Re: dnssec-keyfromlabel-pkcs11 label format

2016-01-14 Thread arun
My bad, there was a newline /n character at the pin file.




--
View this message in context: 
http://bind-users-forum.2342410.n4.nabble.com/dnssec-keyfromlabel-pkcs11-label-format-tp1382p1413.html
Sent from the Bind-Users forum mailing list archive at Nabble.com.
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


difference in responses between UDP and TCP

2017-06-15 Thread Arun Natarajan
Hello,

Wondering why we are seeing different serial numbers from a bind
authoritative server for requests over UDP and TCP.

dig +tcp soa @ns.example.com example.com +short
ns1.example.com. hostmaster.example.com. 2017061505 10800 3600 360 3600

dig +notcp soa @ns.example.com example.com +short
ns1.example.com. hostmaster.example.com. 2017061506 10800 3600 360 3600

any idea?

thanks,

--
arun
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: difference in responses between UDP and TCP

2017-06-18 Thread Arun Natarajan
Hello Anand,

 Thanks for the response.

>
> Perhaps the zone got updated between your queries.
>
> Have you (as one should in a proper experiment) repeated these queries
> to demonstrate that this is happening consistently?
>

Yes, it is a consistent behaviour. It happens with some of our secondaries.

for example:
dig +tcp @212.26.18.3 pub.sa
serial: 2017061804
dig +notcp @212.26.18.3 pub.sa
serial: 2017061805


> If it is happening consistently, then it's possible that you have *two*
> DNS servers listening on the server, one on the UDP socket, and another
> on the TCP socket, and they're loaded with different zones.
>

To my understanding, they are running bind with one configuration. Will
double check anyway.

thanks,
arun
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: difference in responses between UDP and TCP

2017-06-18 Thread Arun Natarajan
Hello Tony,


>
> Without knowing the server host name and zone name there could be lots of
> different reasons, so there isn't really any way to answer.
>
> True,

dig +tcp @212.26.18.3 pub.sa
serial: 2017061804
dig +notcp @212.26.18.3 pub.sa
serial: 2017061805

--
arun
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: difference in responses between UDP and TCP

2017-06-18 Thread Arun Natarajan
>
> If it is happening consistently, then it's possible that you have *two*
>> DNS servers listening on the server, one on the UDP socket, and another
>> on the TCP socket, and they're loaded with different zones.
>>
>
>
You are right, seems there are two DNS process listening TCP and UDP.  :)


> To my understanding, they are running bind with one configuration. Will
> double check anyway.
>
>
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

native pkcs#11 and dynamic signing issues

2016-01-21 Thread Arun N S
 Running bind 9.10.3-7.P2, with softhsm-2.0.0rc1-3 on Fedora 23.


I was able to sign the zones with dnssec-signzone-pkcs11 command line,


# dnssec-signzone-pkcs11 example.com
Verifying the zone using the following algorithms: RSASHA2.
Zone fully signed:
Algorithm: RSASHA2: KSKs: 1 active, 0 stand-by, 0 revoked
ZSKs: 1 active, 0 stand-by, 0 revoked


but with dynamic signing the logs were showing
 "dns_dnssec_findmatchingkeys: error reading key file
Kexample.com.+008+01234.private: no engine"


Zone configuration:
zone "example.com" IN {
type master;
file "zones/example.com";
auto-dnssec maintain;
inline-signing yes;
};


# rndc sign example.com
received control channel command 'sign example.com'
zone example.com/IN (signed): reconfiguring zone keys
dns_dnssec_findmatchingkeys: error reading key file
Kexample.com.+008+01234.private: no engine
dns_dnssec_findmatchingkeys: error reading key file
Kexample.+008+05678.private: no engine
zone example.com/IN (signed): next key event: 21-Jan-2016 13:36:59.184

any idea?

Thanks,
Arun
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: native pkcs#11 and dynamic signing issues

2016-01-21 Thread Arun N S
Thanks for the response.

My understanding is that, when you use native pkcs#11 it is not dependent
on the openssl engine. But yes the bind is chrooted. I tried to run it
without chroot and still got the same issue. The private key reference file
created by dnsseckey-fromlabel has the Engine defined as "Engine:
cGtjczExAA=="

--
arun


On Thu, Jan 21, 2016 at 1:01 PM, Tony Finch  wrote:

> Arun N S  wrote:
> >
> > but with dynamic signing the logs were showing
> >  "dns_dnssec_findmatchingkeys: error reading key file
> > Kexample.com.+008+01234.private: no engine"
> >
> > any idea?
>
> Wild guess (I know nothing about PKCS#11): are you running chrooted, and
> if so is the relevant OpenSSL engine plugin in usr/lib/engines in the
> chroot?
>
> Tony.
> --
> f.anthony.n.finchhttp://dotat.at/
> Forth, Tyne, Dogger: South 4 or 5, backing southeast 6 or 7, perhaps gale 8
> later. Moderate or rough, occasionally slight at first. Showers, then rain.
> Good, occasionally moderate.
>
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: native pkcs#11 and dynamic signing issues

2016-01-24 Thread Arun N S
The issue is fixed.

I was using the default named daemon, which is not aware of the native
pkcs#11 compiled in. Started named-pkcs11 fixed a couple of permission
issues, and it worked.

# rndc sign example.com
received control channel command 'sign example.com'
zone sa/IN (signed): reconfiguring zone keys
# zone example.com/IN (signed): next key event: 24-Jan-2016 12:29:40.234
zone example.com/IN (signed): sending notifies (serial 2016012006)

--
arun



On Thu, Jan 21, 2016 at 1:08 PM, Arun N S  wrote:

> Thanks for the response.
>
> My understanding is that, when you use native pkcs#11 it is not dependent
> on the openssl engine. But yes the bind is chrooted. I tried to run it
> without chroot and still got the same issue. The private key reference file
> created by dnsseckey-fromlabel has the Engine defined as "Engine:
> cGtjczExAA=="
>
> --
> arun
>
>
> On Thu, Jan 21, 2016 at 1:01 PM, Tony Finch  wrote:
>
>> Arun N S  wrote:
>> >
>> > but with dynamic signing the logs were showing
>> >  "dns_dnssec_findmatchingkeys: error reading key file
>> > Kexample.com.+008+01234.private: no engine"
>> >
>> > any idea?
>>
>> Wild guess (I know nothing about PKCS#11): are you running chrooted, and
>> if so is the relevant OpenSSL engine plugin in usr/lib/engines in the
>> chroot?
>>
>> Tony.
>> --
>> f.anthony.n.finchhttp://dotat.at/
>> Forth, Tyne, Dogger: South 4 or 5, backing southeast 6 or 7, perhaps gale
>> 8
>> later. Moderate or rough, occasionally slight at first. Showers, then
>> rain.
>> Good, occasionally moderate.
>>
>
>
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

How to keep the KSK private key offline with BIND dynamic signing?

2016-01-24 Thread Arun N S
Tried to  include DNSKEY, RRSIG for the KSK manually in the unsigned zone
file along with the ZSK key ($INCLUDE dynamic/example.com.+008+012345.key).
The dnssec-signzone succeeded, even though it was complaining about the
path for KSK.

# dnssec-signzone-pkcs11 example.com
dnssec-signzone: warning: dns_dnssec_keylistfromrdataset: error reading
private key file example.com/RSASHA256/23456: file not found
Verifying the zone using the following algorithms: RSASHA256.
Zone fully signed:
Algorithm: RSASHA256: KSKs: 1 active, 0 stand-by, 0 revoked
  ZSKs: 1 active, 0 stand-by, 0 revoked

# dig @localhost example.com dnskey +dnssec
;; ANSWER SECTION:
example.com. 3600IN  DNSKEY  256 3 8
AwEAAdkaiQFx+JpWOla3vhucotyePO/
example.com. 3600IN  DNSKEY  257 3 8
AwEAAZt2BKCYKvu6Avr.

But when I tried to include the same unsigned zone file and used rndc tool
(rndc sign example.com) or named restart the signed zone file generated
does not have the DNSKEY for KSK.

# dig @localhost example.com dnskey +dnssec
;; ANSWER SECTION:
example.com. 3600IN  DNSKEY  256 3 8
AwEAAdkaiQFx+JpWOla3vhucotyePO/

Any ideas?

--
arun
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users