Re: Is it possible to use one KSK for multiple domains?

2008-11-20 Thread Stephane Bortzmeyer
On Wed, Nov 19, 2008 at 09:55:52PM +0100,
 Adam Tkac [EMAIL PROTECTED] wrote 
 a message of 17 lines which said:

 If I understand correctly what RFC 4034, section 2.1.1 says ... If
 bit 7 has value 1, then the DNSKEY record holds a DNS zone key, and
 the DNSKEY RR's owner name MUST be the name of a zone... it is
 impossible. Each zone has to have his own KSK and ZSK pair, hasn't
 it?

[Warning: still struggling with the subtleties of KSK/ZSK.]

The text you quote is for DNS publication. But you typically do not
put KSK in the DNS, no?

I would say, quoting Tolkien: one ZSK per zone, but only one KSK to
sign them all.

[AFNIC manages six TLD so the answer interests us, too.]

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Is it possible to use one KSK for multiple domains?

2008-11-20 Thread Niall O'Reilly
On Wed, 2008-11-19 at 21:55 +0100, Adam Tkac wrote:
 does anyone know if is it possible to sign multiple domains with one
 KSK?

Adam,

I suspect your question may need to be more specific.

Are you asking about the signing process itself, or rather 
about how certain aspects of this process need to be exposed
in the DNS?

The RFC-fragment you cite seems to me to require that each 
signed zone needs its set of [KZ]SK exposed in the DNS, but 
to be silent on whether a single key can be reused by appearing
as RDATA in the DNSKEY RRsets of multiple zones.

I haven't read 4033/4034 thoroughly, so it's possible I may 
have misunderstood completely.

Best regards,

Niall O'Reilly


___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Workaround Solaris's kernel bug

2008-11-20 Thread Stacey Jonathan Marshall

Thomas Schulz wrote:

Change 2489 says to define ISC_SOCKET_USE_POLLWATCH to workaround a
Solaris kernel bug about /dev/poll.  How do I know if I should define
this?  Should I just assume that if I am running Sloaris 8 then I need
to define ISC_SOCKET_USE_POLLWATCH?  Is there any down side to defining
this if it is not needed?

Tom Schulz
Applied Dynamics Intl.
[EMAIL PROTECTED]
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users
  

Tom,

This is CR 6724237 
http://bugs.opensolaris.org/view_bug.do?bug_id=6724237 Which was first 
introduced in Solaris 8.  At this time there is no patch for Solaris 8, 
9 or 10 and therefore ISC_SOCKET_USE_POLLWATCH should be defined when 
building BIND 9 for those systems.


Stacey Marshall
Sun Microsystems Ltd.
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Zone not propogating to slaves

2008-11-20 Thread Steve Koon
I am getting on one of my slaves (69.25.129.117) yet on the other I get
the zone to come across from the master. Just a quirk here is that the
.117 slave has to be recycled before the zone comes across yet the .118
comes across when the master is recycle and a change has occurred in one
of the zones. By the way until this zone I have not had problems with
zones coming across to either slave although I have had to do a recycle
to the .117 to get them there.

 

Anyone know why I am getting this not authoritative message and no
zone file on .118 all of a sudden?

 

Thanks,

Steve

 

 

This is the log message in the 69.25.129.119 Master

 client 69.25.129.117#1305: transfer of 'manzanitavacation.com/IN': AXFR
started

client 69.25.129.117#1305: transfer of 'manzanitavacation.com/IN': AXFR
ended

 

This is the log message in the 69.25.129.118 slave

client 69.25.129.117#1304: received notify for zone
'manzanitavacation.com': not authoritative

 

This is the log message in the 69.25.129.117 slave

zone manzanitavacation.com/IN: Transfer started.

transfer of 'manzanitavacation.com/IN' from 69.25.129.119#53: connected
using 69.25.129.117#1305

zone manzanitavacation.com/IN: transferred serial 2008111901

transfer of 'manzanitavacation.com/IN' from 69.25.129.119#53: Transfer
completed: 1 messages, 8 records, 251 bytes, 0.109 secs (2302 bytes/sec)

zone manzanitavacation.com/IN: sending notifies (serial 2008111901)

 

 

 

=[1]== named.conf for 69.25.129.117 Slave =

options {

 

  directory C:\WINDOWS\system32\dns\etc\named;

pid-file C:\WINDOWS\system32\dns\etc\named\run\named.pid;

dump-file
C:\WINDOWS\system32\dns\etc\named\dump\named_dump.db;

statistics-file
C:\WINDOWS\system32\dns\etc\named\stats\named.stats;

zone-statistics yes; 

forwarders { 63.251.161.33; 216.231.41.2; };

allow-query {any;};

recursion yes;

//allow-recursion {69.25.129.119;};

allow-transfer {69.25.129.119;};

listen-on-v6 { any; };

};

 

// log to named\log\named.log events from info UP in severity (no debug)

// defaults to use 3 files in rotation

// failure messages up to this point are in the event log

logging{

channel my_log{

file
C:\WINDOWS\system32\dns\etc\named\log\named.log versions 3 size 250k;

severity info;

};

category default{

my_log;

};

};

 

#

zone manzanitavacation.com. in {

type slave;

file
c:\windows\system32\dns\etc\named\zones\db.manzanitavacation.com.zone;

masters { 69.25.129.119; };

allow-notify {69.25.129.117;69.25.129.118; };

};

=[1]=

 

=[2]== named.conf for 69.25.129.119 Master =

options {

 

directory C:\WINDOWS\system32\dns\etc;

dump-file C:\WINDOWS\system32\dns\etc\named\dump\nameddump.db;

statistics-file
C:\WINDOWS\system32\dns\etc\named\stats\named.stats;

pid-file C:\WINDOWS\system32\dns\etc\named\run\named.pid;

recursion yes;

zone-statistics yes;

forwarders { 63.251.161.33 ; 63.251.161.1; };

 

#forward first;

 

listen-on-v6 { any; };

dnssec-enable yes;

};

 

key rndc-key { algorithm hmac-md5; secret ??; };

 

controls {

inet 127.0.0.1 port 953 allow { localhost; } keys {
rndc-key; };

};

 

logging{

channel my_log{

file
C:\WINDOWS\system32\dns\etc\named\log\named.log versions 3 size 250k;

severity info;

};

category default{

my_log;

};

};

 

#

zone manzanitavacation.com. in {

type master;

file
c:\windows\system32\dns\etc\named\zones\manzanitavacation.com.zone;

};

 

=[3]== named.conf for 69.25.129.118 Slave ==

options {

 

  directory C:\WINDOWS\system32\dns\etc\named;

pid-file C:\WINDOWS\system32\dns\etc\named\run\named.pid;

dump-file
C:\WINDOWS\system32\dns\etc\named\dump\named_dump.db;

statistics-file
C:\WINDOWS\system32\dns\etc\named\stats\named.stats;

zone-statistics yes; 

forwarders { 63.251.161.33; 216.231.41.2; };

allow-query {any;};

recursion yes;

//allow-recursion {69.25.129.119;};

allow-transfer {69.25.129.119;};

listen-on-v6 { any; };

};

 

// log to named\log\named.log events from info UP in severity (no debug)

// defaults to use 3 files in rotation

// failure messages up to this point are in the event log

logging{

channel my_log{

file
C:\WINDOWS\system32\dns\etc\named\log\named.log versions 3 size 250k;


Re: Is it possible to use one KSK for multiple domains?

2008-11-20 Thread Stephane Bortzmeyer
On Thu, Nov 20, 2008 at 11:55:17AM +,
 Chris Thompson [EMAIL PROTECTED] wrote 
 a message of 33 lines which said:

 The text you quote is for DNS publication. But you typically do not
 put KSK in the DNS, no?

 Sure you do. How could a validator use it if you didn't? 

Because it is published as a trust anchor?
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Help understanding lame server error

2008-11-20 Thread Dan
Have you tried looking up the client IP from another line in the logs from the 
same time?


-Original Message-
From: Scott Haneda [EMAIL PROTECTED]

Date: Thu, 20 Nov 2008 00:45:26 
To: BIND Users Mailing Listbind-users@lists.isc.org
Subject: Re: Help understanding lame server error


On Nov 19, 2008, at 6:19 PM, Kevin Darcy wrote:
 Scott Haneda wrote:
 I have a good deal if lame server errors in my logs, which I am not  
 entirely understanding.

 19-Nov-2008 15:36:34.657 lame-servers: info: lame server resolving  
 '170.73.234.209.in-addr.arpa' (in '73.234.209.in-addr.arpa'?):  
 209.234.64.192#53
 73.234.209.in-addr.arpa has been delegated to ns1.networkiowa.com  
 (address 209.234.64.192), but that nameserver is not responding  
 authoritatively for the zone. This is referred to technically as  
 being lame.

 Fortunately one of the other delegated nameservers  
 (storm.weather.net) *is* responding authoritatively. So the zone is  
 not completely broken. But named is logging this as a warning. You  
 can configure logging to ignore these lame-server conditions.

Generally I want to know, as there are cases where I mess up, and  
something bad happens.  I watch the logs, and know to fix it.  So I am  
not so much minding the data in my logs, but more just wanting to  
understand what is causing these lookups.

 19-Nov-2008 15:36:34.955 lame-servers: info: lame server resolving  
 '127.52.195.166.in-addr.arpa' (in '52.195.166.in-addr.arpa'?):  
 209.183.48.20#53
 19-Nov-2008 15:36:34.975 lame-servers: info: lame server resolving  
 '221.250.53.206.in-addr.arpa' (in '250.53.206.in-addr.arpa'?):  
 209.43.20.115#53
 19-Nov-2008 15:36:34.989 lame-servers: info: lame server resolving  
 '127.52.195.166.in-addr.arpa' (in '52.195.166.in-addr.arpa'?):  
 209.183.52.20#53
 19-Nov-2008 15:36:35.050 lame-servers: info: lame server resolving  
 '127.52.195.166.in-addr.arpa' (in '52.195.166.in-addr.arpa'?):  
 209.183.48.21#53
 I assume, without looking, that the causes for these are similar to  
 the example above.

Yes, I have thousands of these entries.  I usually use another NS to  
point my email server to, that one has become a little flakey, so I  
moved to using my own local NS on the same machine as the email server.

 My server is not allowing recursions, other than to localnets.  
 about the only thing hitting it is an email server. So I am not  
 clear on why these lookups are happening, or why they are coming  
 from all these other IP's
 Most email software these days, as a default, performs reverse- 
 lookups of connecting client addresses as a form of spam detection  
 (because it's common knowledge that spammers are genetically  
 incapable of populating reverse records). It is thus perfectly  
 normal to see a lot of reverse-lookup traffic from email servers.

Correct, but that is what is strange.  I am very familiar with my  
email sever, and I am not doing reverse PTR record checking.  I am of  
course using some DNSBL's and DNSWL's as well, but no reverse checking.

Further, I have allowed only localnets to check recursively on this  
NS.  I know my IP range, and what machines would be hitting it.

 BTW, if you want to determine where all of these reverse lookups  
 were coming from, you could just turn on query logging. Why guess  
 when you can tell for sure?

This is the core of my question, maybe someone can point me to docs,  
or help me understand a log line.  In the example above, I see field 1  
is the date, field 2 is the time, field 3 looks like the error  
description, field 4 is the level, and then there are the rest of the  
bits.  However, I thought the last part, was an IP and a port, telling  
me, that IP, asked on port 53, for a lookup of my server.  So in this  
case, why do I need to look at the query log, when I believe, this log  
tells me who is doing the lookup.

If this really was the email server doing this lookup, all the lines  
should share the same IP in common.  So let's assume that for a  
second, this is a reverse record lookup, that means my email server is  
asking of my NS for a record/response.  Should I not see my IP in  
those log lines?

Here is another example, I think not a reverse lookup for sure:
20-Nov-2008 00:36:38.470 lame-servers: info: lame server resolving  
'szi.szi.sv.gov.yu' (in 'szi.sv.gov.yu'?): 195.178.32.2#53

Doesn't that mean that 195.178.32.2 requested a lookup from my NS for  
szi.szi.sv.gov.yu?  I have an email server, and a bunch of web  
servers, the web servers do not have DNS lookups on, so those are not  
asking anything of my DNS server.  The only thing that should be, is  
the email server, but that is not adding up, since I do not have  
reverse lookup checking enabled.

I can think of one thing, which is my web stats server, which I would  
think, does resolve IP's to host names, in order to show a report of  
what domains are going to websites.  That being said, I would think,  
that I should see the source of the 

Re: socket: too many open file descriptors

2008-11-20 Thread JINMEI Tatuya / 神明達哉
At Thu, 20 Nov 2008 04:30:00 -0800 (PST),
pollex [EMAIL PROTECTED] wrote:

  9.3.4-P1.1 still seems to be a Debian specific version, but if this
  is featurewise equivalent to 9.3.5-P1, you should at least upgrade to
  9.3.5-P2 (and build it with a large value of ISC_SOCKET_MAXSOCKETS).
  In fact, I'd rather more strongly recommend 9.3.6.

First off, there was a typo in my previous response:
ISC_SOCKET_MAXSOCKETS should have been ISC_SOCKET_FDSETSIZE.

 how is the exact command line to compile with 4096 FDs?
 ./configure --ISC_SOCKET_MAXSOCKETS='4096'?

Replacing the macro name with the correct one, and assuming you're
using a bsh variant such as zsh and bash:

% STD_CDEFINES='-DISC_SOCKET_FDSETSIZE=4096' ./configure

But again, I'd rather strongly recommend 9.3.6.  Then you won't have
to care about ISC_SOCKET_MAXSOCKETS or any other annoying details
about FD consumption in the first place.  There should be no reason
for someone considering an upgrade to 9.3.5-P2 not to rather use
9.3.6.

---
JINMEI, Tatuya
Internet Systems Consortium, Inc.
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users