Re: Answers for www.dnssec-failed.org with dnssec-validation auto;

2024-04-17 Thread stuart@registry.godaddy
The crypto policy stuff ultimately creates and maintains files in /etc/crypto-policy/backends, which has a list of acceptable or not-acceptable crypto settings. Whilst a "bind.config" is created, you aren't including it in your config (this is fine), which suggests that the issue is with some

Re: How do I debug if the queries are not getting resolved?

2023-12-11 Thread stuart@registry.godaddy
> Subject: Re: How do I debug if the queries are not getting resolved? > > Oh I forgot to tell you that. This is BIND RPZ and all the queries are > recursive. > > Dig output just dies out and does not spit anything. > > And this specifically i noticed with .gov and .gov.in domain. This is the

Re: Facing issues while resolving only one record

2023-08-31 Thread stuart@registry.godaddy
instances) shows no issue retrieving an A record for eportal.incometax.gov.in., from many places around the world (nlnog ring nodes). So, weird. Stuart Browne GoDaddy Registry | Eng - System IV [signature_3682002026] stuart@registry.godaddy<mailto:stuart@registry.godaddy> i.e. I

Re: Bind 9.16.1 crash

2022-12-07 Thread stuart@registry.godaddy
As the package maintained by the Ubuntu team are “no longer” the source from ISC (but highly modified patches onto an old 9.16.1 source tree), I’d suggest following up with the Ubuntu maintainers of the package, as it’s likely their back-porting of security patches from much more recent

Re: Possible to condition a view based on the interface the query comes in on?

2021-11-18 Thread stuart@registry.godaddy
Look in to "match-destination" in a view, i.e. acl abcd.anycast { 10.10.10.1; }; view "abcd" { match-clients { any; }; match-destinations { abcd.anycast; }; ... }; The response-policy definition (and associated zone)

Re: Unable to start name

2021-04-08 Thread Stuart@registry.godaddy
> From: bind-users on behalf of rams > > Date: Friday, 9 April 2021 at 2:56 pm > To: bind-users > Subject: Unable to start name > Hi > We are using bind 9.11.28.1 on centos7.8. We have large number of zones > on disk. When we stop/start , we are not getting successful message and >

Re: replication time for dynamic records from primary to secondary servers

2021-03-30 Thread Stuart@registry.godaddy
On 31/3/21, 8:00 am, "bind-users on behalf of John Thurston" wrote: On 3/30/2021 12:30 PM, Cuttler, Brian R (HEALTH) via bind-users wrote: > We are seeing a delay in the primary DNS server updating the secondary and would like to shorten that interval. Can you post the

Re: Bind 9.11 serving up false answers for a single domain. (OT)

2021-02-11 Thread Stuart@registry.godaddy
t; wrote: Notice: This email is from an external sender. > On 11. 2. 2021, at 7:01, Stuart@registry.godaddy wrote: > > It's one of those old compatibility things. Also called *downgrade attack vector*. Stuart, there’s absolutely no reason to keep any SHA1 in the DN

Re: Bind 9.11 serving up false answers for a single domain. (OT)

2021-02-11 Thread Stuart@registry.godaddy
I was going to throw out a “Of course not”, but after having a bit of a stressful last few hours, I decided to walk the zone manually as something “brainless” to relax.. And found there are some.. firmdale (RSASHS256 DNSKEY algorithm (8)) gdn (RSASHS256 DNSKEY algorithm (8))

Re: Bind 9.11 serving up false answers for a single domain. (OT)

2021-02-10 Thread Stuart@registry.godaddy
Blue via bind-users" wrote: Notice: This email is from an external sender. So out of curiosity why does the us tld have a SHA1 DS in root? Should be an easy thing to tidy up, eh? John -Original Message- From: Stuart@registry.godaddy [mailto:Stuart@regist

Re: Bind 9.11 serving up false answers for a single domain. (OT)

2021-02-10 Thread Stuart@registry.godaddy
30909 8 2 E2D3C916F6DEEAC73294E8268FB5885044A833FC5459588F4A9184CF C41A5766 -Original Message- From: Stuart@registry.godaddy [mailto:Stuart@registry.godaddy] Sent: Wednesday, February 10, 2021 5:24 PM To: John W. Blue; bind-users Subject: Re: Bind 9.11 serving up false answers for a single d

Re: Bind 9.11 serving up false answers for a single domain. (OT)

2021-02-10 Thread Stuart@registry.godaddy
If you look closer, you’ll see that ‘us.’ is RSASHA256. ‘state.ma.us.’ however, is delegated to the state officials of the Commonwealth of Massachusetts and is indeed RSASHA1NSEC3. Stuart ... one of the guy’s that does the DNSSEC for US TLD. From: bind-users on behalf of "John W. Blue via

Re: Filter out TSIG records from zone transfer

2020-12-06 Thread Stuart@registry.godaddy
I usually just GREP them out. dig -k axfr zone @remotehost | grep -v 'ANY[[:space:]]TSIG[[:space:]]' Stuart On 7/12/20, 1:32 am, "bind-users on behalf of Anand Buddhdev" wrote: Notice: This email is from an external sender. Hi folks, When I use "dig" to do a zone

Re: Key rollover for inline signing zones

2020-10-28 Thread Stuart@registry.godaddy
Manual steps? * Generate keys (dnssec-keygen) * Set appropriate Publish and Activation times with the arguments * Set appropriate de-activation and removal times on existing keys (dnssec-settime) BIND should do the rest. You can use rndc loadkeys to hurry up the automation a