Re: dig +norecurse behaviour changed with 9.16.33

2022-12-14 Thread Veronique Lefebure
Hi Ondrej,

Thanks for your reply (and sorry for the delay on this on my side).
Yes, I am aware of the new default for the `minimal-responses` option: we have 
set it to "no".

But anyway, if I am not wrong, the minimal-response option controls whether or 
not the NS records are returned, right ?

I have 2 similar DNS servers, one running BIND9.11 and one running BIND9.16 
with default minimal-response option.

On the second one, the "AUTHORITY SECTION" and "ADDITIONAL SECTION" are omitted 
(as expected because of the minimal-response).
But I can see on both servers that the CNAME and A records are returned in the 
"ANSWER SECTION".

So the "minimal-response" option is not the one controlling whether or not both 
CNAME and A are turned by dig, right ?
Thanks,
Veronique

From: Ondřej Surý 
Sent: Monday, October 31, 2022 5:30 PM
To: BIND users 
Cc: Veronique Lefebure 
Subject: Re: dig +norecurse behaviour changed with 9.16.33

Since we have already established that this is not a **dig** issue, you might 
want
to look at the `minimal-responses` option. The default has changed from `no` to
`no-auth-recursive` in 9.12.0

Anyway, the 9.16.0 is doing the right thing because there's a zone cut between
the two names, any resolver still has to revalidate the answer, and there's no
point in appending records that would be thrown away anyway.

Cheers,
Ondrej
--
Ondřej Surý (He/Him)
ond...@isc.org

My working hours and your working hours may be different. Please do not feel 
obligated to reply outside your normal working hours.



On 28. 10. 2022, at 22:39, Nick Tait via bind-users  
wrote:


Hi Veronique.

I'm not an expert, but to me the 9.16 behaviour is what I would expect to 
happen, based on:

  *   When you issue the non-recursive query for "spectrum.cern.ch", it is 
answered from the "cern.ch" zone, which only knows the CNAME (returned in the 
ANSWER section) and the NS records for the zone that the CNAME points to 
(presumably returned in the ADDITIONAL section?).
  *   A [hypothetical] subsequent non-recursive query for "spectrum-lb.cern.ch" 
would be answered from the "spectrum-lb.cern.ch" zone which contains the A 
records (which should be returned in the ANSWER section of that query).

(A recursive resolver would be expected to make both of the queries above to 
give a complete answer to the query for "spectrum.cern.ch".)

But aside from the observation that the responses from 9.11 and 9.16 aren't the 
same, what is the actual problem you are trying to solve? i.e. Why does it 
matter if the A record is or isn't returned in a non-recursive query for 
"spectrum.cern.ch"?

Nick.


On 28/10/22 01:28, Veronique Lefebure wrote:
Well,

So here a bit more details.
Sorry, I cannot take an example with a DNS server accessible to you (*)  
because they have all been upgraded to 9.16.

The .cern.ch contains:

spectrum-lb IN NS ip-dns-1.cern.ch.
spectrum-lb IN NS ip-dns-2.cern.ch.
spectrum IN CNAME spectrum-lb.cern.ch.

and

spectrum-lb.cern.ch contains:

$ORIGIN .
$TTL 60 ; 1 minute
spectrum-lb.cern.ch IN SOA ip-dns-1.cern.ch. internal-dns.cern.ch. (
273 ; serial
3600 ; refresh (1 hour)
300 ; retry (5 minutes)
360 ; expire (5 weeks 6 days 16 hours)
60 ; minimum (1 minute)
)
NS ip-dns-1.cern.ch.
NS ip-dns-2.cern.ch.
A xxx.xxx.xx.140



named configuration file is identical between 9.11 and 9.16 except for the 
following options that we have added for 9.16:

#BIND916 options
qname-minimization disabled;
stale-answer-enable no;
stale-refresh-time 0; #default is 30
max-stale-ttl 1w;
dnssec-policy none;
synth-from-dnssec no;
min-cache-ttl 0;
min-ncache-ttl 0;
minimal-responses no;





(*) On an external DNS server you can try with the following similar case:

Running DiG 9.11.21 on a linux client

ext-dns-1 (192.65.187.5) runs BIND9.16:

dig @ext-dns-1 foundservices.cern.ch | grep flags | grep ANSWER
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1

dig @ext-dns-1 foundservices.cern.ch +norecurse | grep flags | grep ANSWER
;; flags: qr aa ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1


Full output:

dig @192.65.187.5 foundservices.cern.ch +norecurse
; <<>> DiG 9.11.21 <<>> @192.65.187.5 foundservices.cern.ch +norecurse
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 9899
;; flags: qr aa ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 1232
; COOKIE: 8786b980a1a80a790100635a7898a512a21aa6138faf (good)
;; QUESTION SECTION:
;foundservices.cern.ch. IN A
;; ANSWER SECTION:
foundservices.cern.ch. 900 IN CNAME db-lb-1234.cern.ch.
;; Query time: 2 msec
;; SERVER: 192.65.187.5#53(192.65.187.5)
;; WHEN: Thu Oct 27 14:24:56 CEST 2022
;; MSG SIZE rcvd: 103


ip-dns-0 runs BIND9.11:

dig @ip-dns-0 foundservices.cern.ch | grep flags | grep ANSWER
;; flags: qr aa rd; QUERY: 1, ANSWER: 2, AUTHORITY: 2, ADDITIONAL: 4

dig @ip-dns-0 foundservices.cern.

Re: dig +norecurse behaviour changed with 9.16.33

2022-12-14 Thread Ondřej Surý
I think it would be useful if you read the documentation on the feature before we continue this thread. Guessing what the feature is or isn’t does not help helpful discussion.8. Configuration Reference — BIND 9 9.18.9 documentationbind9.readthedocs.ioThanks,--Ondřej Surý — ISC (He/Him)My working hours and your working hours may be different. Please do not feel obligated to reply outside your normal working hours.On 14. 12. 2022, at 11:21, Veronique Lefebure  wrote:






Hi Ondrej,




Thanks for your reply (and sorry for the delay on this on my side).

Yes, I am aware of the new default for the
 `minimal-responses` option: we have set it to "no".




But
 anyway, if I am not wrong, the minimal-response option controls whether or not the NS records are returned, right ?




I have
 2 similar DNS servers, one running BIND9.11 and one running BIND9.16 with default minimal-response option.




On
 the second one, the "AUTHORITY SECTION" and "ADDITIONAL SECTION" are omitted (as expected because of the minimal-response).

But
 I can see on both servers that the CNAME and A records are returned in the "ANSWER SECTION".





So the "minimal-response" option is not the one controlling whether or not both CNAME and A are turned by dig, right ?


Thanks,
Veronique


From: Ondřej Surý 
Sent: Monday, October 31, 2022 5:30 PM
To: BIND users 
Cc: Veronique Lefebure 
Subject: Re: dig +norecurse behaviour changed with 9.16.33
 

Since we have already established that this is not a **dig** issue, you might want
to look at the `minimal-responses` option. The default has changed from `no` to
`no-auth-recursive` in 9.12.0



Anyway, the 9.16.0 is doing the right thing because there's a zone cut between
the two names, any resolver still has to revalidate the answer, and there's no
point in appending records that would be thrown away anyway.


Cheers,
Ondrej





--

Ondřej Surý (He/Him)

ond...@isc.org




My working hours and your working hours may be different. Please do not feel obligated to reply outside your normal working hours.








On 28. 10. 2022, at 22:39, Nick Tait via bind-users  wrote:



Hi Veronique.
I'm not an expert, but to me the 9.16 behaviour is what I would expect to happen, based on:

When you issue the non-recursive query for "spectrum.cern.ch", it is answered from the "cern.ch" zone, which only knows the CNAME (returned in the ANSWER section) and the NS records for the zone that the CNAME points to (presumably returned in the ADDITIONAL
 section?).A [hypothetical] subsequent non-recursive query for "spectrum-lb.cern.ch" would be answered from the "spectrum-lb.cern.ch" zone which contains the A records (which should be returned in the ANSWER section of that query).

(A recursive resolver would be expected to make both of the queries above to give a complete answer to the query for "spectrum.cern.ch".)
But aside from the observation that the responses from 9.11 and 9.16 aren't the same, what is the actual problem you are trying to solve? i.e. Why does it matter if the A record is or isn't returned in a
non-recursive query for "spectrum.cern.ch"?

Nick.


On 28/10/22 01:28, Veronique Lefebure wrote:


Well, 


So here a bit more details. 
Sorry, I cannot take an example with a DNS server accessible to you (*)  because they have all been upgraded to 9.16.



The .cern.ch contains: 


spectrum-lb IN NS ip-dns-1.cern.ch.

spectrum-lb IN NS ip-dns-2.cern.ch.

spectrum IN CNAME spectrum-lb.cern.ch.




and  


spectrum-lb.cern.ch contains: 

$ORIGIN . 
$TTL 60 ; 1 minute 
spectrum-lb.cern.ch IN SOA ip-dns-1.cern.ch. internal-dns.cern.ch. (

273 ; serial 
3600 ; refresh (1 hour) 
300 ; retry (5 minutes) 
360 ; expire (5 weeks 6 days 16 hours)

60 ; minimum (1 minute) 
) 
NS ip-dns-1.cern.ch. 
NS ip-dns-2.cern.ch. 
A xxx.xxx.xx.140 







named configuration file is identical between 9.11 and 9.16 except for the following options that we have added for 9.16:



#BIND916 options

qname-minimization disabled;

stale-answer-enable no; 
stale-refresh-time 0; #default is 30

max-stale-ttl 1w; 
dnssec-policy none; 
synth-from-dnssec no; 
min-cache-ttl 0; 
min-ncache-ttl 0; 
minimal-responses no; 












(*) On an external DNS server you can try with the following similar case:



Running DiG 9.11.21 on a linux client  
  
ext-dns-1 (192.65.187.5)
runs BIND9.16: 
  
dig @ext-dns-1 foundservices.cern.ch | grep flags | grep ANSWER

;; flags: qr aa rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1


  
dig @ext-dns-1 foundservices.cern.ch
+norecurse | grep flags | grep ANSWER 
;; flags: qr aa ra; QUERY: 1, ANSWER:
1, AUTHORITY: 0, ADDITIONAL: 1


  
  
Full output:

  

dig @192.65.187.5 foundservices.cern.ch +norecurse

; <<>> DiG 9.11.21 <<>> @192.65.187.5 foundservices.cern.ch +norecurse

; (1 server found) 
;; global options: +cmd 
;; Got answer: 
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 9899

;; flags: qr aa ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:

; E

DoT forwarding from BIND9

2022-12-14 Thread Petr Menšík

Hello,

I tried to find a way how to configure queries forwarding over encrypted 
channel. But unlike zone transfer and notifications, I have not found a 
way to configure query forwarding over DNS over TLS even in latest 
9.18.9 version.


Have I looked wrong? Is there some important limit why this is not 
straightforward to configure? Is there some architectural change needed 
to be able to handle high enough count of forwarded queries? I think 
acting as a cache for local network and forwarding queries over 
encrypted channel might be quite common configuration.


But I have not found a way how to specify tls paramters for forwarders 
clause. Is there some reason for it? Is there missing some important 
implementation detail? I think unbound can forward queries over 
encrypted channel just fine. Is bind able to configure the same thing? 
Version 9.18 already has solid support for queries served over XoT. Is 
it still missing ability to forward queries?


Regards,
Petr

--
Petr Menšík
Software Engineer, RHEL
Red Hat, https://www.redhat.com/
PGP: DFCF908DB7C87E8E529925BC4931CA5B6C9FC5CB

--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: DoT forwarding from BIND9

2022-12-14 Thread Victoria Risk


> On Dec 14, 2022, at 10:12 AM, Petr Menšík  wrote:
> 
> Hello,
> 
> I tried to find a way how to configure queries forwarding over encrypted 
> channel. But unlike zone transfer and notifications, I have not found a way 
> to configure query forwarding over DNS over TLS even in latest 9.18.9 version.
> 

Petr,

You didn’t miss it, we don’t have it yet. 
https://gitlab.isc.org/isc-projects/bind9/-/issues/3726

Vicky-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: DoT forwarding from BIND9

2022-12-14 Thread Petr Menšík

Hi Vicky.

Excellent, thank you for the issue link.

Is backport to 9.18 decided already? Would it appear on minor updates in 
9.18.x line? I see comment it needs some missing feature. Is that 
temporary issue or already decided? It seems to be important 
prerequisite for Zero Trust initiative implementation.


On 12/14/22 16:16, Victoria Risk wrote:

Petr,

You didn’t miss it, we don’t have it yet. 
https://gitlab.isc.org/isc-projects/bind9/-/issues/3726


Vicky


--
Petr Menšík
Software Engineer, RHEL
Red Hat, https://www.redhat.com/
PGP: DFCF908DB7C87E8E529925BC4931CA5B6C9FC5CB

--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Domain no longer fully secure after move

2022-12-14 Thread Sandro

Hi,

I'm trying to understand what exactly is wrong with DNSSEC for my 
domain, penguinpee.nl, before contacting involved parties.


I recently (last weekend) moved the domain to a new registrar. The keys 
are now managed by the registrar directly. At least I don't see an 
option providing my own or additional keys in their web interface.


Moreover, I'm no longer running my own DNS server. :(
Previously, I could set my own BIND server as a primary server for my 
domain and have the registrar use AXFR to update the secondaries.


The DNSViz analysis for the current situation:
https://dnsviz.net/d/penguinpee.nl/Y5oJSw/dnssec/

And from before the move:
https://dnsviz.net/d/penguinpee.nl/Yq3P8w/dnssec/

Verisign has one single complaint: No DS records found for penguinpee.nl 
in the nl zone.


IIUC, the details for the DS record have to be provided by my new 
registrar, so SIDN can add them.


-- Sandro
--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users