RE: Question about dynamic IPv6-PTR-Generation

2016-08-26 Thread Woodworth, John R
> Hi list
>
> I'm searching a way to respond to IPv6-PTR-Queries like the "$GENERATE"
> -mechanism for IPv4 has done it.
>
> I read about Delegation, self-registration with "tcp-self" or using
> Wildcards with the disadvantage, that every query has the same response.
> Is there a (planned) way, to generate reverse-responses "on-the-fly"
> with bind? I'm using the latest bind (9.10.4-P2).
>

Tom,

** Full disclosure:  I am directly involved in the Internet-Draft (I-D)
referenced in the below response.

Although this does not necessarily help you today, some colleagues and I
are working on a new standard which addresses this problem in a more
general way by introducing a new RR type.  It provides several features
beyond simply extending the $GENERATE directive to enormous proportions
such as: allowing AXFR transfers of the "intent" of BULK record
generation.  If you are interested in learning more about this, please
follow the link in my signature below.

We appreciate any comments/ suggestions regarding this draft.


Regards,
John
--
John Woodworth  CenturyLink, Inc.
  Q. Can a $GENERATE work for DNS on a /64 of reverse??
  A. BULK CAN
[ http://tools.ietf.org/html/draft-woodworth-bulk-rr-02 ]


> Many thanks for your help.
> Kind regards,
> Tom
> ___
> Please visit https://lists.isc.org/mailman/listinfo/bind-users to
> unsubscribe from this list
>
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users
>
-- THESE ARE THE DROIDS TO WHOM I REFER:
This communication is the property of CenturyLink and may contain confidential 
or privileged information. Unauthorized use of this communication is strictly 
prohibited and may be unlawful. If you have received this communication in 
error, please immediately notify the sender by reply e-mail and destroy all 
copies of the communication and any attachments.
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


DNSSEC and time.nist.gov

2016-08-26 Thread Rok Potočnik via bind-users
I've noticed a spike of ServFail responses on our caching resolvers due 
to some DNSSEC issues on time.nist.gov (CNAME to ntp1.glb.nist.gov). If 
anyone of you guys has a direct contact would you be so kind and notify 
them...


http://dnsviz.net/d/time.nist.gov/dnssec/

--
BR, Rok
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Question about dynamic IPv6-PTR-Generation

2016-08-26 Thread Tom

Many thanks for your quick feedback.

This is the configuration-option, where I'm searching for. But probably 
this will take some time, until it's accepted, tested, 
implemented...etc. What do you propose in the meantime instead of using 
wildcards or allow the clients to register themselves or making static 
PTR-entries? How does other companies handle this issue?


Kind regards,

Tom



On 08/26/2016 09:17 AM, Woodworth, John R wrote:

Hi list

I'm searching a way to respond to IPv6-PTR-Queries like the "$GENERATE"
-mechanism for IPv4 has done it.

I read about Delegation, self-registration with "tcp-self" or using
Wildcards with the disadvantage, that every query has the same response.
Is there a (planned) way, to generate reverse-responses "on-the-fly"
with bind? I'm using the latest bind (9.10.4-P2).


Tom,

** Full disclosure:  I am directly involved in the Internet-Draft (I-D)
referenced in the below response.

Although this does not necessarily help you today, some colleagues and I
are working on a new standard which addresses this problem in a more
general way by introducing a new RR type.  It provides several features
beyond simply extending the $GENERATE directive to enormous proportions
such as: allowing AXFR transfers of the "intent" of BULK record
generation.  If you are interested in learning more about this, please
follow the link in my signature below.

We appreciate any comments/ suggestions regarding this draft.


Regards,
John
--
John Woodworth  CenturyLink, Inc.
   Q. Can a $GENERATE work for DNS on a /64 of reverse??
   A. BULK CAN
[ http://tools.ietf.org/html/draft-woodworth-bulk-rr-02 ]



Many thanks for your help.
Kind regards,
Tom
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to
unsubscribe from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


-- THESE ARE THE DROIDS TO WHOM I REFER:
This communication is the property of CenturyLink and may contain confidential 
or privileged information. Unauthorized use of this communication is strictly 
prohibited and may be unlawful. If you have received this communication in 
error, please immediately notify the sender by reply e-mail and destroy all 
copies of the communication and any attachments.


___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Question about dynamic IPv6-PTR-Generation

2016-08-26 Thread Daniel Stirnimann
Hello Tom

I only know of Knot having a feature available for this use case:

https://www.knot-dns.cz/docs/2.x/html/configuration.html#synth-record-automatic-forward-reverse-records

Daniel

On 26.08.16 11:51, Tom wrote:
> Many thanks for your quick feedback.
> 
> This is the configuration-option, where I'm searching for. But probably 
> this will take some time, until it's accepted, tested, 
> implemented...etc. What do you propose in the meantime instead of using 
> wildcards or allow the clients to register themselves or making static 
> PTR-entries? How does other companies handle this issue?
> 
> Kind regards,
> 
> Tom
> 
> 
> 
> On 08/26/2016 09:17 AM, Woodworth, John R wrote:
>>> Hi list
>>>
>>> I'm searching a way to respond to IPv6-PTR-Queries like the "$GENERATE"
>>> -mechanism for IPv4 has done it.
>>>
>>> I read about Delegation, self-registration with "tcp-self" or using
>>> Wildcards with the disadvantage, that every query has the same response.
>>> Is there a (planned) way, to generate reverse-responses "on-the-fly"
>>> with bind? I'm using the latest bind (9.10.4-P2).
>>>
>> Tom,
>>
>> ** Full disclosure:  I am directly involved in the Internet-Draft (I-D)
>> referenced in the below response.
>>
>> Although this does not necessarily help you today, some colleagues and I
>> are working on a new standard which addresses this problem in a more
>> general way by introducing a new RR type.  It provides several features
>> beyond simply extending the $GENERATE directive to enormous proportions
>> such as: allowing AXFR transfers of the "intent" of BULK record
>> generation.  If you are interested in learning more about this, please
>> follow the link in my signature below.
>>
>> We appreciate any comments/ suggestions regarding this draft.
>>
>>
>> Regards,
>> John
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Need of caching on bind server

2016-08-26 Thread Barry Margolin
In article ,
 Harshith Mulky  wrote:

> Thank you John, Mukund, Barry and Dave for your insights and answers on this 
> Topic.
> 
> 
> @Dave, Lets say we have a Web Page cached(when queried by User 1) and the 
> webpage has either moved the Link ( accessing the same Link from a different 
> user would result in '504 Timeout' as it was cached by the Server)
> 
> So do we mean, every other user when querying the web page still gets the 
> same link which was cached and now not reachable?
> 
> There should be some way, this should not happen
> 
> [P.S: I was trying a web link yesterday, and i got into this issue, but I was 
> still able to open the cached web page link 2 days ago]

Caching web pages has nothing to do with DNS caching.

-- 
Barry Margolin
Arlington, MA
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Question about dynamic IPv6-PTR-Generation

2016-08-26 Thread Matus UHLAR - fantomas

On 26.08.16 07:34, Tom Tom wrote:

I'm searching a way to respond to IPv6-PTR-Queries like the
"$GENERATE"-mechanism for IPv4 has done it.


why? configuring single IP addresses or taking them from DHCP is easier than
creating new useless mechanism.

--
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
Linux is like a teepee: no Windows, no Gates and an apache inside...
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Question about dynamic IPv6-PTR-Generation

2016-08-26 Thread Matthew Pounsett
On 26 August 2016 at 13:45, Matus UHLAR - fantomas 
wrote:

> On 26.08.16 07:34, Tom Tom wrote:
>
>> I'm searching a way to respond to IPv6-PTR-Queries like the
>> "$GENERATE"-mechanism for IPv4 has done it.
>>
>
> why? configuring single IP addresses or taking them from DHCP is easier
> than
> creating new useless mechanism.
>

That's not necessarily true for IPv6, where even a modest network could
have trillions of addresses that may need PTR records.
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: Question about dynamic IPv6-PTR-Generation

2016-08-26 Thread Matthew Pounsett
On 26 August 2016 at 15:41, Matus UHLAR - fantomas 
wrote:

>
>>> On 26.08.16 14:01, Matthew Pounsett wrote:
>
>> That's not necessarily true for IPv6, where even a modest network could
>> have trillions of addresses that may need PTR records.
>>
>
> that's exactly why using $GENERATE and/or creating new mechanism for that
> is
> useless.
>

$GENERATE is useless in that situation, yes.  But something that provides
rules to a name server to synthesize responses (vs actually generating all
18446744073709551616 PTRs in a /64) is not.
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: Question about dynamic IPv6-PTR-Generation

2016-08-26 Thread Matus UHLAR - fantomas

On 26.08.16 07:34, Tom Tom wrote:

I'm searching a way to respond to IPv6-PTR-Queries like the
"$GENERATE"-mechanism for IPv4 has done it.



On 26 August 2016 at 13:45, Matus UHLAR - fantomas 
wrote:

why? configuring single IP addresses or taking them from DHCP is easier
than creating new useless mechanism.


On 26.08.16 14:01, Matthew Pounsett wrote:

That's not necessarily true for IPv6, where even a modest network could
have trillions of addresses that may need PTR records.


that's exactly why using $GENERATE and/or creating new mechanism for that is
useless.
We better need something to identify network itself (even /64 is too much of
IPS) and not necessarily each IPs within that network.

--
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
"To Boot or not to Boot, that's the question." [WD1270 Caviar]
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Question about dynamic IPv6-PTR-Generation

2016-08-26 Thread Robert Edmonds
Tom wrote:
> This is the configuration-option, where I'm searching for. But probably this
> will take some time, until it's accepted, tested, implemented...etc. What do
> you propose in the meantime instead of using wildcards or allow the clients
> to register themselves or making static PTR-entries? How does other
> companies handle this issue?

A very popular option is to only create or delegate IPv6 PTR entries for
hosts with static address assignments, and to return NXDOMAIN for
address space used for dynamic address assignments.

-- 
Robert Edmonds
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Question about dynamic IPv6-PTR-Generation

2016-08-26 Thread John Levine
>A very popular option is to only create or delegate IPv6 PTR entries for
>hosts with static address assignments, and to return NXDOMAIN for
>address space used for dynamic address assignments.

I talk to a lot of large providers at M3AAWG and that's the consensus
about what to do.  If it doesn't have a static address, it's not a
server and it doesn't need rDNS.

R's,
John
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: DNS views TSIG and zone xfers

2016-08-26 Thread Bob Harold
On Thu, Aug 25, 2016 at 6:25 PM, project722  wrote:

> Actually, I got to thinking about this. The "other_allowed_ns" ACL is in
> the global options, along with an "allow-transfer" for that ACL. So, I
> *think* they will still be able to zone transfer via the global option
> based on simply IP. BUT...since I have multiple views, which zones from
> which views get sent over to these servers and how will they know how to
> handle the info if zones from both views get sent. Would something like
> this help:
>
> allow-transfer { other_allowed_ns; view "external"; };
>
> So they only get sent the zones from the external view?
>
> On Thu, Aug 25, 2016 at 5:14 PM, project722  wrote:
>
>> I have successfully setup TSIG keys for "views" using a DNS master/server
>> pair. Zone transfers are working as expected between the 2 servers for each
>> view. Before we go live into production with this I need some clarification
>> on a couple things. Our prod servers are also allowing zone transfers to a
>> few other servers besides the slave server. We have an acl setup that looks
>> similar to this:
>>
>>

> {
>> x.x.x.x; // This is our Secondary DNS server
>> 127.0.0.1; // localhost can make zone transfers
>> x.x.x.x/24; // Server Farm Range is allowed to make zone-transfers
>> x.x.x.x/24; // NAT pool for internal DNS server Zone Transfers
>> x.x.x.x/24; // NAT pool for internal DNS server Zone Transfers
>> x.x.x.x/24; // NAT pool for internal DNS server Zone Transfers
>> }; // end of "other_xfer_allowed" ACL
>>
>> And in the "allow transfer" statement we have included that ACL. My
>> question is:
>>
>> Now that we are using TSIG, will I need to get with the admins of all
>> these other servers and provide them my TSIG key so they can request zone
>> transfers? I would think somehting like that needs to be done since it was
>> required to be configured on slave server, but I am not sure. I'd rather do
>> an IP based control just for these other servers instead of TSIG but I am
>> not sure how that would look or how to set that up in the context of my
>> config. How can I tell my conf to NOT force these other xfer allowed
>> servers to use TSIG and use IP only? This gets complicated when you start
>> throwing views into the mix.
>>
>> acl internal {
>> 192.168.200.0/24; // corpnet
>> };
>>
>> acl external {
>> 192.168.201.0/24;
>> 192.168.202.0/24;
>> };
>>
>>
>>  other_xfer_allowed_ns {
>> x.x.x.x; // This is our Secondary DNS server
>> 127.0.0.1; // localhost can make zone transfers
>> x.x.x.x/24; // Server Farm Range is allowed to make zone-transfers
>> x.x.x.x/24; // NAT pool for internal DNS server Zone Transfers
>> x.x.x.x/24; // NAT pool for internal DNS server Zone Transfers
>> x.x.x.x/24; // NAT pool for internal DNS server Zone Transfers
>> }; // end of "other_xfer_allowed" ACL
>>
>>
>> key "tsigkey" {
>> algorithm HMAC-SHA512;
>> secret   "x";
>> };
>>
>> key "tsigkeyext" {
>> algorithm HMAC-SHA512;
>> secret  "xx";
>> };
>>
>>
>> view "corpnet" {
>>   match-clients { internal; key tsigkey;
>> };
>>
>>   //IP of slave server
>>   server 192.168.173.78 {
>>   keys { tsigkey; };
>> };
>>
>>   also-notify {
>>   192.168.173.78;
>> };
>>
>>   zone "." IN {
>>   type hint;
>>   file "named.ca";
>> };
>>
>>   zone"internalzone1.com" IN {
>>   type master;
>>   file "internalzone1.com";
>>   allow-transfer { key tsigkey; };
>> };
>>
>>   zone"sharedzone.com" IN {
>>   type master;
>>   file "sharedzone1.com";
>>   allow-transfer { key tsigkey; };
>> };
>>
>>  include "/etc/named.rfc1912.zones";
>>   include "/etc/named.root.key";
>> };
>>
>>
>> view "external" {
>>   match-clients { external; key tsigkeyext; };
>>
>>   //IP of slave server
>>   server 192.168.173.78 {
>>   keys { tsigkeyext; };
>> };
>>
>>also-notify {
>>   192.168.173.78;
>> };
>>
>> zone "." IN {
>> type hint;
>> file "named.ca";
>> };
>>
>> zone"externalzone1.com" IN {
>> type master;
>> file "externalzone1";
>> allow-transfer { key tsigkeyext; };
>>
>> zone"sharedzone.com" IN {
>> type master;
>> file "sharedzone2.com";
>> allow-transfer { key tsigkeyext; };
>>  };
>> include "/etc/named.rfc1912.zones";
>> include "/etc/named.root.key";
>>  };
>>
>>
"allow-transfer { key tsigkeyext; };" means that the key  tsigkeyext is the
only way to transfer this zone.

You define "other_xfer_allowed_ns" but I do not see it used anywhere.

Most likely what you want is:
allow-transfer { key tsigkeyext; other_xfer_allowed_ns; };
So that either the TSIG key can be used, or any of the IP's can transfer
regardless of TSIG.
(I don't know of a way to restrict a transfer to a specific IP *and*
require TSIG)

As to which view they "se

Re: DNS views TSIG and zone xfers

2016-08-26 Thread project722
Thanks Bob, that is exactly what I ended up doing. And its working great
now. You are also right about the view selection.

On Fri, Aug 26, 2016 at 3:43 PM, Bob Harold  wrote:

>
> On Thu, Aug 25, 2016 at 6:25 PM, project722  wrote:
>
>> Actually, I got to thinking about this. The "other_allowed_ns" ACL is in
>> the global options, along with an "allow-transfer" for that ACL. So, I
>> *think* they will still be able to zone transfer via the global option
>> based on simply IP. BUT...since I have multiple views, which zones from
>> which views get sent over to these servers and how will they know how to
>> handle the info if zones from both views get sent. Would something like
>> this help:
>>
>> allow-transfer { other_allowed_ns; view "external"; };
>>
>> So they only get sent the zones from the external view?
>>
>> On Thu, Aug 25, 2016 at 5:14 PM, project722  wrote:
>>
>>> I have successfully setup TSIG keys for "views" using a DNS
>>> master/server pair. Zone transfers are working as expected between the 2
>>> servers for each view. Before we go live into production with this I need
>>> some clarification on a couple things. Our prod servers are also allowing
>>> zone transfers to a few other servers besides the slave server. We have an
>>> acl setup that looks similar to this:
>>>
>>>
>
>> {
>>> x.x.x.x; // This is our Secondary DNS server
>>> 127.0.0.1; // localhost can make zone transfers
>>> x.x.x.x/24; // Server Farm Range is allowed to make zone-transfers
>>> x.x.x.x/24; // NAT pool for internal DNS server Zone Transfers
>>> x.x.x.x/24; // NAT pool for internal DNS server Zone Transfers
>>> x.x.x.x/24; // NAT pool for internal DNS server Zone Transfers
>>> }; // end of "other_xfer_allowed" ACL
>>>
>>> And in the "allow transfer" statement we have included that ACL. My
>>> question is:
>>>
>>> Now that we are using TSIG, will I need to get with the admins of all
>>> these other servers and provide them my TSIG key so they can request zone
>>> transfers? I would think somehting like that needs to be done since it was
>>> required to be configured on slave server, but I am not sure. I'd rather do
>>> an IP based control just for these other servers instead of TSIG but I am
>>> not sure how that would look or how to set that up in the context of my
>>> config. How can I tell my conf to NOT force these other xfer allowed
>>> servers to use TSIG and use IP only? This gets complicated when you start
>>> throwing views into the mix.
>>>
>>> acl internal {
>>> 192.168.200.0/24; // corpnet
>>> };
>>>
>>> acl external {
>>> 192.168.201.0/24;
>>> 192.168.202.0/24;
>>> };
>>>
>>>
>>>  other_xfer_allowed_ns {
>>> x.x.x.x; // This is our Secondary DNS server
>>> 127.0.0.1; // localhost can make zone transfers
>>> x.x.x.x/24; // Server Farm Range is allowed to make zone-transfers
>>> x.x.x.x/24; // NAT pool for internal DNS server Zone Transfers
>>> x.x.x.x/24; // NAT pool for internal DNS server Zone Transfers
>>> x.x.x.x/24; // NAT pool for internal DNS server Zone Transfers
>>> }; // end of "other_xfer_allowed" ACL
>>>
>>>
>>> key "tsigkey" {
>>> algorithm HMAC-SHA512;
>>> secret   "x";
>>> };
>>>
>>> key "tsigkeyext" {
>>> algorithm HMAC-SHA512;
>>> secret  "xx";
>>> };
>>>
>>>
>>> view "corpnet" {
>>>   match-clients { internal; key tsigkey;
>>> };
>>>
>>>   //IP of slave server
>>>   server 192.168.173.78 {
>>>   keys { tsigkey; };
>>> };
>>>
>>>   also-notify {
>>>   192.168.173.78;
>>> };
>>>
>>>   zone "." IN {
>>>   type hint;
>>>   file "named.ca";
>>> };
>>>
>>>   zone"internalzone1.com" IN {
>>>   type master;
>>>   file "internalzone1.com";
>>>   allow-transfer { key tsigkey; };
>>> };
>>>
>>>   zone"sharedzone.com" IN {
>>>   type master;
>>>   file "sharedzone1.com";
>>>   allow-transfer { key tsigkey; };
>>> };
>>>
>>>  include "/etc/named.rfc1912.zones";
>>>   include "/etc/named.root.key";
>>> };
>>>
>>>
>>> view "external" {
>>>   match-clients { external; key tsigkeyext; };
>>>
>>>   //IP of slave server
>>>   server 192.168.173.78 {
>>>   keys { tsigkeyext; };
>>> };
>>>
>>>also-notify {
>>>   192.168.173.78;
>>> };
>>>
>>> zone "." IN {
>>> type hint;
>>> file "named.ca";
>>> };
>>>
>>> zone"externalzone1.com" IN {
>>> type master;
>>> file "externalzone1";
>>> allow-transfer { key tsigkeyext; };
>>>
>>> zone"sharedzone.com" IN {
>>> type master;
>>> file "sharedzone2.com";
>>> allow-transfer { key tsigkeyext; };
>>>  };
>>> include "/etc/named.rfc1912.zones";
>>> include "/etc/named.root.key";
>>>  };
>>>
>>>
> "allow-transfer { key tsigkeyext; };" means that the key  tsigkeyext is
> the only way to transfer this zone.
>
> You define "other_xfer_allowed