RE: Can not query localhost

2023-01-16 Thread David Carvalho via bind-users
Hi.
It was not oracle linux 9.16 but Bind 9.16.
The problem seemed to be about broken dnssec validation, that's why commenting 
those entries solved.
For now I'm not using dnssec, I will have to read about key rotation. If that 
is still a very manual process, I'll have to be quite confident before I mess 
with my servers.
Thanks.

David

-Original Message-
From: Mark Andrews  
Sent: 13 January 2023 22:48
To: David Carvalho 
Cc: bind-users@lists.isc.org
Subject: Re: Can not query localhost

Now you went from Oracle Linux 6 to Oracle linux 9.16 (b.t.w. no one keeps 
track of which BIND version ships which which random Linux distro, it is much 
better to report the BIND versions as well). In that time there has been a lot 
of change.  Did you copy over just the local configuration changes or did you 
copy over everything?  By local configuration changes I mean just the zone you 
added and any acls.  Distros expect you to put local changes in isolated files 
so they can update defaults configurations without overwriting local config.  
Copying everything means that you are missing all those changes.

> On 14 Jan 2023, at 03:48, David Carvalho via bind-users 
>  wrote:
> 
> 
> Ok, so apparently everything seems to be running fine.
> 
> 
> I am not using dnsssec (dnssec-validation is auto ?!) and 
> "dnssec-enable yes" was considered obsolete by named-checkconfg, so it is 
> also commented.
> I had to comment
> 
> bindkeys-file "/etc/named.iscdlv.key";

Well what was in "/etc/named.iscdlv.key” ?  I suspect it was grossly out of 
date.  Anything that mentions DLV is out of date as that has been shutdown for 
years and is just returning a response that says there is no content here 
anymore.  Also the Root’s DNSSEC keys rolled in 2017 and if it hasn’t been 
updated since before then the key is out of date.  There should be nothing in 
there but public keys which are safe to publish.  Commenting it out meant that 
you are now using the built in trust anchors.  Defaults for DNSSEC have changed 
over time (validation is on by default) and using out of date trust anchors 
with newer versions of BIND will cause DNSSEC validation failures.

> managed-keys-directory "/var/named/dynamic";
> 
> and everything worked. Still don't understand exactly why, I will 
> continue to investigate, but any feedback is welcome.

Named logs why thing fail.  Examine the logs.

> Thanks
> Regards
> David
> 
> 
> 
> -Original Message-
> From: bind-users  On Behalf Of David 
> Carvalho via bind-users
> Sent: 13 January 2023 14:11
> To: 'Marco' ; bind-users@lists.isc.org
> Subject: RE: Can not query localhost
> 
> Thanks for the reply.
> Yes
> 
> ACL active. Exact same configuration as in old server named.conf, with 
> a different listening IP, of course, which belongs to my LAN ACL.
> 
> Performing "dig @localhost any my.domain" works perfectly. If querying 
> just "dig @localhost" or "dig @my.ip", tcpdump shows it trying to 
> connect to top level IPs And I keep getting SERVFAIL.
> 
> 
> Regards.
> David
> 
> 
> -Original Message-
> From: Marco 
> Sent: 13 January 2023 11:33
> To: bind-users@lists.isc.org
> Cc: David Carvalho 
> Subject: Re: Can not query localhost
> 
> Am 13.01.2023 schrieb David Carvalho via bind-users
> :
> 
>> I get SERVFAIL when querying outside my domain.
> 
> Have you enabled an ACL that allows any IP address to query your 
> public zones?
> 
> You can only restrict recursive requests to your own IP addresses.
> 
> --
> Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
> from this list
> 
> ISC funds the development of this software with paid support subscriptions.
> Contact us at https://www.isc.org/contact/ for more information.
> 
> 
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users
> 
> --
> Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
> from this list
> 
> ISC funds the development of this software with paid support subscriptions. 
> Contact us at https://www.isc.org/contact/ for more information.
> 
> 
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users

--
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742  INTERNET: ma...@isc.org


-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


RE: Incremental transfers generate complete zone reloading

2023-01-16 Thread Bob McDonald
This is just conjecture but I'll take a stab at this problem.

First, the fact that the zone is RPZ really doesn't have any bearing on
this problem.

Do you control both the primary and secondary zones?

Please provide the SOA for the zone. This will allow the list to see some
key timer values.

1) Updates are applied to the primary zone which triggers a notify to the
secondary zone and a resulting incremental zone transfer. (IXFR)

2) Before the IXFR from item 1 is finished, the refresh timer expires
triggering the secondary zone to request the SOA from the primary. Since
the serial number on the secondary has not yet been updated as a result of
the IXFR from item 1, the secondary requests ANOTHER IXFR from the primary.
This can cause the overlap you are seeing.

The following suggestions for possible workarounds depend on you having
control of both primary and secondary zones.

There are a couple of things that could help. the refresh timer for
properly configured dynamically updatable zone sets needs to be set fairly
high. I like 8 hours. YMMV.

The updates to the primary zone can be effectively batched using the
notify-delay value. This will require some further thought and testing. The
ultimate value depends on the volume of updates being generated.

Hope that helps,

Bob
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Incremental transfers generate complete zone reloading

2023-01-16 Thread Petr Špaček

On 16. 01. 23 15:02, Bob McDonald wrote:

This is just conjecture but I'll take a stab at this problem.

First, the fact that the zone is RPZ really doesn't have any bearing on 
this problem.


Well, that's incorrect. Please see
https://lists.isc.org/pipermail/bind-users/2023-January/107212.html

--
Petr Špaček

--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: DNS Cookies Causing FORMERR

2023-01-16 Thread Justin Krejci
Sounds good. I will just buckle down and stay the course. As I encounter these 
servers, I have been attempting to reach out to all of the organizations whose 
DNS servers exhibit this behavior. Some are less responsive than others, as in 
completely ignored. :/



Thanks for the feedback.




From: Mark Andrews 
Sent: Friday, January 6, 2023 2:57 PM
To: Justin Krejci
Cc: bind-users@lists.isc.org
Subject: Re: DNS Cookies Causing FORMERR

Really there are very few servers that are broken and the numbers are 
decreasing.  They are well under 1%. Just contact the few remaining server 
operators and inform them that they are broken.  It should just be an upgrade 
to the current version to fix.

The behavior for unknown EDNS options was tightened nearly 10 years ago (April 
2013). It was unspecified in the original EDNS RFC and made ignored in in the 
updated RFC which every vendor should have picked up. At the time some vendors 
ignored unknown options and others returned FORMERR or NOTIMP or REFUSED. 
Others just dropped the request. Some returned BADVER.  It was a mess.

There are also implementations that don’t know how to return FORMERR properly.  
You don’t echo back the request with rcode set to FORMERR and QR to 1 as that 
produces broken responses but some implementations do that. Why would you send 
a message that you don’t understand?  Nowhere is there any instructions to do 
this.

To send a FORMER you send a DNS message header with rcode set to FORMERR. If 
you can parse the question section for QUERY copy that into the response. If 
you understand EDNS you can add an OPT record. Similarly TSIG if appropriate 
and you support it  Yes you can sign a FORMERR.
--
Mark Andrews

On 7 Jan 2023, at 06:50, Justin Krejci  wrote:



DNS Servers that do not properly support or properly ignore DNS cookies and 
instead return FORMERR is annoying. This is not new. However I have been seeing 
more or perhaps just have more users that are finding more domains that are 
hosted on authoritative servers with this unfortunate behavior.

Example progrowth.com name severs.

Individual work arounds on caching BIND servers are not difficult to implement, 
like this

server  47.206.74.18 {
send-cookie no;
};
server  209.131.228.178 {
send-cookie no;
};


However this workaround is problematic in terms of ongoing upkeep of this list 
and the increasing need to add new entries to the list. I'd like to be able to 
start sending cookies again if the servers begin to operate compliant to the 
EDNS RFC and I would like to not have to write any tools to remove entries from 
this list or schedule some regular calendar reminder to check or add to Nagios 
or whatever. I'd also rather not just globally disable sending of DNS cookies 
but it is something being considered.

In this article @ https://kb.isc.org/docs/aa-01387 it states near the bottom

"Nevertheless, mishandling of the COOKIE option has been known to cause errors 
that are fatal to name resolution when the resolver is validating responses 
coming from a signed zone, and the authoritative server returns either FORMERR 
or BADVERS, or fails to respond to the query. named treats these answers as if 
the server does not support EDNS (which it doesn't) so it stops sending any 
EDNS queries at all, which makes it impossible to get a DNSSEC response back."

This statement indicates this fall-back method is only applicable to signed 
domains. Is there a knob in BIND to apply this behavior to all domains? 
Basically, if the authoritative server is behaving incorrectly in this way then 
enable no-EDNS or no-COOKIE mode in the interest of allowing DNS queries to 
continue to be answered for the end users.

My caching servers are running the BIND 9.18 branch

Thanks for any pointers or suggestions.

-Justin

--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Incremental transfers generate complete zone reloading

2023-01-16 Thread Bob McDonald
Mea Culpa. Apparently RPZ IS the issue here.

I learn something new every time I read this list.

My apologies for the waste of bandwidth.

Bob

On Mon, Jan 16, 2023 at 9:02 AM Bob McDonald  wrote:

> This is just conjecture but I'll take a stab at this problem.
>
> First, the fact that the zone is RPZ really doesn't have any bearing on
> this problem.
>
> Do you control both the primary and secondary zones?
>
> Please provide the SOA for the zone. This will allow the list to see some
> key timer values.
>
> 1) Updates are applied to the primary zone which triggers a notify to the
> secondary zone and a resulting incremental zone transfer. (IXFR)
>
> 2) Before the IXFR from item 1 is finished, the refresh timer expires
> triggering the secondary zone to request the SOA from the primary. Since
> the serial number on the secondary has not yet been updated as a result of
> the IXFR from item 1, the secondary requests ANOTHER IXFR from the primary.
> This can cause the overlap you are seeing.
>
> The following suggestions for possible workarounds depend on you having
> control of both primary and secondary zones.
>
> There are a couple of things that could help. the refresh timer for
> properly configured dynamically updatable zone sets needs to be set fairly
> high. I like 8 hours. YMMV.
>
> The updates to the primary zone can be effectively batched using the
> notify-delay value. This will require some further thought and testing. The
> ultimate value depends on the volume of updates being generated.
>
> Hope that helps,
>
> Bob
>
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users