Re: [dns-operations] Spurious NXDOMAIN response from a DNS hosting provider

2025-04-03 Thread Ondřej Surý
What Vláďa said - implementing RRL (e.g. return empty answer with TC bit), requiring DNS COOKIE or perhaps at least just generating SERVFAIL would be much better option. Giving back NXDOMAIN is … misunderstanding DNS at best. Ondrej -- Ondřej Surý (He/Him) > On 3. 4. 2025, at 15:57, Vladi

Re: [dns-operations] random queries

2025-03-17 Thread Ondřej Surý
Could this be Chromium? https://blog.verisign.com/domain-names/chromiums-impact-on-root-dns-traffic/ -- Ondřej Surý (He/Him) ond...@sury.org > On 15. 3. 2025, at 18:12, Hans Mayer via dns-operations > wrote: > > > From: Hans Mayer > Subject: random queries > Date: 15 M

Re: [dns-operations] DNSbomb attack

2024-05-29 Thread Ondřej Surý
security of DNS as the report rarely comes with a proposed fix. Ondrej -- Ondřej Surý (He/Him) > On 29. 5. 2024, at 12:02, jab...@strandkip.nl wrote: > > On May 29, 2024, at 01:51, Geoff Huston wrote: > >> I tried to point out to the folk on the keytrap bandwagon that the

Re: [dns-operations] DNSbomb attack

2024-05-27 Thread Ondřej Surý
already mitigates the attack to a level that’s just enough. And that’s described in length in the mentioned blogpost by Nicki. I don’t know why are you trying to create rift where there’s really none. Ondřej -- Ondřej Surý (He/Him) > On 27. 5. 2024, at 17:12, Stephane Bortzmeyer wr

Re: [dns-operations] Evaluation of NSEC3-encloser attack

2024-03-27 Thread Ondřej Surý
Both salt and iterations have absolutely no value for NSEC3 security (see the RFC you just quoted), so just always use empty salt and zero iterations. There’s no added value in fiddling with salt to fit into the SHA1 block. Ondrej -- Ondřej Surý (He/Him) > On 27. 3. 2024, at 20:17, Matt

Re: [dns-operations] Evaluation of NSEC3-encloser attack

2024-03-27 Thread Ondřej Surý
; SHA-1 input blocks). Amen to that! Ondřej -- Ondřej Surý (He/Him) ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https://lists.dns-oarc.net/mailman/listinfo/dns-operations

Re: [dns-operations] DNS Operations

2024-03-02 Thread Ondřej Surý
transparent? - (bonus) Are the product developers involved in the DNS community? Are they involved in the protocol development? And FFS never ever ask Large Language Models (ChatGPT) if you want to know truth. There are no shortcuts to knowledge. Cheers, Ondřej (with my ISC BIND 9 hat) -- Ondřej

[dns-operations] .ke - something wrong with DNSKEYs?

2024-03-01 Thread Ondřej Surý
EY is not from time to time, but it's not 100% reliable, so I suspect a "load-balancer" is in play. And ns2ke.dns.business is not responding to any queries. Ondřej -- Ondřej Surý (He/Him) ond...@sury.org ___ dns-operations mailing list

Re: [dns-operations] CDS query issues (google issue?)

2023-08-21 Thread Ondřej Surý
Hey Jack, this is most likely outdated version of dig. The query over TCP works fine with latest supported versions of BIND 9. What version of dig are you running and where did you get it? Ondřej -- Ondřej Surý (He/Him) ond...@sury.org > On 21. 8. 2023, at 16:56, Jacques Latour via

Re: [dns-operations] DNS .com/.net resolution problems in the Asia/Pacific region

2023-07-18 Thread Ondřej Surý
Thanks Mark for the clarification. I just hate adding new knobs and exceptions in a scramble mode. If the knob is already there then it’s already there. There’s already too many knobs in DNS and we all know that. -- Ondřej Surý (He/Him) > On 19. 7. 2023, at 0:43, Mark Andrews wr

Re: [dns-operations] DNS .com/.net resolution problems in the Asia/Pacific region

2023-07-18 Thread Ondřej Surý
in so so so far future) and it doesn’t require any change in the protocol. Ondrej -- Ondřej Surý (He/Him) > On 18. 7. 2023, at 21:39, Viktor Dukhovni wrote: > > On Tue, Jul 18, 2023 at 08:54:04PM +0200, Ondřej Surý wrote: > >> With my implementor’s hat on, I think this is

Re: [dns-operations] DNS .com/.net resolution problems in the Asia/Pacific region

2023-07-18 Thread Ondřej Surý
the original incident, but now every resolver has to have it because people want it. And operationally, it will just pamper over the issue which might then go unnoticed for longer period of time rather than being fixed right away. Ondrej -- Ondřej Surý (He/Him) > On 18. 7. 2023, at 20

Re: [dns-operations] New addresses for b.root-servers.net

2023-06-02 Thread Ondřej Surý
g process. Theoretically, as long as there is at least one working IP address in the root.hints, any sane resolver should be able to recover and start using the current IP address set of all the root servers. It just might take a while… Ondrej -- Ondřej Surý (He/Him) __

Re: [dns-operations] Google Public DNS plans to enable case randomization for cache poisoning protection

2022-08-11 Thread Ondřej Surý
What would really help here is (continuous) sharing the list of problematic domains. That would really help the DNS community, we could talk to the people running these services, and prepare the configuration with exception for popular open-source implementations. Ondřej -- Ondřej Surý (He

Re: [dns-operations] Name servers returning incorrectly truncated UDP responses

2022-07-30 Thread Ondřej Surý
implementations just didn’t had enough differences between than because they adhered to standards that fpdns just could not tell the difference. Cheers, -- Ondřej Surý (He/Him) > On 30. 7. 2022, at 19:37, Puneet Sood wrote: > >  > > >> On Sat, Jul 30, 2022 at 10:26 AM

Re: [dns-operations] Name servers returning incorrectly truncated UDP responses

2022-07-30 Thread Ondřej Surý
I am betting on “load balancers”… -- Ondřej Surý (He/Him) > On 30. 7. 2022, at 16:39, Dave Lawrence wrote: > > Greg Choules via dns-operations writes: >> I am including in this mail the RNAME from the SOA (same for both >> zones) in the hope that someone who is respon

Re: [dns-operations] dns-operationsIgnored SOA serial SOA query refused

2022-05-26 Thread Ondřej Surý
reached end-of-life, so you should be really asking the vendor who provided you with the package. Or upgrade to a supported version of BIND 9 - at least the latest 9.16 version and preferably latest 9.18 release. Ondrej -- Ondřej Surý (He/Him) > On 26. 5. 2022, at 22:56, Wes Hardaker wr

Re: [dns-operations] SHA-1 DNSSEC verification broken in RHEL 9 and CentOS 9 Stream

2022-04-13 Thread Ondřej Surý
I’m with Victor on this one. Disabling RSASHA1 signing in DNS software would be perfectly fine, crippling the validation is counterproductive and actively harmful. Ondřej -- Ondřej Surý (He/Him) > On 13. 4. 2022, at 20:10, Viktor Dukhovni wrote: > > On Wed, Apr 13, 2022 at 0

Re: [dns-operations] .au DNSSEC issues

2022-04-11 Thread Ondřej Surý
DNSCurve on Haiku DNSSEC See this list of DNSSEC Outages Ondřej -- Ondřej Surý (He/Him) > On 12. 4. 2022, at 3:39, Paul Wouters wrote: > > On Mon, 28 Mar 2022, Warren Kumari wrote: > >> This is now at least listed on the Ianix website >> (https://ianix.com/pub/dnssec-outages

Re: [dns-operations] Best practice for securing DNS record

2022-02-10 Thread Ondřej Surý
> On 10. 2. 2022, at 17:55, Subramanian, Karthikeyan via dns-operations > wrote: > > Records are not vulnerable or any Stale record. That doesn’t make any sense on the DNS layer. All the stuff you mentioned are in the upper layers of the stack. Ondrej -- Ondřej Surý

Re: [dns-operations] TLD .law - non-signing KSK with referenced DS

2022-01-14 Thread Ondřej Surý
Yes, the non-signing KSK could be offline disaster recovery key. There’s nothing wrong about having more keys in DS than used because the change process for DS is more complicated than swapping the active key in the zone. Ondřej -- Ondřej Surý (He/Him) > On 14. 1. 2022, at 11:31, Matt

[dns-operations] DNS contact at Barkleys?

2021-07-20 Thread Ondřej Surý
. Perhaps somebody here has better contact? Ondrej -- Ondřej Surý (He/Him) ond...@isc.org ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https://lists.dns-oarc.net/mailman/listinfo/dns-operations

[dns-operations] Root Key Sentinel - current state of affairs?

2021-06-23 Thread Ondřej Surý
right now? - is anybody planning to gather the data before the next RZ KSK rollover? Thanks, Ondrej -- Ondřej Surý (He/Him) ond...@isc.org ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https://lists.dns-oarc.net/mailman/listinfo/dns

Re: [dns-operations] DNS Flag Day 2020 and Google Public DNS

2020-10-09 Thread Ondřej Surý
setting the DF bit right now, so I am interested whether you have numbers (or you could measure them) what would be the impact if both parties (client and server) also set the DF bit on outgoing and what would be the increased drop rate? Ondrej -- Ondřej Surý (He/Him) ond...@sury.org > On 9.

Re: [dns-operations] DNS Flag Day 2020 will become effective on 2020-10-01

2020-09-10 Thread Ondřej Surý
beneficial for the DNS ecosystem. Sending multiple shouts to mailing lists, issue tracker, etc... because you have different opinion is not helpful to the DNS community nor to the cause. We are as much DNS experts as you are. Ondřej -- Ondřej Surý (He/Him) > On 11. 9. 2020, at 4:42, Paul Vi

Re: [dns-operations] New OARC Chat Platform

2020-08-25 Thread Ondřej Surý
should be, but I would suggest to just go with what has been provided now and evaluate the choice after we all have experience using Mattermost for a while. Ondřej -- Ondřej Surý (He/Him) > On 25. 8. 2020, at 17:12, Warren Kumari wrote: > > On Tue, Aug 25, 2020 at 10:44 AM Ondřej Su

Re: [dns-operations] New OARC Chat Platform

2020-08-25 Thread Ondřej Surý
ice of tools by the OARC team, so we should not start doing so now. This is a rathole that nobody really wants to go in. Ondrej -- Ondřej Surý (He/Him) ond...@sury.org ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https://lists.

Re: [dns-operations] New OARC Chat Platform

2020-08-25 Thread Ondřej Surý
. Ondrej -- Ondřej Surý (He/Him) ond...@sury.org > On 25. 8. 2020, at 8:19, Doug Barton wrote: > > Is this something that OARC is operating and maintaining, or is it something > that you're acting as a conduit for? The former would be included in my > definition of "rol

Re: [dns-operations] New OARC Chat Platform

2020-08-24 Thread Ondřej Surý
channels when working on Internet Drafts. Internally, the various OARC teams, program committee and board use the platform to talk to each other. It’s not required to use the chat platform, but it certainly has its use. Ondrej -- Ondřej Surý (He/Him) > On 25. 8. 2020, at 4:59, Fred Mor

Re: [dns-operations] New OARC Chat Platform

2020-08-24 Thread Ondřej Surý
(like Slack) can’t offer. Mattermost is a solid competitor on the market and I am glad that OARC moved away from Jabber both as a board member and OARC member. Ondrej -- Ondřej Surý (He/Him) > On 25. 8. 2020, at 1:43, Doug Barton wrote: > > On 8/20/20 1:54 PM, Matthew Pouns

Re: [dns-operations] A strange DNS problem (intermittent SERVFAILs)

2020-05-30 Thread Ondřej Surý
Most probably it is the load-balancer. I’ve seen this before. Ondřej -- Ondřej Surý > On 30 May 2020, at 21:09, dagon wrote: > > How can you even load > such a zone in a modern authority server? All modern auth > servers would

Re: [dns-operations] question on query to DNS server's IPv6 interface

2020-03-31 Thread Ondřej Surý
Hi Tessa, welcome to the wonderful world of DNS and to this mailing list. No, the `A` rrtype query is specifically IPv4 address. The IPv6 addresses are stored in `` rrtype records. When `` rrtype does not exist, but the other rrtypes does exist, the answer is NOERROR + SOA record. This i

Re: [dns-operations] Is this DNS Flag Day 2020 including 'in-addr.arpa.' and 'ip6.arpa.' clean-up?

2020-02-14 Thread Ondřej Surý
Hi, the DNS Flag Days initiative focus on protocol issues, and neither forward or reverse zones are in the focus. If you have anything specific you could bring this up here. How is the .arpa neglected? Ondrej -- Ondřej Surý > On 14 Feb 2020, at 18:22, Pirawat WATANAPONGSE wr

Re: [dns-operations] root? we don't need no stinkin' root!

2019-11-27 Thread Ondřej Surý
> On 28 Nov 2019, at 08:09, Florian Weimer wrote: > > * Ondřej Surý: > >>> On 27 Nov 2019, at 23:08, Florian Weimer wrote: >>> * Mark Allman: >>> >>>> Let me try to get away from what is or is not "big" and ask two >>&

Re: [dns-operations] root? we don't need no stinkin' root!

2019-11-27 Thread Ondřej Surý
> On 27 Nov 2019, at 23:08, Florian Weimer wrote: > > What's the change rate for the root zone? https://twitter.com/diffroot O. -- Ondřej Surý ond...@sury.org ___ dns-operations mailing list dns-operations@lists.dns-oarc.net htt

Re: [dns-operations] root? we don't need no stinkin' root!

2019-11-27 Thread Ondřej Surý
there is getting better, we will still be stuck with old codebase for foreseeable future What we can do is to make the load on RZ servers lighter, but we can’t make them just go. Ondrej -- Ondřej Surý ond...@sury.org > On 26 Nov 2019, at 14:41, Mark Allman wrote: > > > Let m

[dns-operations] DNS Flag Day 2020 - the date

2019-11-16 Thread Ondřej Surý
the TCP. Personally, I propose to set the date to 31. October 2020, but I would like to hear other people’s opinions. It’s fine to discuss here, but ultimately, your opinion should be recorded in aforementioned issue for a permanent record. Thanks, Ondrej -- Ondřej Surý ond...@sury.org

Re: [dns-operations] DNS vendors - please add DoT and DoH to your products

2019-10-30 Thread Ondřej Surý
To all prospective users of DoT and DoH: Please consider funding the development work for your favourite open-source DNS server. :) No really, this is going to take a significant amount of a development time to do it properly (and not just slap something on top of existing DNS), so please tal

Re: [dns-operations] DNS BoF@DNS OARC 2014 Fall LA

2014-10-12 Thread Ondřej Surý
ponse rate while the server is updating the records in the zone? Cheers, Ondrej -- Ondřej Surý -- Chief Science Officer --- CZ.NIC, z.s.p.o.--Laboratoře CZ.NIC Americka 23, 120 00 Praha 2, Czech Republic mailto:ondrej.s...@nic.czhttp://n

[dns-operations] 30 years of DNS

2013-11-25 Thread Ondřej Surý
Just a short notice - the RFC 882 and 883 has been published in November 1983, so we are celebrating 30 years of DNS this November. O. P.S.: I would be interested if anybody can dig up the exact date when the first DNS RFCs were published. -- Ondřej Surý -- Chief Science Officer

Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-05 Thread Ondřej Surý
e.g 26 occurences. I think it should be quite safe to cap the maximum EDNS0 to 1280 (the minimum IPv6 MTU) and set DF flag in all responses. What do you think? JFTR for the cap 1400 this would hit 359 queries. (Still a very small number) O. -- Ondřej Surý -- Chief Science Officer

Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-05 Thread Ondřej Surý
rewrite RCODE in the packet). O. On 4. 9. 2013, at 15:08, Ondřej Surý wrote: > Hi all, > > for all those who haven't been on saag WG at IETF 88... > > Amir Herzbert and Haya Shulman has presented a quite interesting attack on > UDP fragmentation that allows Kaminsky-s

Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-04 Thread Ondřej Surý
On 4. 9. 2013, at 16:33, Stephane Bortzmeyer wrote: > On Wed, Sep 04, 2013 at 04:04:13PM +0200, > Ondřej Surý wrote > a message of 93 lines which said: > >>> Isn't is a good idea to limit the maximum size of the response, >>> like .com/.net (and may be ot

Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-04 Thread Ondřej Surý
> On 4. 9. 2013, at 16:50, Jim Reid wrote: > > On 4 Sep 2013, at 15:40, Ondřej Surý wrote: > >>> Check also ICMP "packet too big" coming in with ridiculous sizes, they >>> might be the sign that someone is trying the Shulman attack. >> >>

Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-04 Thread Ondřej Surý
> Check also ICMP "packet too big" coming in with ridiculous sizes, they > might be the sign that someone is trying the Shulman attack. JFTR It's one ICMP packet per the fragmentation cache timeout and the unique destination IP. I wish we had found out some way to enforce BCP38 before spoofing

Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-04 Thread Ondřej Surý
BTW just to complete my question in first email - is there a agreement that this is serious and needs to be addressed? I am still wondering why this have slipped under the radar for so long (the original paper was published last year). Ondřej Surý > On 4. 9. 2013, at 15:47, Steph

Re: [dns-operations] Implementation of negative trust anchors?

2013-09-04 Thread Ondřej Surý
om badly managed transfers, and that set of workarounds fixed most of it. So our view is that it's more an operational problem on the parent side than on resolver side. O. -- Ondřej Surý -- Chief Science Officer --- CZ.NIC, z.s.p.o.--Laboratoř

Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-04 Thread Ondřej Surý
On 4. 9. 2013, at 15:47, Stephane Bortzmeyer wrote: > On Wed, Sep 04, 2013 at 03:08:55PM +0200, > Ondřej Surý wrote > a message of 81 lines which said: > >> So what are the views of other people on this list? > > [Total noob just going back from holidays and therefo

Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-04 Thread Ondřej Surý
On 4. 9. 2013, at 16:11, Jim Reid wrote: > > On 4 Sep 2013, at 15:04, Ondřej Surý wrote: > >>> A possible solution is simply to deploy IPv6 faster :-) > >> Yeah :), but what should we do in the eternity meanwhile? > > Don't fragment at all, set TC=1

[dns-operations] DNS Attack over UDP fragmentation

2013-09-04 Thread Ondřej Surý
ar?hl=en&q=Amir+Herzberg%2C+Haya+Shulman+++dnssec&btnG=&as_sdt=1%2C5&as_sdtp= We gave it some thoughts here at CZ.NIC Labs and we think that the threat is real and we are now trying to write a PoC code to prove the theoretical concept. So what are the views of other people on this lis

[dns-operations] DNSSEC implementation survey

2013-06-24 Thread Ondřej Surý
), you can reply to this email (the Reply-To is set to knot-dns-us...@lists.nic.cz), or just send the feedback back to me. Thank you very much, Ondrej -- Ondřej Surý -- Chief Science Officer --- CZ.NIC, z.s.p.o.--Laboratoře CZ.NIC Americka 23, 120

Re: [dns-operations] Summary: Anyone still using a Sun/Oracle SCA6000 with OpenSSL?

2012-10-14 Thread Ondřej Surý
> > On 10/14/12 3:10 PM, Ondřej Surý wrote: >> Just a question - would anyone would be interested in joining a project to >> build an OpenHardware FPGA-based HSM with focus on DNSSEC? >> >> O. >> >> On 16. 8. 2012, at 2:24, George Michaelson >>

[dns-operations] DNS Spectroscopy Paper mentioned by David Dagon

2012-10-14 Thread Ondřej Surý
Here's the paper Dave mentioned (if you are interested): http://www.caida.org/publications/papers/2003/dnsspectroscopy/dnsspectroscopy.pdf And thanks for the feedback, -- Ondřej Surý -- Chief Science Officer --- CZ.NIC, z.s.p.o.--Labor

Re: [dns-operations] Summary: Anyone still using a Sun/Oracle SCA6000 with OpenSSL?

2012-10-14 Thread Ondřej Surý
ations mailing list > dns-operations@lists.dns-oarc.net > https://lists.dns-oarc.net/mailman/listinfo/dns-operations > dns-jobs mailing list > https://lists.dns-oarc.net/mailman/listinfo/dns-jobs -- Ondřej Surý -- Chief Science Officer ---

Re: [dns-operations] DNSSEC DANE testing

2012-08-02 Thread Ondřej Surý
invest in that, they will not magically appear out of the thin air. O. -- Ondřej Surý -- Chief Science Officer --- CZ.NIC, z.s.p.o.--Laboratoře CZ.NIC Americka 23, 120 00 Praha 2, Czech Republic mailto:ondrej.s...@nic.cz

[dns-operations] xt_dns (forked) - filtering ANY (and other) queries

2012-08-02 Thread Ondřej Surý
merged back upstream soon, which can understand and filter EDNS0 packets[2][*]. 1. http://software.klolik.org/xt_dns/ 2. https://github.com/oskar456/xt_dns * - You won't believe that, but this fork was made by 'Ondrej' not related to any other Ondrej you might already know:)

Re: [dns-operations] thoughts on DNSSEC

2012-07-19 Thread Ondřej Surý
es in their respective registry > configuration panel (which also enables the DNSSEC EPP extensions for their > provisioning account) Roughly same here at .CZ: http://www.nic.cz/whois/registrars/list/1/ O. -- Ondřej Surý -- Chief Science Officer --- C

[dns-operations] Meet&beer at RIPE (Re: DNS benchmark platform @ OARC)

2012-04-16 Thread Ondřej Surý
. O. On 13. 4. 2012, at 15:13, Ondřej Surý wrote: > Hi all, > > as you might (or might not) know we now have our own authoritative > DNS server implementation - Knot DNS. > > We often need to have nice graphs in slides, so we do performance > benchmarks of our DNS server an

[dns-operations] DNS benchmark platform @ OARC

2012-04-13 Thread Ondřej Surý
As I know that DNS-OARC lacks resources I propose that we can start by preparing some kickstart document and then make this as a collaborative effort to prepare methodology which would be objective. Thoughts? O. -- Ondřej Surý vedoucí výzkumu/Head of R&D department --