Question about dynamic IPv6-PTR-Generation

2016-08-25 Thread Tom Tom
Hi list

I'm searching a way to respond to IPv6-PTR-Queries like the
"$GENERATE"-mechanism for IPv4 has done it.

I read about Delegation, self-registration with "tcp-self" or using
Wildcards with the disadvantage, that every query has the same
response. Is there a (planned) way, to generate reverse-responses
"on-the-fly" with bind? I'm using the latest bind (9.10.4-P2).

Many thanks for your help.
Kind regards,
Tom
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Zones declared in a catalog-zone are not transferred successfully over XoT

2023-01-09 Thread Tom

Hi list

Running a primary and a secondary with each BIND-9.18.9 and using 
catalog zones.


I'm trying to use XoT for the catalog-zones. The catalog zone itself is 
transferred over XoT without any issues, but the zones *within* the 
catalog-zone aren't transferred succesfully.


On the primary, I configured a "listen-on"-directive for TLS:
tls "xot" {
cert-file "/etc/named/tls/tls.pem";
key-file "/etc/named/tls/tls.key";
protocols { TLSv1.2; };
session-tickets yes;
};

options {
...
listen-on port 853 tls "xot" { 192.168.1.1; };
};


On the secondary, I configured a tls profile too:
tls "xot" {
protocols { TLSv1.2; };
session-tickets yes;
};

and the necessary catalog-zones configuration:
...

catalog-zones {
zone "catz.example.local"
in-memory no
zone-directory "/var/named/slave/catzones"
min-update-interval 5
default-primaries { 192.168.1.1 port 853 tls "xot"; };
};
...

What I see here, is that the secondary tries to transfer the zones 
(which are declared in the catalog-zone) from the primary with UDP-853 
and does nothing with TLS (and just one thing with TCP, see below).


The secondary gives up trying with UDP-853 (6x) and tries to connect 
with TCP (but no TLS) one time and shows then the following error:
09-Jan-2023 15:57:49.787 general: info: zone example.ch/IN: refresh: 
retry limit for primary 192.168.1.1#853 exceeded (source 0.0.0.0#0)
09-Jan-2023 15:57:49.787 xfer-in: info: zone example.ch/IN: Transfer 
started.
09-Jan-2023 15:57:49.788 xfer-in: info: transfer of 'example.ch/IN' from 
192.168.1.1#853: connected using 192.168.1.1#853 TSIG testkey
09-Jan-2023 15:57:49.788 xfer-in: error: transfer of 'example.ch/IN' 
from 192.168.1.1#853: failed while receiving responses: end of file
09-Jan-2023 15:57:49.788 xfer-in: info: transfer of 'example.ch/IN' from 
192.168.1.1#853: Transfer status: end of file
09-Jan-2023 15:57:49.788 xfer-in: info: transfer of 'example.ch/IN' from 
192.168.1.1#853: Transfer completed: 0 messages, 0 records, 0 bytes, 
0.001 secs (0 bytes/sec) (serial 0)






The appropriate tcpdump looks like this where 192.168.1.2 is the 
secondary and 192.168.1.1 is the primary:

15:56:19.719792 IP 192.168.1.2.45333 > 192.168.1.1.853: UDP, length 159
15:56:34.735035 IP 192.168.1.2.45333 > 192.168.1.1.853: UDP, length 159
15:56:49.741560 IP 192.168.1.2.45333 > 192.168.1.1.853: UDP, length 159
15:57:04.757216 IP 192.168.1.2.31594 > 192.168.1.1.853: UDP, length 144
15:57:19.757964 IP 192.168.1.2.31594 > 192.168.1.1.853: UDP, length 144
15:57:34.773366 IP 192.168.1.2.31594 > 192.168.1.1.853: UDP, length 144
15:57:49.789218 IP 192.168.1.2.37670 > 192.168.1.1.853: Flags [S], seq 
1845821283, win 24400, options [mss 1220,nop,nop,sackOK,nop,wscale 7], 
length 0
15:57:49.789457 IP 192.168.1.1.853 > 192.168.1.2.37670: Flags [S.], seq 
385431624, ack 1845821284, win 24400, options [mss 
1220,nop,nop,sackOK,nop,wscale 7], length 0
15:57:49.789503 IP 192.168.1.2.37670 > 192.168.1.1.853: Flags [.], ack 
1, win 191, length 0
15:57:49.789745 IP 192.168.1.2.37670 > 192.168.1.1.853: Flags [P.], seq 
1:147, ack 1, win 191, length 146
15:57:49.789816 IP 192.168.1.1.853 > 192.168.1.2.37670: Flags [.], ack 
147, win 199, length 0
15:57:49.790013 IP 192.168.1.1.853 > 192.168.1.2.37670: Flags [F.], seq 
1, ack 147, win 199, length 0
15:57:49.790070 IP 192.168.1.2.37670 > 192.168.1.1.853: Flags [F.], seq 
147, ack 2, win 191, length 0
15:57:49.790134 IP 192.168.1.1.853 > 192.168.1.2.37670: Flags [.], ack 
148, win 199, length 0



Any hints how I need to configure the "default-primaries"-option in the 
"catalog-zones"-directive to properly "speak" XoT?



btw: Using dig for transferring the zone from the primary with XoT and 
TSIG is working fine:

$ dig @192.168.1.1 -k /tmp/key +tls +onesoa axfr example.ch


Many thanks in advance,
Tom
--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Zones declared in a catalog-zone are not transferred successfully over XoT

2023-01-09 Thread Tom

Hi Aram

Thanks a lot for your quick response. I've tested with 9.18.10 which 
definitely solved this issue and XoT for catalog-zones is now working fine.


Best regards,
Tom


On 1/9/23 16:38, Aram Sargsyan wrote:

Hello Tom,

I see you are using BIND 9.18.9, can you retry with the latest version of BIND 
9.18?

An issue, which looks similar to the one that you are experiencing, was fixed 
in BIND 9.18.10, see https://gitlab.isc.org/isc-projects/bind9/-/issues/3638

Kind regards,

Aram

--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Message "Loop detected resolving..." and different query-behavior after flushing a cache entry

2023-02-21 Thread Tom

Hi list

Using BIND-9.19.10:

An A-query on our resolver for "ns2.comtronic.ch" causes the following 
info in the named.log, after the first response was answered to the 
client and cached and then the entry is flushed from cache with "rndc 
flushname ns2.comtronic.ch":
21-Feb-2023 09:23:15.463 resolver: info: loop detected resolving 
'ns2.comtronic.ch/A'



The appropriate tcpdump for BIND-9.19.10 while the loop is detected 
looks like this (after flushing the cached name with "rndc flushname 
ns2.comtronic.ch"):


# Client query
09:27:25.957381 IP 10.100.2.62.54792 > 10.100.102.21.53: 4744+ [1au] A? 
ns2.comtronic.ch. (57)


# Query from the resolver to the authoritative server for A
09:27:25.957984 IP6 2001:db8::affe.20495 > 2a02:1368:1:47::53.53: 50231 
[1au] A? ns2.comtronic.ch. (45)



# Querying TLD nameserver for A and 
09:27:25.958177 IP6 2001:db8::affe.13748 > 2001:678:3::1.53: 9026% [1au] 
? ns2.comtronic.ch. (45)
09:27:25.958283 IP6 2001:db8::affe.2773 > 2001:678:3::1.53: 20217% [1au] 
A? ns2.comtronic.ch. (45)


# Response from the authoritative
09:27:25.958684 IP6 2a02:1368:1:47::53.53 > 2001:db8::affe.20495: 
50231*- 1/0/1 A 195.200.242.162 (61)


# Response back to the client
09:27:25.958915 IP 10.100.102.21.53 > 10.100.2.62.54792: 4744 1/0/1 A 
195.200.242.162 (89)



# Delegations back from the TLD nameserver for the A and  query
09:27:25.960140 IP6 2001:678:3::1.53 > 2001:db8::affe.13748: 9026- 
0/10/10 (695)
09:27:25.960284 IP6 2001:678:3::1.53 > 2001:db8::affe.2773: 20217- 
0/10/10 (695)



# Query against another authoritative for A and 
09:27:25.960516 IP6 2001:db8::affe.30306 > 2a02:1368:1:48::53.53: 6112% 
[1au] ? ns2.comtronic.ch. (45)
09:27:25.960543 IP6 2001:db8::affe.5267 > 2a02:1368:1:48::53.53: 8517% 
[1au] A? ns2.comtronic.ch. (45)



# Answer back from the authoritative (no  record found for 
"ns2.comtronic.ch)
09:27:25.961284 IP6 2a02:1368:1:48::53.53 > 2001:db8::affe.5267: 8517*- 
1/0/1 A 195.200.242.162 (61)
09:27:25.961374 IP6 2a02:1368:1:48::53.53 > 2001:db8::affe.30306: 6112*- 
0/1/1 (96)




BIND-9.19.10 behaves differently to BIND-9.18.12 regarding -Lookups. 
BIND-9.18.12 doesn't query for  lookup after flushing the name, 
where BIND-9.19.10 always does with the same configuration..., why?
See below, here is the appropriate tcpdump with BIND-9.18.12 for a 
enforced "loop detection resolving" info (after flushing the name with 
"rndc flushname ns2.comtronic.ch"):


# Query from the client
09:36:34.242064 IP 10.100.2.62.59765 > 10.100.102.21.53: 58600+ [1au] A? 
ns2.comtronic.ch. (57)


# Query from the resolver to the authoritative
09:36:34.242787 IP6 2001:db8::affe.4717 > 2a02:1368:1:48::53.53: 26321 
[1au] A? ns2.comtronic.ch. (45)


# Query from the resolver to the TLD server
09:36:34.242880 IP6 2001:db8::affe.25272 > 2001:620:0:ff::56.53: 50695% 
[1au] A? ns2.comtronic.ch. (45)


# Response back from the authoritative server
09:36:34.243673 IP6 2a02:1368:1:48::53.53 > 2001:db8::affe.4717: 26321*- 
1/0/1 A 195.200.242.162 (61)


# Response back to the client
09:36:34.243841 IP 10.100.102.21.53 > 10.100.2.62.59765: 58600 1/0/1 A 
195.200.242.162 (89)


# Delegation answer from the TLD server
09:36:34.244556 IP6 2001:620:0:ff::56.53 > 2001:db8::affe.25272: 50695- 
0/10/10 (695)


# A 2nd query to the same authoritative
09:36:34.244750 IP6 2001:db8::affe.18083 > 2a02:1368:1:48::53.53: 21395% 
[1au] A? ns2.comtronic.ch. (45)


# 2nd response back from the authoritative server
09:36:34.245246 IP6 2a02:1368:1:48::53.53 > 2001:db8::affe.18083: 
21395*- 1/0/1 A 195.200.242.162 (61)




The info "loop detected resolving" is always reproducable in 
BIND-9.19.10 after flushing the name "ns2.comtronic.ch", but only 
sporadic in BIND-9.18.12.


So my questions are:
- What does "loop detected resolving 'ns2.comtronic.ch/A' means here?
- Why is "loop detected resolving 'ns2.comtronic.ch/A'" always 
reproducable in BIND-9.19.10 and sporadic in BIND-9.18.12?
- Why does BIND-9.19.10 behaves differently to BIND-9.18.12 regarding 
 lookups after flushing the name "ns2.comtronic.ch"?
- BIND-9.19.10 does A and  lookups after flushing the name 
"ns2.comtronic.ch", where BIND-9.18.12 only queries for A records



Many thanks for any hints.
Best regards,
Tom
--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Message "Loop detected resolving..." and different query-behavior after flushing a cache entry

2023-02-21 Thread Tom

Hi Ondrej

I've created the issue:
https://gitlab.isc.org/isc-projects/bind9/-/issues/3885

Best regards,
Tom


On 2/21/23 14:24, Ondřej Surý wrote:

Tom,

the ADB (Address DataBase) responsible for caching the delegations had been
heavily refactoring in 9.19 branch, I think the best course of action would be 
to
fill a GitLab issue with the description, so we can follow-up there.

Ondrej
--
Ondřej Surý (He/Him)
ond...@isc.org

My working hours and your working hours may be different. Please do not feel 
obligated to reply outside your normal working hours.




On 21. 2. 2023, at 10:03, Tom  wrote:

Hi list

Using BIND-9.19.10:

An A-query on our resolver for "ns2.comtronic.ch" causes the following info in the 
named.log, after the first response was answered to the client and cached and then the entry is 
flushed from cache with "rndc flushname ns2.comtronic.ch":
21-Feb-2023 09:23:15.463 resolver: info: loop detected resolving 
'ns2.comtronic.ch/A'


The appropriate tcpdump for BIND-9.19.10 while the loop is detected looks like this 
(after flushing the cached name with "rndc flushname ns2.comtronic.ch"):

# Client query
09:27:25.957381 IP 10.100.2.62.54792 > 10.100.102.21.53: 4744+ [1au] A? 
ns2.comtronic.ch. (57)

# Query from the resolver to the authoritative server for A
09:27:25.957984 IP6 2001:db8::affe.20495 > 2a02:1368:1:47::53.53: 50231 [1au] 
A? ns2.comtronic.ch. (45)


# Querying TLD nameserver for A and 
09:27:25.958177 IP6 2001:db8::affe.13748 > 2001:678:3::1.53: 9026% [1au] ? 
ns2.comtronic.ch. (45)
09:27:25.958283 IP6 2001:db8::affe.2773 > 2001:678:3::1.53: 20217% [1au] A? 
ns2.comtronic.ch. (45)

# Response from the authoritative
09:27:25.958684 IP6 2a02:1368:1:47::53.53 > 2001:db8::affe.20495: 50231*- 1/0/1 
A 195.200.242.162 (61)

# Response back to the client
09:27:25.958915 IP 10.100.102.21.53 > 10.100.2.62.54792: 4744 1/0/1 A 
195.200.242.162 (89)


# Delegations back from the TLD nameserver for the A and  query
09:27:25.960140 IP6 2001:678:3::1.53 > 2001:db8::affe.13748: 9026- 0/10/10 (695)
09:27:25.960284 IP6 2001:678:3::1.53 > 2001:db8::affe.2773: 20217- 0/10/10 (695)


# Query against another authoritative for A and 
09:27:25.960516 IP6 2001:db8::affe.30306 > 2a02:1368:1:48::53.53: 6112% [1au] 
? ns2.comtronic.ch. (45)
09:27:25.960543 IP6 2001:db8::affe.5267 > 2a02:1368:1:48::53.53: 8517% [1au] A? 
ns2.comtronic.ch. (45)


# Answer back from the authoritative (no  record found for 
"ns2.comtronic.ch)
09:27:25.961284 IP6 2a02:1368:1:48::53.53 > 2001:db8::affe.5267: 8517*- 1/0/1 A 
195.200.242.162 (61)
09:27:25.961374 IP6 2a02:1368:1:48::53.53 > 2001:db8::affe.30306: 6112*- 0/1/1 
(96)



BIND-9.19.10 behaves differently to BIND-9.18.12 regarding -Lookups. 
BIND-9.18.12 doesn't query for  lookup after flushing the name, where 
BIND-9.19.10 always does with the same configuration..., why?
See below, here is the appropriate tcpdump with BIND-9.18.12 for a enforced "loop detection 
resolving" info (after flushing the name with "rndc flushname ns2.comtronic.ch"):

# Query from the client
09:36:34.242064 IP 10.100.2.62.59765 > 10.100.102.21.53: 58600+ [1au] A? 
ns2.comtronic.ch. (57)

# Query from the resolver to the authoritative
09:36:34.242787 IP6 2001:db8::affe.4717 > 2a02:1368:1:48::53.53: 26321 [1au] A? 
ns2.comtronic.ch. (45)

# Query from the resolver to the TLD server
09:36:34.242880 IP6 2001:db8::affe.25272 > 2001:620:0:ff::56.53: 50695% [1au] 
A? ns2.comtronic.ch. (45)

# Response back from the authoritative server
09:36:34.243673 IP6 2a02:1368:1:48::53.53 > 2001:db8::affe.4717: 26321*- 1/0/1 
A 195.200.242.162 (61)

# Response back to the client
09:36:34.243841 IP 10.100.102.21.53 > 10.100.2.62.59765: 58600 1/0/1 A 
195.200.242.162 (89)

# Delegation answer from the TLD server
09:36:34.244556 IP6 2001:620:0:ff::56.53 > 2001:db8::affe.25272: 50695- 0/10/10 
(695)

# A 2nd query to the same authoritative
09:36:34.244750 IP6 2001:db8::affe.18083 > 2a02:1368:1:48::53.53: 21395% [1au] 
A? ns2.comtronic.ch. (45)

# 2nd response back from the authoritative server
09:36:34.245246 IP6 2a02:1368:1:48::53.53 > 2001:db8::affe.18083: 21395*- 1/0/1 
A 195.200.242.162 (61)



The info "loop detected resolving" is always reproducable in BIND-9.19.10 after flushing 
the name "ns2.comtronic.ch", but only sporadic in BIND-9.18.12.

So my questions are:
- What does "loop detected resolving 'ns2.comtronic.ch/A' means here?
- Why is "loop detected resolving 'ns2.comtronic.ch/A'" always reproducable in 
BIND-9.19.10 and sporadic in BIND-9.18.12?
- Why does BIND-9.19.10 behaves differently to BIND-9.18.12 regarding  lookups after 
flushing the name "ns2.comtronic.ch"?
- BIND-9.19.10 does A and  lookups after flushing the name 
"ns2.comtronic.ch",

Re: Question about dynamic IPv6-PTR-Generation

2016-08-26 Thread Tom

Many thanks for your quick feedback.

This is the configuration-option, where I'm searching for. But probably 
this will take some time, until it's accepted, tested, 
implemented...etc. What do you propose in the meantime instead of using 
wildcards or allow the clients to register themselves or making static 
PTR-entries? How does other companies handle this issue?


Kind regards,

Tom



On 08/26/2016 09:17 AM, Woodworth, John R wrote:

Hi list

I'm searching a way to respond to IPv6-PTR-Queries like the "$GENERATE"
-mechanism for IPv4 has done it.

I read about Delegation, self-registration with "tcp-self" or using
Wildcards with the disadvantage, that every query has the same response.
Is there a (planned) way, to generate reverse-responses "on-the-fly"
with bind? I'm using the latest bind (9.10.4-P2).


Tom,

** Full disclosure:  I am directly involved in the Internet-Draft (I-D)
referenced in the below response.

Although this does not necessarily help you today, some colleagues and I
are working on a new standard which addresses this problem in a more
general way by introducing a new RR type.  It provides several features
beyond simply extending the $GENERATE directive to enormous proportions
such as: allowing AXFR transfers of the "intent" of BULK record
generation.  If you are interested in learning more about this, please
follow the link in my signature below.

We appreciate any comments/ suggestions regarding this draft.


Regards,
John
--
John Woodworth  CenturyLink, Inc.
   Q. Can a $GENERATE work for DNS on a /64 of reverse??
   A. BULK CAN
[ http://tools.ietf.org/html/draft-woodworth-bulk-rr-02 ]



Many thanks for your help.
Kind regards,
Tom
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to
unsubscribe from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


-- THESE ARE THE DROIDS TO WHOM I REFER:
This communication is the property of CenturyLink and may contain confidential 
or privileged information. Unauthorized use of this communication is strictly 
prohibited and may be unlawful. If you have received this communication in 
error, please immediately notify the sender by reply e-mail and destroy all 
copies of the communication and any attachments.


___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Latest BIND: Error "rpz_rewrite_name: mismatched summary data; continuing"

2016-08-29 Thread Tom

Hi list

Using self-compiled latest bind (9.10.4-P2):

I have a bind-setup with activated response-policy-zones. For *each* 
client-forward-query, which has a valid dns-response, I got an error in 
the client-log (for NXDOMAIN-Reponses, I didn't have such errors... ex. 
"dig @nameserver aasledkfjasdlkfjsadlf.asdlfkjsadlfkjasdjflk"):


- 30-Aug-2016 06:43:51.722 client: error: query client=0x7f1074112200 
thread=0x7f107a8a7700 (google.com/A): rpz_rewrite_name: mismatched 
summary data; continuing


- 30-Aug-2016 06:46:19.312 client: error: query client=0x7f10741614e0 
thread=0x7f107b0a8700 (yahoo.com/A): rpz_rewrite_name: mismatched 
summary data; continuing


...
...

The client receives the right response, dns-rpz is also working, but I'm 
suspicious about the errors mentioned above. Any hints?

Thanks a lot.

Kind regards,
Tom
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: Latest BIND: Error "rpz_rewrite_name: mismatched summary data; continuing"

2016-08-29 Thread Tom


Hi list
After some more troubleshooting, I was able to locate the problem:
- One Spamhaus-Zone-File (dbl.rpz.spamhaus.org, ca. 180MB in 
"masterfile-format text;") is loaded correctly, but if this zone is 
loaded, then I got the mentioned errors.
- Configuring the "masterfile-format map;" for this zone, then the error 
disappered.



Any hints for this behaviour?

Kind regards,




On 08/30/2016 06:53 AM, Tom wrote:


Hi list

Using self-compiled latest bind (9.10.4-P2):

I have a bind-setup with activated response-policy-zones. For *each* 
client-forward-query, which has a valid dns-response, I got an error 
in the client-log (for NXDOMAIN-Reponses, I didn't have such errors... 
ex. "dig @nameserver aasledkfjasdlkfjsadlf.asdlfkjsadlfkjasdjflk"):


- 30-Aug-2016 06:43:51.722 client: error: query client=0x7f1074112200 
thread=0x7f107a8a7700 (google.com/A): rpz_rewrite_name: mismatched 
summary data; continuing


- 30-Aug-2016 06:46:19.312 client: error: query client=0x7f10741614e0 
thread=0x7f107b0a8700 (yahoo.com/A): rpz_rewrite_name: mismatched 
summary data; continuing


...
...

The client receives the right response, dns-rpz is also working, but 
I'm suspicious about the errors mentioned above. Any hints?

Thanks a lot.

Kind regards,
Tom


___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: Latest BIND: Error "rpz_rewrite_name: mismatched summary data; continuing"

2016-08-29 Thread Tom
Sorry...wrong post. After a little bit more testing, the errors are 
still appearing. The masterfile-format didn't solved the errors


Thank you,

Tom



On 08/30/2016 08:20 AM, Tom wrote:


Hi list
After some more troubleshooting, I was able to locate the problem:
- One Spamhaus-Zone-File (dbl.rpz.spamhaus.org, ca. 180MB in 
"masterfile-format text;") is loaded correctly, but if this zone is 
loaded, then I got the mentioned errors.
- Configuring the "masterfile-format map;" for this zone, then the 
error disappered.



Any hints for this behaviour?

Kind regards,




On 08/30/2016 06:53 AM, Tom wrote:


Hi list

Using self-compiled latest bind (9.10.4-P2):

I have a bind-setup with activated response-policy-zones. For *each* 
client-forward-query, which has a valid dns-response, I got an error 
in the client-log (for NXDOMAIN-Reponses, I didn't have such 
errors... ex. "dig @nameserver 
aasledkfjasdlkfjsadlf.asdlfkjsadlfkjasdjflk"):


- 30-Aug-2016 06:43:51.722 client: error: query client=0x7f1074112200 
thread=0x7f107a8a7700 (google.com/A): rpz_rewrite_name: mismatched 
summary data; continuing


- 30-Aug-2016 06:46:19.312 client: error: query client=0x7f10741614e0 
thread=0x7f107b0a8700 (yahoo.com/A): rpz_rewrite_name: mismatched 
summary data; continuing


...
...

The client receives the right response, dns-rpz is also working, but 
I'm suspicious about the errors mentioned above. Any hints?

Thanks a lot.

Kind regards,
Tom




___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: Latest BIND: Error "rpz_rewrite_name: mismatched summary data; continuing"

2016-09-05 Thread Tom
Is there a workaround/configuration-directive not to log every request 
with this "error"? One way would be using BIND 9.9.9-P2 (because this 
code was added in 9.10.x...), but I would prefer 9.10.x.


Kind regards,
Tom



On 08/31/2016 03:05 PM, Tony Finch wrote:

Tom  wrote:

I have a bind-setup with activated response-policy-zones. For *each*
client-forward-query, which has a valid dns-response, I got an error in the
client-log (for NXDOMAIN-Reponses, I didn't have such errors... ex. "dig
@nameserver aasledkfjasdlkfjsadlf.asdlfkjsadlfkjasdjflk"):

There's a comment before this error message saying:

/*
 * Continue after a policy record that is missing
 * contrary to the summary data.  The summary
 * data can out of date during races with and among
 * policy zone updates.
 */

Spamhaus RPZ updates frequently, which might be related to your problem.
However I would not expect an update race to cause a complaint for every
query...

Tony.


___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Latest BIND: Error "rpz_rewrite_name: mismatched summary data; continuing"

2016-09-06 Thread Tom

Hi Mukund

Many thanks for your hint. In fact named was compiled with 
"--enable-querytrace". After recompiling 9.10.4-P2 without querytrace, 
the log looks good.


Kind regards,
Tom



On 09/06/2016 09:32 AM, Mukund Sivaraman wrote:

Hi Tom

On Tue, Sep 06, 2016 at 07:37:50AM +0200, Tom wrote:

Is there a workaround/configuration-directive not to log every request with
this "error"? One way would be using BIND 9.9.9-P2 (because this code was
added in 9.10.x...), but I would prefer 9.10.x.


(1) Don't use regular BIND 9.9 for RPZ. For using RPZ, please use 9.10
and higher (or 9.9 subscription branch that's available to ISC
customers). RPZ in vanilla 9.9 is unmaintained and unsupported (it was
experimental there).

(2) We'll look at tweaking this log message, but if you want to just not
see this log message, just recompile after removing the offending CTRACE
statement from bin/named/query.c. In fact, this code is normally enabled
when configured with --enable-querytrace. Do you have query tracing
configured? Is seeing this additional log message so inconvenient then?

Mukund


___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Overwrite SOA-Records in RPZ-Responses?

2016-09-06 Thread Tom

Hi list,

From "https://kb.isc.org/getAttach/21/AA-00512/rpz.txt";, Chapter 3 - 
Subscriber Behavior:


...
...
If a policy trigger results in a modified answer, then that modified 
answer will include in its "authority" section the SOA RR of the DNS RPZ 
whose policy was used to generate the modified answer. This SOA RR will 
tell both the fully qualified name of the DNS RPZ and the serial number 
of the policy data which was connected to the DNS control plane at the 
time the answer was modified.

...





Is there a way to overwrite the SOA-Record in a RPZ-Response 
"on-the-fly", whose zone is configured as "slave"? Because we use 
configured some third-party-rpz-zones, the soa-record is predefined...


Thank you.
Kind regards,
Tom
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


BIND-RPZ and Views

2016-09-16 Thread Tom

Hi

Using BIND 9.10.4-P2: I've a question about configuring DNS-RPZ and views:
I configured view1 and view2. After configuring all rpz-zones in both 
views, I had errors like this (slave file in view2 is already in use 
from view1):
config: error: /etc/named/named.conf:403: writeable file 
'slave/malware.rpz.spamhaus.org': already in use: /etc/named/named.conf:259


Is there a way to support RPZ in views? I want to achieve that 
Customer01 (view01) should have different RPZ-options than Customer02 
(view02) using the same RPZ-Files.


Thank you.
Kind regards,
Tom
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: CDS-deletion record "CDS 0 0 0 00" is failing with bind-9.14.9 and bind-9.14.8

2020-02-20 Thread Tom

Hi

With 9.16.0, the CDS deletion 
(https://gitlab.isc.org/isc-projects/bind9/issues/1554) is still not 
working and is ending with the same error as bind-versions before:


20-Feb-2020 17:31:25.381 general: error: zone example.com/IN (unsigned): 
CDS/CDNSKEY consistency checks failed
20-Feb-2020 17:31:25.381 zoneload: error: zone example.com/IN 
(unsigned): not loaded due to errors.


In which version will this issue be fixed?

Many thanks.
Kind regards,
Tom


On 11.01.20 08:48, Mark Andrews wrote:

Open a ticket saying “CDS/CDNSKEY not handled when performing constancy checks”.


___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: CDS-deletion record "CDS 0 0 0 00" is failing with bind-9.14.9 and bind-9.14.8

2020-02-20 Thread Tom

Hi Mark

Thank you for your answer. BIND is definitely running the current version:

$ rndc status
version: BIND 9.16.0 (Stable Release)  ()
running on server: Linux x86_64 3.10.0-1062.4.3.el7.x86_64 #1 SMP Wed 
Nov 13 23:58:53 UTC 2019

boot time: Thu, 20 Feb 2020 16:30:15 GMT
last configured: Thu, 20 Feb 2020 16:31:25 GMT
configuration file: /etc/named/named.conf 
(/opt/chroot/bind/etc/named/named.conf)

CPUs found: 4
worker threads: 4
UDP listeners per interface: 4
number of zones: 110 (98 automatic)
debug level: 0
xfers running: 0
xfers deferred: 0
soa queries in progress: 0
query logging is OFF
recursive clients: 0/900/1000
tcp clients: 2/150
TCP high-water: 103
server is up and running


I've removed the CDS/CDNSKEY records from the zone with dnssec-settime 
-K [key-directory] -D sync now Kexample.com...


So the CDS/CDNSKEY are no more longer existing in the zone and are no 
longer queryable with dig -> as expected:

$ dig @127.0.0.1 +noall +answer cds example.com -> No output
$ dig @127.0.0.1 +noall +answer cdnskey example.com -> No output

So from my point of view, I have now a clear starting point where no 
longer CDS/CDNSKEY records are published.


When I now configure the explicit deletion record(s) within the zone for 
"CDS" and/or "CDS/CDNSKEY", then BIND is still failing with the 
mentioned error.


The zonefile looks like this:
 SCHNIPP 
$TTL 3600
example.com.IN  SOA ns1.example.com. dnsadmin.example.com. (
2020022104
10800
3600
1209600
3600 )

example.com.IN  NS  ns1.example.com.
example.com.IN  NS  ns2.example.com.

@   IN  CDS 0 0 0 00
@   IN  CDNSKEY 0 3 0 AA==
 SCHNAPP 


21-Feb-2020 08:13:40.939 general: error: zone example.com/IN (unsigned): 
CDS/CDNSKEY consistency checks failed
21-Feb-2020 08:13:40.939 zoneload: error: zone example.com/IN 
(unsigned): not loaded due to errors.



Thank you.

Kind regards,
Tom




On 20.02.20 19:41, Mark Andrews wrote:

Tom,
  I would run ‘rndc status’ or ‘dig ch txt version.bind @server’ and confirm
that you have restarted named with the new code.  I’ve had hundreds of 'bug
reports’ about non fixed bugs that where operators failing to restart named 
after
installing the new version.  The new code is in 9.16.0, 9.14.11, and 9.11.16.

I would check that the *only* CDS record is a deletion record is present.
A CDS deletion record and a non CDS deletion record is a error.  Similarly
for CDNSKEY.  A CDS/CDNSKEY deletion record and other CDS/CDNSKEY records
in a RRset make no sense.  You are either deleting all DS records or replacing
all the DS records with the CDS records, or generating a new set of DS records
from the CDNSKEY records.  You can't do both at once.

Mark


On 21 Feb 2020, at 03:54, Ondřej Surý  wrote:

Hi Tom,


On 20 Feb 2020, at 17:42, Tom  wrote:

Hi

With 9.16.0, the CDS deletion 
(https://gitlab.isc.org/isc-projects/bind9/issues/1554) is still not working 
and is ending with the same error as bind-versions before:

20-Feb-2020 17:31:25.381 general: error: zone example.com/IN (unsigned): 
CDS/CDNSKEY consistency checks failed
20-Feb-2020 17:31:25.381 zoneload: error: zone example.com/IN (unsigned): not 
loaded due to errors.

In which version will this issue be fixed?


it will be included in the next version when the issue in question gets picked 
up by a developer,
be triaged, test written and code fixed.  I can’t really say when this will 
happen, our developer
resources are thin and there are more issues that require our attention.  That 
said - this is open
source and we happily accept external contributions in a form of merge request 
in our gitlab instance
(you need to ask for a permission to fork the project) or as a patch.  This 
seems to be fairly trivial
bug that might be a good start if anybody wants to help fix bugs in BIND 9.

Cheers,
Ondrej
--
Ondřej Surý
ond...@isc.org

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users



___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: CDS-deletion record "CDS 0 0 0 00" is failing with bind-9.14.9 and bind-9.14.8

2020-02-22 Thread Tom
Hi Mark

Heureka..., that did the trick. The zone is inline signed and after I
added the already existing DNSKEY records in the raw zone file, the
CDS/CDNSKEY deletion record was accepted and the zone was loaded.

Many thanks.
Kind regards,
Tom


On 21.02.20 21:08, Mark Andrews wrote:
> There are no DNSKEY records in that zone.  CDS and CDNSKEY must be signed for 
> the
> parent to accept them.  There must be DNSKEY records present for them to be 
> signed.
> Add a DNSKEY record to that test zone and it will load.
> 
> For inline zone just copy the final DNSKEY RRset from the signed version of 
> the 
> zone to the raw zone when adding the deletion CDS and CDNSKEY records.  Wait 
> for
> the parent zone to remove the DS records, then remove the CDS, CDNSKEY, and 
> DNSKEY
> records from the raw zone.
> 
> Mark
> 
>> On 21 Feb 2020, at 18:31, Tom  wrote:
>>
>> Hi Mark
>>
>> Thank you for your answer. BIND is definitely running the current version:
>>
>> $ rndc status
>> version: BIND 9.16.0 (Stable Release)  ()
>> running on server: Linux x86_64 3.10.0-1062.4.3.el7.x86_64 #1 SMP Wed Nov 13 
>> 23:58:53 UTC 2019
>> boot time: Thu, 20 Feb 2020 16:30:15 GMT
>> last configured: Thu, 20 Feb 2020 16:31:25 GMT
>> configuration file: /etc/named/named.conf 
>> (/opt/chroot/bind/etc/named/named.conf)
>> CPUs found: 4
>> worker threads: 4
>> UDP listeners per interface: 4
>> number of zones: 110 (98 automatic)
>> debug level: 0
>> xfers running: 0
>> xfers deferred: 0
>> soa queries in progress: 0
>> query logging is OFF
>> recursive clients: 0/900/1000
>> tcp clients: 2/150
>> TCP high-water: 103
>> server is up and running
>>
>>
>> I've removed the CDS/CDNSKEY records from the zone with dnssec-settime -K 
>> [key-directory] -D sync now Kexample.com...
>>
>> So the CDS/CDNSKEY are no more longer existing in the zone and are no longer 
>> queryable with dig -> as expected:
>> $ dig @127.0.0.1 +noall +answer cds example.com -> No output
>> $ dig @127.0.0.1 +noall +answer cdnskey example.com -> No output
>>
>> So from my point of view, I have now a clear starting point where no longer 
>> CDS/CDNSKEY records are published.
>>
>> When I now configure the explicit deletion record(s) within the zone for 
>> "CDS" and/or "CDS/CDNSKEY", then BIND is still failing with the mentioned 
>> error.
>>
>> The zonefile looks like this:
>>  SCHNIPP 
>> $TTL 3600
>> example.com. IN  SOA ns1.example.com. dnsadmin.example.com. (
>>  2020022104
>>  10800
>>  3600
>>  1209600
>>  3600 )
>>
>> example.com. IN  NS  ns1.example.com.
>> example.com. IN      NS  ns2.example.com.
>>
>> @IN  CDS 0 0 0 00
>> @IN  CDNSKEY 0 3 0 AA==
>>  SCHNAPP 
>>
>>
>> 21-Feb-2020 08:13:40.939 general: error: zone example.com/IN (unsigned): 
>> CDS/CDNSKEY consistency checks failed
>> 21-Feb-2020 08:13:40.939 zoneload: error: zone example.com/IN (unsigned): 
>> not loaded due to errors.
>>
>>
>> Thank you.
>>
>> Kind regards,
>> Tom
>>
>>
>>
>> On 20.02.20 19:41, Mark Andrews wrote:
>>> Tom,
>>>  I would run ‘rndc status’ or ‘dig ch txt version.bind @server’ and 
>>> confirm
>>> that you have restarted named with the new code.  I’ve had hundreds of 'bug
>>> reports’ about non fixed bugs that where operators failing to restart named 
>>> after
>>> installing the new version.  The new code is in 9.16.0, 9.14.11, and 
>>> 9.11.16.
>>> I would check that the *only* CDS record is a deletion record is present.
>>> A CDS deletion record and a non CDS deletion record is a error.  Similarly
>>> for CDNSKEY.  A CDS/CDNSKEY deletion record and other CDS/CDNSKEY records
>>> in a RRset make no sense.  You are either deleting all DS records or 
>>> replacing
>>> all the DS records with the CDS records, or generating a new set of DS 
>>> records
>>> from the CDNSKEY records.  You can't do both at once.
>>> Mark
>>>> On 21 Feb 2020, at 03:54, Ondřej Surý  wrote:
>>>>
>>>> Hi Tom,
>>>>
>>>>> On 20 Feb 2020, at 17:42, Tom  wrote:
>>>>>
>>>>> Hi
>>>>>
>>>>> With 9.16.0, the CDS

CDS/CDNSKEY are not published with BIND-9.16.1 and dnssec-policies

2020-04-08 Thread Tom

Hi
Using BIND-9.16.1.
In the last ISC dnssec webinar 
(https://www.youtube.com/watch?v=2aB__FZZQ84) I heared, that CDS/CDNSKEY 
records automatically should be published when using dnssec-policies.


My policy looks like this:
dnssec-policy "test-policy" {
dnskey-ttl 60;
keys {
ksk lifetime unlimited algorithm ecdsa256;
zsk lifetime unlimited algorithm ecdsa256;
};
};

and the zone like this:
zone "example.com" {
type master;
file "master/example.com.zone";
key-directory "/etc/named/keys/example.com";
dnssec-policy "test-policy";
};


When digging this zone for CDS/CDNSKEY records, then these keys are not 
existing:

$ dig +norec +noall +answer @127.0.0.1 cds example.com
$ dig +norec +noall +answer @127.0.0.1 cdnskey example.com

The keyfile for "example.com" also do not show a "published"-date:
$ cat Kexample.com.+013+02624.key
; This is a key-signing key, keyid 2624, for example.com.
; Created: 20200409061638 (Thu Apr  9 08:16:38 2020)
; Publish: 20200409061638 (Thu Apr  9 08:16:38 2020)
; Activate: 20200409061638 (Thu Apr  9 08:16:38 2020)
example.com. 60 IN DNSKEY 257 3 13 
uV/NtPZSL1fmO3FAi4pZCcbTl19iD3SizgVcDXGJEl1g4l/cHUGvVl33 
3cx2cODA6RUj55pZa77g1VBtFBXByg==



Any hints, why in this case the dnssec-policy mechanism doesn't publish 
the CDS/CDNSKEY records?


Many thanks.

Kind regards,
Tom
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Hints for forwarding a subdomain on a authoritative server

2020-07-06 Thread Tom

Hi list

Our BIND (9.16.4) is authoritative for zone "example.com". Now I need to 
forward a subzone "sub.example.com" to another nameserver instance on 
the same server, running for example under port 5353:


A few years ago, this topic was already discussed:
https://lists.isc.org/pipermail/bind-users/2009-April/076156.html

My BIND config looks like this:
== SCHNIPP ==
zone "example.com" {
type master;
file "master/example.com.hosts";
};
zone "sub.example.com" {
type forward;
forwarders { 127.0.0.1 port 5353; };
forward only;
};
== SCHNAPP ==

In the zonefile for "example.com" I have a delegation like this (as 
described in the post above):


sub.example.com.IN  NS  subns.example.com.

So, the authoritative server understands not to be responsible for this 
zone and forwards the request to the other nameserver.


But: The zone-forwarding is only working, when I enable "recursion" on 
the authoritative server. Does this means, that zone-forwarding really 
requires recursion? Is there a better way with not enabling recursion 
(perhaps with views) to accomplish this?


Many thanks for any hints.

Kind regards,
Tom
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


managed-keys-error since BIND-9.16.15

2021-04-30 Thread Tom

Hi

After upgrading to BIND-9.16.15, I have the following error in named.log:

30-Apr-2021 12:41:29.194 general: error: managed-keys.bind.jnw: journal 
file corrupt: expected serial 1823, got 1824
30-Apr-2021 12:41:29.194 general: error: managed-keys-zone: 
dns_journal_compact failed: unexpected error


$ l /var/named/managed-keys.bind*
-rw-r--r--. 1 named named  821 30. Apr 12:41 /var/named/managed-keys.bind
-rw-r--r--. 1 named named 4.5K 30. Apr 12:41 
/var/named/managed-keys.bind.jnl


Yesterday (after initially starting the latest version) the error 
occured the first time on server1. Then I stopped named on server1, 
removed both files (.bind and .bind.jnl), and startet named again.


Today, the same error appeared one time on server2, but named seems 
working fine, also DNSSEC verification. With "named-journalprint" I'm 
able to print to content of the managed-keys.bind.jnl.


Any hints about this error?

Thank you.
Kind regards,
Tom
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: managed-keys-error since BIND-9.16.15

2021-05-02 Thread Tom
I see the same error also on a couple of slave zones on a updated 
authoritative server, not only on the "managed-keys.bind"-file. So this 
is also not critical and can be ignored?


03-May-2021 00:20:28.532 general: error: 
/var/named/slave/example.com.hosts.jnw: journal file corrupt: expected 
serial 2021050100, got 2021050300
03-May-2021 00:20:28.532 general: error: zone example.com/IN: 
dns_journal_compact failed: unexpected error


Thank you.
Kind regards,
Tom


On 01.05.21 08:52, Mark Andrews wrote:

Named should automatically correct this error. The journal version was not 
updated when the transaction header was updated. This has been corrected and 
named detects the unexpected transaction header and writes out a corrected 
journal.


___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Using catz (catalog zones): BIND does not remove the catz-journal file on the slave

2021-07-28 Thread Tom

Hi

Using BIND-9.16.19: When removing a member zone from a catz (catalog 
zone), then the journal files are not removed on the slave:


Current situation before removing the zone "example.com" from catz:

$ ls -lahF
-rw-r--r--. 1 named named 4.0K 28. Jul 15:21 
__catz___default_catalog.123456.local_example.com.db
-rw-r--r--. 1 named named 1.2K 28. Jul 15:26 
__catz___default_catalog.123456.local_example.com.db.jnl



After removing the zone on the master (catz), the slave removes the 
__catz___default_...-files for the corresponding zone, but not the 
journal-file:


28-Jul-2021 15:29:56.018 general: info: catz: updating catalog zone 
'catalog.123456.local' with serial 2021072803
28-Jul-2021 15:29:56.018 xfer-in: info: zone catalog.123456.local/IN: 
transferred serial 2021072803: TSIG 'master-slave'
28-Jul-2021 15:29:56.018 xfer-in: info: transfer of 
'catalog.123456.local/IN' from 172.16.1.1#53: Transfer status: success
28-Jul-2021 15:29:56.018 xfer-in: info: transfer of 
'catalog.123546.local/IN' from 172.16.1.1#53: Transfer completed: 1 
messages, 5 records, 343 bytes, 0.001 secs (343000 bytes/sec) (serial 
2021072803)
28-Jul-2021 15:29:56.020 general: info: catz: deleting zone 
'example.com' from catalog 'catalog.123456.local' - success
28-Jul-2021 15:29:56.021 general: warning: catz: 
catz_delzone_taskaction: zone 'example.com' deleted


$ ls -lahF
-rw-r--r--. 1 named named 1.2K 28. Jul 15:26 
__catz___default_catalog.123456.local_example.com.db.jnl


Is this intentional or possibly a bug?

Many thanks.
Kind regards,
Tom
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Question about "max-zone-ttl" in dnssec-policy

2021-09-20 Thread Tom

Hi list

Testing dnssec-policy with BIND-9.16.21:

I'd like to better understand the "max-zone-ttl"-directive.
So I defined "max-zone-ttl 3600s;" within the dnssec-policy-options, but 
when I configure the default zone TTL or even a ressource record TTL 
higher than the "max-zone-ttl" (for example to 7200s), then it's not 
capped, as described in the documentation.


Look here:
- Within the dnssec-policy, I've defined "max-zone-ttl 3600;"
- The RR "www.example.com." has a TTL of 7200
- The server returns a TTL of 7200

$ dig @192.168.1.10 www.example.com +dnssec +multi
...
...
;; ANSWER SECTION:
www.example.com.7200 IN A 127.0.0.1
www.example.com.7200 IN RRSIG A 13 3 7200 (
20211002202425 20210920143830 42786 example.com.
3cprtWPAOwEuUvaiV5DKYWxhJHrdU6FL7Jk2+aNavOao
lTzQMKev2OF6TqPhXXfaHANIz+tiVhZaeaDCDagkSA== )
...
...


What do I misunderstand here?

Many thanks for a hint.

Kind regards,
Tom
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Question about "max-zone-ttl" in dnssec-policy

2021-09-21 Thread Tom

Hi Matthijs

Thank you for your explanation.

The documentation says, that "any record encountered with a TTL higher 
than max-zone-ttl is capped at the maximum permissible TTL value".


Is the documentation wrong here?

Thank you.
Kind regards,
Tom



On 21.09.21 09:47, Matthijs Mekking wrote:

Hi Tom,

The max-zone-ttl is there to calculate the right timings for key 
rollovers. It won't alter the zone TTL values.


You should set the max-zone-ttl to whatever the highest TTL is in your 
zone to make sure key rollovers timings are correct.


This value exists until we have added code to the key manager that will 
read the zone's contents and detect the maximum TTL automatically.


I hope this clarifies things.

Best regards,

Matthijs


On 20-09-2021 17:47, Tom wrote:

Hi list

Testing dnssec-policy with BIND-9.16.21:

I'd like to better understand the "max-zone-ttl"-directive.
So I defined "max-zone-ttl 3600s;" within the dnssec-policy-options, 
but when I configure the default zone TTL or even a ressource record 
TTL higher than the "max-zone-ttl" (for example to 7200s), then it's 
not capped, as described in the documentation.


Look here:
- Within the dnssec-policy, I've defined "max-zone-ttl 3600;"
- The RR "www.example.com." has a TTL of 7200
- The server returns a TTL of 7200

$ dig @192.168.1.10 www.example.com +dnssec +multi
...
...
;; ANSWER SECTION:
www.example.com.    7200 IN A 127.0.0.1
www.example.com.    7200 IN RRSIG A 13 3 7200 (
 20211002202425 20210920143830 42786 example.com.
 3cprtWPAOwEuUvaiV5DKYWxhJHrdU6FL7Jk2+aNavOao
 lTzQMKev2OF6TqPhXXfaHANIz+tiVhZaeaDCDagkSA== )
...
...


What do I misunderstand here?

Many thanks for a hint.

Kind regards,
Tom
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to 
unsubscribe from this list


ISC funds the development of this software with paid support 
subscriptions. Contact us at https://www.isc.org/contact/ for more 
information.



bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to 
unsubscribe from this list


ISC funds the development of this software with paid support 
subscriptions. Contact us at https://www.isc.org/contact/ for more 
information.



bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


ECS-IP in the RPZ-Log?

2021-10-27 Thread Tom

Hi

Using BIND-9.16.21. I'm wondering, if it's possible to have the ECS 
client IP address in the RPZ log.
In front of our BIND, which has an RPZ configuration, is a dnsdist, 
which inject the ECS-IP.


BIND could log the ECS-IP with the builtin "querylog" (rndc querylog 
on). In the following example, the effective client-IP is 
172.16.16.33/32, which is logged fine here:
27-Oct-2021 15:41:27.940 queries: info: client @0x7f3db81aa0f8 
127.0.0.1#44353 (example.ch): query: example.ch IN A +E(0)K (127.0.0.1) 
[ECS 172.16.16.33/32/0]



But in the RPZ log, I can correctly see only the dnsdist IP and not the 
one from the effective source (172.16.16.33):
27-Oct-2021 15:41:27.940 rpz: info: client @0x7f3db81aa0f8 
127.0.0.1#44353 (example.ch): rpz QNAME NXDOMAIN rewrite example.ch/A/IN 
via example.ch.blacklist-rpz.test.local


Is there a way to have/see the ECS-IP in the RPZ log?

Many thanks.
Kind regards,
Tom
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


dnssec-policy is not signing anymore

2021-11-29 Thread Tom
g
$ dig +short @127.0.0.1 +norec +dnssec dnskey example.ch
256 3 13 3YU6kADe6IRhJ2rcmHOrPgH6tq/7PQQP7VpLBA70p/bPQFPRagdxuGdl 
XrDg7tQ9WTr553BA5dUGqRBEYYQTUw==
257 3 13 bT4QClt+P9+t1+vF/Ulj7DSISBVMV86TktfNqheiUVGqfZ2hsEpYP140 
flVurgV17M/nzujoMW0KgyTuP3p4Kw==



The dnssec-policy looks like this:
dnssec-policy "thewaytogo-faster" {
signatures-refresh 5d;
signatures-validity 14d;
signatures-validity-dnskey 14d;
dnskey-ttl 3600s;
publish-safety 1h;
retire-safety 1h;
purge-keys 30d;
keys {
ksk lifetime unlimited algorithm ecdsap256sha256;
zsk lifetime 7d algorithm ecdsap256sha256;
};
zone-propagation-delay 300s;
max-zone-ttl 86400s;
parent-propagation-delay 1h;
parent-ds-ttl 3600;
};



When running "rndc sign example.ch", then nothing happens -> I'm not 
sure, if "rndc sign" is still possible with "dnssec-policy"...?


Any hints, how I can recover this state to a working signing-state 
without recreating a new KSK?
I assume, that disabling DNSSEC completely and creating a new ZSK/KSK 
will work, but in the case now, I already have the mentioned KSK (61416).


Thank you.
Kind regards,
Tom
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: dnssec-policy is not signing anymore

2021-11-29 Thread Tom

Hi Matthijs

I've tried several times to reproduce this behavior..., dnssec-policy 
always does his job. I did not currently succeed in reproducing the 
behavior. I will make a few more attempts and otherwise inform you.


Thank you.
Best regards,
Tom


On 29.11.21 10:56, Matthijs Mekking wrote:

Hi Tom,

On 29-11-2021 09:36, Tom wrote:

Hi

Using BIND-9.16.22:
After some tests with the new KASP feature, I'm running in a issue, 
where BIND isn't signing the zone anymore.


In the old fashion way (auto-dnssec maintain;), I was able - under 
some circumstances - to remove the ".signed" and ".signed.jnl" and 
.jnl-files, restart BIND and everything was fine, the zone was signed 
automatically with the existing keys.


In the special case now, I removed the ZSK key files and removed all 
.signed and .signed.jnl and .jnl-files for a zone (like in the old 
way). The KSK is still existing, a new ZSK is created through the 
"dnssec-policy":


The dnssec-policy checks the key files against the policy. If you remove 
the ZSK key files, it has no ZSK any longer while the policy dictates 
so. That's why it will create a new ZSK.


In other words, don't remove your key files.

(Removing .signed and .jnl files should be fine and be recreated).


## BIND detects the already existing KSK, but logs a warning the the 
KSK is missing or inactive.
29-Nov-2021 07:28:25.653 dnssec: info: keymgr: DNSKEY 
example.ch/ECDSAP256SHA256/27534 (ZSK) created for policy 
thewaytogo-faster
29-Nov-2021 07:28:25.654 dnssec: info: Fetching 
example.ch/ECDSAP256SHA256/61416 (KSK) from key repository.
29-Nov-2021 07:28:25.654 dnssec: info: DNSKEY 
example.ch/ECDSAP256SHA256/61416 (KSK) is now published
29-Nov-2021 07:28:25.654 dnssec: info: DNSKEY 
example.ch/ECDSAP256SHA256/61416 (KSK) is now active
29-Nov-2021 07:28:25.654 dnssec: info: Fetching 
example.ch/ECDSAP256SHA256/27534 (ZSK) from key repository.
29-Nov-2021 07:28:25.654 dnssec: info: DNSKEY 
example.ch/ECDSAP256SHA256/27534 (ZSK) is now published
29-Nov-2021 07:28:25.654 general: info: CDS for key 
example.ch/ECDSAP256SHA256/61416 is now published
29-Nov-2021 07:28:25.654 general: info: CDNSKEY for key 
example.ch/ECDSAP256SHA256/61416 is now published
29-Nov-2021 07:28:25.659 dnssec: info: zone example.ch/IN (signed): 
next key event: 29-Nov-2021 09:33:25.641
29-Nov-2021 07:28:25.660 general: warning: zone example.ch/IN 
(signed): Key example.ch/ECDSAP256SHA256/61416 missing or inactive and 
has no replacement: retaining signatures.


I am not able to reproduce this. Is this after a restart or a reload?

Perhaps it's better to report an issue on our gitlab:

     https://gitlab.isc.org/isc-projects/bind9/-/issues/new

Please provide the steps to reproduce and logs with debug level 3.

Best regards,
   Matthijs




## But the KSK (61416) is existing and seems signing
$ rndc dnssec -status example.ch
dnssec-policy: thewaytogo-faster
current time:  Mon Nov 29 09:10:42 2021

key: 61416 (ECDSAP256SHA256), KSK
   published:  yes - since Tue Oct 12 16:50:17 2021
   key signing:    yes - since Tue Oct 12 16:50:17 2021

   No rollover scheduled
   - goal:   omnipresent
   - dnskey: omnipresent
   - ds: omnipresent
   - key rrsig:  omnipresent

key: 27534 (ECDSAP256SHA256), ZSK
   published:  yes - since Mon Nov 29 07:28:25 2021
   zone signing:   no

   Next rollover scheduled on Mon Dec  6 05:23:25 2021
   - goal:   omnipresent
   - dnskey: rumoured
   - zone rrsig: hidden



So, BIND detects the already existing KSK and ZSK, but is not able to 
sign the dnskey-rrset with the KSK or some TXT-records with the ZSK.



## DNSKEY RR are existing, the RRSIG is missing
$ dig +short @127.0.0.1 +norec +dnssec dnskey example.ch
256 3 13 3YU6kADe6IRhJ2rcmHOrPgH6tq/7PQQP7VpLBA70p/bPQFPRagdxuGdl 
XrDg7tQ9WTr553BA5dUGqRBEYYQTUw==
257 3 13 bT4QClt+P9+t1+vF/Ulj7DSISBVMV86TktfNqheiUVGqfZ2hsEpYP140 
flVurgV17M/nzujoMW0KgyTuP3p4Kw==



The dnssec-policy looks like this:
dnssec-policy "thewaytogo-faster" {
 signatures-refresh 5d;
 signatures-validity 14d;
 signatures-validity-dnskey 14d;
 dnskey-ttl 3600s;
 publish-safety 1h;
 retire-safety 1h;
 purge-keys 30d;
 keys {
 ksk lifetime unlimited algorithm ecdsap256sha256;
 zsk lifetime 7d algorithm ecdsap256sha256;
 };
 zone-propagation-delay 300s;
 max-zone-ttl 86400s;
 parent-propagation-delay 1h;
 parent-ds-ttl 3600;
};



When running "rndc sign example.ch", then nothing happens -> I'm not 
sure, if "rndc sign" is still possible with "dnssec-policy"...?


Any hints, how I can recover this state to a working signing-state 
without recreating a new KSK?
I assume, that disabling DNSSEC completely and creating a new ZSK/KSK 
will work, but in the case now, I already have the mentioned KSK (61416).


Thank you.
Kind regards,

Changing ZSK-lifetime in dnssec-policy is not applied

2022-02-11 Thread Tom

Hi

Using BIND-9.16.22 and dnssec-policy:

I've migrated an already existing and signing "auto-dnssec"-configured 
zone to dnssec-policy (same algorithms). That worked without any issues. 
After a while, I changed the ZSK lifetime from 30d to 60d (see below) in 
the dnssec-policy:


dnssec-policy "thewaytogo" {
signatures-refresh 5d;
signatures-validity 14d;
signatures-validity-dnskey 14d;

dnskey-ttl 3600s;
publish-safety 1h;
retire-safety 1h;
purge-keys 10d;

keys {
ksk lifetime unlimited algorithm ecdsap256sha256;
zsk lifetime 60d algorithm ecdsap256sha256;
};

zone-propagation-delay 300s;
max-zone-ttl 86400s;

parent-propagation-delay 1h;
parent-ds-ttl 3600;
nsec3param iterations 0 optout no salt-length 0;
};


After reloading/restarting named, I can't see the new lifetime 
(scheduled rollover), neither in the rndc-output, nor in the keyfile 
itself (ZSK 63304). The new lifetime should be 12/13 Apr and not 13 Mar.


# rndc-output
$ rndc dnssec -status example.com
dnssec-policy: thewaytogo
current time:  Fri Feb 11 13:02:10 2022

key: 455 (ECDSAP256SHA256), ZSK
  published:  yes - since Wed May 20 14:50:09 2020
  zone signing:   no

  Key is retired, will be removed on Mon Jun 29 15:55:09 2020
  - goal:   hidden
  - dnskey: omnipresent
  - zone rrsig: unretentive

key: 63304 (ECDSAP256SHA256), ZSK
  published:  yes - since Fri Feb 11 08:19:18 2022
  zone signing:   yes - since Fri Feb 11 09:24:18 2022

  Next rollover scheduled on Sun Mar 13 07:19:18 2022
  - goal:   omnipresent
  - dnskey: omnipresent
  - zone rrsig: rumoured

key: 39500 (ECDSAP256SHA256), KSK
  published:  yes - since Wed May 20 14:50:09 2020
  key signing:yes - since Wed May 20 14:50:09 2020

  No rollover scheduled
  - goal:   omnipresent
  - dnskey: omnipresent
  - ds: omnipresent
  - key rrsig:  omnipresent



# key-file
; This is the state of key 63304, for example.com.
Algorithm: 13
Length: 256
Lifetime: 2592000
Predecessor: 455
KSK: no
ZSK: yes
Generated: 20220211071918 (Fri Feb 11 08:19:18 2022)
Published: 20220211071918 (Fri Feb 11 08:19:18 2022)
Active: 20220211082418 (Fri Feb 11 09:24:18 2022)
Retired: 20220313082418 (Sun Mar 13 09:24:18 2022)
Removed: 20220323092918 (Wed Mar 23 10:29:18 2022)
DNSKEYChange: 20220211092418 (Fri Feb 11 10:24:18 2022)
ZRRSIGChange: 20220211092418 (Fri Feb 11 10:24:18 2022)
DNSKEYState: omnipresent
ZRRSIGState: rumoured
GoalState: omnipresent



Any hints for this?

Many thanks.

Best regards,
Tom
--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Changing ZSK-lifetime in dnssec-policy is not applied

2022-02-14 Thread Tom

Hi Matthijs

Perfect, thank you for this information and clarifying this.

Best regards,
Tom


On 14.02.22 09:59, Matthijs Mekking wrote:

Hi Tom,

The lifetime is applied to new keys, so when the ZSK is rolled the 
lifetime of the successor key should be 60 days.


I have considered applying it to existing keys as well (and maybe we 
will some day), but there are a bunch of corner cases that make it 
non-trivial, especially when keys are involved that are in the middle of 
a rollover.


Best regards,
   Matthijs

On 11-02-2022 13:16, Tom wrote:

Hi

Using BIND-9.16.22 and dnssec-policy:

I've migrated an already existing and signing "auto-dnssec"-configured 
zone to dnssec-policy (same algorithms). That worked without any 
issues. After a while, I changed the ZSK lifetime from 30d to 60d (see 
below) in the dnssec-policy:


dnssec-policy "thewaytogo" {
 signatures-refresh 5d;
 signatures-validity 14d;
 signatures-validity-dnskey 14d;

 dnskey-ttl 3600s;
 publish-safety 1h;
 retire-safety 1h;
 purge-keys 10d;

 keys {
 ksk lifetime unlimited algorithm ecdsap256sha256;
 zsk lifetime 60d algorithm ecdsap256sha256;
 };

 zone-propagation-delay 300s;
 max-zone-ttl 86400s;

 parent-propagation-delay 1h;
 parent-ds-ttl 3600;
 nsec3param iterations 0 optout no salt-length 0;
};


After reloading/restarting named, I can't see the new lifetime 
(scheduled rollover), neither in the rndc-output, nor in the keyfile 
itself (ZSK 63304). The new lifetime should be 12/13 Apr and not 13 Mar.


# rndc-output
$ rndc dnssec -status example.com
dnssec-policy: thewaytogo
current time:  Fri Feb 11 13:02:10 2022

key: 455 (ECDSAP256SHA256), ZSK
   published:  yes - since Wed May 20 14:50:09 2020
   zone signing:   no

   Key is retired, will be removed on Mon Jun 29 15:55:09 2020
   - goal:   hidden
   - dnskey: omnipresent
   - zone rrsig: unretentive

key: 63304 (ECDSAP256SHA256), ZSK
   published:  yes - since Fri Feb 11 08:19:18 2022
   zone signing:   yes - since Fri Feb 11 09:24:18 2022

   Next rollover scheduled on Sun Mar 13 07:19:18 2022
   - goal:   omnipresent
   - dnskey: omnipresent
   - zone rrsig: rumoured

key: 39500 (ECDSAP256SHA256), KSK
   published:  yes - since Wed May 20 14:50:09 2020
   key signing:    yes - since Wed May 20 14:50:09 2020

   No rollover scheduled
   - goal:   omnipresent
   - dnskey: omnipresent
   - ds: omnipresent
   - key rrsig:  omnipresent



# key-file
; This is the state of key 63304, for example.com.
Algorithm: 13
Length: 256
Lifetime: 2592000
Predecessor: 455
KSK: no
ZSK: yes
Generated: 20220211071918 (Fri Feb 11 08:19:18 2022)
Published: 20220211071918 (Fri Feb 11 08:19:18 2022)
Active: 20220211082418 (Fri Feb 11 09:24:18 2022)
Retired: 20220313082418 (Sun Mar 13 09:24:18 2022)
Removed: 20220323092918 (Wed Mar 23 10:29:18 2022)
DNSKEYChange: 20220211092418 (Fri Feb 11 10:24:18 2022)
ZRRSIGChange: 20220211092418 (Fri Feb 11 10:24:18 2022)
DNSKEYState: omnipresent
ZRRSIGState: rumoured
GoalState: omnipresent



Any hints for this?

Many thanks.

Best regards,
Tom

--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


"Length"-output in DNSSEC-Policy state-files vs. "Key Length"-output on dnsviz.net

2022-05-09 Thread Tom

Hi list

Using BIND-9.16.27:
I'm wondering about the value of the "Length"-field in the dnssec-policy 
state-file output, which results in "Length: 256" for domains, which are 
signed with algorithm 13 (ECDSAP256SHA256) and the "Key length"-output 
for the domain on "dnsviz.net" (ZSK or KSK), which results in "Key 
Length: 512".



# state file
$ grep Length Karcademics.ch.+013+19238.state
Length: 256

# The ZSK/KSK for this domain on "dnsviz.net"
Key Length: 512

What's the difference between this both values?

Many thanks.
Tom

--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: "Length"-output in DNSSEC-Policy state-files vs. "Key Length"-output on dnsviz.net

2022-05-11 Thread Tom

Hi Tony

Many thanks for your explanation!
Tom


On 10.05.22 10:46, Tony Finch wrote:

Tom  wrote:


I'm wondering about the value of the "Length"-field in the dnssec-policy
state-file output, which results in "Length: 256" for domains, which are
signed with algorithm 13 (ECDSAP256SHA256)


That's the size of the cryptographic modulus, i.e. the size of the numbers
in the guts of the cryptographic algorithm.


and the "Key length"-output for the domain on "dnsviz.net" (ZSK or KSK),
which results in "Key Length: 512".


For P-256 the public key needs two coordinates to identify the point on
the curve, so it's twice the nominal size of the algorithm.

DNSviz is not being entirely consistent here, because RSA public keys also
require a few more bits than their nominal size (for the public exponent),
but DNSviz shows their nominal size rather than the size of the public key
blob in the DNSKEY record.

(The public exponent is usually 65537, which is why RSA keys typically
start AwEAA rather than being completely random.)


--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


After switching to "dnssec-policy", existing RRs are still signed with the "old" ZSK

2022-05-11 Thread Tom

Hi list

After switching from "semi-automatic"-signing to dnssec-policy 
(everything identical, except new ZSK rollover) I have the following 
rndc output:


$ rndc dnssec -status example.ch
dnssec-policy: 60d_zsk_rollover
current time:  Wed May 11 09:54:55 2022

key: 45819 (ECDSAP256SHA256), KSK
  published:  yes - since Mon Apr 27 08:00:01 2020
  key signing:yes - since Mon Apr 27 08:00:01 2020

  No rollover scheduled
  - goal:   omnipresent
  - dnskey: omnipresent
  - ds: omnipresent
  - key rrsig:  omnipresent

key: 17242 (ECDSAP256SHA256), ZSK
  published:  yes - since Mon May  9 16:25:59 2022
  zone signing:   yes - since Mon May  9 17:30:59 2022

  Next rollover scheduled on Fri Jul  8 15:25:59 2022
  - goal:   omnipresent
  - dnskey: omnipresent
  - zone rrsig: rumoured

key: 52021 (ECDSAP256SHA256), ZSK
  published:  yes - since Mon Apr 27 08:00:01 2020
  zone signing:   no

  Key is retired, will be removed on Mon Jul  6 09:05:01 2020
  - goal:   hidden
  - dnskey: omnipresent
  - zone rrsig: unretentive



The ZSK 52021 is the old one (from semi-automatic), the ZSK 17242 is the 
new one, which was created after reloading named while applying the new 
dnssec-policy.


The current behavior I see is, that already existing RR are still signed 
with the "old" key (52021) and newly created RR are signed with the new 
ZSK (17242). Is this normal behavior and yes, after which time will the 
existing RR also be signed with the new ZSK (17242)?


The dnssec-policy configuration looks like this:

dnssec-policy "60d_zsk_rollover" {
signatures-refresh 5d;
signatures-validity 14d;
signatures-validity-dnskey 14d;

dnskey-ttl 3600s;
publish-safety 1h;
retire-safety 1h;
purge-keys 10d;

keys {
ksk lifetime unlimited algorithm ecdsap256sha256;
zsk lifetime 60d algorithm ecdsap256sha256;
};

zone-propagation-delay 300s;
max-zone-ttl 86400s;

parent-propagation-delay 1h;
parent-ds-ttl 3600;
nsec3param iterations 0 optout no salt-length 0;
};



Many thanks for hints/explanations.
Best regards,
Tom
--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: After switching to "dnssec-policy", existing RRs are still signed with the "old" ZSK

2022-05-11 Thread Tom




On 11.05.22 11:26, Mark Andrews wrote:

Signature-refresh determines when the RRSIGs will be replaced by looking at the 
expiration time and working backwards. New RRSIGs are generate Using 
signature-interval.


Ah, perfect. Thx.
--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Question about additional section in BIND-responses

2022-08-16 Thread Tom

Hi list

Using BIND-9.18.5 as a recursive server:
What's the reason, that BIND answers with the additional section for the 
the following query where for example Knot resolver and also PowerDNS 
resolver doesn't add the additional section for the same query?


# Querying BIND
$ dig @test ns bastelwurstel.ch

; <<>> DiG 9.18.5 <<>> @test ns bastelwurstel.ch
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 44509
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 3

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 1232
; COOKIE: 5591e3c9e8f24edb010062fbb2eb6e52ddd8fb37 (good)
;; QUESTION SECTION:
;bastelwurstel.ch.  IN  NS

;; ANSWER SECTION:
bastelwurstel.ch.   288 IN  NS  ns2.netnoise.ch.
bastelwurstel.ch.   288 IN  NS  ns1.netnoise.ch.

;; ADDITIONAL SECTION:
ns1.netnoise.ch.3565IN  A   46.22.21.106
ns2.netnoise.ch.3565IN  A   46.22.21.107

;; Query time: 0 msec
;; SERVER: 10.100.102.21#53(test) (UDP)
;; WHEN: Tue Aug 16 17:08:27 CEST 2022
;; MSG SIZE  rcvd: 152




# Querying Knot
$ dig @localhost -p  ns bastelwurstel.ch

; <<>> DiG 9.18.5 <<>> @localhost -p  ns bastelwurstel.ch
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 1240
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 1232
;; QUESTION SECTION:
;bastelwurstel.ch.  IN  NS

;; ANSWER SECTION:
bastelwurstel.ch.   600 IN  NS  ns2.netnoise.ch.
bastelwurstel.ch.   600 IN  NS  ns1.netnoise.ch.

;; Query time: 44 msec
;; SERVER: 127.0.0.1#(localhost) (UDP)
;; WHEN: Tue Aug 16 17:23:27 CEST 2022
;; MSG SIZE  rcvd: 90


BIND (resolver) is configured with "minimal-responses yes;", but I 
assume this is an authoritative-only-option, right?


When flushing the cache for the servers mentioned in the additional 
section (rndc flushname ns1.netnoise.ch; rndc flushname 
ns2.netnoise.ch), then the response looks similar to Knot's/PDNS's response:


# Querying BIND after flushing the cache
$ dig @test ns bastelwurstel.ch

; <<>> DiG 9.18.5 <<>> @test ns bastelwurstel.ch
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 39403
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 1232
; COOKIE: 6d897a3fd76dd815010062fbb44d5082963f3c5dedd4 (good)
;; QUESTION SECTION:
;bastelwurstel.ch.  IN  NS

;; ANSWER SECTION:
bastelwurstel.ch.   596 IN  NS  ns2.netnoise.ch.
bastelwurstel.ch.   596 IN  NS  ns1.netnoise.ch.

;; Query time: 4 msec
;; SERVER: 10.100.102.21#53(test) (UDP)
;; WHEN: Tue Aug 16 17:14:21 CEST 2022
;; MSG SIZE  rcvd: 120



Any hints why BIND adds the additional section while other resolvers 
doesn't? Is there an option in BIND to behave like Knot/PDNS?


Many thanks.

Regards,
Tom
--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Question about additional section in BIND-responses

2022-08-16 Thread Tom




On 8/17/22 02:27, Evan Hunt wrote:

On Tue, Aug 16, 2022 at 05:28:19PM +0200, Tom wrote:

Using BIND-9.18.5 as a recursive server:
What's the reason, that BIND answers with the additional section for the
the following query where for example Knot resolver and also PowerDNS
resolver doesn't add the additional section for the same query?

[...]

Any hints why BIND adds the additional section while other resolvers
doesn't? Is there an option in BIND to behave like Knot/PDNS?


The option is "minimal-responses".  If you set it to "yes", it will omit
authority and additional section data except when necessary.

The default is "no-auth-recursive", which omits authority section data
when it isn't strictly necessary, but will still add additional data for
records in the answer section.



I've already set "minimal-responses yes;", but the additional 
section/data is still shown. So based on your explanation, BIND assumes, 
this data is necessary, why? And why behaves BIND different here than 
Knot/PDNS where no additional section is shown for the same query?

--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Question about additional section in BIND-responses

2022-08-22 Thread Tom



On 8/17/22 06:45, Tom wrote:



On 8/17/22 02:27, Evan Hunt wrote:

On Tue, Aug 16, 2022 at 05:28:19PM +0200, Tom wrote:

Using BIND-9.18.5 as a recursive server:
What's the reason, that BIND answers with the additional section for the
the following query where for example Knot resolver and also PowerDNS
resolver doesn't add the additional section for the same query?

[...]

Any hints why BIND adds the additional section while other resolvers
doesn't? Is there an option in BIND to behave like Knot/PDNS?


The option is "minimal-responses".  If you set it to "yes", it will omit
authority and additional section data except when necessary.

The default is "no-auth-recursive", which omits authority section data
when it isn't strictly necessary, but will still add additional data for
records in the answer section.



I've already set "minimal-responses yes;", but the additional 
section/data is still shown. So based on your explanation, BIND assumes, 
this data is necessary, why? And why behaves BIND different here than 
Knot/PDNS where no additional section is shown for the same query?


Does an BIND expert has an idea or an explanation, why the additional 
section is still shown, although "minimal-responses yes;" is set? And 
why the additional section seems necessary for BIND and not for example 
for Knot/PDNS for the same query?


Many thanks for any hints.
Tom
--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: 'inline-signing' might go away and be replaced by dnssec-policy ?

2022-10-26 Thread Tom



On 10/26/22 10:19, Matthijs Mekking wrote:

Thanks for this. It probably should be removed from the docs at this point.

When introducing dnssec-policy, my goal was to reduce the dozens of 
DNSSEC related configuration options that are scattered throughout 
named.conf and contain them in one stanza. But some options are more 
difficult to be replaced than others.


On 24-10-2022 18:16, PGNet Dev wrote:

i've read this comment


'inline-signing' might go away and be replaced by dnssec-policy


now a few times, in posts and in docs

currently, WITH 'dnssec-policy' signing enabled & in-use, i've

 zone "example.com" IN {
 type master; file "namedb/primary/example.com.zone";
 dnssec-policy "test";
 inline-signing yes;
 ...

the 'inline-signing yes;' is needed IN ADDITION to 'dnssec-policy' in 
order to _not_ overwrite original zone files/data on signing.  e.g., 
with the config above


 cd namedb/primary/
 ls -1 *example*
 example.com.zone  < THIS is the original, 
unsigned zone data

 example.com.zone.jbk
 example.com.zone.jnl
 example.com.zone.signed   < THIS is the signing-generated 
zone data, which gets propagated

 example.com.zone.signed.jnl

without it, the original "example.com.zone" is overwritten with signed 
data.


is there already config in, or planned for, 'dnssec-policy' that 
preserves that separate-file functionality, preserving the original?


There are two ways of DNSSEC maintenance in BIND. One is the 
inline-signing approach, that preserves the original zone file. The 
other is to apply the changes directly to the zone (and zone file) and 
requires the zone to allow dynamic updates.


Since the latest release dnssec-policy requires either inline-signing to 
be set to yes, or allow dynamic updates.


I am thinking of adding inline-signing to dnssec-policy, do you think 
that would that be useful?


Matthijs,

Yes, from my point of view, that would surely be useful. I would very 
much welcome a configuration option within the dnssec-policy-statement, 
to globally enable inline-signing for all dnssec-signed zones.




Best regards,

Matthijs

--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: automatic reverse and forwarding zones

2022-10-27 Thread Tom

Hi Marco

Probably Knot could help here 
(https://www.knot-dns.cz/docs/3.2/html/modules.html#synthrecord-automatic-forward-reverse-records) 
where Knot is able to generate IPv6-PTR and IPv6- based on a pattern 
"on-the-fly". Do you want to achieve something like this?


# Reverse-Lookup
$ dig @resolver +short -x 2a02:1368:6000::cafe
static-2a02-1368-6000--cafe.cust.swissbackbone.net.

# Forward-Lookup ()
$ dig @resolver +short  
static-2a02-1368-6000--cafe.cust.swissbackbone.net.

2a02:1368:6000::cafe

Best regards,
Tom



On 10/27/22 19:23, Marco wrote:

Am 27.10.2022 um 09:52:55 Uhr schrieb Grant Taylor via bind-users:


This is a singular IP (presumably link-net) for a customer.  So there
would be exactly one forward  and one reverse PTR record.


It isn't, because a customer gets /48 or /56 in most cases. The
customer's router can use various methods to assign addresses, auto
configuration and DHCPv6. If the ISP wants to provide reverse zone for
all possible addresses (ISP doesn't know which one of the assigned are
used by the customer), it must have all reverse zones on their zone
file or dynamically create them when a DNS server receives a request.


I remember years ago that DHCP servers could be configured to
dynamically update the forward and / or reverse zone when providing a
lease to a client.

--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: 'inline-signing' might go away and be replaced by dnssec-policy ?

2022-11-09 Thread Tom



On 10/26/22 13:13, Tom wrote:



On 10/26/22 10:19, Matthijs Mekking wrote:
Thanks for this. It probably should be removed from the docs at this 
point.


When introducing dnssec-policy, my goal was to reduce the dozens of 
DNSSEC related configuration options that are scattered throughout 
named.conf and contain them in one stanza. But some options are more 
difficult to be replaced than others.


On 24-10-2022 18:16, PGNet Dev wrote:

i've read this comment


'inline-signing' might go away and be replaced by dnssec-policy


now a few times, in posts and in docs

currently, WITH 'dnssec-policy' signing enabled & in-use, i've

 zone "example.com" IN {
 type master; file "namedb/primary/example.com.zone";
 dnssec-policy "test";
 inline-signing yes;
 ...

the 'inline-signing yes;' is needed IN ADDITION to 'dnssec-policy' in 
order to _not_ overwrite original zone files/data on signing.  e.g., 
with the config above


 cd namedb/primary/
 ls -1 *example*
 example.com.zone  < THIS is the original, 
unsigned zone data

 example.com.zone.jbk
 example.com.zone.jnl
 example.com.zone.signed   < THIS is the 
signing-generated zone data, which gets propagated

 example.com.zone.signed.jnl

without it, the original "example.com.zone" is overwritten with 
signed data.


is there already config in, or planned for, 'dnssec-policy' that 
preserves that separate-file functionality, preserving the original?


There are two ways of DNSSEC maintenance in BIND. One is the 
inline-signing approach, that preserves the original zone file. The 
other is to apply the changes directly to the zone (and zone file) and 
requires the zone to allow dynamic updates.


Since the latest release dnssec-policy requires either inline-signing 
to be set to yes, or allow dynamic updates.


I am thinking of adding inline-signing to dnssec-policy, do you think 
that would that be useful?


Matthijs,

Yes, from my point of view, that would surely be useful. I would very 
much welcome a configuration option within the dnssec-policy-statement, 
to globally enable inline-signing for all dnssec-signed zones.


Matthijs, regarding your question about "adding inline-signing to 
dnssec-policy": Is this something you'll be implementing in the near future?






Best regards,

Matthijs

--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


DF-Flag on UDP-based sockets?

2022-11-29 Thread Tom

Hi list

Regarding ARM 9.18.9 
(https://bind9.readthedocs.io/en/v9_18_9/reference.html#namedconf-statement-edns-udp-size):

"The named now sets the DON’T FRAGMENT flag on outgoing UDP packets."

Tested with BIND-9.18.9, I didn't saw any UDP packets, where the 
"DF"-flag was set on the IP header (true for TCP, but never seen for UDP).


Which circumstands or which queries enforces BIND9 to set the "DF"-flag 
on outgoing UDP-based packets?


Any hints for this?

Thanks a lot.
Tom
--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: DF-Flag on UDP-based sockets?

2022-11-30 Thread Tom

On 11/30/22 09:27, Borja Marcos wrote:




On 30 Nov 2022, at 08:20, Tom  wrote:

Hi list

Regarding ARM 9.18.9 
(https://bind9.readthedocs.io/en/v9_18_9/reference.html#namedconf-statement-edns-udp-size):
"The named now sets the DON’T FRAGMENT flag on outgoing UDP packets."

Tested with BIND-9.18.9, I didn't saw any UDP packets, where the "DF"-flag was 
set on the IP header (true for TCP, but never seen for UDP).

Which circumstands or which queries enforces BIND9 to set the "DF"-flag on 
outgoing UDP-based packets?


I have checked on FreeBSD 13.1 and indeed I don’t see the flag. Neither for UDP 
queries or responses.

What OS are you trying? Might be OS dependant.



I'm trying on linux.

It seems, that this behavior was introduced with
https://gitlab.isc.org/isc-projects/bind9/-/commit/371f829327b8f4cdfae4fa0cca512dcf483eff23

and reverted with
https://gitlab.isc.org/isc-projects/bind9/-/merge_requests/4668/diffs

but the ARM wasn't reverted/corrected.

Does someone of ISC agree? If so, I'll file a bug.

Thank you.
Tom









Borja.


--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: BIND-RPZ and Views

2016-09-19 Thread Tom

Hi

What is the supported/preferred way for implementing slave-rpz's in views?
I want to achieve, that view1 has a different policy-configuration 
(passthru, given, nxdomain..) than the ones configured in view2 using 
the same slave-rpz-files. If not obligatory, I would not 
synchronize/transfer the slave-zone again...just for the view2.


Thank you.
Tom


On 09/16/2016 12:22 PM, Tony Finch wrote:

Anand Buddhdev  wrote:


In newer versions of BIND, you cannot share a writable file in different
views. This is a bad configurtion, and newer versions of BIND reject it.
Just use different file names.


To clarify, you couldn't in older versions of BIND either! It would cause
weird data corruption problems.

Tony.


___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Running current version of bind in a jail?

2016-10-23 Thread Tom

Hi list

From 
https://kb.isc.org/article/AA-00768/0/Getting-started-with-BIND-how-to-build-and-run-named-with-a-basic-recursive-configuration.html:


"Running named in a chroot jail (many still do, but this shouldn't be 
necessary with modern versions of BIND)".:


What's the reason, that it isn't necessary to run modern version of bind 
in a jail?


Kind regards,
Tom
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


response-rate-limiting - "window" explained?

2017-03-24 Thread Tom

Hi
Can someone explain the behaviour of "window" in the rate-limit-context? 
I've tried "responses-per-second 10; window 3;" and had the same results 
as "responses-per-second 10; window 5;".


Any simple explanation for the "window"-directive?

Many thanks.
Kind regards,
Tom
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Question about: "rate-limit: stop limiting responses to 1.1.1.0/24 for www.example.com"

2018-01-04 Thread Tom

Hi list

I'm testing rate-limits (BIND 9.11.2) and I'm unsure, how I've to 
understand the following "stop-limiting"-log-entry:

1)
04-Jan-2018 15:09:10.852 rate-limit: info: limit responses to 1.1.1.0/24 
for www.example.com IN A  (7ae73d9b)


2)
04-Jan-2018 15:09:10.852 rate-limit: info: client @0x7f16440ee550 
13.93.86.165#55203 (www.example.com): rate limit drop response to 
1.1.1.0/24 for www.example.com IN A  (7ae73d9b)


3)
04-Jan-2018 15:09:16.773 rate-limit: info: client @0x7f16440fcc30 
13.93.86.165#33997 (www.example.com): rate limit drop response to 
1.1.1.0/24 for www.example.com IN A  (7ae73d9b)


4)
04-Jan-2018 15:10:20.266 rate-limit: info: stop limiting responses to 
1.1.1.0/24 for www.example.com IN A  (7ae73d9b)



- #1-#3 seems clear, because they reaches the configured threshold. But 
what about the entry #4? Why does this logentry only appears about 60-65 
seconds later, after I've stopped the "test"-attack (confirmed multiple 
times..)?


My rate-config:
rate-limit {
responses-per-second 5;
slip 0;
window 5;
    };


Many thanks.
Kind regards,
Tom
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: response-rate-limiting - "window" explained?

2018-01-05 Thread Tom
I've tested several "window"-values (5-3600) with fast-querying the 
nameserver from one single client with always the same query. As 
explained by Tony the "window" means the time, which the client must 
wait, after he stops fast-querying the nameserver while he was 
successfully dropped.


In my tests, I never had to wait for about more than about 5s.
I've configured rate-limits like this:
   rate-limit {
responses-per-second 5;
slip 0;
window 5;
log-only no; };

Could someone explain the problem here? Why do I never have to wait 
longer than about 5s until I'm able to query the nameserver from the 
unique client with the same query again?


Many thanks.
Kind regards,
Tom



On 03/27/2017 11:33 AM, Tony Finch wrote:

Tom  wrote:


Can someone explain the behaviour of "window" in the rate-limit-context?


It basically determines the time after a client that was querying very
fast but then stopped is allowed to receive responses again.

When a client repeats a query, its counter is decremented until it reaches
the minimum `-1 * window * responses-per-second`. Its counter is
incremented by `responses-per-second` each second, so after the client
stops querying it will be `window` seconds before the counter becomes
positive which means the client is allowed to receive responses again.

Tony.


___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: response-rate-limiting - "window" explained?

2018-01-07 Thread Tom
Mmmh...I can't verify the meaning of the "window"-value. In my 
flood-tests, it makes no differences, if I set this value to 5 or 60 or 
even 3600. The only value which affects the behavior is "slip" and 
"responses-per-second".
When I fast-querying (100r/s) the nameserver with the following 
configuration:.

rate-limit {
responses-per-second 5;
slip 0;
window 5;
log-only no;
};


the nameserver answers always every five seconds for five requests:
Mon Jan  8 07:36:05 CET 2018   querying example.org
Mon Jan  8 07:36:05 CET 2018   querying example.org
Mon Jan  8 07:36:05 CET 2018   querying example.org
Mon Jan  8 07:36:05 CET 2018   querying example.org
Mon Jan  8 07:36:05 CET 2018   querying example.org
Mon Jan  8 07:36:10 CET 2018   querying example.org
Mon Jan  8 07:36:10 CET 2018   querying example.org
Mon Jan  8 07:36:10 CET 2018   querying example.org
Mon Jan  8 07:36:10 CET 2018   querying example.org
Mon Jan  8 07:36:10 CET 2018   querying example.org
Mon Jan  8 07:36:15 CET 2018   querying example.org
Mon Jan  8 07:36:15 CET 2018   querying example.org
Mon Jan  8 07:36:15 CET 2018   querying example.org
Mon Jan  8 07:36:15 CET 2018   querying example.org
Mon Jan  8 07:36:15 CET 2018   querying example.org

And here it makes no differences, if I set the "window"-value to 5 or 60 
or 3600.



Any hints / explanation for the behavior of the "window"-value?


Many thanks.
Tom


On 01/05/2018 07:27 PM, Tony Finch wrote:

Tom  wrote:


Could someone explain the problem here? Why do I never have to wait longer
than about 5s until I'm able to query the nameserver from the unique client
with the same query again?


The 60s is the delay after a client has stopped making queries when the
information about that client can be forgotten. RRL logs "stop limiting"
at that point which is a bit misleading.

Tony.


___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: response-rate-limiting - "window" explained?

2018-01-08 Thread Tom



On 01/08/2018 12:37 PM, Tony Finch wrote:

Tom  wrote:


Mmmh...I can't verify the meaning of the "window"-value. In my flood-tests, it
makes no differences, if I set this value to 5 or 60 or even 3600.


You'll only notice the window if you pause your flood test - it's
basically the recovery time. (This is why the "stop limiting" log message
is misleading: RRL actually stops limiting after the window passes, but it
logs 60s later.)

This delayed log-entry seems now clear.


The relevant part of the ARM is:


Response rate limiting uses a "credit" or "token bucket" scheme.  Each
combination of identical response and client has a conceptual account
that earns a specified number of credits every second. A prospective
response debits its account by one. Responses are dropped or truncated
while the account is negative.  Responses are tracked within a rolling
window of time which defaults to 15 seconds, but can be configured with
the window option to any value from 1 to 3600 seconds (1 hour).  The
account cannot become more positive than the per-second limit or more
negative than window times the per-second limit.  When the specified
number of credits for a class of responses is set to 0, those responses
are not rate limited.


So, during your flood test, your client's token bucket will have its
minimym value, -1 * window * responses-per-second. When it stops, the
token bucket value will increase by `responses-per-second` each second, so
it will increase past zero after `window` seconds, and at that point RRL
will stop dropping responses.
This means, that with a "window 30;", I'll have to wait for about 30s 
until the nameserver stops dropping requests (after I've stopped 
flooding)right? In my tests, this never matches.


If I set the "responses-per-second 5;" and the "window 30;", then begin 
flooding (the responses are correctly dropped), then stop flooding, then 
querying the nameserver from the same source for the same RR, I'll get 
immediately the right answer.


Any explanations for this behavior?
Kind regards,
Tom



Tony.


___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: response-rate-limiting - "window" explained?

2018-01-09 Thread Tom



On 01/09/2018 02:49 PM, Tony Finch wrote:

Tom  wrote:


If I set the "responses-per-second 5;" and the "window 30;", then begin
flooding (the responses are correctly dropped), then stop flooding, then
querying the nameserver from the same source for the same RR, I'll get
immediately the right answer.

Any explanations for this behavior?


Try more than once - you are probably seeing the effect of the "slip"
setting, which is supposed to allow legitimate clients to get answers even
when they are being spoofed by a DDoS attack.


I tried many times with different values for "window" (window 5;, window 
30;, window 3600;) Always the same effect with the following command:
while true; do echo -n "$(date)   "; dig +short +ignore +tries=1 
@x.x.x.x www.example.com; sleep .01; done


Slip is set to "0" (always drop). After stopping the flood, I'm 
immediately able to query the same record (www.example.com) with a 
positive answer. Does the "window 5;" or "window 30;" or "window 3600;" 
possibly has no effect?


Thank you.
Kind regards,
Tom



Also, if you are using DiG then to see the proper effect you'll want to
set the +ignore +tries=1 options (and maybe +timeout=1).

Tony.


___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: response-rate-limiting - "window" explained?

2018-01-09 Thread Tom



On 01/09/2018 05:11 PM, Tony Finch wrote:

Tom  wrote:


Slip is set to "0" (always drop). After stopping the flood, I'm immediately
able to query the same record (www.example.com) with a positive answer. Does
the "window 5;" or "window 30;" or "window 3600;" possibly has no effect?


The script below works for me. My server is configured with

responses-per-second 2;
slip 0;

The script "floods" at 10 qps for 15 seconds (enough to fill the window),
then drops to 1qps and times how long it takes to recover. At the end it
says the recovery time was 20 seconds. This is a bit more than the window
size because I wasn't completely quiet during the recovery time.



Many thanks for this hint/script. The rate-limit works as explained. My 
misunderstanding was, that I didn't set the query-process(es) in the 
background.

Kind regards,
Tom




#!/bin/sh

set -eu

dig='dig +ignore +tries=1 +timeout=1 +norec dotat.at @grey.dotat.at'

start=$(date +%s)

while [ $(date +%s) -lt $(($start + 15)) ]
do
$dig | grep aa &
sleep 0.1
done

end=$(date +%s)

while ! $dig | grep aa
do
:;
done

echo $(( $(date +%s) - $end ))



Tony.


___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Unclear behavior with option "lame-ttl 0;"

2018-02-22 Thread Tom

Hi
While testing the option "lame-ttl" with values 0 (disable) or any value 
higher zero on our resolver, I'm unsure, if I missed something (BIND 
9.11.2):


lame-ttl defines the time in seconds, how long a lame-server-entry 
should be cached and therefore not should be further asked (because it 
seems to be down). See 
http://www.zytrax.com/books/dns/ch7/hkpng.html#lame-ttl


If BIND recognizes a lame-server (written in the logfile), the 
corresponding server will not be contacted for authoritative queries. If 
I set the value "lame-ttl 0;", which means, caching lameservers will be 
disabled, then I would expect, that BIND will do "round-robin"-queries 
to all authoritative servers of a zone (includes the down-one). BUT: 
BIND still would have a notice of the lame-server (written in the log) 
and this server will still *NOT* be contacted for lookups.


I've tested with simple iptables-rules on my resolver, which are 
blocking outbound-connections to one or more authoritative servers of a 
zone for simulating the "lame-servers"-behavior.


Any explanation or hints for this (mis)-behavior?

Thank you.
Kind regards,
Tom
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


DNSSEC and automatic renewal of RRSIG-expiration-time

2018-05-03 Thread Tom

Hi list

Using latest BIND (9.12.1) with dnssec and inline-signing enabled. 
SIG-VALIDITY-INTERVAL is set to 1 day (for testing).

Look the following RRSIG:

test01.example.com. 300 IN RRSIG A 8 3 300 (
20180504060124 20180503052321 1 test01.example.com.
rUch7bFR18Nmaeu+gqS29fG8oTPQm1SIBe9x+0iVPpXw
GnXBy6bZacXiBwYPjgJd7GK+3giGq/Mw2URXexW8PuuV
IGBz8bRUczNbQPHsaZUWXlv32RelJArykWB8S/N5pvOn
r8Q9w4asKR6JNiDnzoF/09EVlSyXvaluVrZT7kMGKdgC
OB7H20kwcBkGdwUYMclna2XmddQMeicc5yjxglQgpg89
48Om5L8A0hjGDQEyTTTaOA91D+7/F2yI99TPvSYizC+6
vYUoleAIWQi3GRG/KJRd9N8OouZIYgOtf2jKPwsEQwhQ
sS7G3w4BxrkEB8Q8btx5CWaKX2CVD8Jv2A== )

The record does expire in a few hours.
Does the "inline-signing"-mechanism also automatically renew the 
expiration-time of the RRSIGs? If so: When or in which interval does 
BIND verify the expiration-times of the RRSIGs and renew them? If no, 
what do I have to do, to force BIND automatically to renew the RRSIGs?


Thank you.
Kind regards,
Tom
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Logrotate for bind9

2018-07-04 Thread Tom




On 07/04/2018 04:00 PM, Anand Buddhdev wrote:

On 04/07/2018 15:50, Blason R wrote:


Hi There,

I am not getting appropriate results for my custom daily logrorate for
bind9 logs on Ubuntu.


It's more useful if you show us your logrotate snippet, so we can point
out what is wrong with it.


Can someone please help me with the settings which would include below
stuff


1. Should rotate daily


daily


2. Compress


compress


3. create new file


Usually not needed, because BIND creates the log file itself.


4. keep last 180 entries


rotate 180


Do I need stop bind9 while logs are being rotated? What is the correct
procedure to start logs in new file?


You don't have to stop BIND to rotate log files. Instead, you just run
"rndc reconfig" and that causes BIND to reopen its log files. If it
finds that the files have been moved (by logrotate) it will create new
log files.
...or you use "copytruncate", so the file will be copied and the other 
stuff (compress, rotate 180, etc..) and then truncated, so BIND has 
still the same filedescriptors open, but the logfile is rotated :-). 
This way, you don't need to "rndc reconfig".

Kind regards,
Tom




Anand
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Understanding TTL in "rndc dumpdb"-output

2018-10-22 Thread Tom

Hi

After querying my resolver for "testbla11.example.com", I receive a 
NXDOMAIN response with a minimum-ttl (in the soa) of 3600.
When I afterwards dump the cache of my resolver (9.12.2-P1) with "rndc 
dumpdb" and look for the negative ttl, then a value much bigger than 
3600 is shown (608363):

# grep testbla /var/named/data/named_dump.db
testbla11.example.com.  608363  \-ANY   ;-$NXDOMAIN

This number decrements every second.

What is this number? The same behavior for positive answers too. The 
A-record for "www.google.com" has a TTL for 300 seconds. In the "rndc 
dumpdb"-output I have a value for 605082.


Any hints?
Thank you.

Kind regards,
Tom
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Understanding TTL in "rndc dumpdb"-output

2018-10-23 Thread Tom

Hi Michal
Thank you for this feedback.

I've checked the serve-stale status, which is currently off.
# rndc serve-stale status
_default: off (stale-answer-ttl=1 max-stale-ttl=604800)
_bind: off (stale-answer-ttl=1 max-stale-ttl=604800)

Is this a normal behavior, that in the "rndc dumpdb" nevertheless the 
TTL in the form of "serve-stale" is shown (even if the 
serve-stale-status = off)?


Thank you.
Tom


On 23.10.18 10:25, Michał Kępień wrote:

After querying my resolver for "testbla11.example.com", I receive a NXDOMAIN
response with a minimum-ttl (in the soa) of 3600.
When I afterwards dump the cache of my resolver (9.12.2-P1) with "rndc
dumpdb" and look for the negative ttl, then a value much bigger than 3600 is
shown (608363):
# grep testbla /var/named/data/named_dump.db
testbla11.example.com.  608363  \-ANY   ;-$NXDOMAIN

This number decrements every second.

What is this number? The same behavior for positive answers too. The
A-record for "www.google.com" has a TTL for 300 seconds. In the "rndc
dumpdb"-output I have a value for 605082.


This happens due to the serve-stale feature being available in BIND 9.12
and later, with max-stale-ttl set to 604800 by default (note that this
does *not* mean serving stale answers is enabled by default).  The TTLs
you are seeing in the cache dump essentially indicate how much longer
any given record will be kept in the cache database.  The serve-stale
"offset" is indicated in a comment near the top of the dump; I am fairly
sure it will say "; using a 604800 second stale ttl" in your case.


___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Rewrite/Override QTYPE with RPZ

2018-11-08 Thread Tom

Hi all
Is there a way to override/rewrite QTYPE (ex. MX) with RPZ? If no, is 
this planned in future releases of BIND?


Regards,
Tom
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Rewrite/Override QTYPE with RPZ

2018-11-08 Thread Tom
Fore example "example.com" and "*.example.com" are blacklisted. I would 
like to return a real ip address for special query types like MX or TXT, 
but not for A or .


Tom


On 08.11.18 16:44, Barry Margolin wrote:

In article ,
  Tom  wrote:


Hi all
Is there a way to override/rewrite QTYPE (ex. MX) with RPZ? If no, is
this planned in future releases of BIND?


What would be the point? If a query is for MX, and you return A instead,
the client won't be able to do anything with it.


___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Rewrite/Override QTYPE with RPZ

2018-11-11 Thread Tom

I mean the other way:

My feeded RPZ blocks othercompany.com and *.othercompany.com. Therefore 
any qtype (MX, A, ...) are blocked for this domain. Is there a way 
with BIND just to whitelist the MX for othercompany.com and the 
consequent A-Record (ex. mail.othercompany.com) that we are able to send 
mail to othercompany.com?





On 09.11.18 14:39, Lightner, Jeffrey wrote:

That wouldn't help you much.   Many mail systems these days check not only your 
MX record but also your PTR record to make sure the IP you came from has a 
valid (i.e. not generic) reverse lookup.   They'll also check things like dkim 
or spf TXT records.   If they don't like what they find they'll simply reject 
email even if you haven't been blacklisted.

In general blacklisting services blacklist specific IPs rather than domains 
anyway.   A work around would be to change the outbound IP your mail server 
uses rather than changing other records.  Of course you'd have to make 
additional changes for the PTR, A/ and TXT records for the new IP you 
select.

Many blacklisting services have a way to delist yourself.

However, if you don't fix the underlying problem that caused you to be 
blacklisted in the first place any new IP will quickly be blacklisted as well 
and/or delisting yourself a second time is much more difficult.

If you are sending multiple automated emails (e.g. invoices or marketing 
materials) to customers you need to be monitoring for returns and removing 
rejected email addresses from your databases.   These often occur because the 
customer no longer has the email address they originally gave you (or they had 
a typo in what they gave you).

-Original Message-
From: bind-users [mailto:bind-users-boun...@lists.isc.org] On Behalf Of Tom
Sent: Thursday, November 08, 2018 11:49 PM
To: bind-users@lists.isc.org
Subject: Re: Rewrite/Override QTYPE with RPZ

Fore example "example.com" and "*.example.com" are blacklisted. I would like to 
return a real ip address for special query types like MX or TXT, but not for A or .

Tom


On 08.11.18 16:44, Barry Margolin wrote:

In article ,
   Tom  wrote:


Hi all
Is there a way to override/rewrite QTYPE (ex. MX) with RPZ? If no, is
this planned in future releases of BIND?


What would be the point? If a query is for MX, and you return A
instead, the client won't be able to do anything with it.


___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Rewrite/Override QTYPE with RPZ

2018-11-11 Thread Tom

Hi Daniel

Thank you for your feedback. This could be a solution.

It seems, that unbound can do this (not verified) and BIND-RPZ can't do 
this actually:

https://serverfault.com/questions/18748/overriding-some-dns-entries-in-bind-for-internal-networks

Any plans for BIND?
Tom



On 12.11.18 08:14, Daniel Stirnimann wrote:

Hello Tom,


My feeded RPZ blocks othercompany.com and *.othercompany.com. Therefore
any qtype (MX, A, ...) are blocked for this domain. Is there a way
with BIND just to whitelist the MX for othercompany.com and the
consequent A-Record (ex. mail.othercompany.com) that we are able to send
mail to othercompany.com?


If the action of your RPZ policy is a CNAME redirecting the user to a
walled garden and that walled garden runs an MTA you could configure it
as a relay server.

We have a similar setup where the MTA on the walled garden rejects the
email so that the sending MTA immediately gets a feedback.

Daniel


___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


BIND 9.12.3-P1: No additional section

2019-01-15 Thread Tom

Hi list,

After migrating from 9.11.x to 9.12.3-P1, I recognized, that BIND is 
giving no "additional sections" back, although "minimal-responses" is 
set to "no". I think this is correct and does not affect the 
authoritative behavior. But I don't understand, why this happens when 
"minimal-responses no;" is configured.


Thank you.
Kind regards,
Tom
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: BIND 9.12.3-P1: No additional section

2019-01-15 Thread Tom

Authoritative servers:

A direct query to a BIND-9.12.3-P1 authoritative server for "mydomain.net":

$ dig +norec -4 @ns3.example.com www.mydomain.net

; <<>> DiG 9.11.3-1ubuntu1.3-Ubuntu <<>> +norec -4 @ns3.example.com 
www.mydomain.net

; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 36984
;; flags: qr aa; QUERY: 1, ANSWER: 2, AUTHORITY: 3, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
; COOKIE: 847bc109e7f71243dd664e215c3ec4c412619cff362fd7fc (good)
;; QUESTION SECTION:
;www.mydomain.net.  IN  A

;; ANSWER SECTION:
www.mydomain.net.   3600IN  A   44.44.44.44

;; AUTHORITY SECTION:
mydomain.net.   3600IN  NS  ns3.example.com.
mydomain.net.   3600IN  NS  ns2.example.com.
mydomain.net.   3600IN  NS  ns1.example.com.





The same direct query here to a BIND-9.11.x authoritative server (also a 
slave like the BIND-9.12.3-P1) for "mydomain.net":


$ dig +norec -4 @ns1.example.com www.mydomain.net

; <<>> DiG 9.11.3-1ubuntu1.3-Ubuntu <<>> +norec -4 @ns1.example.com 
www.mydomain.net

; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 24450
;; flags: qr aa; QUERY: 1, ANSWER: 2, AUTHORITY: 3, ADDITIONAL: 7

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
; COOKIE: 975a61dc07fe107fc5acdc2d5c3ec54df206b954894a2c4f (good)
;; QUESTION SECTION:
;www.mydomain.net.  IN  A

;; ANSWER SECTION:
www.mydomain.net.   3600IN  A   44.44.44.44

;; AUTHORITY SECTION:
mydomain.net.   3600IN  NS  ns2.example.com.
mydomain.net.   3600IN  NS  ns1.example.com.
mydomain.net.   3600IN  NS  ns3.example.com.

;; ADDITIONAL SECTION:
ns1.example.com.7200IN  A   1.1.1.1
ns2.example.com.7200IN  A   2.2.2.2
ns3.example.com.7200IN  A   3.3.3.3
ns1.example.com.7200IN  2001:db8::1
ns2.example.com.7200IN  2001:db8::2
ns3.example.com.7200IN  2001:db8::3


In both authoritative configurations I've set "minimal-responses no;", 
but on 9.12.3-P1, no additional section comes back.


Thank you.

Kind regards,
Tom

On 15.01.19 19:15, Evan Hunt wrote:

On Tue, Jan 15, 2019 at 02:40:51PM +0100, Tom wrote:

After migrating from 9.11.x to 9.12.3-P1, I recognized, that BIND is
giving no "additional sections" back, although "minimal-responses" is
set to "no". I think this is correct and does not affect the
authoritative behavior. But I don't understand, why this happens when
"minimal-responses no;" is configured.


Authoritative or recursive?  Can you give a specific example
of a query that isn't getting an additional section and should?


___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: BIND 9.12.3-P1: No additional section

2019-01-15 Thread Tom




On 16.01.19 08:08, Evan Hunt wrote:

On Wed, Jan 16, 2019 at 07:02:05AM +0100, Tom wrote:

$ dig +norec -4 @ns3.example.com www.mydomain.net

; <<>> DiG 9.11.3-1ubuntu1.3-Ubuntu <<>> +norec -4 @ns3.example.com
www.mydomain.net
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 36984
;; flags: qr aa; QUERY: 1, ANSWER: 2, AUTHORITY: 3, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
; COOKIE: 847bc109e7f71243dd664e215c3ec4c412619cff362fd7fc (good)
;; QUESTION SECTION:
;www.mydomain.net.  IN  A

;; ANSWER SECTION:
www.mydomain.net.   3600IN  A   44.44.44.44

;; AUTHORITY SECTION:
mydomain.net.   3600IN  NS  ns3.example.com.
mydomain.net.   3600IN  NS  ns2.example.com.
mydomain.net.   3600IN  NS  ns1.example.com.


Huh, looks like you're right.  Both of these servers also authoritative for
example.com, I'm guessing? 


Yes.., correct. Both are also authoritative for "example.com".

 It seems that if the additional data comes from

a different zone on the same server (as opposed to the same zone, or from
the cache), then it's not being looked up.

I don't think this change was intentional.  It was introduced during the
work to improve performance in delegation-heavy zones: the old code would
search through all of the zone databases every time it went to look up
additional data.  The newer code saves time by searching only the database
that it's already found.  That's more efficient and yields correct results
in the "minimal-responses yes" case, but it's wrong for "no".

It's possible there was a reason for the change that I've forgotten,
but I think we intended to leave the "no" behavior alone. Thanks for
bringing it up, I'll open a bug ticket about it.


Perfect.., thank you.
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


0-TTL when querying "invalid" soa

2019-01-29 Thread Tom

Hi list

The following "invalid" soa-query responds with NXDOMAIN and with a ttl 
of 0 for the SOA-Record in the authoritative section:

$ dig +norec +noquestion @ns1.yahoo.com. soa asfasdfdas.yahoo.com

; <<>> DiG 9.11.3-1ubuntu1.3-Ubuntu <<>> +norec +noquestion 
@ns1.yahoo.com. soa asfasdfdas.yahoo.com

; (2 servers found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42800
;; flags: qr aa; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 1272
; COOKIE: 352e18e0eb38280a875e08255c506acd96bbdf698575699e (good)
;; AUTHORITY SECTION:
yahoo.com.		0	IN	SOA	ns1.yahoo.com. hostmaster.yahoo-inc.com. 2019012908 
3600 300 1814400 600




When directly querying the "valid" soa record, then the correct ttl for 
the soa-record is shown:

~$ dig +norec +noquestion @ns1.yahoo.com. soa yahoo.com

; <<>> DiG 9.11.3-1ubuntu1.3-Ubuntu <<>> +norec +noquestion 
@ns1.yahoo.com. soa yahoo.com

; (2 servers found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 12677
;; flags: qr aa; QUERY: 1, ANSWER: 1, AUTHORITY: 5, ADDITIONAL: 9

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 1272
; COOKIE: af18a9cdfa9d627675f37ac25c506ae626caee21d6718b5c (good)
;; ANSWER SECTION:
yahoo.com.		1800	IN	SOA	ns1.yahoo.com. hostmaster.yahoo-inc.com. 
2019012908 3600 300 1814400 600




When directly forcing an NXDOMAIN (query an A-record, which doesn't 
exist), then the correct ttl for negative-caching is shown:

$ dig +norec +noquestion @ns1.yahoo.com. asdfasfdasf.yahoo.com

; <<>> DiG 9.11.3-1ubuntu1.3-Ubuntu <<>> +norec +noquestion 
@ns1.yahoo.com. asdfasfdasf.yahoo.com

; (2 servers found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15170
;; flags: qr aa; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 1272
; COOKIE: 8050b624605c3cb9c99cb11e5c506b0d0bd93eb038992f6a (good)
;; AUTHORITY SECTION:
yahoo.com.		600	IN	SOA	ns1.yahoo.com. hostmaster.yahoo-inc.com. 
2019012908 3600 300 1814400 600





When querying the authoritative google-ns for "soa 
asdfasdfdas.google.com", then a ttl of 60s is shown:

$ dig +norec +noquestion @ns1.google.com. soa asdfasdfasd.google.com

; <<>> DiG 9.11.3-1ubuntu1.3-Ubuntu <<>> +norec +noquestion 
@ns1.google.com. soa asdfasdfasd.google.com

; (2 servers found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41492
;; flags: qr aa; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 512
;; AUTHORITY SECTION:
google.com.		60	IN	SOA	ns1.google.com. dns-admin.google.com. 231384568 
900 900 1800 60



We're running BIND-9.12.3-P1 on our authoritative servers and we have 
the same behavior with 0-ttl with a invalid soa-query. Is this 
bind-specific? Why does an invalid soa-record responds with 0-ttl in the 
authority-section?


Thank you.
Kind regards,
Tom
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: 0-TTL when querying "invalid" soa

2019-01-29 Thread Tom

Perfect.., many thanks for your hints.

Tom


On 29.01.19 16:33, Tony Finch wrote:

Tom  wrote:


We're running BIND-9.12.3-P1 on our authoritative servers and we have the same
behavior with 0-ttl with a invalid soa-query. Is this bind-specific? Why does
an invalid soa-record responds with 0-ttl in the authority-section?


Funnily enough, this little obscurity came up elsewhere just last week.

I had the same question back in 2012:

https://lists.isc.org/pipermail/bind-users/2012-June/087843.html

https://tools.ietf.org/html/draft-andrews-dnsext-soa-discovery

The latter link explains the reason for this odd behaviour.

[ Last week we also discussed an odd bit of text in RFC 1035: "For
example, SOA records are always distributed with a zero TTL to
prohibit caching." But RFC 2181 said you must no longer do that. ]

https://twitter.com/fanf/status/1087708537600569344

Tony.


___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


DNSSEC debugging: TC and AD-Flag set?

2019-02-25 Thread Tom

Hi list

I've enabled deep log-debugging in BIND 9.12.2-P1 (resolver) for DNSSEC 
purposes and was wondering, why my resolver received a "authenticated 
data" answer from one of the authoritative server for "org." 
(199.19.57.1), while the response has the TC (truncated) flag set too:


25-Feb-2019 08:26:05.172 resolver: debug 10: log_ns_ttl: fctx 
0x7f89ac0021a0: rctx_answer: dnssec-failed.org (in 'org'?): 1 0
25-Feb-2019 08:26:05.172 dnssec: debug 3: validating 
dnssec-failed.org/DS: starting
25-Feb-2019 08:26:05.172 dnssec: debug 3: validating 
dnssec-failed.org/DS: attempting positive response validation
25-Feb-2019 08:26:05.172 dnssec: debug 9: validating 
dnssec-failed.org/DS: get_key: creating fetch for org DNSKEY

25-Feb-2019 08:26:05.172 resolver: debug 1: fetch: org/DNSKEY
25-Feb-2019 08:26:05.172 resolver: debug 10: log_ns_ttl: fctx 
0x7f89a8c0: fctx_create: org (in 'org'?): 1 0
25-Feb-2019 08:26:05.172 resolver: debug 11: sending packet to 
199.19.57.1#53

;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id:   1478
;; flags:; QUESTION: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 512
; COOKIE: c03358ce09f38ecc
;; QUESTION SECTION:
;org.   IN  DNSKEY


25-Feb-2019 08:26:05.265 resolver: debug 10: received packet from 
199.19.57.1#53

;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id:   1478
;; flags: qr aa tc ad; QUESTION: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 4096
;; QUESTION SECTION:
;org.   IN  DNSKEY
...
...


Any hints for this behavior?
Many thanks.
Tom
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Error: zone example.com/IN (signed): receive_secure_serial: unchanged

2019-03-11 Thread Tom

Hi list

We're sometimes receiving the same error as described in 
https://gitlab.isc.org/isc-projects/bind9/issues/256 after reloading BIND.


zone example.com/IN (signed): receive_secure_serial: unchanged

What does this error exactly means? What can I do to prevent this error?

It seems, that DNSSEC is working fine, but the error is confusing.

Thank you.

Kind regards,
Tom
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Error: zone example.com/IN (signed): receive_secure_serial: unchanged

2019-03-13 Thread Tom

Hi list

Any hints on the error below after restarting bind (using BIND-9.12.3-P1)?

zone example.com/IN (signed): receive_secure_serial: unchanged

DNSSEC is working fine on the zone "example.com", but as I mentioned: 
The severity is "error" and it's not clear why.


Many thanks for any hints/ideas.

Kind regards,
Tom


On 11.03.19 09:14, Tom wrote:

Hi list

We're sometimes receiving the same error as described in 
https://gitlab.isc.org/isc-projects/bind9/issues/256 after reloading BIND.


zone example.com/IN (signed): receive_secure_serial: unchanged

What does this error exactly means? What can I do to prevent this error?

It seems, that DNSSEC is working fine, but the error is confusing.

Thank you.

Kind regards,
Tom

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


DNS-resolution failed for "www.gracenote.com" when "qname-minimization relaxed|strict;"

2019-05-13 Thread Tom

Hi list

Using BIND-9.14.1 as a resolver and qname-minimization set to "relaxed":

The following A-record resp. CNAME could not be resolved, when 
qname-minimization is enabled (strict or relaxed):


www.gracenote.com

With qname-minimization enabled, BIND tries to get the NS record for 
"glb.gracenote.com" (after BIND received the CNAME 
"web.glb.gracenote.com") which results in:


$ dig @bind-9.14.1 +noall +answer ns glb.gracenote.com
glb.gracenote.com.  0   IN  NS  
sc-gtm-1a.globix-sc.gracenote.com.


Then BIND tries to get the ip address for the mentioned NS 
(sc-gtm-1a.globix-sc.gracenote.com.) above, which results in NXDOMAIN:


$ dig @bind-9.14.1 +noall +answer +comment 
sc-gtm-1a.globix-sc.gracenote.com.

;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17096
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
; COOKIE: 9b42859a64d8ace1d701a0565cd94f43afdf5dc2a0368d96 (good)


From the client-perspective, the whole query results in SERVFAIL:

$ dig @bind-9.14.1 +noall +comment www.gracenote.com
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 47277
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
; COOKIE: ffb32844e0c268e28df22c8a5cd9528e2dfff5e5f2f857cf (good)


Question:
Is there a simple way, where I can configure a zone-wide exception for 
"qname-minimization" in a (pseudo)-way like this:

zone "gracenote.com." {   qname-minimization off; };

What's the best way to "enable" resolution for the mentioned zone 
without disabling qname-minimization?


Many thanks for any hints.
Kind regards,
Tom
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


CDS-deletion record "CDS 0 0 0 00" is failing with bind-9.14.9 and bind-9.14.8

2020-01-10 Thread Tom
Hi list

Using BIND 9.14.9 or BIND 9.14.8 and a zonefile with cds-deletion record:
@ IN CDS 0 0 0 00

The zone does not load with the following error:
10-Jan-2020 21:35:47.075 general: error: zone example.com/IN (unsigned):
CDS/CDNSKEY consistency checks failed
10-Jan-2020 21:35:47.076 zoneload: error: zone example.com/IN
(unsigned): not loaded due to errors.

The same zonefile with the same cds deletion-entry with bind-9.14.3
loads perfectly and could also be queried:
$ dig +noall +answer @ns1.example.com cds example.com
example.com.3600INCDS0 0 0 00

Any hints for this?

Thank you.
Kind regards,
Tom
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Logging issue with bind

2012-02-16 Thread Tom Schmitt

> Von: Raven 

> > > I am currently trying to setup query logging with bind on a debian
> > > server, but I seem unable to.

> > > logging {
> > >channel munin_log {
> > >  file "/var/log/bind9/query.log" versions 30 size 15m;
> > >  severity dynamic;

> > "severity dynamic" starts at 0 i.e. off.

correct.

> > 
> > Just remove the "severity" line.

No, let it be, it's nothing wrong with it.

> Still not working I'm afraid.
> What else could it be? Some debian-specific bug?

No, nothing Debian-specific :-)

You told Bind how to log queries in the config.

Now you have to tell Bind that he should start with the querylogging.
Do:

rndc querylog

Tom.

-- 
Empfehlen Sie GMX DSL Ihren Freunden und Bekannten und wir
belohnen Sie mit bis zu 50,- Euro! https://freundschaftswerbung.gmx.de
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: block ddns by name

2012-02-16 Thread Tom Schmitt
> Von: Tony Finch 

> > Does anyone know if there is a way to prevent the creation of certain
> > records - by name?
> 
>   update-policy {
>   deny "*" name "internal.example.com";
>   # ...
>   };

Hi,

I have a quite similar question but can't figure it out from the doc for 
update-policy:

I have a few DHCP-clients which are sending really stupid hostnames to the DHCP 
and via DHCP they got into my DNS zones.

Example: A few IP-phones are sending as their hostname eight times xFF. And 
this not printable name is then in DNS where I (and a few older nameserver) 
don't want it.

So is there something possible like
update-policy { deny "*" name /^a-zA-Z0-9_\-/; };
?

(For thos who don't speak regex: deny all names with something in it what is no 
letter or digit or underscore or dash.

Tom.


-- 
Empfehlen Sie GMX DSL Ihren Freunden und Bekannten und wir
belohnen Sie mit bis zu 50,- Euro! https://freundschaftswerbung.gmx.de
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


how to generate the name of a .nzf file?

2012-03-20 Thread Tom Mueller
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi,

perhaps my idea is quite stupid.

I think about following scenario:
A primary nameserver is script-managed via rdnc addzone/delzone and
nsupdate with data from a database.
I know, rndc generates nzf files, which are named by hash values of
the corresponding view names.
Now there are eg. 50.000 zones configured in that way.
At black friday the system crashes and has to be replaced by a new system.
File-based backups of the old system are of course too old and a
recovery by this way requires zone updates since last backup time, so
its rated as deprecated.

My idea:
Transfer of the the actual generated zone files to the new system and
then performing 50.000 rndc addzone commands to build the nzf files.
The rndc commands will take a lot of time, so it's faster, to generate
the nzf files at my own and transfer them to the new system, too.
Starting named - done.

The question is: how to generate the name of a nzf file?
Is there a tool or an easy way?

- --
Greetings,

Thomas Müller
Entwickler Dedicated Server
-
---
Telefon: + 49 (0)30 - 398 02 - 0
Telefax: + 49 (0)30 - 398 02 - 0
E-Mail:t.muel...@strato-rz.de
Website: http://www.strato.de
-
---
STRATO AG
Pascalstraße 10
10587 Berlin
-
---
Vorsitzender des Aufsichtsrates: Phil Zamani
Vorstand: Damian Schmidt (Vorsitz), Julien Ardisson,
Christian Müller, Christoph Steffens, René Wienholtz
Amtsgericht Berlin-Charlottenburg HRB 79450

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFPaJNkboB3gPvObwIRAocOAJ9iJ2h+LSQVAfdU1j8+xTsbJxxJSACdE+E7
HZhAzeyEdNwiPk5chtCWbyk=
=04Pm
-END PGP SIGNATURE-

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: how to generate the name of a .nzf file?

2012-03-20 Thread Tom Mueller
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi Jan-Piet,


>> The question is: how to generate the name of a nzf file?
>> Is there a tool or an easy way?
>
> Maybe something like this? (Untested)
>
> echo -n internal | shasum -a 256 | awk '{printf "%16.16s\n", $1}'
>
Great - it works. :-D

- --
Greetings,

Thomas Müller
Entwickler Dedicated Server
-
---
Telefon: + 49 (0)30 - 398 02 - 0
Telefax: + 49 (0)30 - 398 02 - 0
E-Mail:t.muel...@strato-rz.de
Website: http://www.strato.de
-
---
STRATO AG
Pascalstraße 10
10587 Berlin
-
---
Vorsitzender des Aufsichtsrates: Phil Zamani
Vorstand: Damian Schmidt (Vorsitz), Julien Ardisson,
Christian Müller, Christoph Steffens, René Wienholtz
Amtsgericht Berlin-Charlottenburg HRB 79450

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFPaXE2boB3gPvObwIRAk5DAKCSCmM9aZuO3wXQ+SqnvPAe9nrFiQCeKrgn
yStrnFFz5815rWG00wmD62M=
=pENY
-END PGP SIGNATURE-

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Moving DNS out of non-cooperative provider

2012-06-18 Thread Tom Diehl

On Mon, 18 Jun 2012, Alexander Gurvitz wrote:


Can someone enlighten me on the following scenario
(I guess it's explained somewhere, but can't find the info.):

example.com was served by ns.OLDprovider.net
example.com owner wants to move his domain to ns.NEWprovider.net
oldprovider.net is not cooperating, and continues to serve
example.com 172800 NS ns.OLDprovider.net
(*.gtld-servers.net and ns.newprovider.com now serve
example.com 172800 NS ns.NEWprovider.net)

Recursive resolver ns.isp.com queried for www.example.com every few minutes,
and currently have
example.com 45892 NS ns.OLDprovider.net
in it's cache. www.example.com have TTL of 3600.
Thus each hour ns.isp.com queries ns.OLDprovider.net,
with each query gets new NS record, and... refreshes the NS TTL ?

Will ns.isp.com EVER query ns.NEWprovider.net ?

I'd be happy to know how BIND behaves, but also
how other servers may behave in this case.


It is not a question of how bind behaves. It is a question of how does
dns work. Bottom line is, setup nameservers with $NEWPROVIDER and change
the nameserver records with your registrar and move on. All will be well
when the ttl's time out.

Until the ttl's timeout, resolvers with the old nameservers cached will still
query them. Once the ttl's time out the new servers will be queried.

Hope this helps,

--
Tom Diehl   tdi...@rogueind.com  Spamtrap address mtd...@rogueind.com___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Stalling slave transfers

2013-05-08 Thread Tom Sommer

Hi,

I have a problem with one of 3 slave servers, all set up the exact same 
way, with the exact same bind version and configuration.


One slave has a problem transfering zones from the master.

The logfiles are flooded with "received notify for zone" .. "refresh in 
progress, refresh check queued" lines and "rndc status" returns a 
constant high number of "soa queries in progress".
After a few hours the zones are transfers, so the connection to the 
master is working, but there is a major delay. I tried resetting the 
slave and transfering ALL slave zones again, which worked fine 
instantly. The problem still appeared again after a few hours though.


The master has three network-paths, one on external IP, one on internal 
IP and one on IPv6. All 3 paths work fine, because the transfers happen 
after an hour or so.


There is no hints in the master's log.
The other two slaves are running perfectly, no errors or delays what so 
ever.


Bind version 9.9.2-P2 (recently upgraded to).

Any hints would be appreciated, as I feel like I've exhausted most 
options.


Thank you.
--
Tom Sommer
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Stalling slave transfers

2013-05-08 Thread Tom Sommer


On 5/8/13 12:25 PM, Cathy Almond wrote:

On 08/05/13 08:26, Tom Sommer wrote:

Hi,

I have a problem with one of 3 slave servers, all set up the exact same
way, with the exact same bind version and configuration.

One slave has a problem transfering zones from the master.

The logfiles are flooded with "received notify for zone" .. "refresh in
progress, refresh check queued" lines and "rndc status" returns a
constant high number of "soa queries in progress".
After a few hours the zones are transfers, so the connection to the
master is working, but there is a major delay. I tried resetting the
slave and transfering ALL slave zones again, which worked fine
instantly. The problem still appeared again after a few hours though.

The master has three network-paths, one on external IP, one on internal
IP and one on IPv6. All 3 paths work fine, because the transfers happen
after an hour or so.

There is no hints in the master's log.
The other two slaves are running perfectly, no errors or delays what so
ever.

Bind version 9.9.2-P2 (recently upgraded to).

Any hints would be appreciated, as I feel like I've exhausted most options.

Thank you.

Have a look at this KB article (you'll need to register to view - but
registration is open to all):

https://kb.isc.org/article/AA-00726/30/Tuning-your-BIND-configuration-effectively-for-zone-transfers-particularly-with-many-frequently-updated-zones.html

Also - and this isn't covered in that article (yet) - if you're using
views, then use-alt-transfer-source defaults to 'yes'.  You might want
to set it explicitly to 'no' or to define alt-transfer-source
and/or alt-transfer-source-v6.

Thank you, great resource. I think I solved it with raising 
serial-query-limit, it's just odd that it's not required on the other 
two servers.


Another issue has arisen now though, the logfile is filled with lots of
named[5596]: zone example.com/IN: refresh: failure trying master 
1.2.3.4#53 (source 0.0.0.0#0): operation canceled


But if I do a "dig example.com @1.2.3.4" it's working just fine. Same 
server as with the previous issue.


Any thoughts? Thank you.

// Tom
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Stalling slave transfers

2013-05-08 Thread Tom Sommer


On 5/8/13 8:15 PM, Tom Sommer wrote:

Another issue has arisen now though, the logfile is filled with lots of
named[5596]: zone example.com/IN: refresh: failure trying master 
1.2.3.4#53 (source 0.0.0.0#0): operation canceled



and

named[5596]: zone example.com/IN: refresh: retry limit for master 
1.2.3.4#53 exceeded (source 0.0.0.0#0)


// Tom
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Stalling slave transfers

2013-05-09 Thread Tom Sommer


On 5/9/13 11:36 AM, Cathy Almond wrote:

I don't think you solved the problem - I think you moved it (or made it
happen faster...)

The refresh errors indicate that the master isn't responding to your
slave for some reason.  That's what you'll need to investigate.  I would
suggest auditing the differences between this slave and the others in
their named configurations as well as their configured IP interfaces and
routing tables.

A pair of network packet traces (slave and the non-responding auth
server) might also point you in the right direction.

Right, but when I perform a "dig" from the server OS, the transfer and 
network-communication work fine - so there are no signs as to why named 
can't connect to the master, but the OS can.


I'll do some more digging.

Thanks.
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Stalling slave transfers

2013-05-14 Thread Tom Sommer


On 5/9/13 2:19 PM, Luther, Dan wrote: 

> Tom, 
> 
> What happens when you "dig +tcp example.com @1.2.3.4"? Specifically I'm 
> wondering here if the slave you're having problems with is blocking TCP port 
> 53. Such a configuration would allow you to query the master server, but not 
> transfer to/from it.

That works fine, but I think I figured out the problem, it was due to
the server having acquired a 2nd (autodiscovered) IPv6 address, and it
was using that as transfer source. It would be very helpful if the
logfile said the actual source IP, and not just 0.0.0.0#53 or ::#0. That
would help debugging a lot. 

I'm down to only seeing the error "retry limit for master" and "refresh:
failure trying master" on IPv6 now, and only occasionally. 

It also appears the master is sending two notifies for each zone, to
each slave, one on IPv4 and one on IPv6? 

// Tom ___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

DNS64 and DNSSEC - AD bit not set (RFC 6147)

2014-03-26 Thread Tom Lanyon
Hi list,

Just wanted to check my understanding of BIND9's implementation of DNS64 
against RFC 6147.

Currently BIND9's "break-dnssec" defaults to "no" - in this configuration, a 
security-aware & validating recursive resolver with will never synthesise a 
 record via DNS64 when queried with DO=1 irregardless of the CD bit.

When changing "break-dnssec" to "yes", querying with DO=1 will always trigger 
synthesis of a DNS64  record, irregardless of the CD bit.

Both of these configurations seem to conflict with the DNS64 RFC 6147, which 
specifies that (so long as the upstream negative  and positive A responses 
validate) the recursive resolver can still synthesise the DNS64  when 
queried with DO=1 and CD=0 but must return the answer with the AD bit set.  
Only when queried with both DO=1 and CD=1 must it not synthesise the DNS64 .

Is there any way to configure BIND9 to comply with this RFC 6147 behaviour?  
We're on 9.8.2, but I couldn't find anything related in the CHANGES for either 
9.8 or 9.9.

Thanks,
Tom

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: DNS64 and DNSSEC - AD bit not set (RFC 6147)

2014-03-26 Thread Tom Lanyon
On 27 Mar 2014, at 14:48, Mark Andrews  wrote:
> No.  If the answer is secure and DO=1 then it won't synthesis.
> 
> RFC 6147 just gets DO and CD semantics completely wrong.  The WG
> wanted there to be signaling that the client was going to validate
> and DNSSEC does not have such signaling.  The best DNSSEC can do
> is DO=1 indicates that the client might validate.  This is independent
> of CD.

Isn't this signalling defined as the purpose of the CD bit in RFC 4035?

My naive understanding is something like:

DS=1 CD=0 "I am not going to validate this, I want you to check it"
DS=1 CD=1 "I am going to validate this, so I don't care if you check it"

> A validating stub resolver should send it queries with CD=0 so that
> the recursive server can filter out bad responses from upstream.
> Only if it gets SERVFAIL should it attempt the query with CD=1 in
> case the resolver has bad time or bad trust anchors.

Right, this is what our current stub resolvers are doing (well, I'm not sure 
about the retry with CD=1 on SERVFAIL, but they're sending DS=1 CD=0 queries to 
our recursive resolvers).


> Named doesn't lie when DO=1 *and* it is possible to detect the lie.
> "break-dnssec yes;" tells named to lie even when it is possible to
> detect the lie.

So, what is a "lie" here?  Assuming that the response received upstream (i.e. a 
negative  and positive A response) has been validated, is inserting a 
synthesised  for DNS64 "lying"?


> Stub resolvers don't currently set DO=1 so DNS64 synthesis happens
> for them.


Our real-world case, and why I'm looking into this, is that our BIND 9.8.2 
validating recursive resolvers are *not* returning synthesised  DNS64 
responses for DNSSEC signed zones because the downstream stub resolvers query 
with DS=1 and CD=0.  This breaks connectivity from our IPv6-only clients for 
DNSSEC signed zones.

As far as I can see, my two options are to enable break-dnssec in BIND, or 
disable DNSSEC validation in the stub resolvers.  Are there any other options, 
and if not, are either of these two more preferred than the other?

Tom

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


BIND 9's entropy consumption

2014-04-02 Thread Tom Limoncelli
Hi!

I have 4 DNS servers all running BIND 9.8.2 (the CentOS 6.5 package).  One
is configured as the master for about 100 zones.  The other 3 are slaves
for those 100 zones.  On the master the amount of entropy reported by "cat
/proc/sys/kernel/random/entropy_avail" was around 150.  On the slaves it
hovered around 90.

Is there a technical reason for the difference?

There is a graph of one of the slaves here:
http://serverfault.com/questions/582908/entropy-deprivation-on-bind-named-servers

Note: I've since enabled "rngd" and the available entropy hovers around 2k.
 So there problem is "solved" that way, but it still makes me very
concerned that the amount of entropy in use was so different.  There is no
DNSSEC configured, no incremenal zone transfers (just notifications sent
from the master to all slaves).

Anyone have any theories on why this might be?

Thanks in advance,
Tom


The specific version is:

# named -V
BIND 9.8.2rc1-RedHat-9.8.2-0.23.rc1.el6_5.1 built with
'--build=x86_64-redhat-linux-gnu' '--host=x86_64-redhat-linux-gnu'
'--target=x86_64-redhat-linux-gnu' '--program-prefix=' '--prefix=/usr'
'--exec-prefix=/usr' '--bindir=/usr/bin' '--sbindir=/usr/sbin'
'--sysconfdir=/etc' '--datadir=/usr/share' '--includedir=/usr/include'
'--libdir=/usr/lib64' '--libexecdir=/usr/libexec'
'--sharedstatedir=/var/lib' '--mandir=/usr/share/man'
'--infodir=/usr/share/info' '--with-libtool' '--localstatedir=/var'
'--enable-threads' '--enable-ipv6' '--with-pic' '--disable-static'
'--disable-openssl-version-check' '--with-dlz-ldap=yes'
'--with-dlz-postgres=yes' '--with-dlz-mysql=yes'
'--with-dlz-filesystem=yes' '--with-gssapi=yes' '--disable-isc-spnego'
'--with-docbook-xsl=/usr/share/sgml/docbook/xsl-stylesheets'
'--enable-fixed-rrset' 'build_alias=x86_64-redhat-linux-gnu'
'host_alias=x86_64-redhat-linux-gnu' 'target_alias=x86_64-redhat-linux-gnu'
'CFLAGS= -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions
-fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic' 'CPPFLAGS=
-DDIG_SIGCHASE'
using OpenSSL version: OpenSSL 1.0.1e 11 Feb 2013
using libxml2 version: 2.7.6

-- 
Email: t...@whatexit.orgWork: tlimonce...@stackoverflow.com
Skype: YesThatTom
Blog:  http://EverythingSysadmin.com
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Can I run two name servers on one host with two IP addresses?

2015-08-19 Thread Tom Browder
I have a single server with access to several IP addresses from my
dedicated host provider.  They do not provide DNS service so I
currently use my domain registrar.

I would like  to run my own DNS server but I only have the one server
(with 5 IP addresses).  Is it possible (and permitted) to run DNS with
just one real server?

Thanks.

Best regards,

-Tom
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Can I run two name servers on one host with two IP addresses?

2015-08-19 Thread Tom Browder
On Wed, Aug 19, 2015 at 5:59 PM, Reindl Harald  wrote:
> Am 20.08.2015 um 00:53 schrieb Tom Browder:
>> I have a single server with access to several IP addresses from my
...
>> I would like  to run my own DNS server but I only have the one server
...
> they have to be on different IP networks and the reason si simply to avoid a
> single-point of failure
> so even if you have different IP ranges on your single machine don't do it -
...

That makes sense--thanks, Reindl!

Best,

-Tom
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Allowable reverse mapping zone file names

2016-08-27 Thread Tom Browder
I do not control 3-octet networks but need reverse mapping for my mail
server.

Two questions:

1. Where is the doc that completely describes the allowable reverse mapping
zone file names?

2. When running my own authoritative name servers, do I need reverse
mapping for anything other than my single mail server?

Thanks.

Best regards,

-Tom
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

rndc on local host: need named running?

2016-08-27 Thread Tom Browder
My plan is to have two remote, authoritative name servers (master and
slave) for my owned domains.  I would like to use rndc to control them from
my local host.

A couple of questions:

1. Does named need to be running on the local host?

2. Can I use rndc from my local host which doesn't have a fixed ip address?

Thanks.

Best regards,

-Tom
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: Allowable reverse mapping zone file names

2016-08-27 Thread Tom Browder
On Saturday, August 27, 2016, /dev/rob0  wrote:

> On Sat, Aug 27, 2016 at 10:47:36AM -0500, Tom Browder wrote:
> > I do not control 3-octet networks but need reverse mapping for my
> > mail server.
>
> Discuss that with your ISP or netblock owner.

...

Thanks for the good advice, "/dev/robo."

Best regards.

-Tom
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: rndc on local host: need named running?

2016-08-27 Thread Tom Browder
On Saturday, August 27, 2016, Warren Kumari  wrote:

> On Saturday, August 27, 2016, Tom Browder  > wrote:
>
>> My plan is to have two remote, authoritative name servers (master and
>> slave) for my owned domains.  I would like to use rndc to control them from
>> my local host.
>> A couple of questions:
>>
>  ...

Thanks, Warren!

Best regards,

-Tom
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: Allowable reverse mapping zone file names

2016-08-27 Thread Tom Browder
On Saturday, August 27, 2016, Lyle  wrote:
...

> As far as question 2, depends on if the reverse zones were delegated to
> you or not. It depends on your ISP.  Many do not delegate reverse lookup
> zones to the end user.  In that case, you have to ask them to insert the
> records you think necessary including your mail server's host name.
>
Thanks, Lyle!

Best regards,

-Tom
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: rndc on local host: need named running?

2016-08-27 Thread Tom Browder
On Saturday, August 27, 2016, Lyle  wrote:

> On 08/27/16 10:54, Tom Browder wrote:
>
> https://calomel.org/dynamic_dns_ddns.htmlMy plan is to have two
>
> 2. Can I use rndc from my local host which doesn't have a fixed ip address?
>
> ...

> Let me Google that for you and the answer is:
> https://www.safaribooksonline.com/library/view/dns-bind/
> 0596004109/ch03s04.html
>

Thanks, Lyle. I've seen that, I have the book. But it's not real clear to a
novice that it works without the remote host knowing the incoming ip
address.

But I have enough info now to risk putting my name servers on line without
fear of destroying the dns system of the internet!

Best regards,

-Tom
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: rndc on local host: need named running?

2016-08-30 Thread Tom Browder
On Tuesday, August 30, 2016, Cathy Almond  wrote:

> On 28/08/2016 02:48, Lyle wrote:
> > Use any in the allow stanza.
>
> You'll be using a shared key for this to work anyway, but I'd suggest
> being slightly more paranoid than 'any' in the allow stanza - perhaps
> the address range in which your local machine is to be allocated its
> address?
>

Thanks, Cathy.

Best regards

-Tom
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: rndc on local host: need named running?

2016-08-30 Thread Tom Browder
On Tuesday, August 30, 2016, Woodworth, John R <
john.woodwo...@centurylink.com> wrote:
>
> I have a slightly unorthodox view on this which may even offer a bit more
>
> security.  The answers are listed below inline.
>
>  ...

Thanks, John.

Best regards,

-Tom
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Request reverse dns mapping advice

2016-09-05 Thread Tom Browder
I have two remote servers, one with one IPv4 address, and one with
five IPv4 addresses.  My ISP will provide reverse mapping for all if I
provide the desired rDNS record for each address.

The rDNS record for the one-address server is not a problem, but I
would appreciate opinions on the choice of names for the records for
the multiple-address server.  The server is currently is or will be
performing the following roles:

1. Apache web server for 10+ virtual hosts (name based, each with its
own domain name).

2. Planned:  A mail server to be used for all my current (and future) domains.

3. Planned:  A slave (secondary), authoritative DNS server for my
domains (the single-adddress server will be the master).

My idea is to use this list of names for the rDNS record for each of
the five addresses:

1.  pick a primary domain from the list of virtual hosts (example2.com)
2.  use the "real" host name of the server (juvat.example1.com)
3.  the mail server name (mail.example1.com)
4.  the dns server name (ns2.example1.com)
5.  another domain from the virtual hosts list (example 3.com)

Note that I alse have IPv6 addresses with which I will create similar
rDNS records matching the names I use for the IPv4 records.

Thanks for your always helpful advice.

Best regards,

-Tom
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Request reverse dns mapping advice

2016-09-05 Thread Tom Browder
On Monday, September 5, 2016, John Levine  wrote:

> >1.  pick a primary domain from the list of virtual hosts (example2.com)
> >2.  use the "real" host name of the server (juvat.example1.com)
> >3.  the mail server name (mail.example1.com)
> >4.  the dns server name (ns2.example1.com)
> >5.  another domain from the virtual hosts list (example 3.com)
>
> Publish a PTR with the mail server name, forget about the rest of
> them.

...

Thank you, John, for the good advice.  I thought I had read that somewhere
but haven't been able to find it again.

On today's Internet, you want your mail server to EHLO with a name
> that has matching forward and reverse DNS with the server's IP.  If
> you don't, you look unnecessarily like a spambot.

...

A very good reason, indeed!

Thanks again.

Best regards,

-Tom
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: failed to start BIND 9.16.34 on Ubuntu 20.04

2022-11-11 Thread Tom Krizek

On 11/11/2022 01.47, Ling Yun wrote:

# systemctl status bind9
● named.service - BIND Domain Name Server
      Loaded: loaded (/lib/systemd/system/named.service; enabled; vendor 
preset: enabled)
      Active: failed (Result: signal) since Thu 2022-11-10 21:51:18 CST; 48s ago
        Docs: man:named(8)
     Process: 96944 ExecStart=/usr/sbin/named -f $OPTIONS (code=killed, 
signal=ABRT)
    Main PID: 96944 (code=killed, signal=ABRT)

Nov 10 21:51:18 h2o systemd[1]: named.service: Scheduled restart job, restart 
counter is at 6.
Nov 10 21:51:18 h2o systemd[1]: Stopped BIND Domain Name Server.
Nov 10 21:51:18 h2o systemd[1]: named.service: Start request repeated too 
quickly.
Nov 10 21:51:18 h2o systemd[1]: named.service: Failed with result 'signal'.
Nov 10 21:51:18 h2o systemd[1]: Failed to start BIND Domain Name Server.


These log messages are irrelevant - it's just the systemd's restart facility 
rate-limit. Please attach the log which contains the real cause of failure, 
e.g. by using:

# journalctl -u bind9

--
Tom Krizek


OpenPGP_0x01623B9B652A20A7.asc
Description: OpenPGP public key


OpenPGP_signature
Description: OpenPGP digital signature
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


RT-Number?

2011-01-14 Thread Tom Schmitt
I just read the release notes from Bind 9.7.2-P3 and noticed that behind every 
short description of a change there is a number beginning with RT.
I hope this is some kind of ticket number were more detailed information about 
this change could be found?

My question:
Were do I find these tickets? 
(wouldn't make much sense to publish their numbers if the tickets themself 
couldn't be read, but I couldn't find them on the ISC homepage)
-- 
Empfehlen Sie GMX DSL Ihren Freunden und Bekannten und wir
belohnen Sie mit bis zu 50,- Euro! https://freundschaftswerbung.gmx.de
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Zones not getting transferred after a restart

2011-06-02 Thread Richard Tom

Consider the option "transfers-in".

Look at the output of:
rndc status

If you notice that the "soa queries in progress" number is high in 
proportion to the number of slave zones maintained by the server, you 
should increase the transfers-in number (the default is 10 as I 
recall).  That means that your server is limiting itself to only 10 
simultaneous zone retrievals from the masters of the zones.  I didn't 
get the response I liked in my particular case until I tweaked the 
number to about 70% of the "soa queries in progress" number.


As with tweaking any parameter on a heavily used system, you might want 
to look at the typical system vital statistics after tweaking the value 
and looking at how any of those things (cpu, mem, disk i/o, network i/o, 
general load, etc) may now be trending differently after a day/week.


Richard

On 3/15/2011 6:29 PM, Mark Andrews wrote:

In message, Bernhard Schmidt writes:

Hi,

we have an internal distribution point running BIND 9.5.0-P2 (SLES 11.1
distribution package). It slaves about 1800 zones from a commercial DNS
management software running on 127.0.0.1:8054 and distributes them
towards our servers.

Whenever we restart BIND on that system, the 1800 zones are loaded
within two seconds (1800 loaded serial x entries, running), but it
takes up to 30 minutes (26 minutes the last time) where it does not do
any AXFR upstream and logs

15-Mar-2011 09:36:47.334 zone kongress.xxx.de/IN: notify from
127.0.0.1#8054: refresh in progress, refresh check queued

on every notify it receives. I cannot really see SOA queries upstream
either. When that time has passed by it catches up with the zone
transfers.

Other than having "edns no" and "request-ixfr no" set for the upstream
server (due to bugs in this field) the configuration is pretty standard.
I'm not really opposed to updating the BIND to a newer version, but
given I'd have to go away from the distribution package where I feel
fine using it (firewalled system, only reachable by our other servers)
I'd rather know for sure that this problem is solved. I see similar
issues on our frontend servers running 9.7.3.

Can anyone explain how I can speedup this progress?

Disable notify for the zones.  Increase soa-query-rate.  It also applies
to notifies.


Also I'd like to disable/tune down the

15-Mar-2011 08:25:36.828 zone xxx.in-addr.arpa/IN: refresh:
skipping zone transfer as master 127.0.0.1#8054 (source 0.0.0
.0#0) is unreachable (cached)

thing. Good idea, but stopping all zone transfers for 10 minutes from
the only master just because it was unreachable for a few seconds is a
bad idea.

Adjust lame-ttl.


I have searched for a named.conf knob and have failed to find any.
Closest I have found is serial-query-rate, which is not set in our
environment and should default to 20.


The information transmitted in this email and any of its attachments is 
intended only for the person or entity to which it is addressed and may contain 
Cablevision proprietary information, which is privileged, confidential, or 
subject to copyright belonging to Cablevision. Any review, retransmission, 
dissemination or other use of, or taking of any action in reliance upon, this 
information by persons or entities other than the intended recipient is 
prohibited and may be unlawful. If you received this in error, please contact 
the sender immediately and delete and destroy the communication and all of the 
attachments you have received and all copies thereof.
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


what does dig +trace do?

2011-08-30 Thread Tom Schmitt
Hi,

I have a question: What does dig +trace exactly do?

The reason for my question is:
I have a internal-only DNS in our company with my own root-zone. And normaly 
all things are fine. But when there is an issue I would like to analyze with 
dig +trace, the command fails.

If I do dig +trace example.com

I get something like this:


; <<>> DiG 9.8.0-P4 <<>> +trace example.com
;; global options: +cmd
.   10800   IN  NS  root1.
.   10800   IN  NS  root2.
.   10800   IN  NS  root3.
.   10800   IN  NS  root4.
;; Received 159 bytes from 127.0.0.1#53(127.0.0.1) in 1 ms

;; connection timed out; no servers could be reached


I don't understand why there is a timeout. Next zone on the trace should be the 
com. domain which is hosted on the same servers as the rootzone.

I don't see any DNS-problems at all, only the +trace-option is behaving weird. 
Can anybode tell me why? What does this option what normal DNS queries don't do?


Tom.


-- 
NEU: FreePhone - 0ct/min Handyspartarif mit Geld-zurück-Garantie!   
Jetzt informieren: http://www.gmx.net/de/go/freephone
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: RE: what does dig +trace do?

2011-08-30 Thread Tom Schmitt


> 
> What strikes me as odd is that the first query does return 4 (internal)
> root servers, but no glue records ?

I have no idea why this is this way.

> Given those root name servers, do you have A-records for root[1234] in
> your root zone ?

Yes, of course. From my root-zone:
 

.  10800   IN  NS  root1.
.  10800   IN  NS  root2.
.  10800   IN  NS  root3.
.  10800   IN  NS  root4.
root1. 10800 IN A 10.111.111.111
root2. 10800 IN A 10.111.112.112
root3. 10800 IN A 10.111.113.113
root4. 10800 IN A 10.111.114.114
com. 10800 IN NS root3.
com. 10800 IN NS root4.


All these records I can query with dig without any problem, but dig +trace 
still fails. :-(


-- 
NEU: FreePhone - 0ct/min Handyspartarif mit Geld-zurück-Garantie!   
Jetzt informieren: http://www.gmx.net/de/go/freephone
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: RE: RE: what does dig +trace do?

2011-08-31 Thread Tom Schmitt

 Original-Nachricht 

> I believe what is missing the root cache file.  
> 
> The root server would have glue records point to GTLDs, like this
> 
> Then the GTLDs would have glue records pointing to nameserver of the
> domain you are trying to trace.
> 
> What you are seeing is your local nameservers, it seems to me they don't
> have access to the Internet or a firewall is blocking some of the 
> response or you don't have the root cache file to do hints or 
> combination of all the above. 

Hi Gary,

yes, all of the above. But this is no mistake, it's the intended architecture. 

My DNS-server is an internal one without any conection to the internet. There 
is no root hint file because I have a internal root zone on my own. And my root 
servers have the glue records in this root zone and the NS records for the TLDs 
as well. 

So dig +trace should work. Or has the trace-option the IP-addresses of the 
Internet-root-servers hardwired in the the sourcecode?




-- 
Empfehlen Sie GMX DSL Ihren Freunden und Bekannten und wir
belohnen Sie mit bis zu 50,- Euro! https://freundschaftswerbung.gmx.de
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: RE: what does dig +trace do?

2011-08-31 Thread Tom Schmitt

> >> What strikes me as odd is that the first query does return 4 (internal)
> >> root servers, but no glue records ?
> >
> >I have no idea why this is this way.
> 
> Because +trace only displays the answer section of the responses by
> default.
> Try "dig +trace +additional".

Hi Chris,

you are right, thank you. With this I see the glue records:

; <<>> DiG 9.8.0-P4 <<>> +trace example.com
;; global options: +cmd
.   10800   IN  NS  root1.
.   10800   IN  NS  root2.
.   10800   IN  NS  root3.
.   10800   IN  NS  root4.
root1. 10800 IN A  10.111.111.111
root2. 10800 IN A  10.111.112.112  
root3. 10800 IN A  10.111.113.113
root4. 10800 IN A  10.111.114.114
;; Received 159 bytes from 127.0.0.1#53(127.0.0.1) in 1 ms

;; connection timed out; no servers could be reached


The main problem is still the same though. The trace option fails with a 
timeout. Even thought I'm operating on the shell of one of the root-servers 
itself (so there is not much network in between to cause trouble).

-- 
NEU: FreePhone - 0ct/min Handyspartarif mit Geld-zurück-Garantie!   
Jetzt informieren: http://www.gmx.net/de/go/freephone
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

  1   2   >