Key ID from DNSKEY - how?

2010-10-27 Thread Mark Elkins
I would like to calculate the Key-ID from a DNSKEY record. I'd prefer to
do this in PHP as this is inside some existing PHP (Web) scripts but I
guess calling a C program would not be too inconvenient.

I'd like to index records (ie DNSKEY and DS Records) according to their
Key-ID - and present them grouped by Key-ID. DS keys are usually
presented with their Key-ID - so are less problematic.

Side issue - the RFC description for a DS Record on the wire
gives the first 16 bytes as the Key-ID, followed by (8-bit)
Algorithm, (8-bit) Digest type and (32 bytes - or so) Digest. Is
all this info encoded into the Base-64 stuff that one can see as
ascii in a zone? ... or is the base-64 ascii stuff just the
Digest?

I'd love to be able to validate both DS and DNSKEY records that
people give me but I am still floundering around amongst the
DNSSEC RFC's...

I understand that key-ID's are not necessarily unique but as I'd usually
not have more than about 4 or so in any one domain - I'm hoping that
statistics will be with me 99.95% of the time. 

Anyway - does anyone have existing code snippets that might assist me?
-- 
  .  . ___. .__  Posix Systems - (South) Africa
 /| /|   / /__   m...@posix.co.za  -  Mark J Elkins, Cisco CCIE
/ |/ |ARK \_/ /__ LKINS  Tel: +27 12 807 0590  Cell: +27 82 601 0496


smime.p7s
Description: S/MIME cryptographic signature
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

non-improving referral

2010-10-27 Thread Leo Baltus
Hi,

We are in the process of migrating from bind-9.4-ESV-R2 to bind-9.7.2-P2.

We have our authoritative servers migrated to bind-9.7.2-P2 and it all
seems to work fine.

While testing our caching resolvers with bind-9.7.2-P2 however, we
noticed some errors in our logfiles we have never seen before.

Oct 26 09:52:03 myhost named[21085]: DNS format error from 1.5.3.4#53 resolving 
1.2.4.2.x.y.z.example.com/TXT for client 1.5.3.203#15637: non-improving referral
Oct 26 09:52:03 myhost named[21085]: DNS format error from 1.5.2.2#53 resolving 
1.2.4.2.x.y.z.example.com/TXT for client 1.5.3.203#15637: non-improving referral

Obviously I have obscured some data here :) As you may guess this is a
query for a TXT record from a blocklist-daemon.

The nameservers on 1.5.3.4 and 1.5.2.2 are bind-9.7.2-P2.

The queried domains are hosted by us and the hopefully relevant part of
the zone looks like this:

x.y.z.example.com.   IN NS   bl1a.example.com.
x.y.z.example.com.   IN NS   bl1b.example.com.

A dump of the cache shows NS and A records are in the cache for bl1[ab]
however, on each non-cached query from the client both errorlines
are printed in the log suggesting the resolver is not using the cached
NS records.

The client receives a valid answer, so my only real problem seems to be
the amount of spam I get in our logfiles.

The blocklist is served by rbldnsd, manually query-ing gives my a
valid response.

Could anybody tell me what problem bind is complaining about?

Please CC me as I am not on this list.

-- 
Leo Baltus, internetbeheerder /\
NPO ICT Internet Services/NPO/\
Sumatralaan 45, 1217 GP Hilversum, Filmcentrum, west \  /\/
beh...@omroep.nl, 035-6773555 \/
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Key ID from DNSKEY - how?

2010-10-27 Thread Casey Deccio
On Wed, Oct 27, 2010 at 10:46 AM, Mark Elkins m...@posix.co.za wrote:
 I would like to calculate the Key-ID from a DNSKEY record. I'd prefer to
 do this in PHP as this is inside some existing PHP (Web) scripts but I
 guess calling a C program would not be too inconvenient.


See RFC 4034, Appendix B (http://tools.ietf.org/html/rfc4034#appendix-B )

 I'd like to index records (ie DNSKEY and DS Records) according to their
 Key-ID - and present them grouped by Key-ID. DS keys are usually
 presented with their Key-ID - so are less problematic.

The key tag field in a DS RR is the key tag value computed from the
DNSKEY RR to which it corresponds in the child zone.

        Side issue - the RFC description for a DS Record on the wire
        gives the first 16 bytes as the Key-ID, followed by (8-bit)
        Algorithm, (8-bit) Digest type and (32 bytes - or so) Digest. Is
        all this info encoded into the Base-64 stuff that one can see as
        ascii in a zone? ... or is the base-64 ascii stuff just the
        Digest?


See below for explanation of the following queries:

$ dig +short org ds
21366 7 2 96EEB2FFD9B00CD4694E78278B5EFDAB0A80446567B69F634DA078F0 D90F01BA

$ dig +noall +answer +multi org dnskey
;; Truncated, retrying in TCP mode.
org.383 IN DNSKEY 257 3 7 (
AwEAAZTjbIO5kIpxWUtyXc8avsKyHIIZ+LjC2Dv8naO+
Tz6X2fqzDC1bdq7HlZwtkaqTkMVVJ+8gE9FIreGJ4c8G
1GdbjQgbP1OyYIG7OHTc4hv5T2NlyWr6k6QFz98Q4zwF
IGTFVvwBhmrMDYsOTtXakK6QwHovA1+83BsUACxlidpw
B0hQacbD6x+I2RCDzYuTzj64Jv0/9XsX6AYV3ebcgn4h
L1jIR2eJYyXlrAoWxdzxcW//5yeL5RVWuhRxejmnSVnC
uxkfS4AQ485KH2tpdbWcCopLJZs6tw8q3jWcpTGzdh/v
3xdYfNpQNcPImFlxAun3BtORPA2r8ti6MNoJEHU=
) ; key id = 9795
org.383 IN DNSKEY 256 3 7 (
AwEAAa1gQwarOzgSbmhYj2eRUf/1RcHuAed0zlnAmqJY
ELF6iUGfPNSBfD0QDilro3Dxc307zVONrTK7qnWtaHXH
NDFVbB3+qDs1E+9tUjfKt9OuFQBQuGSlVvnM7O5ASbxs
Ex/8ms3mQFDCt4nTUmcELQGVE/EwLcDjxAUAmYBW9bQN
) ; key id = 61598
org.383 IN DNSKEY 256 3 7 (
AwEAAfyGacR9k8f85+1XqM6qLTLwdAEQDHUJJbScMrqq
XesZN6GFZDqn4zahg2GllxlHbGMuQJsWXSotq2Jp1Khe
/fp1547v0k2jnOaFv/18wLBmUGSQNNTWpBgp8Yzu8BOw
18kHmbXpQeju2mk6bHgiL7HkJfFoV1nsSTh15q92d5IR
) ; key id = 245
org.383 IN DNSKEY 257 3 7 (
AwEAAYpYfj3aaRzzkxWQqMdl7YExY81NdYSv+qayuZDo
dnZ9IMh0bwMcYaVUdzNAbVeJ8gd6jq1sR3VvP/SR36mm
GssbV4Udl5ORDtqiZP2TDNDHxEnKKTX+jWfytZeT7d3A
bSzBKC0v7uZrM6M2eoJnl6id66rEUmQC2p9DrrDg9F6t
XC9CD/zC7/y+BNNpiOdnM5DXk7HhZm7ra9E7ltL13h2m
x7kEgU8e6npJlCoXjraIBgUDthYs48W/sdTDLu7N59rj
CG+bpil+c8oZ9f7NR3qmSTpTP1m86RqUQnVErifrH8Kj
DqL+3wzUdF5ACkYwt1XhPVPU+wSIlzbaAQN49PU=
) ; key id = 21366

The first value in the DS RR (21366) is the 16-bit key tag value
computed from the org DNSKEY last in the list below. The second value
(7) corresponds to the algorithm of this DNSKEY RR.  The last field is
the hex representation of the SHA-256 digest (designated by value 2
in the digest algorithm field of the DS RR) of DNSKEY RR 21366.

        I'd love to be able to validate both DS and DNSKEY records that
        people give me but I am still floundering around amongst the
        DNSSEC RFC's...

 I understand that key-ID's are not necessarily unique but as I'd usually
 not have more than about 4 or so in any one domain - I'm hoping that
 statistics will be with me 99.95% of the time.


From RFC 4034, section 8:
   The key tag is used to help select DNSKEY resource records
   efficiently, but it does not uniquely identify a single DNSKEY
   resource record.  It is possible for two distinct DNSKEY RRs to have
   the same owner name, the same algorithm type, and the same key tag.
   An implementation that uses only the key tag to select a DNSKEY RR
   might select the wrong public key in some circumstances.  Please see
   Appendix B for further details.

 Anyway - does anyone have existing code snippets that might assist me?

See the code snippet in the RFC for starters.

Casey
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Key ID from DNSKEY - how?

2010-10-27 Thread Alan Clegg
On 10/27/2010 1:46 PM, Mark Elkins wrote:
 I would like to calculate the Key-ID from a DNSKEY record. I'd prefer to
 do this in PHP as this is inside some existing PHP (Web) scripts but I
 guess calling a C program would not be too inconvenient.

[...]

 Anyway - does anyone have existing code snippets that might assist me?

You may want to look at dnssec-dsfromkey

AlanC



signature.asc
Description: OpenPGP digital signature
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: Key ID from DNSKEY - how?

2010-10-27 Thread Phil Mayers

On 10/27/2010 06:46 PM, Mark Elkins wrote:

I would like to calculate the Key-ID from a DNSKEY record. I'd prefer to
do this in PHP as this is inside some existing PHP (Web) scripts but I
guess calling a C program would not be too inconvenient.


I use some Python code to do this in our debugging/management tools, 
translated straight from the RFC; it might convert pretty easily into 
PHP, although in my experience language number/bit-shift/overflow 
behaviour can be a bit... odd.


def key2keytag(flags, alg1, alg2, keydata):
data = struct.pack('!HBB', flags, alg1, alg2)
data += keydata.decode('base64')
v = 0
for i in range(len(data)):
if i  1:
v += ord(data[i])
else:
v += ord(data[i])  8
v += (v  16)  0x
return v  0x

Called like so:

tag = key2tag(257, 3, 5, 'AwEAA...')

Very handy during testing is:

dig +multi domain.com DNSKEY

...which displays the tag as a comment. HTH
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: limiting number of recursion/queries per IP address

2010-10-27 Thread Sebastian Tymków
In FreeBSD you can use pf to limit connections using tables and setting up
rate limit.

http://forums.freebsd.org/showthread.php?t=1727

Best regards,

Shamrock

On Tue, Oct 26, 2010 at 9:29 PM, Kebba Foon kebba.f...@qcell.gm wrote:

 On Tue, 2010-10-26 at 15:22 -0400, Todd Snyder wrote:
  What version of bind, on what OS?
 
 I use Debian 5.0 with bind 9.6-ESV-R1 but also i thought that the OS
 might have some security holes so i try FreeBSD 8.1 with BIND 9.7.1 but
 still have ihave the same problems.

  here may be some things you can do with iptables to limit connections
 
  http://www.debian-administration.org/articles/187
 
 i will just look into these but it done thing iptables will be the ideal
 solution.
  I don't recall seeing anything native to BIND that would allow for limits
 per src.
 
  t.
 
  -Original Message-
  From: bind-users-bounces+tsnyder=rim@lists.isc.org [mailto:
 bind-users-bounces+tsnyder bind-users-bounces%2Btsnyder=rim.com@
 lists.isc.org] On Behalf Of Kebba Foon
  Sent: Tuesday, October 26, 2010 2:27 PM
  To: bind-users@lists.isc.org
  Subject: limiting number of recursion/queries per IP address
 
  Dear List,
 
  Is is possible to limit the number of recursion/queries per IP address.
  there is some kind of virus thats bombarding my dns servers with a lot
  of queries, i realize that when ever the total number of recursion
  clients reach 1000 dns resolution stop working. i have increase the
  recursive-clients to 1 but still these those not help. and also i
  have increase the number of max open files on my OS which at one point
  was complaining about too many open files. can someone please direct me
  to how best to solve this problem its some kind of DDOS.
 
  Thanks
  Kebba
 
  ___
  bind-users mailing list
  bind-users@lists.isc.org
  https://lists.isc.org/mailman/listinfo/bind-users
 
  -
  This transmission (including any attachments) may contain confidential
 information, privileged material (including material protected by the
 solicitor-client or other applicable privileges), or constitute non-public
 information. Any use of this information by anyone other than the intended
 recipient is prohibited. If you have received this transmission in error,
 please immediately reply to the sender and delete this information from your
 system. Use, dissemination, distribution, or reproduction of this
 transmission by unintended recipients is not authorized and may be unlawful.

 ___
 bind-users mailing list
 bind-users@lists.isc.org
 https://lists.isc.org/mailman/listinfo/bind-users

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

out of place mx records.

2010-10-27 Thread Gregory Machin
Hi.
I have taken over some dns servers, and the process of doing upgrade,
half way through the process..

I have a question about the zone files , as there is some
configuration here that I have not seen before and seems out of place.

here is an excerpt of the zone file

$TTL 14400

@   IN  SOA example.com. postmaster.example.com. (
2010042142  ; Serial
3600; Refresh (1 hours)
1200; Retry   (20 minutes)
1728000 ; Expire  (20 days)
14400   ; Minimum (4 hours)
)
IN  NS  ns1.example.com.
IN  NS  ns2.example.com.
;   IN  NS  ns1.catalyst.net.nz.

IN  MX  10 mail01.example.com.
IN  MX  10 mail02.example.com.
;   IN  MX  20 mail03.example.com.

IN  A   202.xx.xx.2

ns1 IN  A   192.168.xx.xx   
ns2 IN  A   192.168.xx.xx   

listservIN  A   202.xx.xx.2
IN  MX  10  mcvpemr01   
IN  MX  10  mcvpemr02   
cache   IN  A   202.xx.xx.1
IN  MX  10  mcvpemr01   
IN  MX  10  mcvpemr02
captaincometIN  A   202.xx.xx.1
IN  MX  10  mcvpemr01
IN  MX  10  mcvpemr02
louie   IN  A   202.xx.xx.1
IN  MX  10  mcvpemr01
IN  MX  10  mcvpemr02
mail01  IN  A   192.168.xx.xx
IN  MX  10  mcvpemr01   
IN  MX  10  mcvpemr02
mail02  IN  A   192.168.xx.xx
IN  MX  10  mcvpemr01   
IN  MX  10  mcvpemr02
nelson  IN  A   202.xx.xx.1
IN  MX  10  mcvpemr01
IN  MX  10  mcvpemr02


My question is why would INMX10mcvpemr01 and INMX
 10mcvpemr02 be repeated trough the zone file surely this is
redundant ?


Thanks
Greg
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: out of place mx records.

2010-10-27 Thread Andrey G. Sergeev (AKA Andris)
Hello Gregory,


Thu, 28 Oct 2010 13:04:58 +1300 Gregory Machin wrote:

 Hi.
 I have taken over some dns servers, and the process of doing upgrade,
 half way through the process..
 
 I have a question about the zone files , as there is some
 configuration here that I have not seen before and seems out of
 place.
 
 here is an excerpt of the zone file
 
 $TTL 14400
 
 @ IN  SOA example.com. postmaster.example.com. (
   2010042142  ; Serial
   3600; Refresh (1 hours)
   1200; Retry   (20 minutes)
   1728000 ; Expire  (20 days)
   14400   ; Minimum (4 hours)
 )
   IN  NS  ns1.example.com.
   IN  NS  ns2.example.com.
 ; IN  NS  ns1.catalyst.net.nz.
 
   IN  MX  10 mail01.example.com.
   IN  MX  10 mail02.example.com.
 ; IN  MX  20 mail03.example.com.
 
   IN  A   202.xx.xx.2
 
 ns1   IN  A   192.168.xx.xx   
 ns2   IN  A   192.168.xx.xx   
 
 listservINA   202.xx.xx.2
   IN  MX  10  mcvpemr01   
   IN  MX  10  mcvpemr02   
 cache   INA   202.xx.xx.1
   IN  MX  10  mcvpemr01   
   IN  MX  10  mcvpemr02
 captaincomet  IN  A   202.xx.xx.1
   IN  MX  10  mcvpemr01
   IN  MX  10  mcvpemr02
 louie IN  A   202.xx.xx.1
   IN  MX  10  mcvpemr01
   IN  MX  10  mcvpemr02
 mail01  IN  A   192.168.xx.xx
   IN  MX  10  mcvpemr01   
   IN  MX  10  mcvpemr02
 mail02  IN  A   192.168.xx.xx
   IN  MX  10  mcvpemr01   
   IN  MX  10  mcvpemr02
 nelson  INA   202.xx.xx.1
   IN  MX  10  mcvpemr01
   IN  MX  10  mcvpemr02
   
 
 My question is why would INMX10mcvpemr01 and INMX
  10mcvpemr02 be repeated trough the zone file surely this is
 redundant ?

These MX record sets aren't redundant as they belong to the different
labels named listserv, cache etc.


-- 

Yours sincerely,

Andrey G. Sergeev (AKA Andris) http://www.andris.name/
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: out of place mx records.

2010-10-27 Thread Ian Manners
Hi Gregory,

mail02  IN  A   192.168.xx.xx
   IN  MX  10  mcvpemr01   
   IN  MX  10  mcvpemr02
nelson  IN A   202.xx.xx.1
   IN  MX  10  mcvpemr01
   IN  MX  10  mcvpemr02

My question is why would INMX10mcvpemr01 and INMX
 10mcvpemr02 be repeated trough the zone file surely this is
redundant ?

It looks like an old way of specifying the MX for each subdomain.

Cheers
Ian Manners
http://www.os2site.com/

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: out of place mx records.

2010-10-27 Thread Sten Carlsen
To me it looks redundant, named-compilezone -o - zone file should show
you how bind interprets these.
My guess is that they will be listed only once in the output.

I don't see how they could belong to each subdomain, to do that there
should be a@... to set a new origin?



On 28/10/10 2:14, Ian Manners wrote:
 Hi Gregory,

 mail02  IN  A   192.168.xx.xx
  IN  MX  10  mcvpemr01   
  IN  MX  10  mcvpemr02
 nelson  IN   A   202.xx.xx.1
  IN  MX  10  mcvpemr01
  IN  MX  10  mcvpemr02
 My question is why would INMX10mcvpemr01 and INMX
 10mcvpemr02 be repeated trough the zone file surely this is
 redundant ?
 It looks like an old way of specifying the MX for each subdomain.

 Cheers
 Ian Manners
 http://www.os2site.com/

 ___
 bind-users mailing list
 bind-users@lists.isc.org
 https://lists.isc.org/mailman/listinfo/bind-users

-- 
Best regards

Sten Carlsen

No improvements come from shouting:

   MALE BOVINE MANURE!!! 

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: out of place mx records.

2010-10-27 Thread Andrey G. Sergeev (AKA Andris)
Hello Sten,


Thu, 28 Oct 2010 02:48:36 +0200 Sten Carlsen wrote:

 To me it looks redundant, named-compilezone -o - zone file should
 show you how bind interprets these.
 My guess is that they will be listed only once in the output.
 
 I don't see how they could belong to each subdomain, to do that there
 should be a@... to set a new origin?

; Set current origin to mail02
mail02  IN  A   192.168.xx.xx
; Two lines below are still under the same origin mail02
IN  MX  10  mcvpemr01   
IN  MX  10  mcvpemr02
; Time to set a new origin
nelson  IN  A   202.xx.xx.1
[...]


 On 28/10/10 2:14, Ian Manners wrote:
 Hi Gregory,

 mail02  IN  A   192.168.xx.xx
 IN  MX  10  mcvpemr01   
 IN  MX  10  mcvpemr02
 nelson  IN  A   202.xx.xx.1
 IN  MX  10  mcvpemr01
 IN  MX  10  mcvpemr02
 My question is why would INMX10mcvpemr01 and IN
MX 10mcvpemr02 be repeated trough the zone file surely
 this is redundant ?
 It looks like an old way of specifying the MX for each subdomain.


-- 

Yours sincerely,

Andrey G. Sergeev (AKA Andris) http://www.andris.name/
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: out of place mx records.

2010-10-27 Thread Mathieu Imfeld
They prevent people who start a potentially rogue mailserver to receive mails. 
I.e. You centralize mails and make sure only your authorized mailserver 
receives them when you dont have full control over these boxes.

-mat

On Oct 28, 2010, at 8:48 AM, Sten Carlsen st...@s-carlsen.dk wrote:

 To me it looks redundant, named-compilezone -o - zone file should show you 
 how bind interprets these.
 My guess is that they will be listed only once in the output.
 
 I don't see how they could belong to each subdomain, to do that there should 
 be a@... to set a new origin?
 
 
 
 On 28/10/10 2:14, Ian Manners wrote:
 
 Hi Gregory,
 
 mail02  IN  A   192.168.xx.xx
 IN  MX  10  mcvpemr01   
 IN  MX  10  mcvpemr02
 nelson  IN  A   202.xx.xx.1
 IN  MX  10  mcvpemr01
 IN  MX  10  mcvpemr02
 
 My question is why would INMX10mcvpemr01 and INMX
 10mcvpemr02 be repeated trough the zone file surely this is
 redundant ?
 It looks like an old way of specifying the MX for each subdomain.
 
 Cheers
 Ian Manners
 http://www.os2site.com/
 
 ___
 bind-users mailing list
 bind-users@lists.isc.org
 https://lists.isc.org/mailman/listinfo/bind-users
 
 -- 
 Best regards
 
 Sten Carlsen
 
 No improvements come from shouting:
 
MALE BOVINE MANURE!!! 
 ___
 bind-users mailing list
 bind-users@lists.isc.org
 https://lists.isc.org/mailman/listinfo/bind-users
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: non-improving referral

2010-10-27 Thread Barry Margolin
In article mailman.567.1288203288.555.bind-us...@lists.isc.org,
 Leo Baltus leo.bal...@omroep.nl wrote:

 Hi,
 
 We are in the process of migrating from bind-9.4-ESV-R2 to bind-9.7.2-P2.
 
 We have our authoritative servers migrated to bind-9.7.2-P2 and it all
 seems to work fine.
 
 While testing our caching resolvers with bind-9.7.2-P2 however, we
 noticed some errors in our logfiles we have never seen before.
 
 Oct 26 09:52:03 myhost named[21085]: DNS format error from 1.5.3.4#53 
 resolving 1.2.4.2.x.y.z.example.com/TXT for client 1.5.3.203#15637: 
 non-improving referral
 Oct 26 09:52:03 myhost named[21085]: DNS format error from 1.5.2.2#53 
 resolving 1.2.4.2.x.y.z.example.com/TXT for client 1.5.3.203#15637: 
 non-improving referral
 
 Obviously I have obscured some data here :) As you may guess this is a
 query for a TXT record from a blocklist-daemon.
 
 The nameservers on 1.5.3.4 and 1.5.2.2 are bind-9.7.2-P2.
 
 The queried domains are hosted by us and the hopefully relevant part of
 the zone looks like this:
 
 x.y.z.example.com.   IN NS   bl1a.example.com.
 x.y.z.example.com.   IN NS   bl1b.example.com.
 
 A dump of the cache shows NS and A records are in the cache for bl1[ab]
 however, on each non-cached query from the client both errorlines
 are printed in the log suggesting the resolver is not using the cached
 NS records.

It *is* using these NS records.  It's complaining that there's a problem 
with the responses these machines are sending.

 The client receives a valid answer, so my only real problem seems to be
 the amount of spam I get in our logfiles.
 
 The blocklist is served by rbldnsd, manually query-ing gives my a
 valid response.
 
 Could anybody tell me what problem bind is complaining about?
 
 Please CC me as I am not on this list.

I think what it's complaining about is that the response to the query is 
a referral to the same or a higher level in the DNS hierarchy.  It 
should be either an ordinary response, a referral to nameservers for a 
subzone, or an NXDOMAIN.

Can you post the result of dig 1.2.4.2.x.y.z.example.com 
@bl1a.example.com +norec?

-- 
Barry Margolin, bar...@alum.mit.edu
Arlington, MA
*** PLEASE don't copy me on replies, I'll read them in the group ***
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: out of place mx records.

2010-10-27 Thread Barry Margolin
In article mailman.575.1288226936.555.bind-us...@lists.isc.org,
 Sten Carlsen st...@s-carlsen.dk wrote:

 To me it looks redundant, named-compilezone -o - zone file should show
 you how bind interprets these.
 My guess is that they will be listed only once in the output.

I suggest you try it, and you'll see that you guessed wrong.

 
 I don't see how they could belong to each subdomain, to do that there
 should be a@... to set a new origin?

@ doesn't set a new origin, $ORIGIN does.  @ is simply a special token 
that gets replaced with the current origin.

When you begin a record with blank space, it means that it uses the 
owner name from the previous line.  So:

mail02 IN A 192.168.x.x
  IN MX 10 mcvpemr01
  IN MX 10 mcvpemr02

is equivalent to:

mail02 IN A 192.168.x.x
mail02 IN MX 10 mcvpemr01
mail02 IN MX 10 mcvpemr02

 
 
 
 On 28/10/10 2:14, Ian Manners wrote:
  Hi Gregory,
 
  mail02  IN  A   192.168.xx.xx
 IN  MX  10  mcvpemr01   
 IN  MX  10  mcvpemr02
  nelson  IN A   202.xx.xx.1
 IN  MX  10  mcvpemr01
 IN  MX  10  mcvpemr02
  My question is why would INMX10mcvpemr01 and INMX
  10mcvpemr02 be repeated trough the zone file surely this is
  redundant ?
  It looks like an old way of specifying the MX for each subdomain.
 
  Cheers
  Ian Manners
  http://www.os2site.com/
 
  ___
  bind-users mailing list
  bind-users@lists.isc.org
  https://lists.isc.org/mailman/listinfo/bind-users

-- 
Barry Margolin, bar...@alum.mit.edu
Arlington, MA
*** PLEASE don't copy me on replies, I'll read them in the group ***
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: non-improving referral

2010-10-27 Thread Mark Andrews

In message 20101026161348.gj2...@omroep.nl, Leo Baltus writes:
 Hi,
 
 We are in the process of migrating from bind-9.4-ESV-R2 to bind-9.7.2-P2.
 
 We have our authoritative servers migrated to bind-9.7.2-P2 and it all
 seems to work fine.
 
 While testing our caching resolvers with bind-9.7.2-P2 however, we
 noticed some errors in our logfiles we have never seen before.
 
 Oct 26 09:52:03 myhost named[21085]: DNS format error from 1.5.3.4#53 resolvi
 ng 1.2.4.2.x.y.z.example.com/TXT for client 1.5.3.203#15637: non-improving re
 ferral
 Oct 26 09:52:03 myhost named[21085]: DNS format error from 1.5.2.2#53 resolvi
 ng 1.2.4.2.x.y.z.example.com/TXT for client 1.5.3.203#15637: non-improving re
 ferral
 
 Obviously I have obscured some data here :) As you may guess this is a
 query for a TXT record from a blocklist-daemon.
 
 The nameservers on 1.5.3.4 and 1.5.2.2 are bind-9.7.2-P2.
 
 The queried domains are hosted by us and the hopefully relevant part of
 the zone looks like this:
 
 x.y.z.example.com.   IN NS   bl1a.example.com.
 x.y.z.example.com.   IN NS   bl1b.example.com.
 
 A dump of the cache shows NS and A records are in the cache for bl1[ab]
 however, on each non-cached query from the client both errorlines
 are printed in the log suggesting the resolver is not using the cached
 NS records.
 
 The client receives a valid answer, so my only real problem seems to be
 the amount of spam I get in our logfiles.
 
 The blocklist is served by rbldnsd, manually query-ing gives my a
 valid response.
 
 Could anybody tell me what problem bind is complaining about?
 
 Please CC me as I am not on this list.

Run dig +trace +all 1.2.4.2.x.y.z.example.com txt and look at the
results.  Somewhere in that chain there will be a broken delegation.
This may manifest itself as a authority section in the reply that
doesn't match the delegation.
 
 -- 
 Leo Baltus, internetbeheerder /\
 NPO ICT Internet Services/NPO/\
 Sumatralaan 45, 1217 GP Hilversum, Filmcentrum, west \  /\/
 beh...@omroep.nl, 035-6773555 \/
 ___
 bind-users mailing list
 bind-users@lists.isc.org
 https://lists.isc.org/mailman/listinfo/bind-users
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: out of place mx records.

2010-10-27 Thread Andrey G. Sergeev (AKA Andris)
Hello Gregory,


Thu, 28 Oct 2010 15:54:32 +1300 Gregory Machin wrote:

 Hi Andrey.
 Thanks for you input.
 
 OK .. but most of those hosts should not be accepting email
 connections, buy my understanding. Or is it implied that email
 destined for that host would be handled by  the email servers
 mcvpemr01 and mcvpemr02 on its behalf ?

Yes. This is a nature of MX RR.

If you don't want to handle mail traffic for some of your hosts (labels
in terms of DNS) at all, then just route your mail as shown below:

; --- Method 1 ---
; This IP should be unreachable or the mail daemon at this host
; should refuse any connections attempts
not-for-mail IN A 192.168.209.16

listserv IN A 202.xx.xx.2
   IN MX 10 not-for-mail

; --- Method 2 ---
listserv IN A 202.xx.xx.2
   IN MX 10 not-for-mail.invalid-domain.tld.

Another but more complex way is to handle such traffic at your mail
relay which is silently delivers messages destined for some domains to
/dev/null.


 Regards
 Gregory Machin
 
 
 On Thu, Oct 28, 2010 at 1:09 PM, Andrey G. Sergeev (AKA Andris)
 and...@aernet.ru wrote:
 Hello Gregory,


 Thu, 28 Oct 2010 13:04:58 +1300 Gregory Machin wrote:

 Hi.
 I have taken over some dns servers, and the process of doing
 upgrade, half way through the process..

 I have a question about the zone files , as there is some
 configuration here that I have not seen before and seems out of
 place.

 here is an excerpt of the zone file

 $TTL 14400

 @             IN      SOA     example.com. postmaster.example.com.
 (
                               2010042142      ; Serial
                               3600            ; Refresh (1 hours)
                               1200            ; Retry   (20
minutes)
                               1728000         ; Expire  (20 days)
                               14400           ; Minimum (4 hours)
                                 )
               IN      NS      ns1.example.com.
               IN      NS      ns2.example.com.
 ;             IN      NS      ns1.catalyst.net.nz.

               IN      MX      10 mail01.example.com.
               IN      MX      10 mail02.example.com.
 ;             IN      MX      20 mail03.example.com.

               IN      A       202.xx.xx.2

 ns1           IN      A       192.168.xx.xx
 ns2           IN      A       192.168.xx.xx

 listserv        IN    A       202.xx.xx.2
               IN      MX      10      mcvpemr01
               IN      MX      10      mcvpemr02
 cache           IN    A       202.xx.xx.1
               IN      MX      10      mcvpemr01
               IN      MX      10      mcvpemr02
 captaincomet  IN      A       202.xx.xx.1
               IN      MX      10      mcvpemr01
               IN      MX      10      mcvpemr02
 louie         IN      A       202.xx.xx.1
               IN      MX      10      mcvpemr01
               IN      MX      10      mcvpemr02
 mail01          IN      A       192.168.xx.xx
               IN      MX      10      mcvpemr01
               IN      MX      10      mcvpemr02
 mail02          IN      A       192.168.xx.xx
               IN      MX      10      mcvpemr01
               IN      MX      10      mcvpemr02
 nelson          IN    A       202.xx.xx.1
               IN      MX      10      mcvpemr01
               IN      MX      10      mcvpemr02


 My question is why would IN    MX    10    mcvpemr01 and IN  
 MX  10    mcvpemr02 be repeated trough the zone file surely this
is
 redundant ?

 These MX record sets aren't redundant as they belong to the
 different labels named listserv, cache etc.


-- 

Yours sincerely,

Andrey G. Sergeev (AKA Andris) http://www.andris.name/
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users