Re: KSK signing all records; NSEC3 algorithm status?

2014-05-28 Thread Phil Pennock
On 2014-05-29 at 00:59 -0400, Phil Pennock wrote: > The new DNSKEY had id=33768 and when I deployed it, Bind signed the SOA > with it but nothing else. Bind 9.10 ARM (PDF-only??): "However, if the new key is replacing an existing key of the same algorithm, then the zone will be re-signed increm

logging via named.conf

2014-05-28 Thread Jim Pazarena
Is there an easy way in the named.conf logging to have ALL logging go to local2 ? I've created: logging { channel syslog-local2 { syslog local2; print-category yes; print-severity yes; }; category default { syslog-local2; }; category general {

Re: KSK signing all records; NSEC3 algorithm status?

2014-05-28 Thread Phil Pennock
On 2014-05-28 at 13:02 +1000, Mark Andrews wrote: > If you want to finish transitioning to RSASHA256 just generate a > zone signing key RSASHA256. Named will sort things out. You may > end up with 3 sets of signatures for a while. Don't worry about > it. The new DNSKEY had id=33768 and when I d

please give feedback on new howto: arming the dns firewall (rpz zone howto part 2)

2014-05-28 Thread Hans-Cees Speel
Hello dear bind people, I have produced a second part in the DNS-firewall howto 1. is howto setup a DNS-firewall part 1: http://www.isc.org/wpcontent/uploads/2014/05/dns-firewall-howto.pdf 2. is new "Arming the DNS-firewall howto" and now lives at: https://app.younited.com/?shareObject=ed24f5

Re: RPZ and www.rackspace.com

2014-05-28 Thread David A. Evans
Rack Space appears to have fixed the issue."dig www.wip.rackspace.com NS" now returns NO DATA instead of NXDOMAIN. I wonder how many more are lurking out there. We are still getting a trickle in of complaints about slowness and failures that appear to be related t

Re: KSK signing all records; NSEC3 algorithm status?

2014-05-28 Thread Mark Andrews
In message <20140528151909.ga66...@redoubt.spodhuis.org>, Phil Pennock writes: > On 2014-05-28 at 13:02 +1000, Mark Andrews wrote: > > In message <20140528012734.ga55...@redoubt.spodhuis.org>, Phil Pennock > > writes: > > > The registrar for my zone "xn--qck5b9a5eml3bze.jp" required a DNSSEC > >

Re: KSK signing all records; NSEC3 algorithm status?

2014-05-28 Thread Phil Pennock
On 2014-05-28 at 13:02 +1000, Mark Andrews wrote: > In message <20140528012734.ga55...@redoubt.spodhuis.org>, Phil Pennock writes: > > The registrar for my zone "xn--qck5b9a5eml3bze.jp" required a DNSSEC > > KSK update; good practice on their part. > > For most zones you never need to roll DNSSEC

Re: Book recomendations?

2014-05-28 Thread John Miller
Agreed that _DNS and BIND_ is the first place to start. After that, two books I've liked are Jan-Piet Mens' _Alternative DNS Servers_ (free at http://mens.de/:/altdnsbook) and Ron Aitchison's _Pro DNS and BIND_ (both versions). The latter is probably the most current book out there at the moment.

Re: Bad performance from BIND 9.10 on RHEL 6.5

2014-05-28 Thread Vinícius Ferrão
Hello Mark, Sorry but I was referring to 9.10.0-P1. I've forgotten the last zero. > On 28/05/2014, at 11:53, "Mark Andrews" wrote: > > > Please, please, please use the FULL version when reporting or > commenting. > > BIND 9.10-P1 does not exist. BIND 9.10 is a feature set of which > BIND 9.1

Re: Bad performance from BIND 9.10 on RHEL 6.5

2014-05-28 Thread Mark Andrews
Please, please, please use the FULL version when reporting or commenting. BIND 9.10-P1 does not exist. BIND 9.10 is a feature set of which BIND 9.10.0 is the initial release and BIND 9.10.x (x>0) are maintenance releases or if you want to use Microsoft terminology Service Packs. BIND 9.10.X-PY

Re: Bad performance from BIND 9.10 on RHEL 6.5

2014-05-28 Thread Nicholas F Miller
Thanks for the info. I don’t know how I missed the 9.10-p1 update. _ Nicholas Miller, OIT, University of Colorado at Boulder On May 28, 2014, at 8:36 AM, Vinícius Ferrão wrote: > I've had the same crash those days. Just check if you hav

Re: Architecture Questions

2014-05-28 Thread Matus UHLAR - fantomas
On 28.05.14 14:04, Baird, Josh wrote: I realize that it is considered a bad practice for any authoritative servers to perform recursion. But it's not bad practice for recursive servers to provide authoritative service for your own domains. (like it's very bad when athletes dring much of alc

Re: Architecture Questions

2014-05-28 Thread Mark Andrews
In message , "Baird, Josh" writes: > Hi, > > I have historically hosted authoritative slave zones on my internal caching/r > ecursive servers to override recursion for internal zones. These servers are > not directly reachable from the internet. Generally speaking, I realize tha > t it is cons

Re: Bad performance from BIND 9.10 on RHEL 6.5

2014-05-28 Thread Vinícius Ferrão
I've had the same crash those days. Just check if you have the latest 9.10 version. I wasn't running 9.10-p1. Sent from my iPhone > On 28/05/2014, at 10:30, "Nicholas F Miller" > wrote: > > Not that they are related but we had a crash of bind about seven hours after > installing 9.10: > > n

Architecture Questions

2014-05-28 Thread Baird, Josh
Hi, I have historically hosted authoritative slave zones on my internal caching/recursive servers to override recursion for internal zones. These servers are not directly reachable from the internet. Generally speaking, I realize that it is considered a bad practice for any authoritative serv

Re: Bad performance from BIND 9.10 on RHEL 6.5

2014-05-28 Thread Nicholas F Miller
Not that they are related but we had a crash of bind about seven hours after installing 9.10: named[20831]: name.c:534: REQUIREname) != ((void *)0)) && (((const isc__magic_t *)(name))->magic == ((('D') << 24 | ('N') << 16 | ('S') << 8 | ('n')) failed, back trace Back to 9.9.5 for now.