



On Mar 10, 2010, at 10:31 PM, Gilles Massen wrote:

> Hello all,
> 
> If a the validation of a signed RR fails, the answer from the validating
> resolver to the requestor is SERVFAIL, if I understood correctly. To the
> average end user who isn't aware that DNS exists this translates to
> "it's broken". Possibly even "my ISP is broken" if the neighbor's ISP
> does not validate.
> 
> So wouldn't a be an interesting option to allow Bind to be configured to
> return an IP address in case of failed validation (if a A/ record
> was queried). This would allow the provider to set up a webpage with a
> small explanation on what went wrong.
> 
> The obvious limitation of this feature would be that it assumes
> internet=http, even though you could go as far as set up a few services
> reacting appropriately on that "fail-host". On the other hand it would
> allow to lessen the fear from the unexplainable failure and return
> something to a large part of the users (if only who is to blame).
> 
> Thoughts?
> 
> 
> Best regards,
> Gilles
> 
> 
> -- 
> Fondation RESTENA - DNS-LU
> 6, rue Coudenhove-Kalergi
> L-1359 Luxembourg
> tel: (+352) 424409
> fax: (+352) 422473
> ___
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: recursion

2010-03-10 Thread Kevin Darcy

On 3/10/2010 4:45 PM, ic.nssip wrote:

I've got the idea!
So even I have no statement "recursion yes", the server is still 
recursive as time I dont specify "recursion no;"
It is going to make no difference if I'll add "recursion yes;" on 
options.

No difference.


Is "localnets" a term I really need to use?

It's predefined. Read the ARM.


Currently I'm using an ACL defined for "acl custnets { x.x.x.x; };" 
and "allow-query { custnets; };"


Should I change the name "custnets" to "localnets"?
If they're numerically  the same thing, then it would just be a matter 
of personal preference. If they're different, then it would depend on 
one's implementation requirements whether it's ok to switch one for the 
other. We don't have enough information about your implementation 
requirements to give a definitive answer one way or the other.


Note that both "localnets" and "localhost" can change dynamically, if 
network interfaces are brought up and/or taken down.
Is my customized name "custnets" going to affect recursion in any way 
if I use it instead of "localnets"?


If running BIND 9.4.x or higher, "allow-query { custnets; }" will affect 
one's allow-recursion default if "custnets" is (or _becomes_, as a 
result of interfaces being brought up and/or taken down) in any way 
numerically different from "{ localnets; localhost; }".


(Of course, a query that's REFUSED will never get a chance to recurse, 
but one can override a *global* allow-query at the zone level, so it 
still makes sense for allow-recursion to cross-inherit from allow-query)


If all of this is confusing, then I would recommend explicitly setting 
all of them -- allow-query, allow-query-cache, allow-recursion. Then you 
don't need to constantly guess at what is inheriting from where.



- Kevin



___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: return address for failed DNSSEC validation

2010-03-10 Thread Mark Andrews

Additionally you can detect a DNSSEC failure by asking
queries with and without the CD bit set.

Most DNSSEC failures can be diagnosed with dig, knowing the
current time and date and access to named.conf for the trust
anchors.  There are actually easier to diagnose than most
other DNS failure issues.

Most DNSSEC failure fall into these categories:

* failure to re-sign, check the dates in the RRSIG records.
* failute to roll a key correctly. check the key id match.
  dig +multi will print out the key id for KEY and DNSKEY
  records.

To find the failure you ask the failing server for the records
in the trust chain until you find the break point.

record -> dnskey [ [ -> ds/dlv -> dnskey ]  .  ] -> trusted-key.

Mark
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


dynamic update in IPv6 environment

2010-03-10 Thread aihua zhang
hi,
   when i was in IPv4 environment test the dynamic update ,the result is
completely sucess,there is the result(rangi type is the new type i added):
   [r...@localhost named]# host -t rangi 4086:0002:0010:::1
0001.0010.0002.4086.rangiid.arpa has RANGI record
2001:da8:215:1800::1
0001.0010.0002.4086.rangiid.arpa has RANGI record
2001:da8:215:1800::2
0001.0010.0002.4086.rangiid.arpa has RANGI record
2001:da8:215:1800:20c:29ff:fe32:572a
[r...@localhost named]# nsupdate
> update add 0001.0010.0002.4086.rangiid.arpa 3001 IN rangi
2001:da8:215:1800::3
quit
[r...@localhost named]# host -t rangi 4086:0002:0010:::1
0001.0010.0002.4086.rangiid.arpa has RANGI record
2001:da8:215:1800::2
0001.0010.0002.4086.rangiid.arpa has RANGI record
2001:da8:215:1800::3
0001.0010.0002.4086.rangiid.arpa has RANGI record
2001:da8:215:1800:20c:29ff:fe32:572a
0001.0010.0002.4086.rangiid.arpa has RANGI record
2001:da8:215:1800::1
[r...@localhost named]# nslookup -type=A ns.0010.0002.4086.rangiid.arpa.
Server:  127.0.0.1
Address: 127.0.0.1#53
Name: ns.0010.0002.4086.rangiid.arpa
Address: 127.0.0.1
But,when i change the environment to IPv6 environment ,update always error!!

[r...@localhost named]# host -t  ns.0010.0002.4086.rangiid.arpa
ns.0010.0002.4086.rangiid.arpa has IPv6 address ::1
[r...@localhost named]# nsupdate
> update add 0001.0010.0002.4086.rangiid.arpa. 2001 IN rangi
2001:da8:215:1800::5
couldn't get address for 'ns.0010.0002.4086.rangiid.arpa': failure

the BIND version is  BIND-9.6.1,my install process is :./configure;make
;make install, is there any wrong with my install or others problem ?
thanks!

-- 
Best regards!

Sincerely,
aiHua Zhang

State Key Lab. of Networking Technology Research Institute, BeiJing
University of Posts and Telecommunications, 100876, P.R.China
Email :aih...@bupt.cn
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: return address for failed DNSSEC validation

2010-03-10 Thread Gilles Massen
Mark, Mat,

Mat wrote:
> End users will get confused by this, but then there are plenty of
> other possibilities with and without DNS they may get confused about.
> I think providing help to them should be dealt with by the OS instead
> of bloating DNS. Upon return of any error by DNS (or any other
> subsystem) it can show them a useful, platform-dependent message how
> to fix it.

Mark Andrews wrote:
>   Additionally you can detect a DNSSEC failure by asking
>   queries with and without the CD bit set.
> 
>   Most DNSSEC failures can be diagnosed with dig, knowing the
>   current time and date and access to named.conf for the trust
>   anchors.  There are actually easier to diagnose than most
>   other DNS failure issues.


I agree with both of you, but you are missing the point. The problem
space is users that don't know about DNS, and that don't have a local
validating resolver. So there is no point of even considering dig.

As soon as applications (or local stub resolvers) are validating, that
would be the place to generate a "user compatible" error. But in the
best case this will take years. In the mean term we are stuck with dummy
users, and ISPs that might want to enable validation, but might also be
kept off by the cost that unexplainable (or rather unexplained) failures
will produce (Helpdesk). Being able to return 'something' in case of
validation failures (and only them, not any SERVFAIL!) looks as it were
in the interest of the adoption of DNSSEC.

Obviously there are parallels to NXDOMAIN rewriting. However, the major
difference I see is that NXDOMAIN is a clear message, known by the OSs
and applications, that has basically one meaning. SERVFAIL is more like
'didn't work. go figure.' And the good thing is that 'validation error
rewriting' could be abandoned again if DNSSEC arrives at the
OS/applications.

Gilles

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users