I'm having some problems sending some dynamic updates. The server says that the signature is bad, however I can use the key with nsupdate to send updates just fine. Here's the output that I get:
# python mysshfp ankeny-b06-r18-core1 /usr/lib64/python2.6/site-packages/Crypto/Util/randpool.py:40: RandomPool_DeprecationWarning: This application uses RandomPool, which is BROKEN in older releases. See http://www.pycrypto.org/randpool-broken RandomPool_DeprecationWarning) id 7945 opcode UPDATE rcode NOERROR flags ;ZONE . IN SOA ;PREREQ ;UPDATE ankeny-b06-r18-core1.dmacc.net. ANY SSHFP ankeny-b06-r18-core1.dmacc.net. 3600 IN SSHFP 1 1 35041f2cb9fdd67384865b2ca73f9d6a9fae80f7 ;ADDITIONAL Traceback (most recent call last): File "mysshfp", line 55, in <module> response = dns.query.tcp(update, '127.0.0.1') File "/usr/lib/python2.6/site-packages/dns/query.py", line 253, in tcp one_rr_per_rrset=one_rr_per_rrset) File "/usr/lib/python2.6/site-packages/dns/message.py", line 774, in from_wire reader.read() File "/usr/lib/python2.6/site-packages/dns/message.py", line 719, in read self._get_section(self.message.additional, adcount) File "/usr/lib/python2.6/site-packages/dns/message.py", line 671, in _get_section self.message.first) File "/usr/lib/python2.6/site-packages/dns/tsig.py", line 152, in validate raise PeerBadKey dns.tsig.PeerBadKey And here's the entry in the log: client 127.0.0.1#46327: request has invalid signature: TSIG lt27416.campus.dmacc.edu: tsig verify failure (BADKEY) Can anyone clue me in on what I'm doing wrong. I'm using dnspython 1.8.0 (with the recent TSIG patch applied) on Fedora 13. -- Jeff Ollie
mysshfp
Description: Binary data
_______________________________________________ dnspython-users mailing list [email protected] http://howl.play-bow.org/mailman/listinfo.cgi/dnspython-users
