find the professional DNS hosting service

2010-11-29 Thread Jorg W Young
Hi list,

We are a company running for gaming.
Our website's rank is about 500 in Alexa.
We didn't have our own nameservers, have been using the domain
registry provider's nameservers for free.
Due to some problems, we want to change the DNS hosting.
The provider should have included the features:

* Professional DNS hosting service with 24*7 tech supports.
* Great stability and fast speed.
* Anti-DDoS and other DNS attacks.
* Having webadmin system which is ease to use for DNS records management.
* Audit mechanisms for different management accounts.
* It's better if there is DNS query statistics.

We have been greatest expecting the solid and professional DNS hosting
service, the price is no problem.
If there is any commercial hosting provider here you could please
contact with me.

Thanks.

Kind regrads,
Jorg W. Young
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: "broken trust chain" for non-existing AAAA records

2010-11-29 Thread lst_hoe02

Zitat von Mark Andrews :



In message <20101118131400.37717e5p5tard...@webmail.kwsoft.de>,  
lst_ho...@kwsof

t.de writes:

We are using Bind 9.7 at the border to resolve DNS queries for a small
LAN. After moving forward in using IPv6 we discovered many "broken
trust chain" errors in the bind log for non existing  records. One
example is

Nov 18 01:18:21 firewall named[27580]: error (broken trust chain)
resolving 'smtp.g.comcast.net//IN': 76.96.53.47#53
Nov 18 01:18:21 firewall named[27580]: error (broken trust chain)
resolving 'smtp.g.comcast.net//IN': 68.87.66.201#53
Nov 18 01:18:29 firewall named[27580]: error (broken trust chain)
resolving 'smtp.g.comcast.net//IN': 76.96.53.47#53
Nov 18 01:18:29 firewall named[27580]: error (broken trust chain)
resolving 'smtp.g.comcast.net//IN': 76.96.53.47#53

From what i can see there is no DNSSEC for comcast.net so this should
not happen and the A record just resolve fine. Any comment if this
should worry me?


A broken chain of trust can be *anywhere* in the trust chain.

Remember named has to prove that a answer should be insecure (not
signed) by looking for the absence of a DS RRset at a delegation
point above the name in question.



Sorry to come up with this again...
As far as i understand if i get a secure answer from the root-NS that  
there is no DS for the domain in inquestion (de. net. etc) there  
should be no "broken trust chain" further on because there is  
(validated) none?




If validation is working correctly you should be able to get a
validated negative response for DS net.  Note the "ad" in the flags
below which indicates that named thinks the answer is secure.



This is working, no problem but i still get "broken trust chain" for  
some non existing  records like for example this one:


; <<>> DiG 9.7.0-P1 <<>> +dnssec mail.cdu-freiburg.de 
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 54325
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 4096
;; QUESTION SECTION:
;mail.cdu-freiburg.de.  IN  


Nov 29 14:37:01 firewall named[976]: error (broken trust chain)  
resolving 'mail.cdu-freiburg.de//IN': 62.116.129.129#53



; <<>> DiG 9.7.0-P1 <<>> +dnssec de. DS
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 9033
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 4, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 4096
;; QUESTION SECTION:
;de.IN  DS

;; AUTHORITY SECTION:
.			3	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2010112801  
1800 900 604800 86400
.			3	IN	RRSIG	SOA 8 0 86400 2010120500 2010112723 40288 .  
HxKeNrwFeDxJDKKbBcQJQQ8aXf1sEs93J1rcm647RI3Qw3bpm9Dbs+xj  
aYki5iRhk0HHjDHm1Kj2gGXFdKlzMAExszF7js1IaCs+EgePqwSqDoHT  
lSduCn/hqlrklOqrwQkjYJhJkEYLJuhKVHTkilbC/w94RxVK3Uh5qEdJ K44=
de.			3	IN	RRSIG	NSEC 8 1 86400 2010120500 2010112723 40288 .  
DfHYLjIgdB3M+ib9Gn6anvtE27UTdZWX9nqvzf7ts4+X2TCVwlPmGtn7  
4EXwrDTfYNe5YEWh67MO/7mcUeZ2LcqqyQifIu0hJZf5RBmys0ml39JZ  
VNcSaWr7N5J3OV2GCJl366w24Eeuuje+xAJAyIfzE68LkMlnypjbrAAT mtA=

de. 3   IN  NSECdj. NS RRSIG NSEC


So it is validated that the TLD de. has no DS (-> NSEC) but Bind 9.7  
report a broken trust chain for the IPv6 record of  
"mail.cdu-freiburg.de". I have not even find something looking like  
DNSKEY further down the road so why the error is reported?


Many Thanks

Andreas







smime.p7s
Description: S/MIME Cryptographic Signature
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: about the zone file management

2010-11-29 Thread Lyle Giese
Or nsupdate

Lyle Giese
LCR Computer Services, Inc.

philippe.simo...@swisscom.com wrote:
> Hi
>
> if i good understand your question maybe the answer is :
>   rndc freeze / thaw
>
> Philippe
>
>
>   
>> -Original Message-
>> From: bind-users-bounces+philippe.simonet=swisscom@lists.isc.org
>> [mailto:bind-users-bounces+philippe.simonet=swisscom@lists.isc.org]
>> On Behalf Of Tech W.
>> Sent: lundi 29 novembre 2010 06:38
>> To: bind-users@lists.isc.org
>> Subject: about the zone file management
>>
>> Hello,
>>
>> I'm not sure, is it right for the management of zone files, with both dynamic
>> update and editting by hand?
>>
>> Thanks.
>>
>>
>>
>> ___
>> bind-users mailing list
>> bind-users@lists.isc.org
>> https://lists.isc.org/mailman/listinfo/bind-users
>> 
> ___
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users
>   

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: "broken trust chain" for non-existing AAAA records

2010-11-29 Thread Mark Andrews

Is this still with BIND 9.7.0-P1 or something more recent?  If it
is still BIND 9.7.0-P1 then please upgrade.  There really is no
point debugging validation failures in BIND 9.7.0-P1 anymore as the
validator has had really extensive changes since then.

Please remember, that unlike most of the rest of named, the validator
is still very much "new" code that hasn't had millions of users
exercising it in the real world like the rest of the code base has.
As a result it is still changing as we run into real world patterns
that have not been seen in the lab or by those of us that have been
running it in production for several years.  If you are validating
you really need to follow the releases we make.

For the record I can validate the answer in question with current code.

Mark


; <<>> DiG 9.6.0-APPLE-P2 <<>> mail.cdu-freiburg.de  @127.0.0.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 56812
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0

;; QUESTION SECTION:
;mail.cdu-freiburg.de.  IN  

;; Query time: 345 msec
;; SERVER: 127.0.0.1#53(127.0.0.1)
;; WHEN: Tue Nov 30 08:55:51 2010
;; MSG SIZE  rcvd: 38

; <<>> DiG 9.6.0-APPLE-P2 <<>> +dnssec de ds @127.0.0.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 45413
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 4, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 4096
;; QUESTION SECTION:
;de.IN  DS

;; AUTHORITY SECTION:
.   7641IN  SOA a.root-servers.net. 
nstld.verisign-grs.com. 2010112900 1800 900 604800 86400
.   7641IN  RRSIG   SOA 8 0 86400 2010120600 
2010112823 40288 . VXdtlcNzXMvVy0QGYYNv8euCsGn9Cb+aM+jhdMM2aABpShc7d8J8vBWS 
XrnFwmr1AoqV8LhcWYwSP3+Xu2XOs7HW3OY9IXYVoYDW2JLgCef9fYe/ 
MkwNxTQFuw2EwZFZTkkrxPLhPucuwiCRlBO/w1dl8Qak6F72lFG39UFt h9Q=
de. 7641IN  RRSIG   NSEC 8 1 86400 2010120600 
2010112823 40288 . JB4Fz8EGFxg5sY/KY5EK0ebcmLr03LnQSVtddkHxljSydz1RA/OoriNe 
xwp6GmYz6DpjuoDcBMW/9PDwYTl17SqPFwFQBw/6yRf+oXtHx5u7Q7zx 
4Kf/7zDxw8h2L/FeAa1WqLLbmhEBF2RcaV6Rv2OCj1VXIVffBgW/GDDw CD8=
de. 7641IN  NSECdj. NS RRSIG NSEC

;; Query time: 0 msec
;; SERVER: 127.0.0.1#53(127.0.0.1)
;; WHEN: Tue Nov 30 08:56:20 2010
;; MSG SIZE  rcvd: 447

In message <20101129144338.8595771dm36el...@webmail.kwsoft.de>, lst_ho...@kwsof
t.de writes:
> Zitat von Mark Andrews :
> 
> >
> > In message <20101118131400.37717e5p5tard...@webmail.kwsoft.de>,  
> > lst_ho...@kwsof
> > t.de writes:
> >> We are using Bind 9.7 at the border to resolve DNS queries for a small
> >> LAN. After moving forward in using IPv6 we discovered many "broken
> >> trust chain" errors in the bind log for non existing  records. One
> >> example is
> >>
> >> Nov 18 01:18:21 firewall named[27580]: error (broken trust chain)
> >> resolving 'smtp.g.comcast.net//IN': 76.96.53.47#53
> >> Nov 18 01:18:21 firewall named[27580]: error (broken trust chain)
> >> resolving 'smtp.g.comcast.net//IN': 68.87.66.201#53
> >> Nov 18 01:18:29 firewall named[27580]: error (broken trust chain)
> >> resolving 'smtp.g.comcast.net//IN': 76.96.53.47#53
> >> Nov 18 01:18:29 firewall named[27580]: error (broken trust chain)
> >> resolving 'smtp.g.comcast.net//IN': 76.96.53.47#53
> >>
> >> From what i can see there is no DNSSEC for comcast.net so this should
> >> not happen and the A record just resolve fine. Any comment if this
> >> should worry me?
> >
> > A broken chain of trust can be *anywhere* in the trust chain.
> >
> > Remember named has to prove that a answer should be insecure (not
> > signed) by looking for the absence of a DS RRset at a delegation
> > point above the name in question.
> 
> 
> Sorry to come up with this again...
> As far as i understand if i get a secure answer from the root-NS that  
> there is no DS for the domain in inquestion (de. net. etc) there  
> should be no "broken trust chain" further on because there is  
> (validated) none?
> 
> 
> > If validation is working correctly you should be able to get a
> > validated negative response for DS net.  Note the "ad" in the flags
> > below which indicates that named thinks the answer is secure.
> 
> 
> This is working, no problem but i still get "broken trust chain" for  
> some non existing  records like for example this one:
> 
> ; <<>> DiG 9.7.0-P1 <<>> +dnssec mail.cdu-freiburg.de 
> ; (1 server found)
> ;; global options: +cmd
> ;; Got answer:
> ;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 54325
> ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
> 
> ;; OPT PSEUDOSECTION:
> ; EDNS: version: 0, flags: do; udp: 4096
> ;; QUESTION SECTION:
> ;mail.cdu-freiburg.de.IN  
> 
> 
> Nov 29 14:37:01 firewall named[976]: error (broken trust chain)  
> resolving 'mail

Re: zone management plus automatic "nsupdate"

2010-11-29 Thread Chris Buxton
On Nov 28, 2010, at 3:25 AM, Christian Ruppert wrote:

> Hey guys,
> 
> we have many zones and a few admins who are able to edit those. Now
> we're looking for a good and free solution to a) track who changed what
> and b) to update the zone afterwards.
> 
> So we thought using git with a update hook could be a good one.
> With git we can see who changed what and when and the hook could use
> "git diff" with a simple diff parser to get the lines that shall be
> updated by nsupdate.
> 
> e.g.
> -ns  IN A 
> +ns  IN A 
> 
> The first line would be used for "update delete" and the second one for
> "update add".
> 
> Of course it takes some time realize this properly so my question is: Is
> there already something equivalent?
> Or do you guys have a better idea? How do you manage your zones?

Before rolling your own DNS management platform, take a look at the existing 
solutions. In addition to the commercial offerings, there is Carnegie Mellon's 
NetReg, which is apparently both credible and open source.

http://www.net.cmu.edu/netreg/

Disclaimers:  I've never used NetReg, and I work for a company that produces a 
commercial solution for DNS, DHCP, and IP address management (DDI).

Chris Buxton
BlueCat Networks
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: "broken trust chain" for non-existing AAAA records

2010-11-29 Thread lst_hoe02

Zitat von Mark Andrews :



Is this still with BIND 9.7.0-P1 or something more recent?  If it
is still BIND 9.7.0-P1 then please upgrade.  There really is no
point debugging validation failures in BIND 9.7.0-P1 anymore as the
validator has had really extensive changes since then.

Please remember, that unlike most of the rest of named, the validator
is still very much "new" code that hasn't had millions of users
exercising it in the real world like the rest of the code base has.
As a result it is still changing as we run into real world patterns
that have not been seen in the lab or by those of us that have been
running it in production for several years.  If you are validating
you really need to follow the releases we make.


I was afraid of that. If using a pre-packed system you get only  
(backported) security fixes most of the time and managing a self  
compiled packaging is the thing one tries to avoid in using a  
pre-packed system :-(
I have not suspected that the code changed that much with minor  
version numbers, but of course this may not apply to DNSSEC.

I will try if i can get a "clean" update from source.

Thanks for the help

Andreas




smime.p7s
Description: S/MIME Cryptographic Signature
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users