Re: High recursive client counts

2014-03-26 Thread Sam Wilson
In article , Jason Brandt wrote: > For now, I've disabled DNS inspection on our firewall, as it is an ancient > Cisco firewall services module, and that seems to have stabilized things, > but it's only been 30 minutes or so. Until I get a few days in, I'll keep > researching. We used to run DN

Dynamic update with bind

2014-03-26 Thread Ramanou Biaou
Dear All, Someone has resources, links or tutorial to understand and implement the dynamic update zone files with BIND Thank you! Ramanou ___ Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list bind-users mai

Re: Dynamic update with bind

2014-03-26 Thread Flex Banana
Hi, Look at the Bind 9 ARM: https://kb.isc.org/article/AA-00845/0/BIND-9.9-Administrator-Reference-Manual-ARM.html and O’Reilly book DNS and BIND: http://shop.oreilly.com/product/9780596100575.do Best regards Banana On 26 Mar 2014, at 12:18, Ramanou Biaou wrote: > Dear All, > Someone has

Re: Dynamic update with bind

2014-03-26 Thread Tony Finch
Ramanou Biaou wrote: > Someone has resources, links or tutorial to understand and implement the > dynamic update zone files with BIND If you search the web for [nsupdate howto] or [nsupdate tutorial] you should find some useful resources. If you are running BIND 9.7 or newer then it has a built

Re: High recursive client counts

2014-03-26 Thread Jason Brandt
The code on our FWSMs isn't the latest release, so that could be part of the issue, but it's been about 16 hours now since I shut it off, and so far so good. I would say though with the other load on our firewalls, it's highly possible that they were being overloaded. Unfortunately our MRTG isn't

Re: Re: High recursive client counts

2014-03-26 Thread Timothe Litt
DNS inspection doesn't do anything useful; bind does enough validity checking. UDP inspection suffices to let return packets thru. Another thing to beware of is NAT - if you do static NAT translation for your nameservers, be sure to specify no-payload (e.g. ip nat inside source static tcp/ud

Re: High recursive client counts

2014-03-26 Thread Jason Brandt
I had it set as: policy-map global_policy class inspection_default inspect dns maximum-length 4096 Which is what Cisco recommends. EDNS tests worked fine, but the BIND servers would still get backed up. On Wed, Mar 26, 2014 at 7:35 AM, Thom, Paul E wrote: > Do you have the FWSM DNS inspe

Re: Re: High recursive client counts

2014-03-26 Thread Jason Brandt
We don't do any NAT at the firewall level, they're all public IPs. Thanks, Jason On Wed, Mar 26, 2014 at 7:51 AM, Timothe Litt wrote: > DNS inspection doesn't do anything useful; bind does enough validity > checking. UDP inspection suffices to let return packets thru. > > Another thing to bew

Re: High recursive client counts

2014-03-26 Thread Sam Wilson
In article , Jason Brandt wrote: > The code on our FWSMs isn't the latest release, so that could be part of > the issue, but it's been about 16 hours now since I shut it off, and so far > so good. I would say though with the other load on our firewalls, it's > highly possible that they were bei

RE: High recursive client counts

2014-03-26 Thread CARTWRIGHT, CORY C
Here is a script I wrote to log and sent traps. I'm sure you'll have to make a lot of changes but hopefully it can help you get started monitoring the FWSM. You can use this as a template to expand upon. #!/usr/bin/perl use strict; use Expect; use Net::Telnet; use Data::Dumper; use POSIX qw(t

Re: High recursive client counts

2014-03-26 Thread Jason Brandt
Thanks guys. I appreciate the input. I don't want to derail the list much though, as this is supposed to be more BIND than Cisco :) At this point my BIND installation seems to be stable, so we'll call it case closed. We do plan on replacing our firewalls in the near future, so hopefully we won'

Re: High recursive client counts

2014-03-26 Thread Scott Bertilson
This got me to take a look at "rndc recursing" on one of our servers. It is disappointing that queries for the same FQDN/type/class from the same client (different source port and query ID though) are handled individually rather than being merged somehow. Is this because of the ID or the source p

Re: High recursive client counts

2014-03-26 Thread Mark Andrews
In message , Scott Bertilson writes: > > This got me to take a look at "rndc recursing" on one of our servers. > > It is disappointing that queries for the same FQDN/type/class from the same > client (different source port and query ID though) are handled individually > rather than being merge

DNS64 and DNSSEC - AD bit not set (RFC 6147)

2014-03-26 Thread Tom Lanyon
Hi list, Just wanted to check my understanding of BIND9's implementation of DNS64 against RFC 6147. Currently BIND9's "break-dnssec" defaults to "no" - in this configuration, a security-aware & validating recursive resolver with will never synthesise a record via DNS64 when queried with D

Re: DNS64 and DNSSEC - AD bit not set (RFC 6147)

2014-03-26 Thread Mark Andrews
In message , Tom Lanyon wri tes: > Hi list, > > Just wanted to check my understanding of BIND9's implementation of DNS64 agai > nst RFC 6147. > > Currently BIND9's "break-dnssec" defaults to "no" - in this configuration, a > security-aware & validating recursive resolver with will never synthes

Re: DNS64 and DNSSEC - AD bit not set (RFC 6147)

2014-03-26 Thread Tom Lanyon
On 27 Mar 2014, at 14:48, Mark Andrews wrote: > No. If the answer is secure and DO=1 then it won't synthesis. > > RFC 6147 just gets DO and CD semantics completely wrong. The WG > wanted there to be signaling that the client was going to validate > and DNSSEC does not have such signaling. The

Re: DNS64 and DNSSEC - AD bit not set (RFC 6147)

2014-03-26 Thread Mark Andrews
In message , Tom Lanyon wri tes: > On 27 Mar 2014, at 14:48, Mark Andrews wrote: > > No. If the answer is secure and DO=1 then it won't synthesis. > > > > RFC 6147 just gets DO and CD semantics completely wrong. The WG > > wanted there to be signaling that the client was going to validate > > a