norecursion on external zone, but how do I allow CNAMEs to be fully resolved?

2011-05-20 Thread Tory M Blue
So I'm been having dns issues for a while, differing issues that pop
up and I knock them down , but another just came to my attention which
has me stumped.

My external zone config has allow-recursion ( none; );

However I have some 3rd party sites that I CNAME too. Akamai for
example, yes CNAME to CNAME , i know I know :)..

Well my primary NS servers will only provide the CNAME record:

;; QUESTION SECTION:
;cdn.domain.net.IN  A

;; ANSWER SECTION:
cdn.domain.net. 300 IN  CNAME   cdn.domain.net.edgesuite.net.

This causes all types of failures if just using dig, or Linux built in
lookup mechanism, or heck Perl or PHP methods as well. None of the
stated methods, know that they should now query
cdn.domain.net.edgesuite.net, so they provide the CNAME and SERVFAIL
or whatever.

Is there a way to allow any host to actually do a recursive lookup if
the request starts out on my domain,  in order to receive the A
record? Or do I just have to enable recursion on my external zone? The
problem there obviously, is now joe and frank can use my dns servers
because it performs a bit better than their ISP's. I don't want that,
but I do want to provide the extended information for that CNAME
record.


Oh ya still on "bind-9.7.2-P3" , fedora based system

I'm missing something, but since it's gosh knows who that will be
querying for cdn.domain.net there really is no ACL I can use, it has
to be all. And based on some failures, I have to do the leg work for
each client, i have to provide them the necessary information in that
one request.

Thanks again
Tory
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


RE: [dns-operations] Bind 9.8.0 intermittent problem with non-recursive responses

2011-05-20 Thread Marc Lampo
Implementation specific, probably, but with Bind it's the authoritative
part that wins !

(assuming the caching name server is DNSSEC enabled, possibly even
validating DNSSEC, then)

If Bind is caching for all,
but authoritative for some domains (I think this is called : "bogus for
some domains"),
a query for something in those domains where it is bogus,
gets a reply with "AA" set.
This regardless of the fact if the official/public domain has or has no
DNSSEC information itself.
--> so, the bogus name server will produce acceptable results
(yes, we - the Internet community - has been doing this for years,
 make our caching name server bogus for our own public domains)

But the problem is for "validating resolvers" (like validating forwarding
name server),
that use this name server :
because the validating resolver asks for DS records,
because the DS records are in the *parent* zone,
the validating resolver gets DS records (for public, signed, domains)
and will *insist* on replies it can validate (signed with correct key).
If the "bogus" domain is not signed, that will fail ...

(cfr http://www.eurid.eu/files/Insights_DNSSEC2.pdf,
 combine info on pages 15+16 (bogus NS) and 17+18 (forwarding NS)
)

Kind regards,

Marc Lampo
Security Officer
EURid


 

-Original Message-
From: Matthew Pounsett [mailto:m...@conundrum.com] 
Sent: 20 May 2011 06:49 AM
To: Carlos Vicente
Cc: bind-users@lists.isc.org
Subject: Re: [dns-operations] Bind 9.8.0 intermittent problem with
non-recursive responses


On 2011-05-20, at 00:35, Carlos Vicente wrote:

> That's news to me.  What's the failure mode? Does the server return
SERVFAIL, or does it not set the AD flag, or...?

It's another undefined condition in the RFCs, and so the outcome is
implementation specific.  I believe in the case of BIND the authoritative
algorithm wins out, and so you get RRSIGs and no AD flag.  I haven't
tested this one out personally, but I vaguely recall the problem coming up
on one of the DNS operations lists several months ago, so someone else may
have a more detailed answer.




___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: [dns-operations] Bind 9.8.0 intermittent problem with non-recursive responses

2011-05-20 Thread Phil Mayers

On 05/20/2011 05:56 AM, Matthew Pounsett wrote:


If, for some reason, you can't wait for your TTLs to expire, then
forwarding the relevant zones to your authoritative servers is a
better solution than slaving the zones.


How?

The whole point of stealth slaving is timely (NOTIFY/IXFR) updates of 
the data the "recursive" resolver will reply with. Waiting for $TTL is 
not timely in most cases.

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: norecursion on external zone, but how do I allow CNAMEs to be fully resolved?

2011-05-20 Thread Phil Mayers

On 05/20/2011 07:16 AM, Tory M Blue wrote:


This causes all types of failures if just using dig, or Linux built in
lookup mechanism, or heck Perl or PHP methods as well. None of the
stated methods, know that they should now query
cdn.domain.net.edgesuite.net, so they provide the CNAME and SERVFAIL
or whatever.


That's because stub resolvers are not recursive resolvers.

No-one should be querying your authoritative servers unless they are 
themselves a full recursive resolver, and those will handle this 
situation just fine.


Serving A records for other zones isn't valid anyway - for security 
reasons they'll be ignored (after all, you could be trying to poison the 
far end cache, and are not authoritative for the zones containing the 
CNAME target)


Can you give more info about how this is causing actual problems, versus 
problems with dig/perl/whatever?

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: norecursion on external zone, but how do I allow CNAMEs to be fully resolved?

2011-05-20 Thread Matus UHLAR - fantomas
On 19.05.11 23:16, Tory M Blue wrote:
> My external zone config has allow-recursion ( none; );
> 
> However I have some 3rd party sites that I CNAME too. Akamai for
> example, yes CNAME to CNAME , i know I know :)..
> 
> Well my primary NS servers will only provide the CNAME record:
> 
> ;; QUESTION SECTION:
> ;cdn.domain.net.  IN  A
> 
> ;; ANSWER SECTION:
> cdn.domain.net.   300 IN  CNAME   cdn.domain.net.edgesuite.net.
> 
> This causes all types of failures if just using dig, or Linux built in
> lookup mechanism, or heck Perl or PHP methods as well. None of the
> stated methods, know that they should now query
> cdn.domain.net.edgesuite.net, so they provide the CNAME and SERVFAIL
> or whatever.
> 
> Is there a way to allow any host to actually do a recursive lookup if
> the request starts out on my domain,  in order to receive the A
> record?

I doubt so. Even if there was, clients should not trust those responses.
Clients just have to find out about cdn.domain.net.edgesuite.net themselves.

> Or do I just have to enable recursion on my external zone? The
> problem there obviously, is now joe and frank can use my dns servers
> because it performs a bit better than their ISP's. I don't want that,
> but I do want to provide the extended information for that CNAME
> record.

That wouldn't help. They will use your server for all queries (you don't
want that) or they use their isp's server for all queries, and it will not
trust your server about cdn.domain.net.edgesuite.net.

-- 
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
We are but packets in the Internet of life (userfriendly.org)
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: norecursion on external zone, but how do I allow CNAMEs to be fully resolved?

2011-05-20 Thread Kevin Darcy
This is why people run separate views, separate instances, or separate 
devices for DNS resolution (= recursive, by necessity) versus DNS 
hosting (= non-recursive, best practice). If you run both hosting and 
resolution on the same nameserver instance but different views, you may 
need to be a little careful about how you resolve names in your own 
zones (don't recurse to the same view otherwise you may end up in an 
infinite loop situation!), and especially if you're publishing a NAT'ed 
address for your nameserver(s).


Within named.conf, you can limit recursive resolution by client address 
or by view. You can't limit it by zone, because, on deeper analysis, 
that actually doesn't make any sense anyway -- either you are 
authoritative for a given zone, in which case no recursion is necessary, 
or you're not authoritative, in which case recursive resolution is 
*always* necessary.




- Kevin


On 5/20/2011 2:16 AM, Tory M Blue wrote:

So I'm been having dns issues for a while, differing issues that pop
up and I knock them down , but another just came to my attention which
has me stumped.

My external zone config has allow-recursion ( none; );

However I have some 3rd party sites that I CNAME too. Akamai for
example, yes CNAME to CNAME , i know I know :)..

Well my primary NS servers will only provide the CNAME record:

;; QUESTION SECTION:
;cdn.domain.net.IN  A

;; ANSWER SECTION:
cdn.domain.net. 300 IN  CNAME   cdn.domain.net.edgesuite.net.

This causes all types of failures if just using dig, or Linux built in
lookup mechanism, or heck Perl or PHP methods as well. None of the
stated methods, know that they should now query
cdn.domain.net.edgesuite.net, so they provide the CNAME and SERVFAIL
or whatever.

Is there a way to allow any host to actually do a recursive lookup if
the request starts out on my domain,  in order to receive the A
record? Or do I just have to enable recursion on my external zone? The
problem there obviously, is now joe and frank can use my dns servers
because it performs a bit better than their ISP's. I don't want that,
but I do want to provide the extended information for that CNAME
record.


Oh ya still on "bind-9.7.2-P3" , fedora based system

I'm missing something, but since it's gosh knows who that will be
querying for cdn.domain.net there really is no ACL I can use, it has
to be all. And based on some failures, I have to do the leg work for
each client, i have to provide them the necessary information in that
one request.

Thanks again
Tory
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users






___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: [dns-operations] Bind 9.8.0 intermittent problem with non-recursive responses

2011-05-20 Thread Carlos Vicente
So, if I understand you correctly, if I were to sign my authoritative
zone and my caching nameserver, which is "bogus" for this zone, is
dnssec enabled, and also validating, and no other validating
nameserver is querying this bogus nameserver, then it's OK?

cv

On Thu, May 19, 2011 at 11:16 PM, Marc Lampo  wrote:
> Implementation specific, probably, but with Bind it's the authoritative
> part that wins !
>
> (assuming the caching name server is DNSSEC enabled, possibly even
> validating DNSSEC, then)
>
> If Bind is caching for all,
> but authoritative for some domains (I think this is called : "bogus for
> some domains"),
> a query for something in those domains where it is bogus,
> gets a reply with "AA" set.
> This regardless of the fact if the official/public domain has or has no
> DNSSEC information itself.
> --> so, the bogus name server will produce acceptable results
>    (yes, we - the Internet community - has been doing this for years,
>     make our caching name server bogus for our own public domains)
>
> But the problem is for "validating resolvers" (like validating forwarding
> name server),
> that use this name server :
> because the validating resolver asks for DS records,
> because the DS records are in the *parent* zone,
> the validating resolver gets DS records (for public, signed, domains)
> and will *insist* on replies it can validate (signed with correct key).
> If the "bogus" domain is not signed, that will fail ...
>
> (cfr http://www.eurid.eu/files/Insights_DNSSEC2.pdf,
>  combine info on pages 15+16 (bogus NS) and 17+18 (forwarding NS)
> )
>
> Kind regards,
>
> Marc Lampo
> Security Officer
> EURid
>
>
>
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: [dns-operations] Bind 9.8.0 intermittent problem with non-recursive responses

2011-05-20 Thread Carlos Vicente
> If, for some reason, you can't wait for your TTLs to expire, then forwarding 
> the relevant zones to your authoritative servers is a better solution than 
> slaving the zones.
>

But the server that is forwarding to the authoritative also caches the
response, so that won't help. I'm looking for something like a
'no-cache' option to put inside a zone definition of type "forward",
but I can't find it.

cv
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: dnssec-keygen with different activation date

2011-05-20 Thread Noel Rocha

I found this on our list:

https://lists.isc.org/mailman/htdig/bind-users/2010-April/079653.html

Made ​​more sense. :)

On 05/20/2011 08:41 PM, Noel Rocha wrote:

Hello,

I don't know if this is a problem ... but I found strange:

# date on server:
$ date
Fri May 20 20:31:23 BRT 2011

# key will be activated at 2011/05/20 20:35:00
$ dnssec-keygen -r '/dev/urandom' -a RSASHA1 -b 2048 -n ZONE -A 
20110520203500 'mydomain.com'

Kmydomain.com.+005+48738

# Showing activate date
$ cat Kmydomain.com.+005+48738.key | grep Activate
; Activate: 20110520203500 (Fri May 20 17:35:00 2011)

This (20110520203500)2011/05/20 20:35:00 isn't "Fri May 20 17:35:00 
2011." :(


Anyone have idea how to solve this problem?

Thanks in advance,
Noel Rocha



___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

dnssec-keygen with different activation date

2011-05-20 Thread Noel Rocha

Hello,

I don't know if this is a problem ... but I found strange:

# date on server:
$ date
Fri May 20 20:31:23 BRT 2011

# key will be activated at 2011/05/20 20:35:00
$ dnssec-keygen -r '/dev/urandom' -a RSASHA1 -b 2048 -n ZONE  -A 
20110520203500  'mydomain.com'

Kmydomain.com.+005+48738

# Showing activate date
$ cat Kmydomain.com.+005+48738.key | grep Activate
; Activate: 20110520203500 (Fri May 20 17:35:00 2011)

This (20110520203500)2011/05/20 20:35:00 isn't "Fri May 20 17:35:00 
2011." :(


Anyone have idea how to solve this problem?

Thanks in advance,
Noel Rocha

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: [dns-operations] Bind 9.8.0 intermittent problem with non-recursive responses

2011-05-20 Thread Mark Andrews

In message , Carlos Vicente 
writes:
> > If, for some reason, you can't wait for your TTLs to expire, then 
> > forwarding the relevant zones to your authoritative servers
>  is a better solution than slaving the zones.
> >
> 
> But the server that is forwarding to the authoritative also caches the
> response, so that won't help. I'm looking for something like a
> 'no-cache' option to put inside a zone definition of type "forward",
> but I can't find it.

There isn't one.
 
> cv
> ___
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: dnssec-keygen with different activation date

2011-05-20 Thread Chuck Swiger
On May 20, 2011, at 4:41 PM, Noel Rocha wrote:
> # Showing activate date
> $ cat Kmydomain.com.+005+48738.key | grep Activate
> ; Activate: 20110520203500 (Fri May 20 17:35:00 2011)
> 
> This (20110520203500)2011/05/20 20:35:00 isn't "Fri May 20 17:35:00 2011." :(
> 
> Anyone have idea how to solve this problem?

There isn't a problem: 20:35 GMT is 17:35 BRT.

As a general rule, ISC software stores timestamps in GMT rather than in the 
local timezone to avoid all sorts of nonportable painful issues with local 
timezone conversions.

Regards,
-- 
-Chuck

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users