Re: Hell breaks loose in the afternoon with format error from X.X.X.X#53 resolving ./NS: non-improving referral

2022-05-06 Thread Ondřej Surý

> On 6. 5. 2022, at 8:19, Bjørn Mork  wrote:
> 
> How about configuring forwarder(s) if you have to operate a resolver in
> such an environment?  Hoping that the answer from the intercepting
> server isn't too different from what you'd expect from a forwarder.

I would personally go with VPN as a first option.

Other than that this is classical example of GIGO (garbage in, garbage out).

Ondřej 
--
Ondřej Surý — ISC (He/Him)

My working hours and your working hours may be different. Please do not feel 
obligated to reply outside your normal working hours.

-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Hell breaks loose in the afternoon with format error from X.X.X.X#53 resolving ./NS: non-improving referral

2022-05-06 Thread Reindl Harald



Am 06.05.22 um 08:19 schrieb Bjørn Mork:

Mark Andrews  writes:


It’s a long known issue with so called “Transparent” DNS
proxies/accelerators/firewalls.  Iterative resolvers expect to talk to
authoritative servers.  They ask questions differently to the way they
do when they talk to a recursive server.  Answers from different
levels of the DNS hierarchy for the same question are different.  If
you just cache and return the previous answer you break iterative
lookups.  The answers from recursive servers are different to those
from authoritative servers.

You get the same sort of problem in many hotels if you have an
iterative resolver on your portable devices.  Switching named to use a
public recursive server that supports DNSSEC in forward only mode
helps sometimes.  It really depends on what the middleware is doing.


How about configuring forwarder(s) if you have to operate a resolver in
such an environment?  Hoping that the answer from the intercepting
server isn't too different from what you'd expect from a forwarder


the problem is that this middleware crap operates on the protocol level

in the past our CISCO ISP router with "DNS ALG" even rewrote zone 
transfers and invented a zero TTL for each and every CNAME it saw


means our secondary nameserver hat completly different zone files than 
the master


you don't expect that and watch a zone transfer on both ends with 
wireshark solved that riddle


so from the moment on some device thinking it's smart about DNS you are lost
--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Hell breaks loose in the afternoon with format error from X.X.X.X#53 resolving ./NS: non-improving referral

2022-05-06 Thread Ted Mittelstaedt



On 5/5/2022 11:19 PM, Bjørn Mork wrote:

Mark Andrews  writes:


How about configuring forwarder(s) if you have to operate a resolver in
such an environment?  Hoping that the answer from the intercepting
server isn't too different from what you'd expect from a forwarder.



In my environment, I'm operating 3 nameservers authoritative for a bunch 
of domains.  If it's crapping what I'm pulling in from outside it's 
probably crapping what I'm sending to the rest of the world.


However the real reason for me?  The real reason is  _I_ pay _them_ for 
connectivity.  Therefore _they_ give it to me the way _I_ want, not the 
way _they_ want.  I have the gold, and he who has the gold makes the rules.


As for the hotel scenario simple answer there.  Never stay at that hotel
again and inform them as to why.  Why do people insist on rewarding
poor service with money?

Ted
--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Hell breaks loose in the afternoon with format error from X.X.X.X#53 resolving ./NS: non-improving referral

2022-05-06 Thread Ted Mittelstaedt




On 5/6/2022 12:45 AM, Reindl Harald wrote:



in the past our CISCO ISP router with "DNS ALG" even rewrote zone 
transfers and invented a zero TTL for each and every CNAME it saw




Probably doing that to retaliate for dynamic DNS providers abusing DNS 
and people abusing dynamic DNS providers for being cheapskates and 
saving a nickle on a real static IP.


You got caught in the crossfire of that particular war.

Ted
--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Hell breaks loose in the afternoon with format error from X.X.X.X#53 resolving ./NS: non-improving referral

2022-05-06 Thread Ondřej Surý

> On 6. 5. 2022, at 12:24, Ted Mittelstaedt  wrote:
> 
> You got caught in the crossfire of that particular war.

Nah, it was just crappy implementation and somebody at Cisco  not understanding 
the RFC. I remember that - at my previous job we had a ticket opened with them 
about this particular issue. They were crippling the TTL to 0 in the wrong 
direction.

Ondřej 
--
Ondřej Surý — ISC (He/Him)

My working hours and your working hours may be different. Please do not feel 
obligated to reply outside your normal working hours.

-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Hell breaks loose in the afternoon with format error from X.X.X.X#53 resolving ./NS: non-improving referral

2022-05-06 Thread Reindl Harald




Am 06.05.22 um 12:24 schrieb Ted Mittelstaedt:

On 5/6/2022 12:45 AM, Reindl Harald wrote:



in the past our CISCO ISP router with "DNS ALG" even rewrote zone 
transfers and invented a zero TTL for each and every CNAME it saw




Probably doing that to retaliate for dynamic DNS providers abusing DNS 
and people abusing dynamic DNS providers for being cheapskates and 
saving a nickle on a real static IP.


You got caught in the crossfire of that particular war


nonsense - it's the cisco default behavior

no ip nat service alg udp dns
no ip nat service alg tcp dns

--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Confused by parental-source documentation

2022-05-06 Thread Matthijs Mekking

Hi Nick,

Thanks for bringing this to our attention. Yes, this is a copy paste 
error. I think it can be removed, although we could change it because 
you should make sure the address matches with what the parental agent 
expects.


Best regards,
Matthijs

On 01-05-2022 07:18, Nick Tait via bind-users wrote:

Hi list.

I've been reading the latest BIND9 documentation on the new DNSSEC 
features, and section 4.2.28.1 got me horribly confused:


/The following options apply to DS queries sent to
//|parental-agents|//:/

/|parental-source|/

/|parental-source|//determines which local source address, and
optionally UDP port, is used to send parental DS queries. This
address must appear in the secondary server’s
//|parental-agents|//zone clause. This statement sets the
//|parental-source|//for all zones, but can be overridden on a
per-zone or per-view basis by including a
//|parental-source|//statement within the //|zone|//or
//|view|//block in the configuration file./

No matter how many times I read the sentence in blue font, I couldn't 
make sense of it...


I finally realised that the parental-source paragraph is almost 
identical to the documentation for notify-source:


/|notify-source|/

/|notify-source|//determines which local source address, and
optionally UDP port, is used to send NOTIFY messages. This
address must appear in the secondary server’s
//|primaries|//zone clause or in an //|allow-notify|//clause.
This statement sets the //|notify-source|//for all zones, but
can be overridden on a per-zone or per-view basis by including a
//|notify-source|//statement within the //|zone|//or
//|view|//block in the configuration file./

And so I can only assume that the problematic sentence in 
parental-source (i.e. "/This address must appear in the secondary 
server’s //|parental-agents|//zone clause./") is a copy-paste error? If 
that is the case can the sentence please be removed from the documentation?


Or if I'm mistaken can anybody please give an example to explain what 
this is trying to say?


Thanks,

Nick.




--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Bind9 Server conflicts with docker0 interface

2022-05-06 Thread Maurício Penteado via bind-users
 Hi folks,
Thank you for the reply.
 I added the A-record "ns1  IN  A  172.17.0.1" to my zone-file as suggested and 
it seems that the order fixed the issue.Now my Bind9 clients are getting ip 
192.168.0.10 favorably.
Anyway, I'd like to eliminate ip 172.17.0.1 from name resolutions.I never added 
this ip in my zone files and I don't have any DNS clients coming from this 
network (at least not at the moment).
It makes no sense to me. Why does Bind9 insist on adding the docker0 ip in name 
resolutions.That is a mystery.
Kind regards,Mauricio
Em quinta-feira, 5 de maio de 2022 21:44:50 GMT+1, Nick Tait via bind-users 
 escreveu:  
 
  On 6/05/2022 7:51 am, Grant Taylor via bind-users wrote:
  
 
On my Bind9 server, I have the following zone-files: 
 
 forward.example.lan.db: 
 ns1     IN      A           192.168.0.10 
 ns1     IN          fe80::f21f:afff:fe5d:be90 
 
 
 I don't see the 2nd, Docker (?), address; 172.17.0.1, in the zone.  So if your 
client is still receiving that address in addition to the 192.168.0.10 address, 
then something else is happening outside of BIND. 
 
Mauricio, was 172.17.0.1 in the zone file at any time in the past? Because if 
so, I'm betting that the problem is simply that after you removed it, you 
neglected to increment the SOA serial number? (In case you weren't aware the 
serial number needs to be increased every time you change the zone file.)
 
 
Can you please try updating the "1 ; Serial" line to "2 ; Serial" as shown 
below:
 
 $TTL    604800@       IN      SOA     ns1.example.lan. hostmaster.example.lan. 
(                             2         ; Serial                        604800  
       ; Refresh                          86400         ; Retry                 
       2419200         ; Expire                        604800 )       ; 
Negative Cache TTL 
Once you've done that, run "sudo rndc reload" on your the primary DNS server 
for the zone (or alternatively restart BIND), and see if that makes a 
difference?
 
 
Nick.

  -- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users
  -- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Bind9 Server conflicts with docker0 interface

2022-05-06 Thread Maurício Penteado via bind-users
 I just message you and the problem happened again ... 

C:\Users\Mauricioλ ping ns1.example.lan
Pinging ns1.example.lan [172.17.0.1] with 32 bytes of data:Reply from 
84.116.236.63: Destination net unreachable.Reply from 84.116.236.63: 
Destination net unreachable.Reply from 84.116.236.63: Destination net 
unreachable.Reply from 84.116.236.63: Destination net unreachable.
Ping statistics for 172.17.0.1:    Packets: Sent = 4, Received = 4, Lost = 0 
(0% loss),
C:\Users\Mauricioλ ping ns1.example.lan
Pinging ns1.example.lan [172.17.0.1] with 32 bytes of data:Reply from 
84.116.236.63: Destination net unreachable.Reply from 84.116.236.63: 
Destination net unreachable.Reply from 84.116.236.63: Destination net 
unreachable.Reply from 84.116.236.63: Destination net unreachable.
Ping statistics for 172.17.0.1:    Packets: Sent = 4, Received = 4, Lost = 0 
(0% loss),
C:\Users\Mauricioλ ping ns1.example.lan
Pinging ns1.example.lan [172.17.0.1] with 32 bytes of data:Reply from 
84.116.236.63: Destination net unreachable.Reply from 84.116.236.63: 
Destination net unreachable.Reply from 84.116.236.63: Destination net 
unreachable.Reply from 84.116.236.63: Destination net unreachable.
Ping statistics for 172.17.0.1:    Packets: Sent = 4, Received = 4, Lost = 0 
(0% loss),
= (Em sexta-feira, 6 de maio de 2022 14:38:37 GMT+1, Maurício Penteado via 
bind-users  escreveu:  
 
  Hi folks,
Thank you for the reply.
 I added the A-record "ns1  IN  A  172.17.0.1" to my zone-file as suggested and 
it seems that the order fixed the issue.Now my Bind9 clients are getting ip 
192.168.0.10 favorably.
Anyway, I'd like to eliminate ip 172.17.0.1 from name resolutions.I never added 
this ip in my zone files and I don't have any DNS clients coming from this 
network (at least not at the moment).
It makes no sense to me. Why does Bind9 insist on adding the docker0 ip in name 
resolutions.That is a mystery.
Kind regards,Mauricio
Em quinta-feira, 5 de maio de 2022 21:44:50 GMT+1, Nick Tait via bind-users 
 escreveu:  
 
  On 6/05/2022 7:51 am, Grant Taylor via bind-users wrote:
  
 
On my Bind9 server, I have the following zone-files: 
 
 forward.example.lan.db: 
 ns1     IN      A           192.168.0.10 
 ns1     IN          fe80::f21f:afff:fe5d:be90 
 
 
 I don't see the 2nd, Docker (?), address; 172.17.0.1, in the zone.  So if your 
client is still receiving that address in addition to the 192.168.0.10 address, 
then something else is happening outside of BIND. 
 
Mauricio, was 172.17.0.1 in the zone file at any time in the past? Because if 
so, I'm betting that the problem is simply that after you removed it, you 
neglected to increment the SOA serial number? (In case you weren't aware the 
serial number needs to be increased every time you change the zone file.)
 
 
Can you please try updating the "1 ; Serial" line to "2 ; Serial" as shown 
below:
 
 $TTL    604800@       IN      SOA     ns1.example.lan. hostmaster.example.lan. 
(                             2         ; Serial                        604800  
       ; Refresh                          86400         ; Retry                 
       2419200         ; Expire                        604800 )       ; 
Negative Cache TTL 
Once you've done that, run "sudo rndc reload" on your the primary DNS server 
for the zone (or alternatively restart BIND), and see if that makes a 
difference?
 
 
Nick.

  -- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users
  -- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users
  -- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


DNS traffic tracking

2022-05-06 Thread Alex K
Hi all,

I have the following problem: I run a caching dns server using bind9
v9.10.3 in a gateway device which it serves several internal LAN IP
addresses (clients). I am doing some traffic accounting in the gateway
device using Linux conntrack so as to calculate the generated client
traffic (mostly HTTP/HTTPs related, in/out) so as to charge the volume
consumed.

What I cannot charge is the actual DNS traffic that each client is
generating, since each client DNS request is actually two sessions, one
between client and gateway device and the other between gateway and
upstream DNS servers. It seems to me not fare to charge the traffic
observed between the client and the gateway since the internal DNS traffic
includes cached responses and may be much higher from the actual DNS
traffic observed on the WAN side (gateway - upstream).

I was wondering if there is a solution to this. If bind9 has any feature
that can be used to track the WAN DNS traffic and understand from which
client was first requested/generated. In this way I will be able to
differentiate the DNS traffic per client and avoid accounting DNS traffic
that the gateway generated for its own services.

Just as an additional note on this, I had in the past the same issue with
the proxy traffic that this same gateway was generating and found a
solution by using TPROXY feature of the squid proxy, which exposes the real
internal client IP address at the WAN traffic which can later be NATed.

Thanx for any ideas,
Alex
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Bind9 Server conflicts with docker0 interface

2022-05-06 Thread Nick Tait via bind-users

On 7/05/2022 1:38 am, Maurà cio Penteado via bind-users wrote:
I added the A-record "ns1  IN  A  172.17.0.1" to my zone-file as 
suggested and it seems that the order fixed the issue.

Now my Bind9 clients are getting ip 192.168.0.10 favorably.


Hi Mauricio.

I don't think anyone suggested that you add that address to your zone file?

My suggestion was to simply update the SOA serial number.

Nick.

--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Turn To Bind-Users For Advice And Help

2022-05-06 Thread tengfei xiao
Hi,

We are encountering a problem that SOA records had data residue when
deleting a new-created zone with BIND 9. The operation procedures are as
below:

1. Firstly, a zone named test18.cn was added with BIND 9. The command "dig
-t SOA test18.cn" shows the corresponding SOA record was created
successfully.

2. Secondly, RNDC command "rndc -s 127.0.0.1 -p  953  -k  /etc/rndc.key
delzone  test18.cn" was applied to remove zone "test18.cn".

3. After a few of minutes, "dig -t SOA  test18.cn" was applied again and
found the SOA record still existed.


The BIND version is 9.11.4-P2-RedHat-9.11.4-16.P2.el7. The problem occurred
from time to time. Unfortunately, the logging file "name.run" does not
record any abnormal information.


Any comments or suggestions will be highly appreciated.


Best Regards,
Tengfei
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users