Re: Create DS and DLV records

2010-05-05 Thread Stephane Bortzmeyer
On Wed, May 05, 2010 at 11:59:23AM +0530,
 rams  wrote 
 a message of 36 lines which said:

> could you please explain me, how to create DS and DLV records into my zone.

If you want to add DS or DLV records in _your_ zone, you typically never
create them. Managers of child zones do it and they send it to you and
you just include them.

However, I believe your question is not phrased properly and you want
to create DS and DLV records to be included, not in your zone but in
the _parent_ zone. Correct?

If so, it depends on the signer you use. With BIND's dnssec-signzone,
a file containing the DS (and named from the zone) is created by
default:

% cat dsset-example.org.  
example.org.IN DS 38078 7 1 48DC6B209ABB716549F833852141890DC99D4BCA
example.org.IN DS 38078 7 2 
30CC4B8F36687D3C2B7FD64448C167295875DE5486BBCCE4E36CDA52 6656C547

With option '-l dlv.isc.org', you can create DLV records as well:

% cat dlvset-example.org. 
example.org.dlv.isc.org. IN DLV 38078 7 1 
48DC6B209ABB716549F833852141890DC99D4BCA
example.org.dlv.isc.org. IN DLV 38078 7 2 
30CC4B8F36687D3C2B7FD64448C167295875DE5486BBCCE4E36CDA52 6656C547

(Note they have the same syntax so you could use an editor to create
them as well...)
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Switching to TCP in BIND.

2010-05-05 Thread Sam Wilson
In article ,
 Stephane Bortzmeyer  wrote:

> On Wed, Apr 28, 2010 at 11:59:11AM -0400,
>  Kevin Darcy  wrote 
>  a message of 21 lines which said:
> 
> > I know of no such feature. What do you mean by "spoofed" anyway? How
> > would you expect named to detect "spoofing", and is that its job?
> 
> It seems (not tested by me) that Nominum CNS does that: when many
> responses arrive which do not match (src IP address, query ID, etc)
> any pending answer, it switches to TCP, assuming someone tries to
> poison it.
>  
> This is supposed to be a protection against the Kaminsky attack.

Interesting.  "Switches" by what means?  Returns TC responses to all UDP 
queries?  Just for particular clients or particular domains?  Is this 
documented at all (yes, I'm too lazy to Google :-) ).

Sam
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Switching to TCP in BIND.

2010-05-05 Thread sthaug
> > > I know of no such feature. What do you mean by "spoofed" anyway? How
> > > would you expect named to detect "spoofing", and is that its job?
> > 
> > It seems (not tested by me) that Nominum CNS does that: when many
> > responses arrive which do not match (src IP address, query ID, etc)
> > any pending answer, it switches to TCP, assuming someone tries to
> > poison it.
> >  
> > This is supposed to be a protection against the Kaminsky attack.
> 
> Interesting.  "Switches" by what means?  Returns TC responses to all UDP 
> queries?  Just for particular clients or particular domains?  Is this 
> documented at all (yes, I'm too lazy to Google :-) ).

According to the Nominum CNS manual,

"When a single query ID mismatch is detected in the expected DNS
response, CNS switches the recursive query to the more reliable TCP
protocol ..."

So it is definitely documented - though I'm sure there are details of
the implementation which are *not* documented in the regular user
manual.

Steinar Haug, Nethelp consulting, sth...@nethelp.no
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Switching to TCP in BIND.

2010-05-05 Thread Stephane Bortzmeyer
On Wed, May 05, 2010 at 09:35:38AM +0100,
 Sam Wilson  wrote 
 a message of 22 lines which said:

> > It seems (not tested by me) that Nominum CNS does that: when many
> > responses arrive which do not match (src IP address, query ID, etc)
> > any pending answer, it switches to TCP, assuming someone tries to
> > poison it.
> >  
> > This is supposed to be a protection against the Kaminsky attack.
> 
> Interesting.  "Switches" by what means? 

I don't understand the question. When detecting an attack, CNS decides
to query the authoritative name servers with TCP instead of querying
with UDP as it does by default, that's all.

> Returns TC responses to all UDP queries?

Why would it do that? The stub resolvers would not know what to do
with it.

> Just for particular clients or particular domains?  Is this
> documented at all

I don't know.
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Switching to TCP in BIND.

2010-05-05 Thread Sam Wilson
In article ,
 sth...@nethelp.no wrote:

> > > > I know of no such feature. What do you mean by "spoofed" anyway? How
> > > > would you expect named to detect "spoofing", and is that its job?
> > > 
> > > It seems (not tested by me) that Nominum CNS does that: when many
> > > responses arrive which do not match (src IP address, query ID, etc)
> > > any pending answer, it switches to TCP, assuming someone tries to
> > > poison it.
> > >  
> > > This is supposed to be a protection against the Kaminsky attack.
> > 
> > Interesting.  "Switches" by what means?  Returns TC responses to all UDP 
> > queries?  Just for particular clients or particular domains?  Is this 
> > documented at all (yes, I'm too lazy to Google :-) ).
> 
> According to the Nominum CNS manual,
> 
> "When a single query ID mismatch is detected in the expected DNS
> response, CNS switches the recursive query to the more reliable TCP
> protocol ..."
> 
> So it is definitely documented - though I'm sure there are details of
> the implementation which are *not* documented in the regular user
> manual.

Oh, I see. It's the other way round from what I had (wrongly) assumed - 
if the response to a query looks suspect then CNS will retry the query 
using TCP to try to protect against spoofed answers coming back.  Seems 
sensible.

Sam
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Switching to TCP in BIND.

2010-05-05 Thread Sam Wilson
In article ,
 Stephane Bortzmeyer  wrote:

> On Wed, May 05, 2010 at 09:35:38AM +0100,
>  Sam Wilson  wrote 
>  a message of 22 lines which said:
> 
> > > It seems (not tested by me) that Nominum CNS does that: when many
> > > responses arrive which do not match (src IP address, query ID, etc)
> > > any pending answer, it switches to TCP, assuming someone tries to
> > > poison it.
> > >  
> > > This is supposed to be a protection against the Kaminsky attack.
> > 
> > Interesting.  "Switches" by what means? 
> 
> I don't understand the question. When detecting an attack, CNS decides
> to query the authoritative name servers with TCP instead of querying
> with UDP as it does by default, that's all.

Yeah - I misunderstood the original description and had in my mind CNS 
getting spoofed responses and causing the original querier to retry with 
TCP.  I understand now.

Thanks,

Sam
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


RE: Preparing for upcoming DNSSEC changes on 5/5

2010-05-05 Thread Lightner, Jeff
8:30 EDT 05/05/2010 and the world hasn't ended here yet.

We can celebrate Cinco de Mayo in peace.  If only I didn't detest
tequila.

Side note:  I've actually been to Puebla Mexico which is where the
battle that Cinco de Mayo commemorates took place.

-Original Message-
From: bind-users-bounces+jlightner=water@lists.isc.org
[mailto:bind-users-bounces+jlightner=water@lists.isc.org] On Behalf
Of Laws, Peter C.
Sent: Tuesday, May 04, 2010 6:09 PM
To: bind-us...@isc.org
Subject: RE: Preparing for upcoming DNSSEC changes on 5/5 

> It may be the person that suggested setting it was under the
> misapprehension that the two values would be the same but the quote
from
> the Java testing tool made it clear that is NOT the case.


I think this is it exactly.  But someone in the thread seemed pretty
certain that we needed to set our packet size to what the test reported
which just didn't make sense.

OK, so, bring on the End Of The Internet tomorrow!

Peter
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users
 
Proud partner. Susan G. Komen for the Cure.
 
Please consider our environment before printing this e-mail or attachments.
--
CONFIDENTIALITY NOTICE: This e-mail may contain privileged or confidential 
information and is for the sole use of the intended recipient(s). If you are 
not the intended recipient, any disclosure, copying, distribution, or use of 
the contents of this information is prohibited and may be unlawful. If you have 
received this electronic transmission in error, please reply immediately to the 
sender that you have received the message in error, and delete it. Thank you.
--
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Preparing for upcoming DNSSEC changes on 5/5

2010-05-05 Thread Alan Clegg
On 5/5/2010 1:32 PM, Lightner, Jeff wrote:
> 8:30 EDT 05/05/2010 and the world hasn't ended here yet.
> 
> We can celebrate Cinco de Mayo in peace.  If only I didn't detest
> tequila.
> 
> Side note:  I've actually been to Puebla Mexico which is where the
> battle that Cinco de Mayo commemorates took place.

Not so fast!  It's not 17:00 GMT yet.  Still ~4 more hours.

"**  The final transition to the DURZ will take place on
 **  J-Root, on 2010-05-05 between 1700--1900 UTC."

AlanC




signature.asc
Description: OpenPGP digital signature
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

RE: Preparing for upcoming DNSSEC changes on 5/5

2010-05-05 Thread Chris Thompson

On May 5 2010, Lightner, Jeff wrote:


8:30 EDT 05/05/2010 and the world hasn't ended here yet.


The switchover of j.root-servers.net to "DURZ" is scheduled for
17:00-19:00 UTC (see http://www.root-dnssec.org/ - or just try
"dig dnskey . @j.root-servers.net"). We aren't there yet ...


We can celebrate Cinco de Mayo in peace.  If only I didn't detest
tequila.

Side note:  I've actually been to Puebla Mexico which is where the
battle that Cinco de Mayo commemorates took place.


The (in fact largely successful) French invasion was apparently
triggered by Mexico defaulting on its debts. Watch out, Greece ...

--
Chris Thompson
Email: c...@cam.ac.uk
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: DNSSEC

2010-05-05 Thread Warren Kumari


On May 4, 2010, at 11:01 AM, Linux Addict wrote:

On Tue, May 4, 2010 at 10:43 AM, Stephane Bortzmeyer > wrote:

On Tue, May 04, 2010 at 10:27:25AM -0400,
 Linux Addict  wrote
 a message of 89 lines which said:

> lacks EDNS, defaults to 512"
> DNS reply size limit is at least 490"
> "Tested at 2010-05-04 14:21:02 UTC"

You edited the responses (which includes an IP address). Is it the IP
address of your resolver? There is may be a forwarder which does not
have EDNS.

Second possibility, a middlebox mangles your packets and deletes EDNS
options.


Actually that IP was our external NAT. One information I neglected  
to mention is bind forwards to a tinydns appliance which of course  
does not support DNSSEC for obvious reasons.


So what are my options now? Will the internet work for me tomorrow?   
At least  I have company in Google..


dig +short rs.dns-oarc.net txt @8.8.8.8
rst.x476.rs.dns-oarc.net.
rst.x485.x476.rs.dns-oarc.net.
rst.x490.x485.x476.rs.dns-oarc.net.
"64.233.168.94 DNS reply size limit is at least 490"
"64.233.168.94 lacks EDNS, defaults to 512"
"Tested at 2010-05-04 15:00:07 UTC"





Actually, we do support EDNS0, but usually only advertise larger  
buffers if needed.


For example,  if you retry this with +dnssec you should get:

wkum...@colon:/$ dig +dnssec  +short rs.dns-oarc.net txt @8.8.8.8
rst.x1247.rs.dns-oarc.net.
rst.x1257.x1247.rs.dns-oarc.net.
rst.x1228.x1257.x1247.rs.dns-oarc.net.
"74.125.44.94 DNS reply size limit is at least 1257"
"74.125.44.94 sent EDNS buffer size 1280"
"Tested at 2010-05-05 15:51:16 UTC"
wkum...@colon:/$


W





___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


--
If the bad guys have copies of your MD5 passwords, then you have way  
bigger problems than the bad guys having copies of your MD5 passwords.

-- Richard A Steenbergen


___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: DNSSEC

2010-05-05 Thread Linux Addict
On Wed, May 5, 2010 at 11:53 AM, Warren Kumari  wrote:

>
> On May 4, 2010, at 11:01 AM, Linux Addict wrote:
>
> On Tue, May 4, 2010 at 10:43 AM, Stephane Bortzmeyer wrote:
>
>> On Tue, May 04, 2010 at 10:27:25AM -0400,
>>  Linux Addict  wrote
>>  a message of 89 lines which said:
>>
>> > lacks EDNS, defaults to 512"
>> > DNS reply size limit is at least 490"
>> > "Tested at 2010-05-04 14:21:02 UTC"
>>
>> You edited the responses (which includes an IP address). Is it the IP
>> address of your resolver? There is may be a forwarder which does not
>> have EDNS.
>>
>> Second possibility, a middlebox mangles your packets and deletes EDNS
>> options.
>>
>>
> Actually that IP was our external NAT. One information I neglected to
> mention is bind forwards to a tinydns appliance which of course does not
> support DNSSEC for obvious reasons.
>
> So what are my options now? Will the internet work for me tomorrow?
>  At least  I have company in Google..
>
> dig +short rs.dns-oarc.net txt @8.8.8.8
> rst.x476.rs.dns-oarc.net.
> rst.x485.x476.rs.dns-oarc.net.
> rst.x490.x485.x476.rs.dns-oarc.net.
> "64.233.168.94 DNS reply size limit is at least 490"
> "64.233.168.94 lacks EDNS, defaults to 512"
> "Tested at 2010-05-04 15:00:07 UTC"
>
>
>
>
> Actually, we do support EDNS0, but usually only advertise larger buffers
> if needed.
>
> For example,  if you retry this with +dnssec you should get:
>
> wkum...@colon:/$ dig +dnssec  +short rs.dns-oarc.net txt @8.8.8.8
> rst.x1247.rs.dns-oarc.net.
> rst.x1257.x1247.rs.dns-oarc.net.
> rst.x1228.x1257.x1247.rs.dns-oarc.net.
> "74.125.44.94 DNS reply size limit is at least 1257"
> "74.125.44.94 sent EDNS buffer size 1280"
> "Tested at 2010-05-05 15:51:16 UTC"
> wkum...@colon:/$
>
>
> W
>
>


thanks for the clarification, I learned that after sometime.
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users