Re: Questions about automatic KSK and using an additional stand-by KSK

2025-02-24 Thread Bernd Naumann
On 24.02.25 11:51 AM, Bernd Naumann wrote: > > Mhm. But *how* is *everyone else* using DNSSEC then? > https://www.ripe.net/manage-ips-and-asns/dns/dnssec/dnssec-policy-and-practice-statement/#DNSSECPolicyandPracticeStatement-KeySigningKeyRoll-over Does someone know any other good DNSSEC Practic

xfer-in: Transfer status: timed out (selective failures)

2025-02-24 Thread Peter 'PMc' Much
Hi, I started to get these messages, when some secondary tries to fetch a zonefile from a primary. So I looked into it - The primary is running: # ps ax | grep named 13667 - IsJ 0:00.39 /usr/local/sbin/named -n 1 -u bind -c /usr/local/etc/namedb/named.conf It has ports configured:

Re: xfer-in: Transfer status: timed out (selective failures)

2025-02-24 Thread Timothe Litt via bind-users
On 24-Feb-25 17:54, Peter 'PMc' Much wrote: tcpdump was friendly enough to tell me I should use -vv option, only I didn't read that at first. Then it clearly shows that these packets have invalid checksums. :( And that is apparently reason enough to just drop them without notice. Now how they a

Re: ECS subnet

2025-02-24 Thread Evan Hunt
On Tue, Feb 18, 2025 at 08:40:53AM +0100, Rainer Duffner wrote: > > ECS is not supported in the open source version of BIND so I guess > > it might not get logged. The open source version doesn't *send* client-subnet requests, or cache the responses differently depending on client-subnet data incl

Re: xfer-in: Transfer status: timed out (selective failures)

2025-02-24 Thread Crist Clark
Another thing to consider, especially if you are playing wild games routing through tunnels and such, is to verify the server has a route back to the client. If something in the LAN can reach it, like the first dump, but off-net gets no response, like the second, that’s a classic cause. On Mon, Fe

Re: xfer-in: Transfer status: timed out (selective failures)

2025-02-24 Thread Peter 'PMc' Much
On Mon, Feb 24, 2025 at 10:01:49PM +0100, Peter 'PMc' Much wrote: ! Packets do arrive, but are ignored. ! The local firewall is switched to pass-thru. ! ! I don't know what else could selectively swallow packets without ! notice. Okay, I figured it out. tcpdump was friendly enough to tell me I

Re: Questions about automatic KSK and using an additional stand-by KSK

2025-02-24 Thread Matthijs Mekking
Hi Bernd, Non-signing keys (for example a stand-by key), is a bit tricky in dnssec-policy and not fully supported. In 9.18, I would suggest to disable inline-signing and just add the DNSKEY record to the zone. Don't put the key files for the stand-by key in the 'key-directory', this should o

Re: Questions about automatic KSK and using an additional stand-by KSK

2025-02-24 Thread Bernd Naumann
Hi Matthijs, thanks for your response. On 24.02.25 9:47 AM, Matthijs Mekking wrote: > Hi Bernd, > > Non-signing keys (for example a stand-by key), is a bit tricky in > dnssec-policy and not fully supported. > Yeah I figured that in the mean time :/ But what I don't understand; RFC 7583 explic

Re: Questions about automatic KSK and using an additional stand-by KSK

2025-02-24 Thread Matthijs Mekking
Hi Bernd, On 24-02-2025 10:12, Bernd Naumann wrote: Hi Matthijs, thanks for your response. On 24.02.25 9:47 AM, Matthijs Mekking wrote: Hi Bernd, Non-signing keys (for example a stand-by key), is a bit tricky in dnssec-policy and not fully supported. Yeah I figured that in the mean time :

Re: Questions about automatic KSK and using an additional stand-by KSK

2025-02-24 Thread Bernd Naumann
On 24.02.25 11:22 AM, Matthijs Mekking wrote: >> But what I don't understand; RFC 7583 explicit mentioned pre-publish of >> DSDATA of ZSK, but not for KSK (IIUC)? > > And I am confused about the phrase "DSDATA of ZSK". Sorry I'm not fully confident yet about the wording here and there... I thing

Using CNAME for _domainkey (DKIM)

2025-02-24 Thread Danilo Godec via bind-users
Hello, apparently one shouldn't use CNAMEs for 'delegating' _domainkey records to another DNS server, but I see that some email service vendors use that - they have their customers add a CNAME pointing to their TXT record (one recent example that I was dealing with is atlassian.net (https://

Re: Using CNAME for _domainkey (DKIM)

2025-02-24 Thread Greg Choules via bind-users
My 2p is... You *shouldn't* do a lot of things, but people do anyway, because they can. If you maintain your own DKIM records then deliberately adding a CNAME upfront seems unnecessarily complicated. KISS. If someone else hosts them and CNAME is a pragmatic way to achieve that "ask them" behaviou