Dear All,
many thanks pointing me into the right direction. // Hans — > On 21.03.2022, at 17:58, Ondřej Surý <ond...@isc.org> wrote: > > This is already being tracked as > https://gitlab.isc.org/isc-projects/bind9/-/issues/3122 > > Ondrej > -- > Ondřej Surý (He/Him) > ond...@isc.org > > My working hours and your working hours may be different. Please do not feel > obligated to reply outside your normal working hours. > >> On 21. 3. 2022, at 17:12, MAYER Hans <hans.ma...@iiasa.ac.at> wrote: >> >> >> Hi Borja, >> >> Many thanks for this hint. I tried to allow with >> setcap 'CAP_NET_BIND_SERVICE=+eip' /usr/local/sbin/named >> but it didn’t help. >> >> On other hand there is no issue on port 53 and 953. Why should it be just on >> port 853 ? >> >> Kind regards >> Hans >> >> >> >>> On 21.03.2022, at 15:26, Borja Marcos <bor...@sarenet.es> wrote: >>> >>> >>> >>>> On 21 Mar 2022, at 14:51, MAYER Hans <hans.ma...@iiasa.ac.at> wrote: >>>> >>>> >>>> Looking at the log I see: >>>> network: error: creating TLS socket: permission denied >>>> >>>> Why doesn’t named have the permissions after a „rndc reload“ but it has >>>> the permissions after a start ? And why on one server but not on another ? >>>> In both cases the daemon is running as user „bind“ with UID below 128 but >>>> not as root. >>> >>> Because it usually starts as root and it demotes itself to “bind” whenever >>> possible. >>> >>> Maybe there is a mechanism in Linux to grant permission to a certain UID to >>> bind() a socket to certain privileged >>> port number, as it is used for NTP on FreeBSD? >>> >>> >>> >>> >>> Borja. >>> >> >> >> >> >> >>> On 21.03.2022, at 14:51, MAYER Hans <hans.ma...@iiasa.ac.at> wrote: >>> >>> >>> >>> Dear All, >>> >>> now BIND 9.18 is supporting DoT directly I tried to go away from a solution >>> with stunnel4 and therefore I compiled 9.18.1 and modified named.conf >>> So far everything is working fine. All the tests with dig , openssl and >>> lsof is showing it’s working. >>> The problem: when I run a „rndc reload“ the named process is not listen on >>> 853/tcp anymore. All tests with TLS fail. And this on IPv4 as well on IPv6. >>> The rest of BIND is working well. Still listening on port 53 on UDP and TCP >>> When I restart the service so that named stops and a new process is started >>> and running then DoT is working again. >>> I run this on Debian 10 buster. >>> The interesting story is I run the same version 9.18.1 on a different >>> Debian 10 buster server. On this server the process „named" survives a >>> „rndc reload“ on port 853 >>> >>> Looking at the log I see: >>> network: error: creating TLS socket: permission denied >>> >>> Why doesn’t named have the permissions after a „rndc reload“ but it has the >>> permissions after a start ? And why on one server but not on another ? >>> In both cases the daemon is running as user „bind“ with UID below 128 but >>> not as root. >>> >>> Any ideas where to look ? >>> >>> Kind regards >>> Hans >>> >>> — >>> >>> >>> maybe the important part of the config >>> >>> listen-on { >>> my.ipv4.hiding.here ; >>> 127.0.0.1 ; >>> }; >>> listen-on port 853 tls iiasaatls { any; }; >>> listen-on-v6 { any ; } ; >>> listen-on-v6 port 853 tls iiasaatls { any; }; >>> >>> >> >> >> -- >> Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from >> this list >> >> ISC funds the development of this software with paid support subscriptions. >> Contact us at https://www.isc.org/contact/ for more information. >> >> >> bind-users mailing list >> bind-users@lists.isc.org >> https://lists.isc.org/mailman/listinfo/bind-users > -- Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list ISC funds the development of this software with paid support subscriptions. Contact us at https://www.isc.org/contact/ for more information. bind-users mailing list bind-users@lists.isc.org https://lists.isc.org/mailman/listinfo/bind-users