how to bring edns info to the author dns, does it not support?

2018-01-31 Thread xd.c...@bitvalue.com.cn
hi, every body: as all know: bind9 already support edns now. i build my local dns(ldns) and author dns(adns) with bind, and test as follows: 1. request to ldns with edns info;( such as: dig @ldns cxdtest.com +subnet=192.168.1.128) 2. ldns has no cache for the request,and f

Re: Enable systemd hardening options for named

2018-01-31 Thread Ludovic Gasc
2018-01-31 21:47 GMT+01:00 Petr Menšík : > Hi Ludovic, > Hi Petr, I didn't expect to discuss directly with the Fedora maintainer :-) Just in case you are at DNS devroom of FOSDEM this Sunday: https://fosdem.org/2018/schedule/track/dns/ I'm interested in to meet you. Anyway, about SELinux discus

Re: Enable systemd hardening options for named

2018-01-31 Thread Petr Menšík
Hi Ludovic, On Fedora, CAP_DAC_OVERRIDE is not granted to bind, because it might be dangerous feature. CAP_DAC_READ_SEARCH is a little bit safer, but still might be unnecessary. It should be possible to run even without it with careful permission configuration of keys and config files. I think CA

Re: Enable systemd hardening options for named

2018-01-31 Thread Petr Menšík
Dne 31.1.2018 v 15:37 Reindl Harald napsal(a): > > Am 31.01.2018 um 15:18 schrieb Petr Menšík: >> as a Fedora maintainer of BIND package, I can say only that SELinux in >> enforcing mode will provide better hardening than most of suggested >> changes. That does not mean they are not useful, but

RHEL, Centos, Fedora rpm 9.12.0

2018-01-31 Thread Carl Byington
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 http://www.five-ten-sg.com/mapper/bind contains links to the source rpms, and build instructions. -BEGIN PGP SIGNATURE- Version: GnuPG v2.0.14 (GNU/Linux) iEYEAREKAAYFAlpx93oACgkQL6j7milTFsGfCACeLvDHoWvmTAGe28j/C7tIw99n eu4AoIN8klyuHs7cUaB

Re: Enable systemd hardening options for named

2018-01-31 Thread Daniel Stirnimann
> Am 31.01.2018 um 16:35 schrieb Daniel Stirnimann: >>> that don't change the fact that from that moment on all protections for >>> *that* service are gone while with layered security and >>> systemd-hardening are still in place >> >> Where is the layered security if you disable for e.g. systems-ha

Re: Enable systemd hardening options for named

2018-01-31 Thread Reindl Harald
Am 31.01.2018 um 16:35 schrieb Daniel Stirnimann: that don't change the fact that from that moment on all protections for *that* service are gone while with layered security and systemd-hardening are still in place Where is the layered security if you disable for e.g. systems-hardening for a

Re: Enable systemd hardening options for named

2018-01-31 Thread Daniel Stirnimann
> that don't change the fact that from that moment on all protections for > *that* service are gone while with layered security and > systemd-hardening are still in place Where is the layered security if you disable for e.g. systems-hardening for a service? I don't understand your argument. If y

Re: Enable systemd hardening options for named

2018-01-31 Thread Reindl Harald
Am 31.01.2018 um 16:16 schrieb Daniel Stirnimann: it is completly irrelevant because when you switch SELinux to "permissive" in case you need to debug something it's gone and hence layered-security is always the way to go I don't understand this negative perception of SELinux. Why do you thin

Re: Enable systemd hardening options for named

2018-01-31 Thread Daniel Stirnimann
> it is completly irrelevant because when you switch SELinux to > "permissive" in case you need to debug something it's gone and hence > layered-security is always the way to go I don't understand this negative perception of SELinux. Why do you think debugging differs from any other applied hard

Re: Enable systemd hardening options for named

2018-01-31 Thread Reindl Harald
Am 31.01.2018 um 15:18 schrieb Petr Menšík: as a Fedora maintainer of BIND package, I can say only that SELinux in enforcing mode will provide better hardening than most of suggested changes. That does not mean they are not useful, but most of them are irrelevant with SELinux in enforcing mode.

Re: Enable systemd hardening options for named

2018-01-31 Thread Petr Menšík
Hi, as a Fedora maintainer of BIND package, I can say only that SELinux in enforcing mode will provide better hardening than most of suggested changes. That does not mean they are not useful, but most of them are irrelevant with SELinux in enforcing mode. We want all Fedora users to run in enforci

Re: Hostname Not Resolving Outside Domain

2018-01-31 Thread Petr Menšík
Hi Rick. It would be more useful if you provided full output of DIG. There should not be any private information. If there are private IPs, just replace them. I would start with dig @corpdc12.na.ads.idt.com -t NS eng.idt.com. If it does not know your domain as I expect, you would get NXDOMAIN.