I'm having some problems sending some dynamic updates.  The server
says that the signature is bad, however I can use the key with
nsupdate to send updates just fine.  Here's the output that I get:

# python mysshfp ankeny-b06-r18-core1
/usr/lib64/python2.6/site-packages/Crypto/Util/randpool.py:40:
RandomPool_DeprecationWarning: This application uses RandomPool, which
is BROKEN in older releases.  See
http://www.pycrypto.org/randpool-broken
  RandomPool_DeprecationWarning)
id 7945
opcode UPDATE
rcode NOERROR
flags
;ZONE
. IN SOA
;PREREQ
;UPDATE
ankeny-b06-r18-core1.dmacc.net. ANY SSHFP
ankeny-b06-r18-core1.dmacc.net. 3600 IN SSHFP 1 1
35041f2cb9fdd67384865b2ca73f9d6a9fae80f7
;ADDITIONAL
Traceback (most recent call last):
  File "mysshfp", line 55, in <module>
    response = dns.query.tcp(update, '127.0.0.1')
  File "/usr/lib/python2.6/site-packages/dns/query.py", line 253, in tcp
    one_rr_per_rrset=one_rr_per_rrset)
  File "/usr/lib/python2.6/site-packages/dns/message.py", line 774, in from_wire
    reader.read()
  File "/usr/lib/python2.6/site-packages/dns/message.py", line 719, in read
    self._get_section(self.message.additional, adcount)
  File "/usr/lib/python2.6/site-packages/dns/message.py", line 671, in
_get_section
    self.message.first)
  File "/usr/lib/python2.6/site-packages/dns/tsig.py", line 152, in validate
    raise PeerBadKey
dns.tsig.PeerBadKey

And here's the entry in the log:

client 127.0.0.1#46327: request has invalid signature: TSIG
lt27416.campus.dmacc.edu: tsig verify failure (BADKEY)

Can anyone clue me in on what I'm doing wrong.

I'm using dnspython 1.8.0 (with the recent TSIG patch applied) on Fedora 13.

-- 
Jeff Ollie

Attachment: mysshfp
Description: Binary data

_______________________________________________
dnspython-users mailing list
[email protected]
http://howl.play-bow.org/mailman/listinfo.cgi/dnspython-users

Reply via email to