Re: BIND 9.18.2 break-dnssec question

2022-05-01 Thread Mark Andrews
> On 2 May 2022, at 12:28, J Doe wrote: > > On 2022-04-29 01:18, Mark Andrews wrote: > >> break-dnssec is about if the client could detect the re-write or not using >> DNSSEC. If the client has DO=1 in the request and the normal response is >> signed then rewrites can be detected. If break-

Re: BIND 9.18.2 break-dnssec question

2022-05-01 Thread J Doe
On 2022-04-29 01:18, Mark Andrews wrote: break-dnssec is about if the client could detect the re-write or not using DNSSEC. If the client has DO=1 in the request and the normal response is signed then rewrites can be detected. If break-dnssec is ’no’ the rewrite will be prevented. If break-

Re: BIND 9.18.2 break-dnssec question

2022-04-28 Thread Mark Andrews
break-dnssec is about if the client could detect the re-write or not using DNSSEC. If the client has DO=1 in the request and the normal response is signed then rewrites can be detected. If break-dnssec is ’no’ the rewrite will be prevented. If break-dnssec is ‘yes’ then the rewrite will occur.

BIND 9.18.2 break-dnssec question

2022-04-28 Thread J Doe
Hi, I am configuring an RPZ for a validating resolver. I read in the BIND 9.18.2 ARM that there is a boolean option for RPZ zones called: break-dnssec. The ARM states: ...In that case, RPZ actions are applied regardless of DNSSEC. The name of the clause option reflects the fact that

Re: strange dnssec question

2021-08-17 Thread Edwardo Garcia
Thank you, I'll report back the result On Wed, Aug 18, 2021 at 10:49 AM Mark Andrews wrote: > > > On 18 Aug 2021, at 10:23, Edwardo Garcia wrote: > > > > Hola Mark, > > > > Thank you, so to be clear, what is mean to delegate zone, the black > zone? I am not dns expert unfortunately > > Yes, c

Re: strange dnssec question

2021-08-17 Thread Mark Andrews
> On 18 Aug 2021, at 10:23, Edwardo Garcia wrote: > > Hola Mark, > > Thank you, so to be clear, what is mean to delegate zone, the black zone? I > am not dns expert unfortunately Yes, create a seperate zone for black.example.net. In example.net you add NS records for black.example.net. They

Re: strange dnssec question

2021-08-17 Thread Edwardo Garcia
Hola Mark, Thank you, so to be clear, what is mean to delegate zone, the black zone? I am not dns expert unfortunately On Wed, Aug 18, 2021 at 6:23 AM Mark Andrews wrote: > Delegate the zone. Do NOT add a DS for it. > > -- > Mark Andrews > > On 17 Aug 2021, at 23:47, Edwardo Garcia wrote: > >

Re: strange dnssec question

2021-08-17 Thread Mark Andrews
Delegate the zone. Do NOT add a DS for it. -- Mark Andrews > On 17 Aug 2021, at 23:47, Edwardo Garcia wrote: > >  > Hola > > We have dnssec working for long time but need now to have a subdomain > excluded, we are going to be use it to replace an internal blacklist, we have > 14 smtp serve

strange dnssec question

2021-08-17 Thread Edwardo Garcia
Hola We have dnssec working for long time but need now to have a subdomain excluded, we are going to be use it to replace an internal blacklist, we have 14 smtp servers and it is cumbersome to keep in sync. So we have example.net signed, but we want black.example.net, and of course all addresses

Re: DNSSEC Question

2018-04-11 Thread Bob McDonald
I should have pointed out that BOTH servers have recursion turned on. Yeah, I know about having DNSSEC-enable=yes to not break downstream validation. (I inherited this setup...) BOTH are internal DNS servers with access to the internet to query the internet roots (no default forwarding active).

Re: DNSSEC Question

2018-04-11 Thread Tony Finch
Bob McDonald wrote: > > Server A > DNSSEC=yes > DNSSEC-validation=yes > Valid trust anchor for the root zone > DNSSEC validation seems to work correctly > Zone one.com. is setup as a forward zone to server B > > Server B > DNSSEC=no > DNSSEC-validation=N/A > authoritative and the master for one.co

DNSSEC Question

2018-04-11 Thread Bob McDonald
Consider the follwing example: Server A DNSSEC=yes DNSSEC-validation=yes Valid trust anchor for the root zone DNSSEC validation seems to work correctly Zone one.com. is setup as a forward zone to server B Server B DNSSEC=no DNSSEC-validation=N/A authoritative and the master for one.com. When ser

Re: dnssec question. confused.

2011-09-29 Thread Joseph Karpenko
> From: michoski > To: Steve Arntzen , bind-users@lists.isc.org > Subject: Re: dnssec question. confused. > > On 9/28/11 5:32 AM, "Steve Arntzen" wrote: >> Is your firewall Cisco based? >> >> There is a known "default" setting in Cisco with res

RE: dnssec question. confused.

2011-09-28 Thread Brad Bendily
> On 9/28/11 5:32 AM, "Steve Arntzen" wrote: > > Is your firewall Cisco based? Yes. The firewall is Cisco based. However, the main problem there is, there are several firewalls before leaving our network and my dept doesn't manage all of them. > > There is a known "default" setting in Cisco wi

Re: dnssec question. confused.

2011-09-28 Thread michoski
On 9/28/11 5:32 AM, "Steve Arntzen" wrote: > Is your firewall Cisco based? > > There is a known "default" setting in Cisco with respect to packet size > for DNS. Our network guys run into this anytime they do an upgrade, > etc. and have to go in and update the setting. This bit me the first tim

Re: dnssec question. confused.

2011-09-28 Thread Steve Arntzen
Is your firewall Cisco based? There is a known "default" setting in Cisco with respect to packet size for DNS. Our network guys run into this anytime they do an upgrade, etc. and have to go in and update the setting. Steve. On Tue, 2011-09-27 at 15:45 -0500, Brad Bendily wrote: > When trying

RE: dnssec question. confused.

2011-09-27 Thread Marc Lampo
11 10:45 PM To: bind-users@lists.isc.org Subject: dnssec question. confused. When trying the DNSSEC check command from: https://www.dns-oarc.net/oarc/services/replysizetest behind our corporate firewall, I get: rst.x476.rs.dns-oarc.net. rst.x485.x476.rs.dns-oarc.net. rst.x490.x485.x476.rs.dns-oarc.

Re: dnssec question. confused.

2011-09-27 Thread Mark Andrews
In message <798e3caf2fcc264481d8f75fb3d0bfd91b538...@mailmbx10.mail.la.gov>, Br ad Bendily writes: > > When trying the DNSSEC check command from: > https://www.dns-oarc.net/oarc/services/replysizetest > > behind our corporate firewall, I get: > rst.x476.rs.dns-oarc.net. > rst.x485.x476.rs.dns-oa

Re: dnssec question. confused.

2011-09-27 Thread Doug Barton
On 09/27/2011 13:45, Brad Bendily wrote: > dig +dnssec eeoc.gov Try that again with +notcp. FYI, on a "clean" network the response I get to that query is 3,918 bytes. hth, Doug -- Nothin' ever doesn't change, but nothin' changes much. -- OK Go Breadt

dnssec question. confused.

2011-09-27 Thread Brad Bendily
When trying the DNSSEC check command from: https://www.dns-oarc.net/oarc/services/replysizetest behind our corporate firewall, I get: rst.x476.rs.dns-oarc.net. rst.x485.x476.rs.dns-oarc.net. rst.x490.x485.x476.rs.dns-oarc.net. "Tested at 2011-09-27 20:32:34 UTC" "205.172.49.177 sent EDNS buffer s