Re: Problems in views in a zone transfer

2011-05-26 Thread Luis Silva
Hi all,

I have this configuration in the zone.conf:

view "VIEW1" {

   match-clients {
  10.112.25.184; // IPs you want to access this view
  10.112.25.185; // Note: you must include the IP of
 // the master to receive notifications.
  };

  server 10.112.25.184 {keys view1-resolver.; };   // master

  zone "test.domain.pt" IN {
type slave;
notify no;
masters {10.112.25.184 port 40001;};
  };
};

view "VIEW2" {

   match-clients {
  10.112.25.184; // IPs you want to access this view
  10.112.25.186; // Note: you must include the IP of
 // the master to receive notifications.
  };

  server 10.112.25.184 {keys view2-resolver.; };   // master

  zone "test.domain.pt" IN {
type slave;
notify no;
masters {10.112.25.184 port 40001;};
  };
};


And I sent a notify request to this element, with a TSIG key associated with
View2, but apparently it didn't work since it was View 1 o requested the
zone transfer. Checking the logs I've discovered this:

26-May-2011 15:24:09.506 notify: info: client 10.112.25.184#47627: view
VIEW1: received notify for zone 'test.domain.pt': TSIG 'view2-resolver'

Am I doing something wrong?

Many thanks,
Luis


On Tue, May 24, 2011 at 3:13 AM, Mark Andrews  wrote:

>
> In message , Luis
> Silva wri
> tes:
> > Hi Steve,
> >
> > Many thanks for the answer. Just one question, when the master sends the
> > notification, does the slave checks all views and see if the tsig
> matches?
> >
> > Br,
> > Ls
>
> NOTIFY, UPDATE and QUERY messages are treated indentically in terms of
> view selection. i.e. first match.
>
> --
> Mark Andrews, ISC
> 1 Seymour St., Dundas Valley, NSW 2117, Australia
> PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org
>
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

ISC BIND 9.8.1b1 is now available

2011-05-26 Thread Evan Hunt
 __

Introduction

   BIND 9.8.1b1 is the first beta release of BIND 9.8.1, a maintenance
   release for BIND 9.8.

   Please see the CHANGES file in the source code release for a complete
   list of all changes.  See below for a list of changes since 9.8.0.

Download

   The latest versions of BIND 9 software can always be found
   on our web site at http://www.isc.org/downloads/all. There you will
   find additional information about each release, source code, and
   pre-compiled versions for certain operating systems.

Support

   Product support information is available on
   http://www.isc.org/services/support for paid support options. Free
   support is provided by our user community via a mailing list.
   Information on all public email lists is available at
   https://lists.isc.org/mailman/listinfo.

Thank You

   Thank you to everyone who assisted us in making this release possible.
   If you would like to contribute to ISC to assist us in continuing to
   make quality open source software, please visit our donations page at
   http://www.isc.org/supportisc.

Known issues in this release:

   * Named can fail to return a complete CNAME chain when the CNAME record
 and its target are both within zones for which the server is
 authoritative.  This only happens when named is configured to be
 recursive as well as authoritative, and only effects recursive
 clients.  The failure happens infrequently, but once it has started
 happening the only fix is to restart named.  The bug was fixed too
 late for inclusion in this beta release, but it will be included in
 the next release.

All changes since 9.8.0:

  3112. [doc]   Add missing descriptions of the update policy name
types "ms-self", "ms-subdomain", "krb5-self" and
"krb5-subdomain", which allow machines to update
their own records, to the BIND 9 ARM.
  
  3111. [bug]   Improved consistency checks for dnssec-enable and
dnssec-validation, added test cases to the
checkconf system test. [RT #24398]
  
  3110. [bug]   dnssec-signzone: Wrong error message could appear
when attempting to sign with no KSK. [RT #24369]
  
  3107. [bug]   dnssec-signzone: Report the correct number of ZSKs
when using -x. [RT #20852]
  
  3105. [bug]   GOST support can be suppressed by "configure
--without-gost" [RT #24367]
  
  3104. [bug]   Better support for cross-compiling. [RT #24367]
  
  3103. [bug]   Configuring 'dnssec-validation auto' in a view
instead of in the options statement could trigger
an assertion failure in named-checkconf. [RT #24382]
  
  3101. [bug]   Zones using automatic key maintenance could fail
to check the key repository for updates. [RT #23744]
  
  3100. [security]  Certain response policy zone configurations could
trigger an INSIST when receiving a query of type
RRSIG. [RT #24280]
  
  3099. [test]  "dlz" system test now runs but gives R:SKIPPED if
not compiled with --with-dlz-filesystem.  [RT #24146]
  
  3098. [bug]   DLZ zones were answering without setting the AA bit.
[RT #24146]
  
  3097. [test]  Add a tool to test handling of malformed packets.
[RT #24096]
  
  3096. [bug]   Set KRB5_KTNAME before calling log_cred() in
dst_gssapi_acceptctx(). [RT #24004]
  
  3095. [bug]   Handle isolated reserved ports in the port range.
[RT #23957]
  
  3094. [doc]   Expand dns64 documentation.
  
  3093. [bug]   Fix gssapi/kerberos dependencies [RT #23836]
  
  3092. [bug]   Signatures for records at the zone apex could go
stale due to an incorrect timer setting. [RT #23769]
  
  3091. [bug]   Fixed a bug in which zone keys that were published
and then subsequently activated could fail to trigger
automatic signing. [RT #22911]
  
  3090. [func]  Make --with-gssapi default [RT #23738]
  
  3088. [bug]   Remove bin/tests/system/logfileconfig/ns1/named.conf
and add setup.sh in order to resolve changing
named.conf issue.  [RT #23687]
  
  3087. [bug]   DDNS updates using SIG(0) with update-policy match
type "external" could cause a crash. [RT #23735]
  
  3086. [bug]   Running dnssec-settime -f on an old-style key will
now force an update to the new key format even if no
other change

Re: Problems in views in a zone transfer

2011-05-26 Thread Luis Silva
Hi all,

I think I have found a solution. Don't know if it is the best one:

For example, for view1 i added "!key view2-resolver;" to the match-clients.

view "VIEW1" {

   match-clients {
  !key view2-resolver.;
  10.112.25.184; // IPs you want to access this view
  10.112.25.185; // Note: you must include the IP of
 // the master to receive notifications.
  };

  server 10.112.25.184 {keys view1-resolver.; };   // master

  zone "test.domain.pt" IN {
type slave;
notify no;
masters {10.112.25.184 port 40001;};
  };
};

Is there a best way?

Regards and thanks,
Luis


On Thu, May 26, 2011 at 3:32 PM, Luis Silva  wrote:

> Hi all,
>
> I have this configuration in the zone.conf:
>
> view "VIEW1" {
>
>match-clients {
>   10.112.25.184; // IPs you want to access this view
>   10.112.25.185; // Note: you must include the IP of
>  // the master to receive notifications.
>   };
>
>   server 10.112.25.184 {keys view1-resolver.; };   // master
>
>   zone "test.domain.pt" IN {
> type slave;
> notify no;
> masters {10.112.25.184 port 40001;};
>};
> };
>
> view "VIEW2" {
>
>match-clients {
>   10.112.25.184; // IPs you want to access this view
>   10.112.25.186; // Note: you must include the IP of
>   // the master to receive notifications.
>   };
>
>   server 10.112.25.184 {keys view2-resolver.; };   // master
>
>   zone "test.domain.pt" IN {
> type slave;
> notify no;
> masters {10.112.25.184 port 40001;};
>   };
> };
>
>
> And I sent a notify request to this element, with a TSIG key associated
> with View2, but apparently it didn't work since it was View 1 o requested
> the zone transfer. Checking the logs I've discovered this:
>
> 26-May-2011 15:24:09.506 notify: info: client 10.112.25.184#47627: view
> VIEW1: received notify for zone 'test.domain.pt': TSIG 'view2-resolver'
>
> Am I doing something wrong?
>
> Many thanks,
> Luis
>
>
> On Tue, May 24, 2011 at 3:13 AM, Mark Andrews  wrote:
>
>>
>> In message , Luis
>> Silva wri
>> tes:
>> > Hi Steve,
>> >
>> > Many thanks for the answer. Just one question, when the master sends the
>> > notification, does the slave checks all views and see if the tsig
>> matches?
>> >
>> > Br,
>> > Ls
>>
>> NOTIFY, UPDATE and QUERY messages are treated indentically in terms of
>> view selection. i.e. first match.
>>
>> --
>> Mark Andrews, ISC
>> 1 Seymour St., Dundas Valley, NSW 2117, Australia
>> PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org
>>
>
>
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Bug in bind 9.7.3?

2011-05-26 Thread Frank Kloeker

Hi,

I using bind 9.7.3 as resolver in a slightly larger server farm with
some mail servers that use domain key validation.
If a try

# host -t TXT _adsp._domainkey.federalreserve.gov

bind dies with

May 26 19:59:02 resolv04 named[8237]: buffer.c:285: REQUIRE(b->used + 1
<= b->length) failed
May 26 19:59:02 resolv04 named[8237]: exiting (due to assertion failure)

This is reproducible and should only affected in 9.7.3. Can this be
possible?

kind regards

Frank

--
++
 Frank Kloeker
 Operations and Optimization of Internet Solutions (TZO)
 Vodafone D2 GmbH / Main Office Eschborn / Terminal B
++
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Problems in views in a zone transfer

2011-05-26 Thread Evan Hunt

>   server 10.112.25.184 {keys view1-resolver.; };   // master
> 
> Is there a best way?

Your way is fine.  You can also specify a key in the masters
statement, e.g:

view internal {
match-clients { !key external-key; internal-acl; };
zone example.com {
type slave;
masters { localhost key external-key; };

};
};

view external {
match-clients { any; };
zone example.com {
type master;

};
};

(Currently you can't specify a key in an also-notify statement but
that's being fixed in 9.9.)

-- 
Evan Hunt -- e...@isc.org
Internet Systems Consortium, Inc.
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


recursive server querying authoritative - timeout before trying next server?

2011-05-26 Thread Dan Pritts
Hi,

A question regarding BIND defaults.  I'd love the same answer for other 
nameserver software if anyone
cares to share.

I am a recursive nameserver.  I am looking for foo.bar.com.  i've learned from 
bar.com that foo.bar.com has
four NS records.  I've never tried to talk to these servers before.  

I send a query to the address listed in the first NS record.  I never get an 
answer?

How long do I wait before trying the next one?

I looked through several RFCs but couldn't find anything specific in the spec.  
RFC1035 mentions
that choosing this timeout would be up to nameserver implementors and suggests 
5-10 seconds as
a reasonable default.  

my google-fu is failing me on this one.  I found something at Microsoft that 
suggests that their DNS server 
waits 3 seconds although i may have interpreted that wrong.  I found a 
reference to a nameserver  called 
"deadwood" that defaults to 2 seconds.  But, I couldn't find anything on BIND.  

thanks,
danno
--
Dan Pritts, Sr. Systems Engineer
Internet2
office: +1-734-352-4953 | mobile: +1-734-834-7224

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Bug in bind 9.7.3?

2011-05-26 Thread Michael Sinatra



On Thu, 26 May 2011, Frank Kloeker wrote:


Hi,

I using bind 9.7.3 as resolver in a slightly larger server farm with
some mail servers that use domain key validation.
If a try

# host -t TXT _adsp._domainkey.federalreserve.gov

bind dies with

May 26 19:59:02 resolv04 named[8237]: buffer.c:285: REQUIRE(b->used + 1
<= b->length) failed
May 26 19:59:02 resolv04 named[8237]: exiting (due to assertion failure)

This is reproducible and should only affected in 9.7.3. Can this be
possible?


Yes, UC Berkeley had 7 of 8 anycast servers die in the same way, and I do 
recall seeing exactly that query earlier in the stream.  I think you're on 
to something, and I am looking into it further.


michael

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Bug in bind 9.7.3 [ and 9.8.0]

2011-05-26 Thread Jan-Piet Mens
> # host -t TXT _adsp._domainkey.federalreserve.gov
> 
> bind dies with
> 
> May 26 19:59:02 resolv04 named[8237]: buffer.c:285: REQUIRE(b->used + 1
> <= b->length) failed
> May 26 19:59:02 resolv04 named[8237]: exiting (due to assertion failure)
> 
> This is reproducible and should only affected in 9.7.3. Can this be
> possible?

I've just reproduced the crash with the same query on 9.8.0 (on Mac
OS/X, where BIND in fact took down the whole machine :-| As I'm sitting
in a hotel room I'm only trying this once more...)

I'm attaching my debug output, and Cc-ing this to bind-bugs.

Best regards [ & bis bald :-],

-JP

26-May-2011 20:57:29.882 starting BIND 9.8.0 -g
26-May-2011 20:57:29.882 built with '--prefix=/usr/local' '--with-libxml2' 
'--disable-threads' '--with-dlz-dlopen' '--with-gssapi' 
'--with-openssl=/usr/local/stow/openssl-1.0.0c/' '--with-pic'
26-May-2011 20:57:29.882 using up to 4096 sockets
26-May-2011 20:57:29.888 loading configuration from '/usr/local/etc/named.conf'
26-May-2011 20:57:29.890 reading built-in trusted keys from file 
'/usr/local/etc/bind.keys'
26-May-2011 20:57:29.890 statistics channel listening on 0.0.0.0#8053
26-May-2011 20:57:29.890 using default UDP/IPv4 port range: [49152, 65535]
26-May-2011 20:57:29.890 using default UDP/IPv6 port range: [49152, 65535]
26-May-2011 20:57:29.891 listening on IPv4 interface lo0, 127.0.0.1#53
26-May-2011 20:57:29.900 generating session key for dynamic DNS
26-May-2011 20:57:29.902 loading additional zones for view 'internal'
26-May-2011 20:57:29.902 none:0: open: 3bed2cb3a3acf7b6.nzf: file not found
26-May-2011 20:57:29.903 using built-in DLV key for view internal
26-May-2011 20:57:29.904 set up managed keys zone for view internal, file 
'managed-keys/3bed2cb3a3acf7b6a8ef408420cc682d5520e26976d354254f528c965612054f.mkeys'
26-May-2011 20:57:29.904 automatic empty zone: view internal: 0.IN-ADDR.ARPA
26-May-2011 20:57:29.904 automatic empty zone: view internal: 127.IN-ADDR.ARPA
26-May-2011 20:57:29.904 automatic empty zone: view internal: 
254.169.IN-ADDR.ARPA
26-May-2011 20:57:29.904 automatic empty zone: view internal: 
2.0.192.IN-ADDR.ARPA
26-May-2011 20:57:29.904 automatic empty zone: view internal: 
100.51.198.IN-ADDR.ARPA
26-May-2011 20:57:29.904 automatic empty zone: view internal: 
113.0.203.IN-ADDR.ARPA
26-May-2011 20:57:29.904 automatic empty zone: view internal: 
255.255.255.255.IN-ADDR.ARPA
26-May-2011 20:57:29.904 automatic empty zone: view internal: 
0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.IP6.ARPA
26-May-2011 20:57:29.904 automatic empty zone: view internal: 
1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.IP6.ARPA
26-May-2011 20:57:29.904 automatic empty zone: view internal: D.F.IP6.ARPA
26-May-2011 20:57:29.904 automatic empty zone: view internal: 8.E.F.IP6.ARPA
26-May-2011 20:57:29.904 automatic empty zone: view internal: 9.E.F.IP6.ARPA
26-May-2011 20:57:29.904 automatic empty zone: view internal: A.E.F.IP6.ARPA
26-May-2011 20:57:29.904 automatic empty zone: view internal: B.E.F.IP6.ARPA
26-May-2011 20:57:29.904 automatic empty zone: view internal: 
8.B.D.0.1.0.0.2.IP6.ARPA
26-May-2011 20:57:29.905 loading additional zones for view 'external'
26-May-2011 20:57:29.905 none:0: open: 3c4623849a49a539.nzf: file not found
26-May-2011 20:57:29.906 set up managed keys zone for view external, file 
'managed-keys/3c4623849a49a53911c4a3e48d8cead8a1858960bccdea7a1b978d73ec2f06d7.mkeys'
26-May-2011 20:57:29.907 loading additional zones for view 'extern-chaos'
26-May-2011 20:57:29.907 none:0: open: 2c25c0432e291924.nzf: file not found
26-May-2011 20:57:29.908 set up managed keys zone for view extern-chaos, file 
'managed-keys/2c25c0432e2919242e3fb4d511858dde3a6b0a5efdbdf2a79a228d5e00e08d74.mkeys'
26-May-2011 20:57:29.909 command channel listening on 127.0.0.1#953
26-May-2011 20:57:29.909 ignoring config file logging statement due to -g option
26-May-2011 20:57:29.910 zone a.aa/IN/internal: loaded serial 20083
26-May-2011 20:57:29.913 zone b.aa/IN/internal: loaded serial 5178
26-May-2011 20:57:29.913 zone sig0.aa/IN/internal: loaded serial 19
26-May-2011 20:57:29.914 zone temp.aa/IN/internal: loaded serial 42478
26-May-2011 20:57:29.914 master/sec.temp.aa/sec.temp.aa.zone.signed:10: 
signature has expired
26-May-2011 20:57:29.914 zone sec.temp.aa/IN/internal: loaded serial 2 (DNSSEC 
signed)
26-May-2011 20:57:29.915 zone test1.aa/IN/internal: sig-re-signing-interval 
less than 3 * refresh.
26-May-2011 20:57:29.915 zone test1.aa/IN/internal: loaded serial 2010100561 
(DNSSEC signed)
26-May-2011 20:57:29.915 zone 1.168.192.in-addr.arpa/IN/internal: loaded serial 
201011030
26-May-2011 20:57:29.916 zone bzl/IN/internal: loaded serial 1287682762
26-May-2011 20:57:29.916 zone mens.de/IN/internal: loaded serial 201101201
26-May-2011 20:57:29.917 zone keys/IN/internal: loaded serial 4
26-May-2011 20:57:29.917 zone rpz/IN/internal: loaded serial 4
26-May-2011 20:57:29.917 managed-keys-zone ./IN/intern

Re: Bug in bind 9.7.3?

2011-05-26 Thread Andris Kalnozols
> I using bind 9.7.3 as resolver in a slightly larger server farm with
> some mail servers that use domain key validation.
> If a try
> 
> # host -t TXT _adsp._domainkey.federalreserve.gov
> 
> bind dies with
> 
> May 26 19:59:02 resolv04 named[8237]: buffer.c:285: REQUIRE(b->used + 1
> <= b->length) failed
> May 26 19:59:02 resolv04 named[8237]: exiting (due to assertion failure)
> 
> This is reproducible and should only affected in 9.7.3. Can this be
> possible?

Also fails using 9.8.1b1:

May 26 12:25:33 lpans2 named[2425]: dnssec: info:   validating @0x2a0f740: 
federalreserve.gov SOA: no valid signature found
May 26 12:25:33 lpans2 named[2425]: dnssec: info:   validating @0x7f087808a0d0: 
9811cuitspl6a9216q7e07en9sejpgst.federalreserve.gov NSEC3: no valid signature 
found
May 26 12:25:33 lpans2 named[2425]: dnssec: info:   validating @0x7f087808a0d0: 
m2n0plcd7rkj15ehs9s21ufd2bppkhcp.federalreserve.gov NSEC3: no valid signature 
found
May 26 12:25:33 lpans2 named[2425]: dnssec: info:   validating @0x7f087808a0d0: 
k3i91guqugukqor9ui8f0u5hvk0ijo84.federalreserve.gov NSEC3: no valid signature 
found
May 26 12:25:33 lpans2 named[2425]: general: critical: buffer.c:285: 
REQUIRE(b->used + 1 <= b->length) failed, back trace
May 26 12:25:33 lpans2 named[2425]: general: critical: #0 0x41649b in 
assertion_failed()+0x4b
May 26 12:25:33 lpans2 named[2425]: general: critical: #1 0x5ab8ea in 
isc_assertion_failed()+0xa
May 26 12:25:33 lpans2 named[2425]: general: critical: #2 0x5ad159 in 
isc__buffer_putuint8()+0x59
May 26 12:25:33 lpans2 named[2425]: general: critical: #3 0x4ad48f in 
dns_ncache_addoptout()+0x20f
May 26 12:25:33 lpans2 named[2425]: general: critical: #4 0x52b168 in 
validated()+0x688
May 26 12:25:33 lpans2 named[2425]: general: critical: #5 0x5ccac8 in 
run()+0x1c8
May 26 12:25:33 lpans2 named[2425]: general: critical: #6 0x7f088bfdc8ba in 
_fini()+0x7f088b9f92f2
May 26 12:25:33 lpans2 named[2425]: general: critical: #7 0x7f088b9f402d in 
_fini()+0x7f088b410a65
May 26 12:25:33 lpans2 named[2425]: general: critical: exiting (due to 
assertion failure)

--
Andris
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Bug in bind 9.7.3?

2011-05-26 Thread Evan Hunt
> I using bind 9.7.3 as resolver in a slightly larger server farm with
> some mail servers that use domain key validation.

We're investigating the problem.

-- 
Evan Hunt -- e...@isc.org
Internet Systems Consortium, Inc.
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Bug in bind 9.7.3?

2011-05-26 Thread SM

Hi Frank,
At 11:33 26-05-2011, Frank Kloeker wrote:

I using bind 9.7.3 as resolver in a slightly larger server farm with
some mail servers that use domain key validation.
If a try

# host -t TXT _adsp._domainkey.federalreserve.gov


This occurs with BIND 9.8.0:

buffer.c:285: REQUIRE(b->used + 1 <= b->length) failed, back trace
#0 0x1c012a92 in assertion_failed()+0x42
#1 0x1c186957 in isc_assertion_failed()+0x27
#2 0x1c187e6d in isc__buffer_putuint8()+0x7d
#3 0x1c09f3e5 in dns_ncache_addoptout()+0x2e5
#4 0x1c10fce9 in ncache_adderesult()+0x69
#5 0x1c1102e5 in validated()+0x3a5
#6 0x1c1a2af0 in isc__taskmgr_dispatch()+0x1c0
#7 0x1c1a5f23 in evloop()+0x73
#8 0x1c1a619a in isc__app_ctxrun()+0x13a
#9 0x1c1a6242 in isc__app_run()+0x12
#10 0x1c013add in main()+0xbbd
#11 0x1c003917 in ___start()+0x77
#12 0x1c003897 in __start()+0x17
#13 0xcfbde8bc in __fini()+0xb3a2874c
exiting (due to assertion failure)

Regards,
-sm 


___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Bug in bind 9.7.3?

2011-05-26 Thread David Sparro

On 5/26/2011 2:33 PM, Frank Kloeker wrote:

Hi,

I using bind 9.7.3 as resolver in a slightly larger server farm with
some mail servers that use domain key validation.
If a try

# host -t TXT _adsp._domainkey.federalreserve.gov

bind dies with

May 26 19:59:02 resolv04 named[8237]: buffer.c:285: REQUIRE(b->used + 1
<= b->length) failed
May 26 19:59:02 resolv04 named[8237]: exiting (due to assertion failure)

This is reproducible and should only affected in 9.7.3. Can this be
possible?

kind regards

Frank



I had some of my 9.7.2-P3 boxes die the same way as well.

dig txt _policy._domainkey.federalreserve.gov
will trigger the crash as well.

Not all of my systems seem to be affected, though.  Those that are seem 
to be 100% reproducible.



--
Dave
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: recursive server querying authoritative - timeout before trying next server?

2011-05-26 Thread lst_hoe02

Zitat von Dan Pritts :


Hi,

A question regarding BIND defaults.  I'd love the same answer for  
other nameserver software if anyone

cares to share.


http://www.unbound.net/documentation/info_timeout.html

For sure Bind is doing something similar.

Regards

Andreas


___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Bug in bind 9.7.3?

2011-05-26 Thread Hauke Lampe

I can't get my 9.8.0-P1 resolvers to crash. The response from the
federalreserve.gov servers looks strange, though:

dig +dnssec +ignore +norec federalreserve.gov soa @ns5.frb.gov
;; Warning: Message parser reports malformed message packet.
;; WARNING: Messages has 57 extra bytes at end


Hauke.



signature.asc
Description: OpenPGP digital signature
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: Bug in bind 9.7.3?

2011-05-26 Thread Eivind Olsen
David Sparro wrote:

> I had some of my 9.7.2-P3 boxes die the same way as well.
> dig txt _policy._domainkey.federalreserve.gov
> will trigger the crash as well.
> Not all of my systems seem to be affected, though.  Those that are seem
> to be 100% reproducible.

Just out of curiosity - are anyone seeing these crashes with a BIND that
isn't doing DNSSEC validation?

(I've not been able to reproduce this on any non-validating server yet,
and my validating servers are running some other software at the moment -
I'll enable validation on my test systems and check if I can get them to
crash).

Regards
Eivind Olsen
eiv...@aminor.no


___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: recursive server querying authoritative - timeout before trying next server?

2011-05-26 Thread Kevin Darcy

On 5/26/2011 2:51 PM, Dan Pritts wrote:

Hi,

A question regarding BIND defaults.  I'd love the same answer for other 
nameserver software if anyone
cares to share.

I am a recursive nameserver.  I am looking for foo.bar.com.  i've learned from 
bar.com that foo.bar.com has
four NS records.  I've never tried to talk to these servers before.

I send a query to the address listed in the first NS record.  I never get an 
answer?

How long do I wait before trying the next one?

I looked through several RFCs but couldn't find anything specific in the spec.  
RFC1035 mentions
that choosing this timeout would be up to nameserver implementors and suggests 
5-10 seconds as
a reasonable default.

my google-fu is failing me on this one.  I found something at Microsoft that 
suggests that their DNS server
waits 3 seconds although i may have interpreted that wrong.  I found a 
reference to a nameserver  called
"deadwood" that defaults to 2 seconds.  But, I couldn't find anything on BIND.


Dan,
I don't know the exact timing, but with BIND it's on the order 
of tenths of a seconds (or 100s of milliseconds, if you prefer). 2 
seconds would be way too slow.


It shouldn't be hard to set up a test delegation with one "dead" 
nameserver and restart/query named a few times to see how long the 
failover takes...



- Kevin


P.S. You guys are practically next door to where I live (Pitt Twp), let 
me know if you need any help with this :-)


___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Bug in bind 9.7.3?

2011-05-26 Thread Evan Hunt
> Just out of curiosity - are anyone seeing these crashes with a BIND that
> isn't doing DNSSEC validation?

Yes.  But the problem domain has been corrected, so you won't be able to
reproduce it now.

In the interest of preventing this happening again, either by accident
(as it was in this case) or due to someone crafting a bad zone maliciously,
we will be releasing a patch to all affected versions of BIND 9 as soon as
I finish turning the crank.

-- 
Evan Hunt -- e...@isc.org
Internet Systems Consortium, Inc.
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Bug in bind 9.7.3?

2011-05-26 Thread Eivind Olsen
I wrote:

> (I've not been able to reproduce this on any non-validating server yet,
> and my validating servers are running some other software at the moment -
> I'll enable validation on my test systems and check if I can get them to
> crash).

I've so far not been able to reproduce it on a DNSSEC-validating BIND either.
I'm not saying there's no bug, only that I can't reproduce it myself
(probably, I'm doing something wrong).

Regards
Eivind Olsen
eiv...@aminor.no


___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Bug in bind 9.7.3?

2011-05-26 Thread Kevin Oberman
> Date: Fri, 27 May 2011 01:32:05 +0200
> From: "Eivind Olsen" 
> Sender: bind-users-bounces+oberman=es@lists.isc.org
> 
> I wrote:
> 
> > (I've not been able to reproduce this on any non-validating server yet,
> > and my validating servers are running some other software at the moment -
> > I'll enable validation on my test systems and check if I can get them to
> > crash).
> 
> I've so far not been able to reproduce it on a DNSSEC-validating BIND either.
> I'm not saying there's no bug, only that I can't reproduce it myself
> (probably, I'm doing something wrong).

You can't trigger it any longer. The .gov people imposed a work-around
that prevented the bug from being triggered. This was done quite a few
hours ago.
-- 
R. Kevin Oberman, Network Engineer
Energy Sciences Network (ESnet)
Ernest O. Lawrence Berkeley National Laboratory (Berkeley Lab)
E-mail: ober...@es.net  Phone: +1 510 486-8634
Key fingerprint:059B 2DDF 031C 9BA3 14A4  EADA 927D EBB3 987B 3751
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users