private tld

2013-08-20 Thread Maria
My company uses a private tld. We are working on fixing that but the fix is 
going to take a while, especially if our solution ends up being trying to 
register it with icann.

Our resolvers that all internet queries go through have a forward zone 
statement for that tld to some internal name servers. Unfortunately, when I 
turn on dnssec validation our resolvers go check out the root zone, see our 
private zone doesn't exist, and refuse to resolve records in the zone. Is there 
a solution I can put in place so we can do dnssec validation in the meantime 
while we work on ceasing to use the private tld?

Thanks,
Maria

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: private tld

2013-08-21 Thread Maria
Thank you for all of the responses, I really appreciate it. Clearly the
best approach is to sign the internal tld, but at the moment I can't do that
because I would need new internal servers, ours don't support dnssec.

I configured it as a slave and it's working. Thanks!

Maria

On Tue, Aug 20, 2013 at 08:17:03PM -0500, Timothy Morizot wrote:
> DNSSEC sign the private TLD and configure its KSK as a trust anchor on the
> recursive resolvers.
> 
> Alternatively, you can configure all your recursive resolvers as slaves for
> the private zone. Authoritative responses aren't validated on a mixed
> authoritative/recursive nameserver.
> 
> Those are the only two options that immediately spring to my mind.
> 
> Scott
> On Aug 20, 2013 5:16 PM, "Maria"  wrote:
> 
> > My company uses a private tld. We are working on fixing that but the fix
> > is going to take a while, especially if our solution ends up being trying
> > to register it with icann.
> >
> > Our resolvers that all internet queries go through have a forward zone
> > statement for that tld to some internal name servers. Unfortunately, when I
> > turn on dnssec validation our resolvers go check out the root zone, see our
> > private zone doesn't exist, and refuse to resolve records in the zone. Is
> > there a solution I can put in place so we can do dnssec validation in the
> > meantime while we work on ceasing to use the private tld?
> >
> > Thanks,
> > Maria
> >
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Reinstall after modifying

2013-08-21 Thread Maria
On Wed, Aug 21, 2013 at 08:18:36PM +0200, Jan-Piet Mens wrote:
> > how can I install bind as a named server after I have made my
> > modification to it's source code without using "yum"
> 
> First you ./configure, specifying the options you want to use; pay
> particular attention to installation paths. (The best way to determine
> how your existing BIND was configured is to locate a SRC RPM file and
> look at its .spec file and patches.)
> 
> Then you `make'. If all goes well, you either `make install', in which
> case the files and programs are copied to the paths you specified in the
> first step, or if you just want to test `named', you can run
> `bin/named/named' from the top-level directory of the source
> distribution. 
> 
> -JP

Don't forget to exclude the bind packages in yum.conf or it will be
overwritten in an update.

If you do this for the same reason as I do, to get the pre-made
/var/named/chroot directory, then you might like this. After the server
is first built, I move /var/named/chroot out of harms way and remove all
the bind packages. Then I put it back and can make my own bind
installation with whatever paths I like.

Maria

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


packet size

2013-09-11 Thread Maria Iano
What does it mean when the edns0 response to a dig says the overall packet size 
will be one value but the message size reported is different. For example in 
this reponse the OPT PSEUDOSECTION says udp: 4096 but at the end it says MSG 
SIZE  rcvd: 275.

$ dig www.google.com

; <<>> DiG 9.9.3-P2-gci-9.9.3-P2-1.P2.gci.el6 <<>> www.google.com
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 18023
;; flags: qr rd ra; QUERY: 1, ANSWER: 6, AUTHORITY: 4, ADDITIONAL: 5

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;www.google.com.IN  A

;; ANSWER SECTION:
www.google.com. 113 IN  A   74.125.131.147
www.google.com. 113 IN  A   74.125.131.103
www.google.com. 113 IN  A   74.125.131.99
www.google.com. 113 IN  A   74.125.131.105
www.google.com. 113 IN  A   74.125.131.104
www.google.com. 113 IN  A   74.125.131.106

;; AUTHORITY SECTION:
google.com. 95419   IN  NS  ns4.google.com.
google.com. 95419   IN  NS  ns3.google.com.
google.com. 95419   IN  NS  ns2.google.com.
google.com. 95419   IN  NS  ns1.google.com.

;; ADDITIONAL SECTION:
ns1.google.com. 95419   IN  A   216.239.32.10
ns2.google.com. 95419   IN  A   216.239.34.10
ns3.google.com. 95419   IN  A   216.239.36.10
ns4.google.com. 95419   IN  A   216.239.38.10

;; Query time: 0 msec
;; SERVER: 127.0.0.1#53(127.0.0.1)
;; WHEN: Wed Sep 11 11:56:32 EDT 2013
;; MSG SIZE  rcvd: 275

I want to know because I have been asked what the impact to DNS in our 
environment would be if they dropped udp fragments at the border. It seems to 
me I would have to configure our name servers to drop back to tcp when a packet 
is over 1500. I'm trying to understand just how much that would impact the 
servers.

Thanks,
Maria
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


make test fails without Net::DNS::Nameserver

2015-07-14 Thread Maria Iano
I don't see this mentioned anywhere else, although I'm suprised by that
so maybe I'm missing something. When I build bind-9.10.2-P2 I find
that "make test" fails for reclimit with "Couldn't start server ans2" if
I don't have Net::DNS::Nameserver installed. After I install it the
testing is successful.

Maria

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


REQUIRE(rdataset->rdclass == db->rdclass) failed

2015-07-30 Thread Maria Iano
We have a private internal TLD which I have our resolver pull as a slave zone
to prevent it failing dnssec. It has subdomains and normally our
resolver follows the delegations and resolves those correctly without
needing to pull slave copies.

If I use the option:
attach-cache "globalcache";

and query a subdomain then named dies with the error:
general: critical: db.c:767: REQUIRE(rdataset->rdclass == db->rdclass) failed
general: critical: exiting (due to assertion failure)

So far my server is running fine once I remove 'attach-cache
"globalcache";'.

Is this a known issue with internal private TLDs and I should just give
up on using a shared cache? Getting rid of our internal domain is a huge
undertaking which won't be completed any time soon.

Thanks,
Maria
?
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: REQUIRE(rdataset->rdclass == db->rdclass) failed

2015-07-30 Thread Maria Iano
On Thu, Jul 30, 2015 at 05:56:31PM +, Evan Hunt wrote:
> 
> On the one hand: No, this is a bug, and I'd appreciate it if you'd
> bundle up your named.conf (with key secrets stripped out; you can use
> named-checkconf -px to do this automatically) and the details of the query
> you sent to bind9-b...@isc.org.
> 
> On the other hand: I don't see why you'd want to share a cache between two
> views if only one of them has access to the internal TLD.
> 

I submitted the bug report and it's ISC-Bugs #40205. I only have one
view for "in"; the reason I am using views is to make chaos bind queries
work for specific client IPs only. I don't want to waste a bunch of
memory doing that if I don't have to - so I put in the shared cache
option. Taking it out means I have to go back and do my sums again to
work out what max cache sizes and number of clients to specify.

Thanks,
Maria

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


why one shouldn't use relative hostnames

2010-11-10 Thread Maria Iano
We are working with a software vendor whose software only works with relative 
hostnames - they say it can't cope with a fully-qualified domain name. They 
want us to make sure the necessary domain is in all clients' search lists. Does 
anyone have any good references for me to explanations of why this is a very 
bad thing. I would find quick access to thoughtful well-phrased arguments very 
useful right now.

Thanks!
Maria
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: why one shouldn't use relative hostnames

2010-11-12 Thread Maria Iano
Thank you both and Kevin I for one would really appreciate if you  
would compose that web page and put it out there!


On Nov 11, 2010, at 8:40 AM, Stacey Jonathan Marshall wrote:

Additionally a wildcard record in one of the the searched domains  
would cause a false positive to be returned causing an outage to the  
service/services.  And if your not in control of the zone or the  
search order it could be difficult to rectify.


-Stacey

On 11/11/2010 00:30, Kevin Darcy wrote:

On 11/10/2010 1:19 PM, Maria Iano wrote:
We are working with a software vendor whose software only works  
with relative hostnames - they say it can't cope with a fully- 
qualified domain name. They want us to make sure the necessary  
domain is in all clients' search lists. Does anyone have any good  
references for me to explanations of why this is a very bad thing.  
I would find quick access to thoughtful well-phrased arguments  
very useful right now.



I've looked for such a thing from time to time, with no success.

Maybe I need to compose something like that.

Main reasons for not using shortnames:
a) Security. The problem cited way back in RFC 1535 still exists,  
in a slightly different form, with respect to shortnames, i.e.  
they're ambiguous and can cause names to resolve unexpectedly, thus  
causing connections to be made to unexpected hosts, which might not  
be trusted. E.g. we have multiple DNS names with the first label of  
"mailroom", one could potentially connect to the wrong "mailroom"  
server, depending on the (somewhat arbitrary) ordering of one's  
searchlist. A less-trusted "mailroom" server could trojan the more- 
trusted one.
b) Capacity and performance (specifically, query latency). Each  
searchlist element magnifies query volume, and increases query  
latency for all queries which don't happen to resolve with the  
first element in the searchlist. Names which don't resolve at all  
(typos, obsolete references, etc.) exhaust the *entire* searchlist,  
which has maximum latency to the invoking application, and uses  
maximum nameservice-infrastructure, network, logging and/or server  
resources.
c) Undesired dependencies and co-ordination challenges. Shortname  
resolution depends on the precise configuration of searchlists, but  
in many organizations the DNS infrastructure experts are not in the  
same department as those who control the configuration of  
searchlists (which are often "client OS" experts rather than in the  
"server" or "networking" areas), so there can be co-ordination  
challenges between the departments. When using FQDNs, searchlists  
are unnecessary and therefore the dependencies and co-ordination  
challenges are minimized
d) Inconsistency between internal and Internet environments; future- 
proofing. Shortnames are, by and large, not used on the Internet,  
because of the foregoing reasons, writ large because of the sheer  
scale and diversity of the Internet and its DNS namespace. If  
shortnames are used on an internal network, there is an  
inconsistency between the the two environments, internal and  
Internet, which may cause confusion and interoperability  
challenges, should a particular function or subsystem be "out- 
hosted" and/or attached to an Internet-accessible "cloud" at some  
point in the future. Under this heading, it should be noted that  
some Internet-oriented technologies absolutely require FQDNs as  
part of their formal specification. To my knowledge, no formal  
specifications (other than WINS/NETBIOS perhaps) require  
shortnames. Therefore, to be most flexible and accommodating to  
changing technologies and environments, it is best to use the  
naming format -- FQDNs -- which is most likely to be compatible and  
interoperable going forward.



   - Kevin


___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


looking for reference to correct behavior

2009-05-11 Thread Maria Iano

My apologies if this is considered to be too off-topic.

I have a situation where my company uses a number of servers with a  
commercial DNS implementation (in addition to our BIND servers). The  
other implementation is Windows DNS, and there is some behavior that I  
do not think is acceptable, but which the vendor claims is acceptable  
behavior. I really want them to fix this bug (as I consider it), but  
first I need to get general agreement that it is a bug. I will be  
looking through the RFCs as much as I can time for, but haven't found  
what I need yet. Since my next meeting with the vendor is tomorrow, I  
thought I would also ask if anyone can already point me to a relevant  
RFC or other reference.


Here is the behavior that I think is not acceptable.

We have configured a zone on the windows server - dmz.example.com.  
This zone contains an A record for foo.dmz.example.com with IP address  
10.240.240.240. The zone example.com is hosted elsewhere and contains  
a CNAME record foo.example.com pointing to foo.dmz.example.com.


If the cache has just been cleared, and a client asks the WIndows DNS  
server for foo.example.com, it has a forwarding server to which it  
forwards the request. The forwarding server hands it back the CNAME  
record but it also hands back an A record for foo.dmz.example.com  
pointing to an incorrect IP address 192.168.240.240. The Windows DNS  
server accepts this A record for foo.dmz.example.com with an incorrect  
IP address into its cache, and hands out that incorrect information to  
the client. Even though it concurrently has dmz.gannett.com configured  
on it as a primary zone with a record for that same owner name  
pointing to a different IP address.


I believe it shouldn't do that. Since it hosts dmz.example.com as a  
primary zone, I think it should discard that bad A record and hand  
back its own.


The vendor's argument is that it should blindly trust the forwarding  
resolver.


Can anyone point me to an RFC or reference about this?

Thanks,
Maria
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: looking for reference to correct behavior

2009-05-29 Thread Maria Iano
By saying things like "We load the authoritative data into memory so  
that is also cached data" and other nonsense the vendor is stating  
that this behavior is in compliance with the RFCs and refusing to fix  
their code. Very frustrating, as I believe this behavior is clearly  
wrong and also seems to me to be a security issue.


Thanks for your help anyway!
Maria

On May 11, 2009, at 2:33 PM, Kevin Darcy wrote:


The "resolver algorithm" in RFC 1034, Section 5.3.3, states

  1. See if the answer is in local information, and if so return

it to the client.


and is further detailed as

  Step 1 searches the cache for the desired data. If the data is in  
the
  cache, it is assumed to be good enough for normal use. Some  
resolvers
  have an option at the user interface which will force the resolver  
to
  ignore the cached data and consult with an authoritative server.  
This
  is not recommended as the default. If the resolver has direct  
access to

  a name server's zones, it should check to see if the desired data is
  present in authoritative form, and if so, use the authoritative  
data in

  preference to cached data.

This would be a case where the resolver "has direct access to the  
name server's zones", so there is no debate, in my opinion, that the  
resolver in question is doing The Wrong Thing.


RFC 2181 also makes it clear that authoritative data ranks higher  
than cached data, so that could also be used as a relevant normative  
reference.


- Kevin

Maria Iano wrote:

My apologies if this is considered to be too off-topic.

I have a situation where my company uses a number of servers with a  
commercial DNS implementation (in addition to our BIND servers).  
The other implementation is Windows DNS, and there is some behavior  
that I do not think is acceptable, but which the vendor claims is  
acceptable behavior. I really want them to fix this bug (as I  
consider it), but first I need to get general agreement that it is  
a bug. I will be looking through the RFCs as much as I can time  
for, but haven't found what I need yet. Since my next meeting with  
the vendor is tomorrow, I thought I would also ask if anyone can  
already point me to a relevant RFC or other reference.


Here is the behavior that I think is not acceptable.

We have configured a zone on the windows server - dmz.example.com.  
This zone contains an A record for foo.dmz.example.com with IP  
address 10.240.240.240. The zone example.com is hosted elsewhere  
and contains a CNAME record foo.example.com pointing to  
foo.dmz.example.com.


If the cache has just been cleared, and a client asks the WIndows  
DNS server for foo.example.com, it has a forwarding server to which  
it forwards the request. The forwarding server hands it back the  
CNAME record but it also hands back an A record for  
foo.dmz.example.com pointing to an incorrect IP address  
192.168.240.240. The Windows DNS server accepts this A record for  
foo.dmz.example.com with an incorrect IP address into its cache,  
and hands out that incorrect information to the client. Even though  
it concurrently has dmz.gannett.com configured on it as a primary  
zone with a record for that same owner name pointing to a different  
IP address.


I believe it shouldn't do that. Since it hosts dmz.example.com as a  
primary zone, I think it should discard that bad A record and hand  
back its own.


The vendor's argument is that it should blindly trust the  
forwarding resolver.


Can anyone point me to an RFC or reference about this?

Thanks,
Maria

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


do I have this wrong?

2009-05-29 Thread Maria Iano
If I should not be sending this to this list please let me know.  
Please let me know if you think I have this wrong:


Bare Minimum to be considered a usable DNS server (under limited  
conditions):


When a zone is configured locally as a master or slave zone, only hand  
out data from the local configuration. Do not accept records in that  
zone into the cache that come from another server. Never hand out data  
in that zone received from another server.


Desired Behavior to be considered a good working DNS server:

In addition to the above:

When a zone is configured locally as a stub zone, only accept into  
cache records in that zone from the zone's name servers as configured  
in the stub zone. Never hand out data from that zone unless it was  
received from one of the zone's name servers.


When a zone is configured locally as a forward zone, only accept  
records in that zone into the cache that come from the servers to  
which the zone was specified to be forwarded. Never hand out data from  
that zone unless it was received from one of the forwarders.


Thanks,
Maria
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


wildcard not working after record deleted

2017-06-19 Thread Maria Iano
We have a group of users that need to use a wildcard record in their
zone. Their wildcard works in general, but they have a situation where it
isn't working. They had some records that they deleted, and expected
the wildcard to take over, but it hasn't. If we query a record that
doesn't exist and never has in the zone, then we get the answer from
the wildcard. If we query a record that used to exist but was deleted
and now doesn't exist, then we get no answer. We don't get NXDOMAIN, we
get

status: NOERROR

and no answer.

Has anyone else come across this?

Thanks,
Maria

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: wildcard not working after record deleted

2017-06-20 Thread Maria Iano
On Mon, Jun 19, 2017 at 09:08:33PM -0500, /dev/rob0 wrote:
> On Mon, Jun 19, 2017 at 06:19:31PM -0400, Maria Iano wrote:
> > We have a group of users that need to use a wildcard record in 
> > their zone. Their wildcard works in general, but they have a 
> > situation where it isn't working. They had some records that they 
> > deleted, and expected the wildcard to take over, but it hasn't. If 
> > we query a record that doesn't exist and never has in the zone, 
> > then we get the answer from the wildcard. If we query a record that 
> > used to exist but was deleted and now doesn't exist, then we get no 
> > answer. We don't get NXDOMAIN, we get
> 
> NXDOMAIN means there is no data of any type for the queried owner 
> name.
> 
> > status: NOERROR
> > 
> > and no answer.
> 
> NOERROR means the query completed successfully, with no error.  It 
> might mean in your case that there is other data with that owner 
> name, but no RRset of the requested type.
> 
> IOW, when you have a TXT and A record with the same owner:
> 
> sample7200IN  A   192.0.2.53
> sample7200IN  TXT "This is a sample."
> * 7200IN  A   192.0.2.101
> 
> If you delete the A record, the TXT is still there, and your wildcard 
> A record in the zone would not be used for that name.
> 
> > Has anyone else come across this?
> 
> That's the best guess I can come up with without seeing the query and 
> the zone data.  If you need more help you will have to share that 
> information.

Thanks for your answer. There are no other records with that name in the
zone, and an ANY query comes back empty but still with status of
NOERROR. Unfortunately, I can't provide the query and zone data, and I
do understand that prevents you from helping.

I was hoping someone else had come across this at some point.

Thanks again,
Maria

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: wildcard not working after record deleted

2017-06-20 Thread Maria Iano
On Tue, Jun 20, 2017 at 10:02:04AM -0400, wbr...@e1b.org wrote:
> > Thanks for your answer. There are no other records with that name in the
> > zone, and an ANY query comes back empty but still with status of
> > NOERROR. Unfortunately, I can't provide the query and zone data, and I
> > do understand that prevents you from helping.
> 
> Not even an SOA record?
> 
There is an SOA record under the AUTHORITY SECTION. There is no ANSWER
SECTION. Here is what comes back from a dig command, and I apologize for
having to remove the names:

; <<>> DiG 9.10.2-P3 <<>> @  any
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 19780
;; flags: qr aa rd; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; WARNING: recursion requested but not available

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
; IN  ANY

;; AUTHORITY SECTION:
  300 IN  SOA   2017062002 1200 
600 604800 300

;; Query time: 59 msec
;; SERVER: 
;; WHEN: Tue Jun 20 10:14:58 EDT 2017
;; MSG SIZE  rcvd: 108

That is the entire output from the dig command!

Thanks,
Maria

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: wildcard not working after record deleted

2017-06-20 Thread Maria Iano
On Tue, Jun 20, 2017 at 09:29:59AM -0500, /dev/rob0 wrote:
> On Tue, Jun 20, 2017 at 09:17:58AM -0400, Maria Iano wrote:
> > Thanks for your answer. There are no other records with that name 
> > in the zone, and an ANY query comes back empty but still with 
> > status of NOERROR. Unfortunately, I can't provide the query and 
> > zone data, and I do understand that prevents you from helping.
> > 
> > I was hoping someone else had come across this at some point.
> 
> I can continue to waste our time with guesses, however. :)
> 

I really appreciate that! :)

> Have you tried directed queries to an authoritative nameserver?
> Today's guess is that you might be seeing some kind of caching issue.
> A directed query like this:
> 
> $ dig sample.example.com. any @
> 
> should return the wildcard if all records at "sample.example.com"
> have been removed.

The queries are being directed at an authoritative server, exactly as
you describe above.

This issue applies to some records that were deleted on
June 18th. I can't recreate it. I have deleted other records and
found that the wildcard immediately takes over. As far as I can tell
this only applies to the particular set of records deleted on the 18th.
I'm told they were deleted in the same way we always do.

We also pay for a secondary dns provider who pulls our zones from the
same authoritative servers of ours which have this issue.
The wildcard works when we send the query to one of our secondary
provider's name servers.

Here is the answer from one of the secondary provider's servers:

; <<>> DiG 9.10.2-P3 <<>> @  any
; (2 servers found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 13930
;; flags: qr aa rd; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
;; WARNING: recursion requested but not available

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
; IN  ANY

;; ANSWER SECTION:
  300 IN  CNAME   

;; Query time: 29 msec
;; SERVER: 
;; WHEN: Tue Jun 20 10:40:18 EDT 2017
;; MSG SIZE  rcvd: 82

> 
> If in fact you were querying a caching resolver, is that BIND?  Is 
> the authoritative nameserver BIND?

Our servers are running bind.

Thanks,
Maria

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: wildcard not working after record deleted

2017-06-20 Thread Maria Iano
On Tue, Jun 20, 2017 at 09:37:04AM -0500, /dev/rob0 wrote:
> On Tue, Jun 20, 2017 at 09:29:59AM -0500, /dev/rob0 wrote:
> > On Tue, Jun 20, 2017 at 09:17:58AM -0400, Maria Iano wrote:
> > > Thanks for your answer. There are no other records with that name 
> > > in the zone, and an ANY query comes back empty but still with 
> > > status of NOERROR. Unfortunately, I can't provide the query and 
> > > zone data, and I do understand that prevents you from helping.
> > > 
> > > I was hoping someone else had come across this at some point.
> > 
> > I can continue to waste our time with guesses, however. :)
> > 
> > Have you tried directed queries to an authoritative nameserver? 
> > Today's guess is that you might be seeing some kind of caching 
> > issue.
> 
> Today's guess retracted, I just saw your followup. :)
> 
> > Is the authoritative nameserver BIND?
> 
> If so, what version?  You might need to file a bug report (and as of 
> now the bug database is entirely private; that will be changing soon, 
> but if you ask them, ISC will keep your bug report private.)
> 

Good to know, we may go ahead and file a report if we can't figure this
out.

Thanks!
Maria

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: wildcard not working after record deleted

2017-06-20 Thread Maria Iano
On Tue, Jun 20, 2017 at 10:08:44AM -0500, Bryan Bradsby wrote:
> On Tue, 2017-06-20 at 10:51 -0400, Maria Iano wrote:
> > 
> > The queries are being directed at an authoritative server, exactly as
> > you describe above.
> > 
> > We also pay for a secondary dns provider who pulls our zones from the
> > same authoritative servers of ours which have this issue.
> > The wildcard works when we send the query to one of our secondary
> > provider's name servers.
> > 
> > Here is the answer from one of the secondary provider's servers:
> > 
> > ; <<>> DiG 9.10.2-P3 <<>> @  any
> > 
> > ;; OPT PSEUDOSECTION:
> > ; EDNS: version: 0, flags:; udp: 4096
> > ;; QUESTION SECTION:
> > ; IN  ANY
> > 
> > ;; ANSWER SECTION:
> >   300 IN  CNAME   
> 
> BIND does not allow a CNAME at the apex of the zone, some other flavors
> of DNS servers allow this. 

At first I was really hopeful that we had our explanation, but then I
realized you are talking about a CNAME for the zone itself, which we
don't have. I think this was a misunderstanding because of my sloppy
editing of the dig results. Replacing our zone name with example.com,
our wildcard record looks like this:

*.example.com.  300 IN  CNAME   name.cname.points.to.

Here are the results of a dig query for a record that was deleted, and a
dig query for a record that never existed, this time with the names
again replaced (sorry) with something more helpful.

$ dig @ns1.domain.com. deletedname.example.com. any

; <<>> DiG 9.3.6-P1-RedHat-9.3.6-25.P1.el5_11.12 <<>> @ns1.domain.com. 
deletedname.example.com. any
; (1 server found)
;; global options:  printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 4107
;; flags: qr aa rd; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;deletedname.example.com.   IN  ANY

;; AUTHORITY SECTION:
example.com.300 IN  SOA ns1.domain.com. 
dnsadmin.example.com. 2017062002 1200 600 604800 300

;; Query time: 6 msec
;; SERVER: IPofns1#53(IPofns1)
;; WHEN: Tue Jun 20 11:27:17 2017
;; MSG SIZE  rcvd: 96

$ dig @ns1.domain.com. nonexistentname.example.com. any

; <<>> DiG 9.3.6-P1-RedHat-9.3.6-25.P1.el5_11.12 <<>> @ns1.domain.com. 
nonexistentname.example.com. any
; (1 server found)
;; global options:  printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 8568
;; flags: qr aa rd; QUERY: 1, ANSWER: 1, AUTHORITY: 16, ADDITIONAL: 4

;; QUESTION SECTION:
;nonexistentname.example.com.   IN  ANY

;; ANSWER SECTION:
nonexistentname.example.com.300 IN  CNAME   name.cname.points.to.

;; AUTHORITY SECTION:
list of all of our NS records

;; ADDITIONAL SECTION:
list of IPs of our name servers

;; Query time: 1 msec
;; SERVER: IPofns1#53(IPofns1)
;; WHEN: Tue Jun 20 11:27:26 2017
;; MSG SIZE  rcvd: 462

> 
> Was the wildcard changed to a CNAME in the last edit?
> 

I just checked, and the wildcard record hasn't been changed since 2015.

Thanks,
Maria

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: wildcard not working after record deleted

2017-06-20 Thread Maria Iano
On Tue, Jun 20, 2017 at 05:39:46PM +0200, Matus UHLAR - fantomas wrote:
> 
> note that existande of "something.sample" subdomain also means that
> "sample" exists and is empty.
> 

That's it! They have www.deletedrecord in the zone! I missed it because
I was searching for deletedrecord* and not *.deletedrecord*.
It didn't help that both of our secondary dns providers do
hand back the wildcard answer to the query. I take it that means they
are not using bind, and their implementations follow different rules for
wildcards.

Thank you all for your time!

Maria

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: wildcard not working after record deleted

2017-06-20 Thread Maria Iano
On Tue, Jun 20, 2017 at 12:22:42PM -0400, wbr...@e1b.org wrote:
> Can you post a copy of the zone file, changing any server names that 
> absolutely must be obscure?
> 

Thank you for your help with this, and you are right, if I had sent you
the edited zone file that would have revealed the cause - i.e. the
subdomain records of the deleted records. I had searched for records
beginning with the deleted names, and not records that were
subdomains of the deleted names. Also, our secondary DNS providers hand
out the wildcard record even though the subdomain records exist.

Thanks!
Maria
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: wildcard not working after record deleted

2017-06-20 Thread Maria Iano
On Tue, Jun 20, 2017 at 11:29:27PM +0100, Cathy Almond wrote:
> On 20/06/2017 14:17, Maria Iano wrote:
> 
> As has been explained already, no answer, no error means that the name
> exists, but not an RRset of the type you queried for.
> 
> Since the ANY query also comes back empty, you've probably got a
> situation something like this in the zone:
> 
> sample7200IN  A   192.0.2.53
> child.sample  7200IN  A   192.0.2.54
> * 7200IN  A   192.0.2.101
> 
> If you delete the 'sample' RR, the wildcard will still not match any
> queries for sample.  This is because the existence of 'child.sample'
> means that 'sample' also exists, even though it has no RRsets of any type.
> 
> 'sample' in this case is what's called an 'Empty Non-Terminal'.
> 
> Does this scenario explain what you are seeing?
> 
> Cathy

Yes it does, that is exactly what was happening and we are in good shape
now. I was able to explain to the users and they plan to delete the child
records. I did recommend to them that they not use wildcard records,
but they continue to need them.

Thank you for the detailed explanation!

Maria

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Bind-9.5.0-P2

2009-06-25 Thread Del Solar Navarrete Maria Cristina
Hello

Y have a problem with bind, part of file mesagges is:

Jun 25 12:50:25 amon named[13443]: socket: too many open file descriptors
Jun 25 12:50:26 amon last message repeated 112 times
Jun 25 12:50:26 amon named[13443]: client 200.72.65.45#40268: recursive-clients 
soft limit exceeded, aborting oldest query
Jun 25 12:50:26 amon named[13443]: socket: too many open file descriptors
Jun 25 12:50:27 amon last message repeated 61 times
Jun 25 12:50:27 amon named[13443]: client 206.127.153.68#32705: query (cache) 
'./A/IN' denied
Jun 25 12:50:28 amon named[13443]: socket: too many open file descriptors
Jun 25 12:50:33 amon last message repeated 357 times
Jun 25 12:50:33 amon named[13443]: client 206.127.153.68#34224: query (cache) 
'./A/IN' denied
Jun 25 12:50:33 amon named[13443]: socket: too many open file descriptors
Jun 25 12:50:36 amon last message repeated 347 times
Jun 25 12:50:36 amon named[13443]: client 200.72.45.107#10504: 
recursive-clients soft limit exceeded, aborting oldest query
Jun 25 12:50:36 amon named[13443]: socket: too many open file descriptors
Jun 25 12:50:36 amon last message repeated 75 times
Jun 25 12:50:37 amon named[13443]: client 200.111.174.66#63637: 
recursive-clients soft limit exceeded, aborting oldest query
Jun 25 12:50:37 amon named[13443]: socket: too many open file descriptors
Jun 25 12:50:37 amon last message repeated 16 times
Jun 25 12:50:38 amon named[13443]: client 74.220.97.130#39006: query (cache) 
'./NS/IN' denied
Jun 25 12:50:38 amon named[13443]: socket: too many open file descriptors
Jun 25 12:50:38 amon last message repeated 82 times
Jun 25 12:50:38 amon named[13443]: client 74.220.97.130#39006: query (cache) 
'./NS/IN' denied
Jun 25 12:50:38 amon named[13443]: socket: too many open file descriptors
Jun 25 12:50:39 amon last message repeated 95 times
Jun 25 12:50:39 amon named[13443]: client 164.77.239.164#57193: 
recursive-clients soft limit exceeded, aborting oldest query
Jun 25 12:50:39 amon named[13443]: socket: too many open file descriptors
Jun 25 12:50:39 amon last message repeated 5 times
Jun 25 12:50:39 amon named[13443]: client 206.127.153.68#35730: query (cache) 
'./A/IN' denied
Jun 25 12:50:39 amon named[13443]: socket: too many open file descriptors
Jun 25 12:50:39 amon last message repeated 20 times
Jun 25 12:50:39 amon named[13443]: client 74.220.97.130#39006: query (cache) 
'./NS/IN' denied
Jun 25 12:50:39 amon named[13443]: socket: too many open file descriptors
Jun 25 12:50:41 amon last message repeated 179 times
Jun 25 12:50:43 amon named[13443]: client 200.111.12.170#63932: 
recursive-clients soft limit exceeded, aborting oldest query
Jun 25 12:50:43 amon named[13443]: socket: too many open file descriptors

--

Rndc status

version: 9.5.0-P2 (entel DNS)
number of zones: 20
debug level: 0
xfers running: 0
xfers deferred: 0
soa queries in progress: 0
query logging is OFF
recursive clients: 1800/1900/2000
tcp clients: 2/100
server is up and running

-

[r...@amon sbin]# ulimit -a
core file size  (blocks, -c) 0
data seg size   (kbytes, -d) unlimited
max nice(-e) 0
file size   (blocks, -f) unlimited
pending signals (-i) 128363
max locked memory   (kbytes, -l) 32
max memory size (kbytes, -m) unlimited
open files  (-n) 4096
pipe size(512 bytes, -p) 8
POSIX message queues (bytes, -q) 819200
max rt priority (-r) 0
stack size  (kbytes, -s) 10240
cpu time   (seconds, -t) unlimited
max user processes  (-u) 128363
virtual memory  (kbytes, -v) unlimited
file locks  (-x) unlimited

Every day, to the same hour

Please, help me

Bye

Se despide cordialmente

Mª Cristina Del Solar N.

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


RE: Bind-9.5.0-P2

2009-06-26 Thread Del Solar Navarrete Maria Cristina
Hi

I have Red Hat Enterprise Linux Server release 5 (Tikanga)

Se despide cordialmente

Mª Cristina Del Solar N.
Administración de Servicios
Subgerencia de Adm. de Sistemas
Gerencia Operaciones TI
ENTEL S.A.
Teléfono: 3606309  
E-mail: mdelso...@entel.cl

-Original Message-
From: JINMEI Tatuya /  [mailto:jin...@isc.org] 
Sent: Jueves, 25 de Junio de 2009 18:27
To: Del Solar Navarrete Maria Cristina
Cc: bind-users@lists.isc.org
Subject: Re: Bind-9.5.0-P2

At Thu, 25 Jun 2009 13:05:27 -0400,
Del Solar Navarrete Maria Cristina  wrote:

> Y have a problem with bind, part of file mesagges is:

Please use 9.5.1.  9.5.0-P2 is an emergency security fix version with
limitation on performance/scalability.  It should still work (or have
worked) for most people, but cannot work in a highly busy environment.
The log and status output seem to indicate your operational
environment is such a busy one.

(BTW: how 9.5.1 is effective also depends on your OS.  Which OS are
you using?)

---
JINMEI, Tatuya
Internet Systems Consortium, Inc.
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users