Re: BIND 9.10.4 may have a fatal crash defect.

2016-05-18 Thread Michael McNally
To our users:

Last week, reacting to reports from several users concerning assertion
failures in BIND 9.10.4, we took the unusual step of deprecating that
release while we investigated the problem: internal checks detecting a
state in the cache data structure that should have been impossible.

Thanks to several users who shared their crash data with us, our developers
have identified a problem. In the April 28 maintenance releases, the
internal representation and packing of the 'node' structure used in
the BIND cache was changed to reduce memory usage and increase performance.
The packing change caused some single-bit flag values that were protected
by one lock to share the same word in physical memory with flag values
protected by a different lock.  This creates the potential for a race
condition: two threads can modify the same flag value simultaneously,
leading to the inconsistent state that triggers the assertion failures.

Though this flaw can occur with any compiler, it's substantially more
likely to lead to a crash when BIND is compiled on the x86_64 platform
using the 'clang' compiler and a difference in the node structure between
BIND 9.9 and 9.10 makes the failure more likely to occur in BIND 9.10.
However, operators who are running one of the affected versions (BIND 9.9.9,
BIND 9.10.4, or BIND 9.9.9-S1) should replace those versions as soon as
updated releases are available.

Having identified what we believe to be the root cause, we are currently,
with the help of some volunteers who were previously experiencing crashes
in their operational environments, testing a candidate fix with (so far)
good results.  If no further failures occur, we expect to issue patch
releases for all of the April 28 releases (BIND 9.9.9, BIND 9.10.4, and
BIND 9.9.9-S1)

If you're wondering how this affects you, we hope this summary may help:

+  Nothing we have seen so far suggests that this issue is a
   deliberately exploitable security vulnerability.

+  Completely authoritative servers are at extremely low risk
   (approaching zero) from this defect.  Only recursive servers are at
   significant risk.  If you are operating an authoritative server which
   does not perform recursion for clients, you can probably safely wait for
   replacement versions to be released and upgrade when convenient.

+  We have only received reports of INSIST exceptions in BIND 9.10.4.

+  The change which exposed the race condition exists in BIND 9.9.9
   and BIND 9.9.9-S1 as well, but we have received no reports of
   INSIST errors occurring in those versions.  They are possible but
   have a much lower probability of occurrence.

+  If you are running a recursive resolver on an affected version
   of BIND, you are at moderate risk unless you are running BIND 9.10.4
   and your named binaries have been compiled with clang, in which case
   you are at higher risk.  You have several options, including:

-  revert to BIND 9.9.8-P4, 9.10.3-P4, or 9.9.8-S6 until the
   replacement versions are officially released

-  retrieve and compile the current 9_9 or 9_10 branch from
   the ISC public git repository, which will contain the candidate
   fix which we expect to release next week or contact ISC
   Support for assistance with a patch if you are a customer
   with a support contract.

-  use a watchdog process to manage 'named' and restart it if
   it exits; upgrade when replacement versions are released.

We'd like to once again thank the users who helped us to track this
down and apologize for the inconvenience it has caused to our users.

Michael McNally
ISC Support
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Trouble with option managed-keys

2016-05-18 Thread thl
Hello Mark,

yes, it works now. Thanks for your prompt help.

Thomas Hluchnik


Am Tuesday 17 May 2016 22:49:29 schrieb Mark Elkins:
> "managed-keys" is not a config option, try moving it outside the option
> stanza, eg
> 
> options {
> version ""; // remove this to allow version queries
> listen-on{ 127.0.0.1; 192.168.21.101; };
> listen-on-v6 { none; };
> empty-zones-enable yes;
> allow-query { clients; };
> allow-recursion { clients; };
> allow-transfer { none; };
> dnssec-enable yes;
> dnssec-validation yes;
> };
> 
> include "/etc/root_trusted_key";
> 
> logging {
> category lame-servers { null; };
> };
> ...
> 
> Personally, I just have the text from your included file directly in
> named.conf file itself.
> 
> Take a quick peek at http://dnssec.co.za
> 
> 
> 
> On 17/05/2016 22:35, t...@it-hluchnik.de wrote:
> > Hi all,
> > 
> > I have a problem with DNSSEC and I dont find a solution. Maybe someone can 
> > help me.
> > 
> > My intention is to run a bind which acts as DNSSEC enabled resolver for my 
> > internal LAN. This runs on a VirtualBox instance with OpenBSD 5.9. I got a 
> > precompiled package from OpenBSD, version is 9.10.3-P3.
> > 
> > Configuring my named, I mostly followed a howto from Calomel.org:
> > 
> > https://calomel.org/dns_bind.html
> > 
> > This is my named.conf:
> > 
> > root@bsd59n:/var/named/etc# egrep -v '^ *#|^ *$|^\/\/' named.conf
> > acl clients {
> > 127.0.0.0/8;
> > 192.168.21.0/24;
> > ::1;
> > };
> > options {
> > version ""; // remove this to allow version queries
> > listen-on{ 127.0.0.1; 192.168.21.101; };
> > listen-on-v6 { none; };
> > empty-zones-enable yes;
> > allow-query { clients; };
> > allow-recursion { clients; };
> > allow-transfer { none; };
> > include "/etc/root_trusted_key";
> > dnssec-enable yes;
> > dnssec-validation yes;
> > };
> > logging {
> > category lame-servers { null; };
> > };
> > zone "." {
> > type hint;
> > file "etc/root.hint";
> > };
> > zone "localhost" {
> > type master;
> > file "standard/localhost";
> > allow-transfer { localhost; };
> > };
> > zone "127.in-addr.arpa" {
> > type master;
> > file "standard/loopback";
> > allow-transfer { localhost; };
> > };
> > 
> > 
> > As my named is running in a chroot jail, /etc/root_trusted_key is 
> > /var/named/etc/root_trusted_key in reality.
> > 
> > root@bsd59n:/var/named/etc# root_trusted_key
> > managed-keys {
> >"." initial-key 257 3 8 
> > "AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjF 
> > FVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoX 
> > bfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaD 
> > X6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpz 
> > W5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relS 
> > Qageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulq QxA+Uk1ihz0= ";
> > };
> > 
> > root_trusted_key was generated as Calomel howto describes.
> > 
> > Now, when I try to start named with that config, I get a courious error 
> > message:
> > 
> > 
> > root@bsd59n:/var/named/etc# /usr/local/sbin/named -t /var/named -u _bind -U 
> > 4 -g
> > 17-May-2016 21:53:14.644 starting BIND 9.10.3-P3  -t /var/named 
> > -u _bind -U 4 -g
> > 17-May-2016 21:53:14.644 built with '--enable-shared' 
> > '--enable-filter-' '--enable-threads' '--with-libt
> > ool' '--without-readline' '--with-python=/usr/local/bin/python2.7' 
> > '--prefix=/usr/local' '--sysconfdir=/etc'
> >  '--mandir=/usr/local/man' '--infodir=/usr/local/info' 
> > '--localstatedir=/var' '--disable-silent-rules' '--di
> > sable-gtk-doc' 'CC=cc' 'CFLAGS=-O2 -pipe'
> > 17-May-2016 21:53:14.644 
> > 
> > 17-May-2016 21:53:14.644 BIND 9 is maintained by Internet Systems 
> > Consortium,
> > 17-May-2016 21:53:14.644 Inc. (ISC), a non-profit 501(c)(3) public-benefit
> > 17-May-2016 21:53:14.644 corporation.  Support and training for BIND 9 are
> > 17-May-2016 21:53:14.644 available at https://www.isc.org/support
> > 17-May-2016 21:53:14.644 
> > 
> > 17-May-2016 21:53:14.645 found 2 CPUs, using 2 worker threads
> > 17-May-2016 21:53:14.645 using 2 UDP listeners per interface
> > 17-May-2016 21:53:14.648 using up to 4096 sockets
> > 17-May-2016 21:53:14.681 loading configuration from '/etc/named.conf'
> > 17-May-2016 21:53:14.683 /etc/root_trusted_key:1: unknown option 
> > 'managed-keys'
> > 17-May-2016 21:53:14.686 loading configuration: failure
> > 17-May-2016 21:53:14.686 exiting (due to fatal error)
> > 
> > 
> > But named documentation and "man named.conf" both say that managed-keys 
> > were a valid option.
> > 
> > So what's wrong here? Thanks in advance for any help.
> > 
> > Thomas Hluchnik
> > 
> > 
> > 

resolution problem

2016-05-18 Thread Con Wieland
I am having an issue resolving www.cloudsat.cira.colostate.edu from 2 of my 
name servers. I have 2 others with identical configs that resolve correctly. A 
normal lookup shows a server fail but a +trace looks ok. Any ideas how to 
better troubleshoot the issue?

dig www.cloudsat.cira.colostate.edu @ns1.service.uci.edu

; <<>> DiG 9.3.4-P1 <<>> www.cloudsat.cira.colostate.edu @ns1.service.uci.edu
; (1 server found)
;; global options:  printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 1057
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0

;; QUESTION SECTION:
;www.cloudsat.cira.colostate.edu. INA

;; Query time: 4992 msec
;; SERVER: 128.200.1.201#53(128.200.1.201)
;; WHEN: Wed May 18 14:08:26 2016
;; MSG SIZE  rcvd: 49




dig www.cloudsat.cira.colostate.edu @ns1.service.uci.edu +trace

; <<>> DiG 9.3.4-P1 <<>> www.cloudsat.cira.colostate.edu @ns1.service.uci.edu 
+trace
; (1 server found)
;; global options:  printcmd
.   350434  IN  NS  d.root-servers.net.
.   350434  IN  NS  e.root-servers.net.
.   350434  IN  NS  c.root-servers.net.
.   350434  IN  NS  a.root-servers.net.
.   350434  IN  NS  l.root-servers.net.
.   350434  IN  NS  f.root-servers.net.
.   350434  IN  NS  g.root-servers.net.
.   350434  IN  NS  i.root-servers.net.
.   350434  IN  NS  j.root-servers.net.
.   350434  IN  NS  b.root-servers.net.
.   350434  IN  NS  k.root-servers.net.
.   350434  IN  NS  m.root-servers.net.
.   350434  IN  NS  h.root-servers.net.
;; Received 496 bytes from 128.200.1.201#53(128.200.1.201) in 2 ms

edu.172800  IN  NS  l.edu-servers.net.
edu.172800  IN  NS  a.edu-servers.net.
edu.172800  IN  NS  d.edu-servers.net.
edu.172800  IN  NS  f.edu-servers.net.
edu.172800  IN  NS  g.edu-servers.net.
edu.172800  IN  NS  c.edu-servers.net.
;; Received 284 bytes from 199.7.91.13#53(d.root-servers.net) in 73 ms

colostate.edu.  172800  IN  NS  dns1.colostate.edu.
colostate.edu.  172800  IN  NS  dns3.colostate.edu.
;; Received 119 bytes from 192.41.162.30#53(l.edu-servers.net) in 78 ms

www.cloudsat.cira.colostate.edu. 3600 IN CNAME  dpc.cira.colostate.edu.
dpc.cira.colostate.edu. 3600IN  A   129.82.109.62
;; Received 83 bytes from 129.82.103.121#53(dns1.colostate.edu) in 36 ms___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users