Re: Views vs Separate Authoritative & Recursive DNS

2023-01-04 Thread Greg Choules via bind-users
Hi E R.
My short answer would be, don't configure views unless you have a good use
case for them. For example you are running resolvers that have two
different kinds of clients that need to be handled differently - one client
set needs RPZ, the other doesn't. Or something like that.

BIND has views inside anyway. If you run "rndc stats" it produces a file
called "named.stats", in which you will see line like this:
[View: _bind]
[View: default]
The "_bind" view is always there and is used for internal processing. The
"default" exists for all client processing and if you define your own views
it disappears. So having one user-defined view is functionally
equivalent to having no views.

One possible reason I can think of for defining a view would be if you know
you will need to add more views in future, so would like to standardise the
structure of your config day one. It's a bit like configuring an Ethernet
switch: do I configure VLANs even though (today) it's one flat network?

Hope that helps.
Greg

On Wed, 4 Jan 2023 at 01:15, E R  wrote:

> New to BIND and just starting to read the 5th edition from O'Reilly after
> watching some videos online while it made its way to me.  I am trying to
> understand why the view statement appears to be included by default in most
> Linux distributions if best practice says you should have separate servers
> for each?  Based on the comments in the named.conf sample file I am
> inclined to remove all of the view statements so it operates in "default
> view" on new servers I am setting up to replace old ones.  Is the view
> statement just there for those who need to ignore best practices or am I
> missing something?
> --
> Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe
> from this list
>
> ISC funds the development of this software with paid support
> subscriptions. Contact us at https://www.isc.org/contact/ for more
> information.
>
>
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users
>
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Email migration and MX records

2023-01-04 Thread Marcus Kool

SMTP is a wonderful protocol that queues messages and retries delivery for 5 
days so a non-responsive email server is no issue.
Just do not have a temporary solution that bounces emails since those will 
never arrive (the sender is notified about the bounce).

Marcus

On 03/01/2023 21:31, Bruce Johnson via bind-users wrote:

We’re making an O365 tenant switchover for our domain (a subdomain of the 
arizona.edu domain) and moving from our Barracuda cloud email SMTP to the 
University’s tenant, but email cannot flow until the Arizona.edu O365 tenant 
can take over our email domain.

In anticipation I set our TTL for MX records quite low before the break (150 
seconds) so, but the process may take up to an hour (if everything goes well )

Will setting our mx record to a bogus address cause email to bounce on the 
sending end and eventually get retried later after the mx record has been 
properly set to the Universities main smtp MX address?

Or are we approaching this in the wrong way?  Basically our end result is we 
want to stop accepting email from anywhere until the whole process has been 
changed and we have established the correct route so email starts flowing 
correctly.

As it’s been explained to me the main campus tenant cannot start accepting 
email for our domain  until we’ve transferred the email domain between tenants, 
so we cannot just change the MX record in our DNS server to the University’s (a 
Cisco Ironport setup)


--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


RE: Email migration and MX records

2023-01-04 Thread E R
Bruce, I would push back and ask for more information from whomever is
leading you down that path as it does not sound right to me although others
more familiar with DNS magic might have better suggestions to DNS changes.
But if Barracuda is just a front-end for email that does antivirus/spam
filtering I would expect you could update Barracuda to send email to your
new M365 tenant when it is ready without any DNS change to your MX record.
Once that change was made you could then update MX records to bypass the
Barracuda service altogether.  Keep in mind that you may specify a short
TTL, but you may see emails for DAYS after the change from my experience
when we changed our MX servers years ago.

If you received information that you could not use a third party device in
front of M365, you received incorrect information.  You can definitely use
another service in front of M365 although the additional cost might not
pencil out.  We let the third party store dangerous/nasty emails in their
quarantine and forward SPAM/Bulk over to M365 Junk Email folders so
employees have one space to look for those things.

>
> -Original Message-
> From: bind-users [mailto:bind-users-boun...@lists.isc.org] On Behalf Of
> Bruce Johnson via bind-users
> Sent: Tuesday, January 3, 2023 3:32 PM
> To: bind-users@lists.isc.org
> Subject: Email migration and MX records
>
> We?re making an O365 tenant switchover for our domain (a subdomain of the
> arizona.edu domain) and moving from our Barracuda cloud email SMTP to the
> University?s tenant, but email cannot flow until the Arizona.edu O365
> tenant can take over our email domain.
>
> In anticipation I set our TTL for MX records quite low before the break
> (150 seconds) so, but the process may take up to an hour (if everything
> goes well )
>
> Will setting our mx record to a bogus address cause email to bounce on the
> sending end and eventually get retried later after the mx record has been
> properly set to the Universities main smtp MX address?
>
> Or are we approaching this in the wrong way?  Basically our end result is
> we want to stop accepting email from anywhere until the whole process has
> been changed and we have established the correct route so email starts
> flowing correctly.
>
> As it?s been explained to me the main campus tenant cannot start accepting
> email for our domain  until we?ve transferred the email domain between
> tenants, so we cannot just change the MX record in our DNS server to the
> University?s (a Cisco Ironport setup)
>
>
>
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Email migration and MX records

2023-01-04 Thread Matthew Richardson
Bruce Johnson via bind-users  wrote:-

>We’re making an O365 tenant switchover for our domain (a subdomain of the 
>arizona.edu domain) and moving from our Barracuda cloud email SMTP to the 
>University’s tenant, but email cannot flow until the Arizona.edu O365 tenant 
>can take over our email domain.

This is probably more of an email than a DNS question.  In any event, I
have reasonably regularly undertaken such moves for clients.  You are
correct that the email often cannot be setup on the system until it is
removed from the old.

Trying to achieve this with a simple MX change WILL result in some email
being rejected/bounced.

>In anticipation I set our TTL for MX records quite low before the break (150 
>seconds) so, but the process may take up to an hour (if everything goes well )

Sensible...

>Will setting our mx record to a bogus address cause email to bounce on the 
>sending end and eventually get retried later after the mx record has been 
>properly set to the Universities main smtp MX address?

Depending on what you mean by "bogus", this approach has the scope to end
badly.  It might work, but it might not.  Furthermore, you will not know
whether is did work or not.  Indeed, different senders may produce
different results.

An approach which should cause queuing (which I do not recommend) would be
to have a hostname & IP as the MX, which is under your control and which
does NOT have an SMTP server running.

>Or are we approaching this in the wrong way?  Basically our end result is we 
>want to stop accepting email from anywhere until the whole process has been 
>changed and we have established the correct route so email starts flowing 
>correctly.

You have correctly identified "we want to stop accepting email from
anywhere until the whole process has been changed".

My approach, as has been suggested by others, is to have a temporary email
server as an intermediate MX (ie only ONE MX server), which has a hard
delivery rule to the real OLD mail server.  In order for this to work, the
old and new mail servers have to be configured not to do any DNS based
processing on messages from the temporary server; specifically not SPF or
DNSBL.

Just before the migration, configure the server not to deliver the email
but hold it in a queue.

When the work is complete and tested, configure the temporary server to
deliver email to the new mail destination.

Once dequeued and everything is working, change the DNS MX to point to the
new destination.  After TTL expiry (plus a bit), remove the temporary
config re SPF etc from the new server.

Doing this fairly often, I keep a temporary server for the purpose, in my
case a fairly simple Postfix configuration.  This also allows one to see
all the logs and (if one wishes) take copies of emails in transit to assist
with troubleshooting or for resubmission.

>As it’s been explained to me the main campus tenant cannot start accepting 
>email for our domain  until we’ve transferred the email domain between 
>tenants, so we cannot just change the MX record in our DNS server to the 
>University’s (a Cisco Ironport setup)

This sounds plausible.

Hope this helps.

--
Best wishes,
Matthew
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: managed-keys vs trust-anchors

2023-01-04 Thread Evan Hunt
On Mon, Jan 02, 2023 at 07:33:46AM -0500, Bob McDonald wrote:
> I've upgraded to bind 9.16.36.
> 
> I went to the ISC site and picked up the bind.keys file.
> 
> However, it is intended for use in bind 9.11 and contains the managed-keys
> clause. This throws an error in the syslog messages during startup. It
> appears to still function correctly.
> 
> In the ARM for bind 9.16 it states that managed-keys clause is deprecated.
> Replacing the managed-keys clause with the trust-anchors clause seems to
> fix the issue. In the file itself it states the following:
> 
> # This file is NOT expected to be user-configured.
> 
> Perhaps I've missed something. If not, the documentation needs to be a bit
> more clear on this. Would it be helpful to have a version of the bind.keys
> file for bind 9.16 and above?

Thanks for bringing this to our attention. It's no longer necessary
to get the bind.keys file from the ISC website. We've updated the
site to remove the downloadable version, and just put some explanatory
text there instead.

The bind.keys file was originally put there for reasons that aren't really
applicable anymore; you can safely rely on the one that's compiled in to
named now.  Some background on this can be found in the discussion at
https://www.mail-archive.com/bind-users@lists.isc.org/msg31664.html.

(And, if for some odd reason you really do need to download a new copy of
bind.keys instead of updating BIND, you can pull it from the source tree:
https://gitlab.isc.org/isc-projects/bind9/-/blob/main/bind.keys.)

-- 
Evan Hunt -- e...@isc.org
Internet Systems Consortium, Inc.
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: managed-keys vs trust-anchors

2023-01-04 Thread Bob McDonald
Thanks Evan and Ondrej.  I'll let the folks at FreeBSD know also. Their
bind packages still include that file.

Bob


On Wed, Jan 4, 2023, 14:59 Evan Hunt  wrote:

> On Mon, Jan 02, 2023 at 07:33:46AM -0500, Bob McDonald wrote:
> > I've upgraded to bind 9.16.36.
> >
> > I went to the ISC site and picked up the bind.keys file.
> >
> > However, it is intended for use in bind 9.11 and contains the
> managed-keys
> > clause. This throws an error in the syslog messages during startup. It
> > appears to still function correctly.
> >
> > In the ARM for bind 9.16 it states that managed-keys clause is
> deprecated.
> > Replacing the managed-keys clause with the trust-anchors clause seems to
> > fix the issue. In the file itself it states the following:
> >
> > # This file is NOT expected to be user-configured.
> >
> > Perhaps I've missed something. If not, the documentation needs to be a
> bit
> > more clear on this. Would it be helpful to have a version of the
> bind.keys
> > file for bind 9.16 and above?
>
> Thanks for bringing this to our attention. It's no longer necessary
> to get the bind.keys file from the ISC website. We've updated the
> site to remove the downloadable version, and just put some explanatory
> text there instead.
>
> The bind.keys file was originally put there for reasons that aren't really
> applicable anymore; you can safely rely on the one that's compiled in to
> named now.  Some background on this can be found in the discussion at
> https://www.mail-archive.com/bind-users@lists.isc.org/msg31664.html.
>
> (And, if for some odd reason you really do need to download a new copy of
> bind.keys instead of updating BIND, you can pull it from the source tree:
> https://gitlab.isc.org/isc-projects/bind9/-/blob/main/bind.keys.)
>
> --
> Evan Hunt -- e...@isc.org
> Internet Systems Consortium, Inc.
>
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: managed-keys vs trust-anchors

2023-01-04 Thread Evan Hunt
On Wed, Jan 04, 2023 at 03:25:10PM -0500, Bob McDonald wrote:
> Thanks Evan and Ondrej.  I'll let the folks at FreeBSD know also. Their
> bind packages still include that file.

The file itself is harmless. But we used to say it was best practice to
check for updates at the ISC website before turning on DNSSEC validation,
and we no longer consider that to be worthwhile advice. Just keep your
packages up to date and you'll be fine.

-- 
Evan Hunt -- e...@isc.org
Internet Systems Consortium, Inc.
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Deprecation notice force BIND 9.20+: source port(s)

2023-01-04 Thread Ondřej Surý
Hi,

in line with out deprecation policy, I am notifying the mailing list about our 
preliminary
intent to deprecate the definition of the source ports and rely on the 
operating system
to provide reasonable ephemeral port range for outgoing UDP and TCP connections.

Specifying outgoing ports is a bad practice, it's already discouraged, it's 
prone to errors
(it's not only specifying single port, but specifying not enough ports removes 
a layer
of protection) and is already full of caveats like:

   .. note:: The address specified in the :any:`query-source` option is used 
for both
  UDP and TCP queries, but the port applies only to UDP queries. TCP
  queries always use a random unprivileged port.

   .. warning:: Specifying a single port is discouraged, as it removes a layer 
of
  protection against spoofing errors.

   .. warning:: The configured :term:`port` must not be the same as the 
listening port.

The deprecation will include:

* specifying **port** in following statements:
  - `query-source`
  - `query-source-v6`
  - `transfer-source`
  - `transfer-source-v6`
  - `notify-source`
  - `notify-source-v6`
  - `parental-source`
  - `parental-source-v6`
* following statements as whole:
  - `use-v4-udp-ports`
  - `use-v6-udp-ports`
  - `avoid-v4-udp-ports`
  - `avoid-v6-udp-ports`

These options will be marked as deprecated in BIND 9.20[1][2] and removed in 
BIND 9.22[3].

1. BIND 9.20 will be released early 2024
2. Most probably we will also enable the warning in BIND 9.18 to notify users
that skip versions.
3. BIND 9.22 will be release in early 2026

Ondrej
--
Ondřej Surý (He/Him)
ond...@isc.org

My working hours and your working hours may be different. Please do not feel 
obligated to reply outside your normal working hours.

-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users