Re: measuring dns query

2012-05-10 Thread Daniel Migault
Hi, Maybe you are looking for dnsperf and resperf [1]. We have done some tests similar to these in [2] and [3], so maybe it helps. Replaying captures of traffic may also be recommended especially to consider, for example, queries with no answers. At least for DNSSEC this matters. [1] http://www.n

erros in logs

2012-05-10 Thread Ben
Hi, I just enable bind as caching name server and when watching logs i got below erros. error (network unreachable) resolving 'www.indiaresultsalert.com//IN': 2001:503:a83e::2:30#53 error (network unreachable) resolving 'ns-797.awsdns-35.net/A/IN': 2001:503:231d::2:30#53 error (network

Re: erros in logs

2012-05-10 Thread Niall O'Reilly
On 10 May 2012, at 09:47, Ben wrote: > I just enable bind as caching name server and when watching logs i got below > erros. You seem to be noticing 3 kinds of error. "Network unreachable" messages refer only to IPv6 destinations. Perhaps you have IPv6 enabled on the sy

Re: erros in logs

2012-05-10 Thread Phil Mayers
On 10/05/12 09:47, Ben wrote: Hi, I just enable bind as caching name server and when watching logs i got below erros. It looks like you have broken IPv6 connectivity - your machine believes it has an IPv6 address and possibly a default route, but it doesn't work. Check your networking confi

Hi;

2012-05-10 Thread William Thierry SAMEN
Hi, Bind'ers, i'm trying to have a TTL of a zone just by typing a command, but i can't seen which command line i can used to have the solution. Can someone have an idea? is it possible to found that? PS: The zone file is not created by me. For example, i made a dig +dnssec www.google.fr and i wa

Re: Hi;

2012-05-10 Thread WBrown
William Thierry wrote on 05/10/2012 08:02:57 AM: > i'm trying to have a TTL of a zone just by typing a command, but i > can't seen which command line i can used to have the solution. > > Can someone have an idea? is it possible to found that? > > PS: The zone file is not created by me. For exam

RE: Hi;

2012-05-10 Thread Todd Snyder
When you do a dig, the TTL is the 2nd column: ;; ANSWER SECTION: www.google.com. 604800 IN CNAME www.l.google.com. www.l.google.com. 300 IN A 74.125.225.20 www.l.google.com. 300 IN A 74.125.225.19 www.l.google.com. 300 IN A

Re: DNSSEC

2012-05-10 Thread Tony Finch
Barry Margolin wrote: > > [Validation is] only untroublesome until someone screws things up on > their auth server. When one of your users can't access something.gov, > they'll complain to YOU, even though it's mostly out of your hands. > > This is true for other problems on auth servers as well,

Re: DNSSEC

2012-05-10 Thread Barry Margolin
In article , Tony Finch wrote: > Barry Margolin wrote: > > > > [Validation is] only untroublesome until someone screws things up on > > their auth server. When one of your users can't access something.gov, > > they'll complain to YOU, even though it's mostly out of your hands. > > > > This is

Re: DNSSEC

2012-05-10 Thread Daniel Ryšlink
On 05/10/2012 04:33 PM, Barry Margolin wrote: In article, Tony Finch wrote: Barry Margolin wrote: [Validation is] only untroublesome until someone screws things up on their auth server. When one of your users can't access something.gov, they'll complain to YOU, even though it's mostly ou

Re: DNSSEC

2012-05-10 Thread Warren Kumari
On May 10, 2012, at 11:20 AM, Daniel Ryšlink wrote: > > On 05/10/2012 04:33 PM, Barry Margolin wrote: >> In article, >> Tony Finch wrote: >> >>> Barry Margolin wrote: [Validation is] only untroublesome until someone screws things up on their auth server. When one of your users can

Re: DNSSEC

2012-05-10 Thread Anand Buddhdev
On 10/05/2012 17:20, Daniel Ryšlink wrote: > What's the point of DNSSec when resolver administrators configure > exceptions on regular basis? If you can't be sure when your resolver > does or does not validate, why having signed zones in the first place? > It's just seems to be another "shared ill

Re: DNSSEC

2012-05-10 Thread WBrown
Warren wrote on 05/10/2012 11:50:30 AM: > Nope -- Comcast does a large amount of checking before turning off > validation for a failing domain. > This is (IMO) more secure than the alternative, which is to simply > leave it failing, and have users move to a non-validatiing resolver instead? D

KSK stays published 3 days after delete time

2012-05-10 Thread Axel Rau
All, key 22924 of framail.de has a delete date of 2012-05-07T14:55:02 set. It has been deleted from the repository at 2012-05-07T14:55:02.569706, but is still included by named 9.9.0 in the zone framail.de (as of 2012-05-10T19:51:32). Is this a bug, triggered by my timing? Should I wait one more

Re: DNSSEC

2012-05-10 Thread Warren Kumari
On May 10, 2012, at 12:52 PM, wbr...@e1b.org wrote: > Warren wrote on 05/10/2012 11:50:30 AM: > >> Nope -- Comcast does a large amount of checking before turning off >> validation for a failing domain. >> This is (IMO) more secure than the alternative, which is to simply >> leave it failing,

random-device purpose in DNSSEC

2012-05-10 Thread Alexander Gurvitz
Hello all. What random device used for ? ARM says "Entropy is primarily needed for DNSSEC operations, such as ... dynamic update of signed zones". I don't get why signing a zone requires any randomness. This bothers me as I'm implementing DNSSEC now, and I know that my systems are low at entropy,

Re: KSK stays published 3 days after delete time

2012-05-10 Thread Axel Rau
Am 10.05.2012 um 21:32 schrieb Alexander Gurvitz: > Did you delete it manually (at 2012-05-07T14:55:02.569706) ? Yes; i.e. my script. > If so, maybe it's still in the zone because BIND doesn't know the timing > metadata anymore ? I thought that would be in the journal or internal repository of na

Re: random-device purpose in DNSSEC

2012-05-10 Thread Warren Kumari
On May 10, 2012, at 3:41 PM, Alexander Gurvitz wrote: > Hello all. > > What random device used for ? > ARM says "Entropy is primarily needed for DNSSEC operations, > such as ... dynamic update of signed zones". I don't get why signing a zone > requires any randomness. > > This bothers me as I'm

Re: KSK stays published 3 days after delete time

2012-05-10 Thread Axel Rau
Am 10.05.2012 um 19:55 schrieb Axel Rau: > key 22924 of framail.de has a delete date of 2012-05-07T14:55:02 set. > It has been deleted from the repository at 2012-05-07T14:55:02.569706, > but is still included by named 9.9.0 in the zone framail.de > (as of 2012-05-10T19:51:32). To clarify: I'm u

Re: random-device purpose in DNSSEC

2012-05-10 Thread G.W. Haywood
Hi there, On Thu, 10 May 2012, Alexander Gurvitz wrote: What random device used for ? Cryptographic operations, loading libraries in random locations to avoid insidious attacks, that kind of thing. This bothers me as I'm implementing DNSSEC now, and I know that my systems are low at entropy

Re: random-device purpose in DNSSEC

2012-05-10 Thread Michael Graff
Some signature methods require this, some do not. RSA should not (in general) but RSA encryption in practice may. Signing is different, in that you know both halves (encrypted and cleartext) so it should not require padding. I think DSA does require randomness in signing. --Michael On May 10

Re: KSK stays published 3 days after delete time

2012-05-10 Thread Alexander Gurvitz
On Thu, May 10, 2012 at 11:04 PM, Axel Rau wrote: > >> Did you delete it manually (at 2012-05-07T14:55:02.569706) ? > Yes; i.e. my script. >> If so, maybe it's still in the zone because BIND doesn't know the timing >> metadata anymore ? > I thought that would be in the journal or internal reposito

Re: KSK stays published 3 days after delete time

2012-05-10 Thread Evan Hunt
> > key 22924 of framail.de has a delete date of 2012-05-07T14:55:02 set. > > It has been deleted from the repository at 2012-05-07T14:55:02.569706, > > but is still included by named 9.9.0 in the zone framail.de > > (as of 2012-05-10T19:51:32). > > To clarify: I'm using inline-signing. > The repo

Re: random-device purpose in DNSSEC

2012-05-10 Thread Mark Andrews
In message , Alexander Gurvitz writes: > Hello all. > > What random device used for ? > ARM says "Entropy is primarily needed for DNSSEC=A0operations, > such as ... dynamic update of signed zones". I don't get why signing a zone > requires any randomness. It doesn't for RSA. However DSA does r

Re: KSK stays published 3 days after delete time

2012-05-10 Thread Mark Andrews
In message , Alexander Gurvitz writes: > On Thu, May 10, 2012 at 11:04 PM, Axel Rau wrote: > > > >> Did you delete it manually (at 2012-05-07T14:55:02.569706) ? > > Yes; i.e. my script. > >> If so, maybe it's still in the zone because BIND doesn't know the timing > >> metadata anymore ? > > I th

Re: DNSSEC

2012-05-10 Thread Mark Andrews
In message <532c3631-d503-4dc0-88c9-600a90564...@kumari.net>, Warren Kumari wri tes: > > On May 10, 2012, at 12:52 PM, wbr...@e1b.org wrote: > > > Warren wrote on 05/10/2012 11:50:30 AM: > > = > > >> Nope -- Comcast does a large amount of checking before turning off = > > >> validation for a f

Multiple zones with single key pair

2012-05-10 Thread Alexander Gurvitz
Hello, Multiple zones with a single key - is possible with BIND ? Regards, Alexander Gurvitz, net-me.net ___ Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list bind-users mailing list bind-users@lists.isc.org

RE: Multiple zones with single key pair

2012-05-10 Thread Spain, Dr. Jeffry A.
> Multiple zones with a single key - is possible with BIND ? There was a recent discussion on this topic. See thread beginning at https://lists.isc.org/pipermail/bind-users/2012-April/087481.html. Jeff. Jeffry A. Spain Network Administrator Cincinnati Country Day School

Re: DNSSEC

2012-05-10 Thread Jan-Piet Mens
> Comcast has taken a pragmatic view. I'm glad to see they've turned on > validation, but I can see why they need to configure exceptions. Without > being able to manage exceptions, large ISPs are not going to turn on > validation. Indeed, which brings on the question why BIND (still) doesn't have