Re: Fwd: Re: Fwd: Re: Difference between netstat & rndc status

2011-07-05 Thread Cathy Almond
On 05/07/11 06:25, Bind wrote:
> -Original Message-
>  From: "Bind" 
>  To: "Mark Andrews" 
>  Date: Tue, 05 Jul 2011 09:55:03 +0430
>  Subject: Re: Fwd: Re: Difference between netstat & rndc status
> 
> 
> Thanks for your best support and answers all the time.
> Could u explain more about this list. how it built and when it refreshed?
> Regards
> 

When a client makes a query of a recursive server, sometimes the answer
can be given immediately from cache (or from authoritative data if the
server is both authoritative and recursive).  However, if the server
needs to perform iterative resolution of the query on behalf of the
client by sending it's own queries to authoritative servers
elsewhere,then it has to keep a record of the original client query
while this is happening so that it can respond when the answer is
available.

If the same client makes multiple queries for different names, then
these are all recorded separately since each is due its own answer.

When the server responds to the client, then the entry is removed from
the list.

If a client doesn't see the server response, it doesn't mean that the
entry isn't removed from the list, it means that the server responded
after the client timed out (this sometimes happens if there are problems
resolving the query).

Duplicate client queries are identified (for example if the client
retries) and stored as a single 'recursive client'.

If the list reaches the 'soft' limit (this is the number in the middle)
then named starts timing out (SERVFAIL) the longest waiting client
queries earlier than it would normally in order to make room for new
queries.

If the list reaches the 'hard' limit, then there is nowhere to put new
queries and named will not be able to process them.
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: whether to return RRSIG RRs

2011-07-05 Thread Tony Finch
Cathy Zhang  wrote:

> # Check direct query for RRSIG: If it's not cached with other records,
> # it should result in an empty response.
>
> Why shouldn't recursive server return RRSIG RRs to the client?

An RRSIG is part of the RRset that it signs, and the whole thing must
travel together as a unit. If you fetch the signature and the signed
records separately, you are likely to encounter a spurious mismatch when
the authoritative data changes.

Tony.
-- 
f.anthony.n.finchhttp://dotat.at/
Portland, Plymouth, Northwest Biscay: Southerly or southwesterly 4 or 5,
increasing 5 to 7 later. Slight or moderate. Rain or showers. Moderate or
good, occasionally poor.
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


BIND 9.8.0-P4

2011-07-05 Thread Mark Andrews

Introduction

   BIND 9.8.0-P4 is security patch for BIND 9.8.0.

   Please see the CHANGES file in the source code release for a complete
   list of all changes.

Download

   The latest versions of BIND 9 software can always be found on our web
   site at http://www.isc.org/downloads/all. There you will find
   additional information about each release, source code, and some
   pre-compiled versions for certain operating systems.

Support

   Product support information is available on
   http://www.isc.org/services/support for paid support options. Free
   support is provided by our user community via a mailing list.
   Information on all public email lists is available at
   https://lists.isc.org/mailman/listinfo.

Security Fixes

9.8.0-P4

 * Using Response Policy Zone (RPZ) with DNAME records and querying
   the subdomain of that label can cause named to crash. Now logs that
   DNAME is not supported. [RT #24766]
 * If named is configured to be both authoritative and resursive and
   receives a recursive query for a CNAME in a zone that it is
   authoritative for, if that CNAME also points to a zone the server
   is authoritative for, the recursive part of name will not follow
   the CNAME change and the response will not be a complete CNAME
   chain. [RT #24455]
 * Using Response Policy Zone (RPZ) to query a wildcard CNAME label
   with QUERY type SIG/RRSIG, it can cause named to crash. Fix is
   query type independant. [RT #24715] [CVE-2011-1907]
 * Change #2912 (see CHANGES) exposed a latent bug in the DNS message
   processing code that could allow certain UPDATE requests to crash
   named. This was fixed by disambiguating internal database
   representation vs DNS wire format data. [RT #24777] [CVE-2011-2464]

Thank You

   Thank you to everyone who assisted us in making this release possible.
   If you would like to contribute to ISC to assist us in continuing to
   make quality open source software, please visit our donations page at
   http://www.isc.org/supportisc.
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE:  +61 2 9871 4742  INTERNET: ma...@isc.org
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


BIND 9.6-ESV-R4-P3

2011-07-05 Thread Mark Andrews

Introduction

   BIND 9.6-ESV-R4-P3 is security patch for BIND 9.6-ESV-R4.

   Please see the CHANGES file in the source code release for a complete
   list of all changes.

Download

   The latest versions of BIND 9 software can always be found on our web
   site at http://www.isc.org/downloads/all. There you will find
   additional information about each release, source code, and some
   pre-compiled versions for certain operating systems.

Support

   Product support information is available on
   http://www.isc.org/services/support for paid support options. Free
   support is provided by our user community via a mailing list.
   Information on all public email lists is available at
   https://lists.isc.org/mailman/listinfo.

Security Fixes

9.6-ESV-R4-P3

 * Change #2912 (see CHANGES) exposed a latent bug in the DNS message
   processing code that could allow certain UPDATE requests to crash
   named. This was fixed by disambiguating internal database
   representation vs DNS wire format data. [RT #24777] [CVE-2011-2464]

Thank You

   Thank you to everyone who assisted us in making this release possible.
   If you would like to contribute to ISC to assist us in continuing to
   make quality open source software, please visit our donations page at
   http://www.isc.org/supportisc.
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE:  +61 2 9871 4742  INTERNET: ma...@isc.org
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Security Advisory: CVE-2011-2465 ISC BIND 9 Remote Crash with Certain RPZ Configurations

2011-07-05 Thread Barry Greene
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

ISC BIND 9 Remote Crash with Certain RPZ Configurations

Two defects were discovered in ISC's BIND 9 code. These defects only affect
BIND 9 servers which have recursion enabled and which use a specific
feature of the software known as Response Policy Zones (RPZ) and where the
RPZ zone contains a specific rule/action pattern.

CVE: CVE-2011-2465

Document Version:  2.0

Posting date: 05 Jul 2011

Program Impacted: BIND

Versions affected:  9.8.0, 9.8.0-P1, 9.8.0-P2 and 9.8.1b1 Other versions of
BIND 9 not listed here are not vulnerable to this problem.

Severity:  High

Exploitable:  Remotely

Description: 

A defect in the affected versions of BIND could cause the "named" process
to exit when queried, if the server has recursion enabled and was
configured with an RPZ zone containing certain types of records.
Specifically, these are any DNAME record and certain kinds of CNAME
records.

The patch release of BIND 9.8.0-P4 alters the behavior of RPZ zones by
ignoring any DNAME records in an RPZ zone, and correctly returning CNAME
records from RPZ zones.

Note that DNAME has no defined effect on the RPZ engine and its presence in
an RPZ zone is ignored. The definitive list of meaningful patterns in an
RPZ zone is given in the BIND 9 Administrative Reference Manual and also in
ISC Technical Note 2010-1.

CVSS Score: 7.8

CVSS Equation: (AV:N/AC:L/Au:N/C:N/I:N/A:C)

For more information on the Common Vulnerability Scoring System and to
obtain your specific environmental score please visit:
http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2

Workarounds: 

Do not put certain CNAME or any DNAME records into an RPZ zone file until
your software can be patched. If you subscribe to a service which supplies
your RPZ zone data, ensure that it does not contain any DNAME or certain
CNAME records. The CNAME records which must not be used are those which
signal the RPZ engine to rewrite query names. CNAME records which signal
the RPZ engine to forge an NXDOMAIN response are not affected by this
defect.

An example of an RPZ rule which causes a query name to be rewritten is:

*.malicious-domain.com CNAME walled-garden.isp.net

An example of an RPZ rule which causes an NXDOMAIN response to be returned
is:

*.malicious-domain.com CNAME .

Please refer to the BIND 9 Administrative Reference Manual or to ISC
Technical Note 2010-1 for more information about the Response Policy Zone
(RPZ) feature which was added to BIND 9 in Version 9.8.0.

Active exploits: 

ISC received reports of this software flaw and verified the report's
accuracy.

Solution: 

Upgrade to: 9.8.0-P4. (Note that 9.8.0-P3 is not affected but has been
replaced by 9.8.0-P4 due to CVE-2011-2464)

Download this version from the following location:

ISC releases of BIND 9 software may be downloaded from
http://www.isc.org/software/bind

If you do not obtain your BIND software directly from ISC, contact your
operating system or software vendor for an update.

If you are participating in ISC's Beta or release candidate (RC) program,
please upgrade. ISC Beta/RC testers are expected to remove vulnerable
versions and upgrade. No security advisories are issued for beta / release
candidates once the corresponding final release is made.

Acknowledgement: ISC thanks Bryce Moore from TELUS Security Labs for
finding and reporting this issue.

Document Revision History

Version 1.0 - 14 June 2011: Phase One Disclosure Date
Version 1.1 - 20 June 2011: Phase Two Disclosure Date with updates.
Version 1.2 - 21 June 2011: Updates on beta, RC, and clarity editing
Version 1.3 - 24 June 2011: Added document URL
Version 1.4 - 28 June 2011:  Updated Solution and description (revised to
recommend 9.8.0-P4 per CVE-2011-2464)
Version 1.5 - 4 July 2011:  Phase Three and Four Disclosure Date
Version 2.0 - 5 July 2011:  Public Disclosure

References:

Do you have Questions? Questions regarding this advisory should go to
security-offi...@isc.org.

Do you need Software Support? Questions on ISC's Support services or other
offerings should be sent to sa...@isc.org. More information on 

ISC's support and other offerings are available at:
http://www.isc.org/community/blog/201102/BIND-support

ISC Security Vulnerability Disclosure Policy Details of our current
security advisory policy and practice can be found here:
https://www.isc.org/security-vulnerability-disclosure-policy


Legal Disclaimer:: 

Internet Systems Consortium (ISC) is providing this notice on an "AS IS"
basis. No warranty or guarantee of any kind is expressed in this notice and
none should be implied. ISC expressly excludes and disclaims any warranties
regarding this notice or materials referred to in this notice, including,
without limitation, any implied warranty of merchantability, fitness for a
particular purpose, absence of hidden defects, or of non-infringement. Your
use or reliance on this notice or materials referred to in this notice is
at your own risk. ISC may change thi

Security Advisory: CVE-2011-2464 - ISC BIND 9 Remote packet Denial of Service against Authoritative and Recursive Servers

2011-07-05 Thread Barry Greene
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

ISC BIND 9 Remote packet Denial of Service against Authoritative and
Recursive Servers

A specially constructed packet will cause BIND 9 ("named") to exit,
affecting DNS service.

CVE: CVE-2011-2464

Document Version:  2.0

Posting date: 05 Jul 2011

Program Impacted: BIND

Versions affected:  9.6.3, 9.6-ESV-R4, 9.6-ESV-R4-P1, 9.6-ESV-R5b1 9.7.0,
9.7.0-P1, 9.7.0-P2, 9.7.1, 9.7.1-P1, 9.7.1-P2, 9.7.2, 9.7.2-P1, 9.7.2-P2,
9.7.2-P3, 9.7.3, 9.7.3-P1, 9.7.3-P2, 9.7.4b1 9.8.0, 9.8.0-P1, 9.8.0-P2,
9.8.0-P3, 9.8.1b1

Severity:  High

Exploitable:  Remotely

Description: 

A defect in the affected BIND 9 versions allows an attacker to remotely
cause the "named" process to exit using a specially crafted packet. This
defect affects both recursive and authoritative servers. The code location
of the defect makes it impossible to protect BIND using ACLs configured
within named.conf or by disabling any features at compile-time or run-time.

A remote attacker would need to be able to send a specially crafted packet
directly to a server running a vulnerable version of BIND. There is also
the potential for an indirect attack via malware that is inadvertently
installed and run, where infected machines have direct access to an
organization's nameservers.

CVSS Score: 7.8

(AV:N/AC:L/Au:N/C:N/I:N/A:C)

For more information on the Common Vulnerability Scoring System and to
obtain your specific environmental score please visit:
http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2

Workarounds: 

There are no known workarounds for publicly available servers.
Administrators of servers that are not publicly available may be able to
limit exposure via firewalls and packet filters.

Active exploits: 

ISC knows of no public tools to exploit this defect at the time of this
advisory.

Solution: 

Upgrade to: 9.6-ESV-R4-P3, 9.7.3-P3 or 9.8.0-P4.

Download these versions from the following locations:

ISC releases of BIND 9 software may be downloaded from
http://www.isc.org/software/bind

If you do not obtain your BIND software directly from ISC, contact your
operating system or software vendor for an update.

If you are participating in ISC's beta or release candidate (RC) programs,
please upgrade. ISC Beta/RC testers are expected to remove vulnerable
versions and upgrade. No security advisories are issued for beta / release
candidates once the corresponding final release is made.

In addition, 9.5.3b1 and 9.5.3rc1 are affected although ISC has not
released a final production version of 9.5.3. Note that BIND 9.5 is
End-of-Life, therefore if you are running a pre-release version of 9.5.3 we
recommend upgrading to a supported production version of BIND.

9.6-ESV-R4-P2 is not affected by any known attack vectors, but has been
replaced by 9.6-ESV-R4-P3 which carries a more complete fix

Other versions of BIND 9 not listed in this advisory are not vulnerable to
this problem.

Acknowledgements: 

ISC thanks Roy Arends from Nominet for pin-pointing the exact nature of the
vulnerability. We also thank Ramesh Damodaran of Infoblox for finding a
variation of the attack vector and Mats Dufberg of TeliaSonera Sweden for
confirming additional variants.

Document Revision History:

Version 1.0 - 14 June 2011:  Phase One Disclosure Date
Version 1.1 - 20 June 2011:  Phase Two Disclosure Date with updates.
Version 1.2 - 21 June 2011:  Updates on beta, RC, and clarity editing
Verison 1.3 - 21 June 2011:  Sent Hold Notices to Phase I constituents,
extended Acknowledgments
Version 1.4 - 23 June 2011:  Updated -P versions to include Advanced
Security Patches release to Phase I, and "Upgrade to:" versions
Version 1.5 - 24 June 2011:  Added document URL, sent schedule update to
Phase I constituents.
Version 1.6 - 28 June 2011:  Updated Versions Affected, extended
Acknowledgments, sent Phase I updates
Version 1.7 - 30 June 2011:  Updated attribution text.
Version 1.8 - 4 July 2011: Phase Three and Four Disclosure Date
version 2.0 - 5 July 2011:  Public Disclosure

Do you have Questions? Questions regarding this advisory should go to
security-offi...@isc.org.

Do you need Software Support? Questions on ISC's Support services or other
offerings should be sent to sa...@isc.org. More information on ISC's
support and other offerings are available at:
http://www.isc.org/community/blog/201102/BIND-support

ISC Security Vulnerability Disclosure Policy: Details of our current
security advisory policy and practice can be found here:
https://www.isc.org/security-vulnerability-disclosure-policy



Legal Disclaimer:: 

Internet Systems Consortium (ISC) is providing this notice on an "AS IS"
basis. No warranty or guarantee of any kind is expressed in this notice and
none should be implied. ISC expressly excludes and disclaims any warranties
regarding this notice or materials referred to in this notice, including,
without limitation, any implied warranty of merchantability, fitness for a
particular purpose, absence of hidden d

BIND 9.7.3-P3

2011-07-05 Thread Mark Andrews

Introduction

   BIND 9.7.3-P3 is security patch for BIND 9.7.3.

   Please see the CHANGES file in the source code release for a complete
   list of all changes.

Download

   The latest versions of BIND 9 software can always be found on our web
   site at http://www.isc.org/downloads/all. There you will find
   additional information about each release, source code, and some
   pre-compiled versions for certain operating systems.

Support

   Product support information is available on
   http://www.isc.org/services/support for paid support options. Free
   support is provided by our user community via a mailing list.
   Information on all public email lists is available at
   https://lists.isc.org/mailman/listinfo.

Security Fixes

9.7.3-P3

 * Change #2912 (see CHANGES) exposed a latent bug in the DNS message
   processing code that could allow certain UPDATE requests to crash
   named. This was fixed by disambiguating internal database
   representation vs DNS wire format data. [RT #24777] [CVE-2011-2464]

Thank You

   Thank you to everyone who assisted us in making this release possible.
   If you would like to contribute to ISC to assist us in continuing to
   make quality open source software, please visit our donations page at
   http://www.isc.org/supportisc.
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE:  +61 2 9871 4742  INTERNET: ma...@isc.org
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


cve-2011-2464 affected the 9.4-ESV-R4-P1?

2011-07-05 Thread iharrathi.ext
Hi all,
on the ISC website i don't see that the 9.4-ESV-R4-P1 is affected by the 
CVE-2011-2464 is it because it's not really affected? or it's affected but i 
don't see it on "versions affected" because the 9.4-ESV-R4-P1 has it's EOL date 
to jun2011.

Thanks.
Issam HARRATHI.


IMPORTANT.Les informations contenues dans ce message electronique y compris les 
fichiers attaches sont strictement confidentielles
et peuvent etre protegees par la loi.
Ce message electronique est destine exclusivement au(x) destinataire(s) 
mentionne(s) ci-dessus.
Si vous avez recu ce message par erreur ou s il ne vous est pas destine, 
veuillez immediatement le signaler  a l expediteur et effacer ce message 
et tous les fichiers eventuellement attaches.
Toute lecture, exploitation ou transmission des informations contenues dans ce 
message est interdite.
Tout message electronique est susceptible d alteration.
A ce titre, le Groupe France Telecom decline toute responsabilite notamment s 
il a ete altere, deforme ou falsifie.
De meme, il appartient au destinataire de s assurer de l absence de tout virus.

IMPORTANT.This e-mail message and any attachments are strictly confidential and 
may be protected by law. This message is
intended only for the named recipient(s) above.
If you have received this message in error, or are not the named recipient(s), 
please immediately notify the sender and delete this e-mail message.
Any unauthorized view, usage or disclosure ofthis message is prohibited.
Since e-mail messages may not be reliable, France Telecom Group shall not be 
liable for any message if modified, changed or falsified.
Additionally the recipient should ensure they are actually virus free.


___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: Slow list

2011-07-05 Thread Chris Thompson

On Jun 1 2011, Alan Clegg wrote:


On 6/1/2011 7:16 AM, /dev/rob0 wrote:

On Wed, Jun 01, 2011 at 09:54:04AM +0200, Jan-Piet Mens wrote:

Does anyone else find the bind-users list to be very slow?

[...]

I'll have operations take a look into what is causing the delay (it
doesn't happen on all mail to the list...)


Delays were very noticeable today for the bind-announce messages copied
to bind-users. From the Received headers, the delay seems to happen
between webster.isc.org and the next host: either mx.ams1.isc.org or
mx.pao1.isc.org for different messages. In the worst case, there was
delay of over 3 hours between webster receiving the message and passing
it on.

--
Chris Thompson
Email: c...@cam.ac.uk
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: cve-2011-2464 affected the 9.4-ESV-R4-P1?

2011-07-05 Thread Evan Hunt

> on the ISC website i don't see that the 9.4-ESV-R4-P1 is affected by the
> CVE-2011-2464 is it because it's not really affected? or it's affected
> but i don't see it on "versions affected" because the 9.4-ESV-R4-P1 has
> it's EOL date to jun2011.

To be very precise with my language:  It is not *exposed*.

The issue has two layers.  First, there's an underlying bug that's been
dormant in our code for a very long time, but there was no way to trigger
it... and, second, there's the trigger.  Actually, there are two separate
triggers: one was introduced in 9.6 and another in 9.7.  Neither of
them is in any version of 9.4.

So, we *will* be releasing 9.4-ESV-R5 soon, and it contains a fix for the
underlying bug.  But we didn't release a patch today because there's no
trigger.

--
Evan Hunt -- e...@isc.org
Internet Systems Consortium, Inc.
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Client cannot resolve communities.intel.com

2011-07-05 Thread Kevin Darcy

On 7/5/2011 12:28 AM, Fajar A. Nugraha wrote:

On Tue, Jul 5, 2011 at 10:29 AM, vr  wrote:

Hello,

I am trying to visit "http://communities.intel.com"; using Iceweasel on a
Debian desktop PC. No proxies.

My clients etc/resolv.conf point to my own Debian BIND 9.7.3 installed on a
separate server and installed from distribution packages (bind9
  1:9.7.3.dfsg-1~squeeze2).

 From myDesktop, NSLOOKUP fails but DIG shows a CNAME record. I see the same
results from the BIND server so I've included just the output from myDesktop
below. Also included below is my named.conf.

Do I have something obvious in BIND screwed up?

Quite possibly so. And you use dig incorrectly too.


me@myDesktop:~$ dig communities.intel.com ns.iotk.net

this should be

$ dig communities.intel.com @ns.iotk.net


;; ANSWER SECTION:
communities.intel.com.  207 IN  CNAME   intel-2.hs.llnwd.net.

so it finds the cname ...


;; AUTHORITY SECTION:
llnwd.net.  604800  IN  SOA localhost. root.localhost.
2008071301 604800 86400 2419200 604800

... but your DNS has a broken record for llnwd.net. It should be

;; ANSWER SECTION:
llnwd.net.  3600IN  SOA dns11.llnwd.net. 
hostmaster.llnwd.net. 210 900
300 604800 300

Yeah, there's some nasty stuff in that nameserver's version of the 
llnwd.net zone:


% dig llnwd.net ns +norec @99.30.25.1

; <<>> DiG 9.4.3-P3 <<>> llnwd.net ns +norec @99.30.25.1
;; global options:  printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 1589
;; flags: qr aa; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 2

;; QUESTION SECTION:
;llnwd.net. IN  NS

;; ANSWER SECTION:
llnwd.net.  604800  IN  NS  localhost.

;; ADDITIONAL SECTION:
localhost.  604800  IN  A   127.0.0.1
localhost.  604800  IN  ::1

;; Query time: 36 msec
;; SERVER: 99.30.25.1#53(99.30.25.1)
;; WHEN: Tue Jul  5 16:02:45 2011
;; MSG SIZE  rcvd: 94

Since the nameserver is responding authoritatively, the llnwd.net zone 
would appear to be defined as "type master" or "type slave", despite the 
fact that it was missing from the named.conf posted earlier.




- Kevin



___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Slow list

2011-07-05 Thread Dan Mahoney


On Tue, 5 Jul 2011, Chris Thompson wrote:

> On Jun 1 2011, Alan Clegg wrote:
> 
> > On 6/1/2011 7:16 AM, /dev/rob0 wrote:
> > > On Wed, Jun 01, 2011 at 09:54:04AM +0200, Jan-Piet Mens wrote:
> > > > > Does anyone else find the bind-users list to be very slow?
> [...]
> > I'll have operations take a look into what is causing the delay (it
> > doesn't happen on all mail to the list...)
> 
> Delays were very noticeable today for the bind-announce messages copied
> to bind-users. From the Received headers, the delay seems to happen
> between webster.isc.org and the next host: either mx.ams1.isc.org or
> mx.pao1.isc.org for different messages. In the worst case, there was
> delay of over 3 hours between webster receiving the message and passing
> it on.

We are working on this -- I believe we've discovered the problem 
internally, it seems to be a bad link between the handoff from mailman to 
postfix on a large list, exacerbated by several users whose domains return 
a SRVFAIL response.  (The irony here of course is that those users need 
the help the list could offer the most).

This seems to be because mailman asks postfix to do a "verify" (but not an 
SMTP VRFY) of the addresses as part of the VERP that it does.

One annoying thing that I should note is that removing those problem users 
and flushing the queues does NOT help.

-Dan

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


"Key : Delaying activation to match the DNSKEY TTL."

2011-07-05 Thread Paul B. Henson
I saw this message from dnssec-signzone around the time a previously
published key was due to be activated, and I'm not quite sure what it
means. Google is uncharacteristically silent about it ;).

If someone could offer an explanation of why the activation was delayed
and whether I should care it would be much appreciated, thanks...


-- 
Paul B. Henson  |  (909) 979-6361  |  http://www.csupomona.edu/~henson/
Operating Systems and Network Analyst  |  hen...@csupomona.edu
California State Polytechnic University  |  Pomona CA 91768
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: cve-2011-2464 affected the 9.4-ESV-R4-P1?

2011-07-05 Thread Mark Andrews

In message <20110705200619.gb99...@isc.org>, Evan Hunt writes:
> > on the ISC website i don't see that the 9.4-ESV-R4-P1 is affected by the
> > CVE-2011-2464 is it because it's not really affected? or it's affected
> > but i don't see it on "versions affected" because the 9.4-ESV-R4-P1 has
> > it's EOL date to jun2011.
> 
> To be very precise with my language:  It is not *exposed*.
> 
> The issue has two layers.  First, there's an underlying bug that's been
> dormant in our code for a very long time, but there was no way to trigger
> it... and, second, there's the trigger.  Actually, there are two separate
> triggers: one was introduced in 9.6 and another in 9.7.  Neither of
> them is in any version of 9.4.
> 
> So, we *will* be releasing 9.4-ESV-R5 soon, and it contains a fix for the
> underlying bug.  But we didn't release a patch today because there's no
> trigger.

Additionally we report if EoL code contains a security vulnerability
even if the only fix is to upgrade to a more recent version.  It
is not in ISC's, nor the public's interest, to leave vulnerable code
out there running.

Mark
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: "Key : Delaying activation to match the DNSKEY TTL."

2011-07-05 Thread Evan Hunt
On Tue, Jul 05, 2011 at 02:28:13PM -0700, Paul B. Henson wrote:
> I saw this message from dnssec-signzone around the time a previously
> published key was due to be activated, and I'm not quite sure what it
> means. Google is uncharacteristically silent about it ;).
> 
> If someone could offer an explanation of why the activation was delayed
> and whether I should care it would be much appreciated, thanks...

The key is being published now, and its activation date (i.e., when it
will start to be used to sign records) is in the near future: less than
the TTL of the DNSKEY record from now.

When the key starts signing, then someone could get an RRSIG generated by
that key... but, if that same someone had a cached copy of the DNSKEY
record from *before* the key was published, then validation could fail.

So, what it's telling you is that named won't start signing records with
this key until after the old DNSKEY record is guaranteed to have expired
out of all the resolver caches.

-- 
Evan Hunt -- e...@isc.org
Internet Systems Consortium, Inc.
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users