Re: Nsupdate usage scenario

2016-05-02 Thread jasonsu
On Mon, May 2, 2016, at 12:15 PM, Jeremy C. Reed wrote: > What about using a specific zone file just for the purpose of the single > A record you want to maintain using dynamic updates? Well, this is a timely idea for another issue I've been working on ... Could you expand on this a bit? Maybe

Re: 'succesful' nsupdate of remote server not persistent across nameserver restart?

2016-05-02 Thread jasonsu
On Mon, May 2, 2016, at 07:17 AM, Matthew Pounsett wrote: > The general procedure is > 1) use 'rndc freeze ' to stop dynamic updates to the zone > 2) edit the file > 3) use 'rndc thaw ' to re-enable dynamic updates > > If the zone is not set up to use dynamic updates, then: > 1) edit the zone fi

Re: 'succesful' nsupdate of remote server not persistent across nameserver restart?

2016-05-02 Thread jasonsu
I'm pretty sure I got this sorted -- as you said, perms. With default ownership of root:named, both the zone & jnl files need to be group writeable inside the chroot. That's fixed now, and I'm getting jnl data written to zone files. (1) Thanks! (2) No idea why I see no logging of these perm err

Re: 'succesful' nsupdate of remote server not persistent across nameserver restart?

2016-05-01 Thread jasonsu
On Sun, May 1, 2016, at 11:34 AM, Phil Mayers wrote: > Days? That surely must be permissions? > > As per my other email - attach a strace to the bind process, and run > "rndc sync" / "rndc freeze" to force an immediate write-out - if there's > a permission problem the error should be apparent. >

Re: 'succesful' nsupdate of remote server not persistent across nameserver restart?

2016-05-01 Thread jasonsu
On Sun, May 1, 2016, at 11:05 AM, Phil Mayers wrote: > > IIUC, though, a nameserver restart is supposed to force the > > write-to-journal immediately, right? > > No, I don't think so. > > Perhaps the behaviour in flush-zones-on-shutdown (which defaults to > "no") is what you're thinking of? >

Re: 'succesful' nsupdate of remote server not persistent across nameserver restart?

2016-04-29 Thread jasonsu
Oops, s/write-to-journal /write-journal-to-masterfile / ___ Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list bind-users mailing list bind-users@lists.isc.org https://lists.isc.org/mailman/listinfo/bind-users

Re: 'succesful' nsupdate of remote server not persistent across nameserver restart?

2016-04-29 Thread jasonsu
Hi On Fri, Apr 29, 2016, at 08:42 PM, Mark Andrews wrote: > Just give it time. The zone contents are the masterfile + journal. > The masterfile only gets written periodically as it can be a expensive > operation. Sure, under normal operation, as I understand it. IIUC, though, a nameserver resta

Re: 'succesful' nsupdate of remote server not persistent across nameserver restart?

2016-04-29 Thread jasonsu
On Mon, Apr 25, 2016, at 11:44 AM, jaso...@mail-central.com wrote: > Now back to figuring this^ out :-/ I started from scratch, now on bind 9.10.4. After update, I'm preserving my jnl files, but they're sill not getting written to zone files on nameserver restart. With this update file

Re: 'succesful' nsupdate of remote server not persistent across nameserver restart?

2016-04-27 Thread jasonsu
On Wed, Apr 27, 2016, at 06:30 AM, Matthew Pounsett wrote: > > Actually it is normal for privsep processes to chroot themselves, usually > > to /var/empty - e.g. > > Right, so "no chroot necessary" (which is what I was responding to) isn't > accurate. Oh. That's not what I got out of your comm

Re: 'succesful' nsupdate of remote server not persistent across nameserver restart?

2016-04-26 Thread jasonsu
On Tue, Apr 26, 2016, at 11:18 AM, Matthew Pounsett wrote: > Both things together are better than either one alone. Thanks for the explanation. upstream bind-chroot with systemd should be easier and better documented ___ Please visit https://lis

Re: 'succesful' nsupdate of remote server not persistent across nameserver restart?

2016-04-25 Thread jasonsu
On Mon, Apr 25, 2016, at 11:33 AM, Matthew Pounsett wrote: > Unless you have a clear reason to do it (perhaps there's some security > consideration I haven't thought of) it seems to me it's unnecessary > complexity that would lead to problems just like this. Noted. Still, I'd honestly like to k

Re: 'succesful' nsupdate of remote server not persistent across nameserver restart?

2016-04-25 Thread jasonsu
On Mon, Apr 25, 2016, at 10:58 AM, Matthew Pounsett wrote: > It's not clear to me why one would want to destroy/rebuild the chroot every > time you restart the process. Well, here (1) Because I inherited it this way, and (2) The notes' quoted examples did that too, and (3) I'd not yet gotten a

Re: 'succesful' nsupdate of remote server not persistent across nameserver restart?

2016-04-25 Thread jasonsu
On Mon, Apr 25, 2016, at 10:46 AM, Matthew Pounsett wrote: > > Unfortunately, that^ returns no TXT record either. Which to me suggests > > the problem's 'earlier'. > > > > Yeah. I think you need to solve the problem with the vanishing journal > file first. But, the above dig is what you *sho

Re: 'succesful' nsupdate of remote server not persistent across nameserver restart?

2016-04-25 Thread jasonsu
On Mon, Apr 25, 2016, at 10:19 AM, Matthew Pounsett wrote: > > TBH I don't understand WHAT to 'expect' from dig to test/verify this^. > > What do I dig to get an answer with "TEST STRING" in it? > > dig in txt test.example.com @ns01.example.com Thanks. Unfortunately, that^ returns no TXT recor

Re: 'succesful' nsupdate of remote server not persistent across nameserver restart?

2016-04-24 Thread jasonsu
> This zone would not pass named-checkzone, which interestingly, is the same > code which named itself uses when initially loading a zone. It appears to named-checkzone -t /var/chroot/named example.com /namedb/master/example.com.zone zone example.com/IN: loaded serial 14

Re: 'succesful' nsupdate of remote server not persistent across nameserver restart?

2016-04-24 Thread jasonsu
> What is deleting your journal? It's not named doing that. Hm. Maybe this destroy_chroot() { cp -af ${CHROOT}/namedb/master/*.signed /opt/etc/named/namedb/master/ should be destroy_chroot() { cp -af ${CHROOT}/namedb/master/*.{jnl,signed} /opt

Re: 'succesful' nsupdate of remote server not persistent across nameserver restart?

2016-04-24 Thread jasonsu
I'm in over my head a bit on these details, so appreciate the help. > The smoking gun is in the hand of systemctl ... Hadn't thought of that, but not surprised to hear it. I inherited this, and didn't yet monkey with systemd. But I can as needed. Here's the systemd unit file for named:

Re: 'succesful' nsupdate of remote server not persistent across nameserver restart?

2016-04-24 Thread jasonsu
On Sun, Apr 24, 2016, at 12:20 PM, Anand Buddhdev wrote: > On 24/04/16 21:04, jaso...@mail-central.com wrote: > > Hey Jason, > > > checking with dig, it's NOT in 'TXT' where I expected it > > > > dig TXT example.net +short > > (empty) > > You added a TXT record for the name te

'succesful' nsupdate of remote server not persistent across nameserver restart?

2016-04-24 Thread jasonsu
I'm doing an nsupdate to a remote server from my desktop cat nsupdate.txt server ns01.example.com debug yes zone example.net. update add test.example.net. 500 in TXT "TEST STRING" show send nsupdate -k ./jason-key ./nsupdate.tx

Re: generating TSIG keys with 'dnssec-keygen', get "error reading key file ... bad key type"?

2016-04-19 Thread jasonsu
On Tue, Apr 19, 2016, at 05:19 PM, Evan Hunt wrote: > The "bad key type" message is a bug; it's been there for a while ... > KEY is in fact what *should* be there, but the collision- > checking function is expectingly DNSKEY, and so it complains. Ok, so the data's good; just the detection whines f

Re: generating TSIG keys with 'dnssec-keygen', get "error reading key file ... bad key type"?

2016-04-19 Thread jasonsu
On Tue, Apr 19, 2016, at 04:25 PM, Evan Hunt wrote: > It's not "bad", dnssec-keygen can generate TSIG keys fine, it's just that > it's cumbersome to remember all the options, and the keys are generated in > a format that isn't directly useful. Sure that's what I was doing anyway. To be clean, I'm

Re: generating TSIG keys with 'dnssec-keygen', get "error reading key file ... bad key type"?

2016-04-19 Thread jasonsu
On Tue, Apr 19, 2016, at 02:24 PM, Evan Hunt wrote: > On Tue, Apr 19, 2016 at 07:40:38AM -0700, jaso...@mail-central.com wrote: > > I'm working on generating TSIG keys for use with my bind server. > > I think you'll be happier if you use "tsig-keygen" instead of "dnssec-keygen". Huh. Didn't co

generating TSIG keys with 'dnssec-keygen', get "error reading key file ... bad key type"?

2016-04-19 Thread jasonsu
I'm working on generating TSIG keys for use with my bind server. When I generate a 2nd set of keys in a dir, I get a "bad key type" error, DIR="/home/me/test/nsupdate" HOST="myhost.example.com" dnssec-keygen -V dnssec-keygen 9.10.3-P4 cd $DIR