Re: Need help on DNS reporter

2011-03-20 Thread terry
How will rndc status take something good for you?



2011/3/20 babu dheen babudh...@yahoo.co.in

 Hi,

 Can anyone let me know is there any open source software available to
 generate report for DNS service based on DNS BIND query logs.

 We have BIND DNS running RHEL 5.0. Would like to generate report based on
 its logs so that we can identify list of clients quering external domains
 and its query count.

 Many clients in our company infected with malware which thus send
 unnecessary query to remote external domain (non available domain). So if we
 have any software which can generate the report from DNS BIND logs, will be
 very helpful.


 Regards
 Babu


 ___
 bind-users mailing list
 bind-users@lists.isc.org
 https://lists.isc.org/mailman/listinfo/bind-users




-- 
www.DNSbed.com
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Master ns on internal lan

2011-03-20 Thread x_bind-users_x
Hi,

I'm trying to figure out how to configure my nameservers so that the
master can reside on an internal LAN *only* address.

I already have it configured such that the master is (almost) hidden
while residing on a public IP.  So I should present that first:

ns0.mydomain.net - Gateway/firewall, public IP (ADSL) + internal LAN.

ns1.mydomain.net - Public nameserver.

ns2.mydomain.net - Public nameserver.

Host ns0 serves DNS for the internal LAN, as well as acting master for
ns1/ns2.

I have glue records at the registry for ns1  ns2.  The zone file
configured on ns0 looks something like this:

@ IN SOA ns0 hostmaster (
...
)
@   IN NS   ns1
@   IN NS   ns2
ns0 IN Aaaa.aaa.aaa.aaa ;; ns0 (hidden)
ns1 IN Abbb.bbb.bbb.bbb ;; ns1
ns2 IN Accc.ccc.ccc.ccc ;; ns2
...

On the master (ns0) named.conf is as follows:

options {
listen-on   { any; };
allow-recursion { 127.0.0.1; lan; };
allow-query { 127.0.0.1; lan; };
allow-transfer  { 127.0.0.1; ns1; ns2; };
...
};
zone mydomain.net {
type master;
file /etc/bind/db.mydomain.net;
allow-query { any; };
};

On the slaves (ns1/ns2) named.conf is as follows:

zone mydomain.net {
type slave;
file /var/cache/bind/db.mydomain.net;
masters { aaa.aaa.aaa.aaa; };
allow-query { any; };
};

As you can see, ns0 isn't quite totally hidden - it shows up in the
SOA record.  I tried using ns1 in the SOA but then ns1/ns2 failed to
update correctly when the zone file was updated on ns0.  I never
figured that out and don't see it as a big deal from a privacy POV but
I accept that probably it's not optimally configured.

Now on to my question. ;-)

Ideally I would like to manage the zones on a main internal server,
which would serve the internal LAN (including an internal-only zone)
as well as somehow keeping the public slaves up to date.  Part reason
for this is a policy to shift all internal services onto the LAN and
away from the DMZ.

This is the plan:

main.mydomain.net - Internal LAN only.

ns0.mydomain.net - Gateway/firewall, public IP (ADSL) + internal LAN.

ns1.mydomain.net - Public nameserver.

ns2.mydomain.net - Public nameserver.

main acts as master for ns0 slave. (and serves dns for the lan)

ns0 acts as master for ns1/ns2 slaves. (and serves dns for the dmz)

This is the problem, I cannot see how to configure the SOA and conf
files such that zone updates will be notified main - ns0 - ns1/ns2.

Any advice or pointers on how to acheive that would be greatly
appreciated.  Thanks in advance. - Charlie.

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Master ns on internal lan

2011-03-20 Thread Torinthiel
On 03/20/11 11:13, x_bind-user...@nospam.pz.podzone.net wrote:
 Hi,
 
 I'm trying to figure out how to configure my nameservers so that the
 master can reside on an internal LAN *only* address.
 
 I already have it configured such that the master is (almost) hidden
 while residing on a public IP.  So I should present that first:
 
[cut]
 
 As you can see, ns0 isn't quite totally hidden - it shows up in the
 SOA record.  I tried using ns1 in the SOA but then ns1/ns2 failed to
 update correctly when the zone file was updated on ns0.  I never
 figured that out and don't see it as a big deal from a privacy POV but
 I accept that probably it's not optimally configured.

And solving your main problem will probably solve this as well.


 Now on to my question. ;-)
 
 Ideally I would like to manage the zones on a main internal server,
 which would serve the internal LAN (including an internal-only zone)
 as well as somehow keeping the public slaves up to date.  Part reason
 for this is a policy to shift all internal services onto the LAN and
 away from the DMZ.
 
 This is the plan:
 
 main.mydomain.net - Internal LAN only.
 
 ns0.mydomain.net - Gateway/firewall, public IP (ADSL) + internal LAN.
 
 ns1.mydomain.net - Public nameserver.
 
 ns2.mydomain.net - Public nameserver.
 
 main acts as master for ns0 slave. (and serves dns for the lan)
 
 ns0 acts as master for ns1/ns2 slaves. (and serves dns for the dmz)
 
 This is the problem, I cannot see how to configure the SOA and conf
 files such that zone updates will be notified main - ns0 - ns1/ns2.

try putting this in config:
on main:
zone mydomain.net {
type master;
...
allow-transfer { ns0.mydomain.net; };
also-notify { ns0.mydomain.net; };
}

on ns0:
zone mydomain.net {
type slave;
...
allow-notify { main.mydomain.net; };
allow-transfer { ns1.mydomain.net; ns2.mydomain.net; };
also-notify { ns1.mydomain.net; ns2.mydomain.net; }
}


on ns1/2:
zone mydomain.net {
type slave;
...
allow-notify { ns0.mydomain.net; };
}

The allow-notify makes slave servers to accept notify messages from
someone that's not listed as master in SOA. Putting this on ns1/2 will
probably solve your first issue, with ns0 not completely hidden.

also-notify makes bind send notify messages to those servers. Probably
also-notify on ns0 is not needed, as ns1/2 are listed in zone as NS. But
on main it will be neeed, as ns0 is not listed as NS for your domain.

If you want to put ns1 at SOA as master, then you'd also need notify no
at ns1 (so it won't send notifies at all), and notify-to-soa yes at ns0
(so it will send notify to ns1).

Oh, and I really hope ns0.mydomain.net has static IP address even though
it has ADSL. If no, you can either use ip/length or (even better) use
TSIG keys as authentication.

Regards,
 Torinthiel



signature.asc
Description: OpenPGP digital signature
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: Need help on DNS reporter

2011-03-20 Thread Warren Kumari
Enable query logging, then:

cat  queries.log | grep 'query: example.com'  | awk '{print $6}' | sed 
's/#.*//' | sort -n | uniq -c | sort -rn | head -100 | more


or something similar? 

W

On Mar 20, 2011, at 10:09 AM, babu dheen wrote:

 Hi,
 
 I am getting below status on this command.. Only internal DNS servers are 
 allowed to query our gateway DNS server as client.
 
 number of zones: 12
 debug level: 0
 xfers running: 0
 xfers deferred: 0
 soa queries in progress: 0
 query logging is ON
 recursive clients: 1/1000
 tcp clients: 0/100
 server is up and running
 
 
 --- On Sun, 20/3/11, terry te...@list.dnsbed.com wrote:
 
 From: terry te...@list.dnsbed.com
 Subject: Re: Need help on DNS reporter
 To: babu dheen babudh...@yahoo.co.in
 Cc: bind-users@lists.isc.org
 Date: Sunday, 20 March, 2011, 12:42 PM
 
 How will rndc status take something good for you?
 
 
 
 2011/3/20 babu dheen babudh...@yahoo.co.in
 Hi,
  
 Can anyone let me know is there any open source software available to 
 generate report for DNS service based on DNS BIND query logs.
  
 We have BIND DNS running RHEL 5.0. Would like to generate report based on its 
 logs so that we can identify list of clients quering external domains and its 
 query count.
  
 Many clients in our company infected with malware which thus send unnecessary 
 query to remote external domain (non available domain). So if we have any 
 software which can generate the report from DNS BIND logs, will be very 
 helpful.
  
  
 Regards
 Babu
 
 
 ___
 bind-users mailing list
 bind-users@lists.isc.org
 https://lists.isc.org/mailman/listinfo/bind-users
 
 
 
 -- 
 www.DNSbed.com
 
 ___
 bind-users mailing list
 bind-users@lists.isc.org
 https://lists.isc.org/mailman/listinfo/bind-users

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


problem validate key of isc dlv

2011-03-20 Thread fakessh @
hello bind network and duru. 

I can not validate the key dlv via the website of the isc. 
I do not understand why the warning is the isc 
you have an explanation
SUCCESS 94.23.59.30 answered DNSKEY query with rcode NOERROR
4.502:SUCCESS 87.98.164.164 answered DNSKEY query with rcode NOERROR
4.502:SUCCESS 87.98.186.232 answered DNSKEY query with rcode NOERROR
4.502:INFO Total answers: 3
4.503:DEBUG COMPARE: Comparing results from 94.23.59.30 to 87.98.164.164
4.504:DEBUG COMPARE: Comparing results from 94.23.59.30 to 87.98.186.232
4.504:SUCCESS All DNSKEY responses are identical.
4.515:DEBUG VERIFY-DNSKEY: Checking tag=10231 flags=257 alg=RSASHA1
AwEAAbwO...8fkjXphfS8=
4.515:DEBUG VERIFY-DNSKEY: Ignoring key.
4.515:DEBUG VERIFY-DNSKEY: Checking tag=30111 flags=256 alg=RSASHA1
AwEAAb1q...jG+UQeAtYE=
4.515:DEBUG VERIFY-DNSKEY: Ignoring key.
4.515:INFO VERIFY-DNSKEY: 2 DNSKEYs found.
4.515:INFO VERIFY-DNSKEY: 0 keys found after filtering.
4.515:DEBUG VERIFY-DNSKEY: Using keys:
4.516:DEBUG VERIFY-DNSKEY: To verify rrset type DNSKEY
4.516:FAILURE VERIFY-DNSKEY: No keys found after filtering.
4.516:FAILURE DNSKEY signature did not validate.
4.516:FINAL_FAILURE FAILURE

-- 
gpg --keyserver pgp.mit.edu --recv-key 092164A7
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x092164A7


signature.asc
Description: Ceci est une partie de message	numériquement signée
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: problem validate key of isc dlv

2011-03-20 Thread Mark Andrews

In message 1300650238.6651.15.camel@localhost.localdomain, fakessh @ writes
:
 hello bind network and duru. 
 
 I can not validate the key dlv via the website of the isc. 
 I do not understand why the warning is the isc 
 you have an explanation
 SUCCESS 94.23.59.30 answered DNSKEY query with rcode NOERROR
 4.502:SUCCESS 87.98.164.164 answered DNSKEY query with rcode NOERROR
 4.502:SUCCESS 87.98.186.232 answered DNSKEY query with rcode NOERROR
 4.502:INFO Total answers: 3
 4.503:DEBUG COMPARE: Comparing results from 94.23.59.30 to 87.98.164.164
 4.504:DEBUG COMPARE: Comparing results from 94.23.59.30 to 87.98.186.232
 4.504:SUCCESS All DNSKEY responses are identical.
 4.515:DEBUG VERIFY-DNSKEY: Checking tag=10231 flags=257 alg=RSASHA1
 AwEAAbwO...8fkjXphfS8=
 4.515:DEBUG VERIFY-DNSKEY: Ignoring key.
 4.515:DEBUG VERIFY-DNSKEY: Checking tag=30111 flags=256 alg=RSASHA1
 AwEAAb1q...jG+UQeAtYE=
 4.515:DEBUG VERIFY-DNSKEY: Ignoring key.
 4.515:INFO VERIFY-DNSKEY: 2 DNSKEYs found.
 4.515:INFO VERIFY-DNSKEY: 0 keys found after filtering.
 4.515:DEBUG VERIFY-DNSKEY: Using keys:
 4.516:DEBUG VERIFY-DNSKEY: To verify rrset type DNSKEY
 4.516:FAILURE VERIFY-DNSKEY: No keys found after filtering.
 4.516:FAILURE DNSKEY signature did not validate.
 4.516:FINAL_FAILURE FAILURE

Based on the key tags and the truncated keys I think these keys are
for fakessh.eu and if so there isn't a DLV record or a DS published
for fakessh.eu.  The only other thing the validator can check against
is any installed trust-anchor.

Mark

;  DiG 9.6.0-APPLE-P2  fakessh.eu.dlv.isc.org dlv
;; global options: +cmd
;; Got answer:
;; -HEADER- opcode: QUERY, status: NXDOMAIN, id: 48161
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;  DiG 9.6.0-APPLE-P2  fakessh.eu ds
;; global options: +cmd
;; Got answer:
;; -HEADER- opcode: QUERY, status: NOERROR, id: 63623
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0



 -- 
 gpg --keyserver pgp.mit.edu --recv-key 092164A7
 http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x092164A7
 
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: problem validate key of isc dlv

2011-03-20 Thread fakessh @
and what do I do. 
and what is this other publication of another DS


Le lundi 21 mars 2011 à 08:25 +1100, Mark Andrews a écrit :
 In message 1300650238.6651.15.camel@localhost.localdomain, fakessh @ 
 writes
 :
  hello bind network and duru. 
  
  I can not validate the key dlv via the website of the isc. 
  I do not understand why the warning is the isc 
  you have an explanation
  SUCCESS 94.23.59.30 answered DNSKEY query with rcode NOERROR
  4.502:SUCCESS 87.98.164.164 answered DNSKEY query with rcode NOERROR
  4.502:SUCCESS 87.98.186.232 answered DNSKEY query with rcode NOERROR
  4.502:INFO Total answers: 3
  4.503:DEBUG COMPARE: Comparing results from 94.23.59.30 to 87.98.164.164
  4.504:DEBUG COMPARE: Comparing results from 94.23.59.30 to 87.98.186.232
  4.504:SUCCESS All DNSKEY responses are identical.
  4.515:DEBUG VERIFY-DNSKEY: Checking tag=10231 flags=257 alg=RSASHA1
  AwEAAbwO...8fkjXphfS8=
  4.515:DEBUG VERIFY-DNSKEY: Ignoring key.
  4.515:DEBUG VERIFY-DNSKEY: Checking tag=30111 flags=256 alg=RSASHA1
  AwEAAb1q...jG+UQeAtYE=
  4.515:DEBUG VERIFY-DNSKEY: Ignoring key.
  4.515:INFO VERIFY-DNSKEY: 2 DNSKEYs found.
  4.515:INFO VERIFY-DNSKEY: 0 keys found after filtering.
  4.515:DEBUG VERIFY-DNSKEY: Using keys:
  4.516:DEBUG VERIFY-DNSKEY: To verify rrset type DNSKEY
  4.516:FAILURE VERIFY-DNSKEY: No keys found after filtering.
  4.516:FAILURE DNSKEY signature did not validate.
  4.516:FINAL_FAILURE FAILURE
 
 Based on the key tags and the truncated keys I think these keys are
 for fakessh.eu and if so there isn't a DLV record or a DS published
 for fakessh.eu.  The only other thing the validator can check against
 is any installed trust-anchor.
 
 Mark
 
 ;  DiG 9.6.0-APPLE-P2  fakessh.eu.dlv.isc.org dlv
 ;; global options: +cmd
 ;; Got answer:
 ;; -HEADER- opcode: QUERY, status: NXDOMAIN, id: 48161
 ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
 
 ;  DiG 9.6.0-APPLE-P2  fakessh.eu ds
 ;; global options: +cmd
 ;; Got answer:
 ;; -HEADER- opcode: QUERY, status: NOERROR, id: 63623
 ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
 
 
 
  -- 
  gpg --keyserver pgp.mit.edu --recv-key 092164A7
  http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x092164A7
  
-- 
gpg --keyserver pgp.mit.edu --recv-key 092164A7
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x092164A7


signature.asc
Description: Ceci est une partie de message	numériquement signée
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: problem validate key of isc dlv

2011-03-20 Thread Torinthiel
On 03/20/11 22:33, fakessh @ wrote:
 and what do I do. 

You have to add your key to ISC's DLV registry. Go to dlv.isc.org,
create account, login, add a zone, add keys for it and publish a record
in your zone validating that you're the owner of the zone. You will be
told what to do after you create zone.

 and what is this other publication of another DS

I have no idea what do you mean by this sentence.
Torinthiel

 
 
 Le lundi 21 mars 2011 à 08:25 +1100, Mark Andrews a écrit :
 In message 1300650238.6651.15.camel@localhost.localdomain, fakessh @ 
 writes
 :
 hello bind network and duru. 

 I can not validate the key dlv via the website of the isc. 
 I do not understand why the warning is the isc 
 you have an explanation
 SUCCESS 94.23.59.30 answered DNSKEY query with rcode NOERROR
 4.502:SUCCESS 87.98.164.164 answered DNSKEY query with rcode NOERROR
 4.502:SUCCESS 87.98.186.232 answered DNSKEY query with rcode NOERROR
 4.502:INFO Total answers: 3
 4.503:DEBUG COMPARE: Comparing results from 94.23.59.30 to 87.98.164.164
 4.504:DEBUG COMPARE: Comparing results from 94.23.59.30 to 87.98.186.232
 4.504:SUCCESS All DNSKEY responses are identical.
 4.515:DEBUG VERIFY-DNSKEY: Checking tag=10231 flags=257 alg=RSASHA1
 AwEAAbwO...8fkjXphfS8=
 4.515:DEBUG VERIFY-DNSKEY: Ignoring key.
 4.515:DEBUG VERIFY-DNSKEY: Checking tag=30111 flags=256 alg=RSASHA1
 AwEAAb1q...jG+UQeAtYE=
 4.515:DEBUG VERIFY-DNSKEY: Ignoring key.
 4.515:INFO VERIFY-DNSKEY: 2 DNSKEYs found.
 4.515:INFO VERIFY-DNSKEY: 0 keys found after filtering.
 4.515:DEBUG VERIFY-DNSKEY: Using keys:
 4.516:DEBUG VERIFY-DNSKEY: To verify rrset type DNSKEY
 4.516:FAILURE VERIFY-DNSKEY: No keys found after filtering.
 4.516:FAILURE DNSKEY signature did not validate.
 4.516:FINAL_FAILURE FAILURE

 Based on the key tags and the truncated keys I think these keys are
 for fakessh.eu and if so there isn't a DLV record or a DS published
 for fakessh.eu.  The only other thing the validator can check against
 is any installed trust-anchor.

 Mark

 ;  DiG 9.6.0-APPLE-P2  fakessh.eu.dlv.isc.org dlv
 ;; global options: +cmd
 ;; Got answer:
 ;; -HEADER- opcode: QUERY, status: NXDOMAIN, id: 48161
 ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

 ;  DiG 9.6.0-APPLE-P2  fakessh.eu ds
 ;; global options: +cmd
 ;; Got answer:
 ;; -HEADER- opcode: QUERY, status: NOERROR, id: 63623
 ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0



 -- 
 gpg --keyserver pgp.mit.edu --recv-key 092164A7
 http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x092164A7



 ___
 bind-users mailing list
 bind-users@lists.isc.org
 https://lists.isc.org/mailman/listinfo/bind-users




signature.asc
Description: OpenPGP digital signature
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: problem validate key of isc dlv

2011-03-20 Thread fakessh @

Le dimanche 20 mars 2011 à 22:47 +0100, Torinthiel a écrit :
 On 03/20/11 22:33, fakessh @ wrote:
  and what do I do. 
 
 You have to add your key to ISC's DLV registry. Go to dlv.isc.org,
 create account, login, add a zone, add keys for it and publish a record
 in your zone validating that you're the owner of the zone. You will be
 told what to do after you create zone.
 

that's what I did
I made ​​a post on my blog explaining how I do
goo.gl/EAbCB

  and what is this other publication of another DS
 
 I have no idea what do you mean by this sentence.
 Torinthiel
 
  
  
  Le lundi 21 mars 2011 à 08:25 +1100, Mark Andrews a écrit :
  In message 1300650238.6651.15.camel@localhost.localdomain, fakessh @ 
  writes
  :
  hello bind network and duru. 
 
  I can not validate the key dlv via the website of the isc. 
  I do not understand why the warning is the isc 
  you have an explanation
  SUCCESS 94.23.59.30 answered DNSKEY query with rcode NOERROR
  4.502:SUCCESS 87.98.164.164 answered DNSKEY query with rcode NOERROR
  4.502:SUCCESS 87.98.186.232 answered DNSKEY query with rcode NOERROR
  4.502:INFO Total answers: 3
  4.503:DEBUG COMPARE: Comparing results from 94.23.59.30 to 87.98.164.164
  4.504:DEBUG COMPARE: Comparing results from 94.23.59.30 to 87.98.186.232
  4.504:SUCCESS All DNSKEY responses are identical.
  4.515:DEBUG VERIFY-DNSKEY: Checking tag=10231 flags=257 alg=RSASHA1
  AwEAAbwO...8fkjXphfS8=
  4.515:DEBUG VERIFY-DNSKEY: Ignoring key.
  4.515:DEBUG VERIFY-DNSKEY: Checking tag=30111 flags=256 alg=RSASHA1
  AwEAAb1q...jG+UQeAtYE=
  4.515:DEBUG VERIFY-DNSKEY: Ignoring key.
  4.515:INFO VERIFY-DNSKEY: 2 DNSKEYs found.
  4.515:INFO VERIFY-DNSKEY: 0 keys found after filtering.
  4.515:DEBUG VERIFY-DNSKEY: Using keys:
  4.516:DEBUG VERIFY-DNSKEY: To verify rrset type DNSKEY
  4.516:FAILURE VERIFY-DNSKEY: No keys found after filtering.
  4.516:FAILURE DNSKEY signature did not validate.
  4.516:FINAL_FAILURE FAILURE
 
  Based on the key tags and the truncated keys I think these keys are
  for fakessh.eu and if so there isn't a DLV record or a DS published
  for fakessh.eu.  The only other thing the validator can check against
  is any installed trust-anchor.
 
  Mark
 
  ;  DiG 9.6.0-APPLE-P2  fakessh.eu.dlv.isc.org dlv
  ;; global options: +cmd
  ;; Got answer:
  ;; -HEADER- opcode: QUERY, status: NXDOMAIN, id: 48161
  ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
 
  ;  DiG 9.6.0-APPLE-P2  fakessh.eu ds
  ;; global options: +cmd
  ;; Got answer:
  ;; -HEADER- opcode: QUERY, status: NOERROR, id: 63623
  ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
 
 
 
  -- 
  gpg --keyserver pgp.mit.edu --recv-key 092164A7
  http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x092164A7
 
 
 
  ___
  bind-users mailing list
  bind-users@lists.isc.org
  https://lists.isc.org/mailman/listinfo/bind-users
 
 
 ___
 bind-users mailing list
 bind-users@lists.isc.org
 https://lists.isc.org/mailman/listinfo/bind-users
-- 
gpg --keyserver pgp.mit.edu --recv-key 092164A7
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x092164A7


signature.asc
Description: Ceci est une partie de message	numériquement signée
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: problem validate key of isc dlv

2011-03-20 Thread Mark Andrews

In message 1300660825.6651.21.camel@localhost.localdomain, fakessh @ writes
:
 
 Le dimanche 20 mars 2011 =C3=A0 22:47 +0100, Torinthiel a =C3=A9crit :
  On 03/20/11 22:33, fakessh @ wrote:
   and what do I do.=20
 =20
  You have to add your key to ISC's DLV registry. Go to dlv.isc.org,
  create account, login, add a zone, add keys for it and publish a record
  in your zone validating that you're the owner of the zone. You will be
  told what to do after you create zone.
 =20
 
 that's what I did
 I made =E2=80=8B=E2=80=8Ba post on my blog explaining how I do
 goo.gl/EAbCB

Have you changed your DNSKEY's since you did that?  If you have did
you update the zone in your account on dlv.isc.org?  What does
dlv.isc.org have to say about fakessh.eu?

   and what is this other publication of another DS

In the end you should have a DS RRset published in the .EU zone for
fakessh.EU.  .EU claim to implement DNSSEC and that should mean
that you can get DS records addeded for your zone.

  I have no idea what do you mean by this sentence.
  Torinthiel
 =20
  =20
  =20
   Le lundi 21 mars 2011 =C3=A0 08:25 +1100, Mark Andrews a =C3=A9crit :
   In message 1300650238.6651.15.camel@localhost.localdomain, fakessh =
 @ writes
   :
   hello bind network and duru.=20
  
   I can not validate the key dlv via the website of the isc.=20
   I do not understand why the warning is the isc=20
   you have an explanation
   SUCCESS 94.23.59.30 answered DNSKEY query with rcode NOERROR
   4.502:SUCCESS 87.98.164.164 answered DNSKEY query with rcode NOERROR
   4.502:SUCCESS 87.98.186.232 answered DNSKEY query with rcode NOERROR
   4.502:INFO Total answers: 3
   4.503:DEBUG COMPARE: Comparing results from 94.23.59.30 to 87.98.164.=
 164
   4.504:DEBUG COMPARE: Comparing results from 94.23.59.30 to 87.98.186.=
 232
   4.504:SUCCESS All DNSKEY responses are identical.
   4.515:DEBUG VERIFY-DNSKEY: Checking tag=3D10231 flags=3D257 alg=3DRSA=
 SHA1
   AwEAAbwO...8fkjXphfS8=3D
   4.515:DEBUG VERIFY-DNSKEY: Ignoring key.
   4.515:DEBUG VERIFY-DNSKEY: Checking tag=3D30111 flags=3D256 alg=3DRSA=
 SHA1
   AwEAAb1q...jG+UQeAtYE=3D
   4.515:DEBUG VERIFY-DNSKEY: Ignoring key.
   4.515:INFO VERIFY-DNSKEY: 2 DNSKEYs found.
   4.515:INFO VERIFY-DNSKEY: 0 keys found after filtering.
   4.515:DEBUG VERIFY-DNSKEY: Using keys:
   4.516:DEBUG VERIFY-DNSKEY: To verify rrset type DNSKEY
   4.516:FAILURE VERIFY-DNSKEY: No keys found after filtering.
   4.516:FAILURE DNSKEY signature did not validate.
   4.516:FINAL_FAILURE FAILURE
  
   Based on the key tags and the truncated keys I think these keys are
   for fakessh.eu and if so there isn't a DLV record or a DS published
   for fakessh.eu.  The only other thing the validator can check against
   is any installed trust-anchor.
  
   Mark
  
   ;  DiG 9.6.0-APPLE-P2  fakessh.eu.dlv.isc.org dlv
   ;; global options: +cmd
   ;; Got answer:
   ;; -HEADER- opcode: QUERY, status: NXDOMAIN, id: 48161
   ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
  
   ;  DiG 9.6.0-APPLE-P2  fakessh.eu ds
   ;; global options: +cmd
   ;; Got answer:
   ;; -HEADER- opcode: QUERY, status: NOERROR, id: 63623
   ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
  
  
  
   --=20
   gpg --keyserver pgp.mit.edu --recv-key 092164A7
   http://pgp.mit.edu:11371/pks/lookup?op=3Dgetsearch=3D0x092164A7
  
  
  
   ___
   bind-users mailing list
   bind-users@lists.isc.org
   https://lists.isc.org/mailman/listinfo/bind-users
 =20
 =20
  ___
  bind-users mailing list
  bind-users@lists.isc.org
  https://lists.isc.org/mailman/listinfo/bind-users
 --=20
 gpg --keyserver pgp.mit.edu --recv-key 092164A7
 http://pgp.mit.edu:11371/pks/lookup?op=3Dgetsearch=3D0x092164A7
 
 --=-PTfCUNzbM6WN0AFHL2g3
 Content-Type: application/pgp-signature; name=signature.asc
 Content-Description: Ceci est une partie de message
   =?ISO-8859-1?Q?num=E9riquement?= =?ISO-8859-1?Q?_sign=E9e?=
 
 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1.4.5 (GNU/Linux)
 
 iD8DBQBNhoJZtXI/OwkhZKcRAujMAKCIR7D4r7o+rVlue7jdtUvzrIqAbwCcD9gt
 hw37QYLE5IuLPQXgUQI3qWc=
 =hDB7
 -END PGP SIGNATURE-
 
 --=-PTfCUNzbM6WN0AFHL2g3--
 
 
 --===8269614476746204563==
 Content-Type: text/plain; charset=us-ascii
 MIME-Version: 1.0
 Content-Transfer-Encoding: 7bit
 Content-Disposition: inline
 
 ___
 bind-users mailing list
 bind-users@lists.isc.org
 https://lists.isc.org/mailman/listinfo/bind-users
 --===8269614476746204563==--
 
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: problem validate key of isc dlv

2011-03-20 Thread fakessh @

Le lundi 21 mars 2011 à 10:58 +1100, Mark Andrews a écrit :
 In message 1300660825.6651.21.camel@localhost.localdomain, fakessh @ 
 writes

  
  that's what I did
  I made =E2=80=8B=E2=80=8Ba post on my blog explaining how I do
  goo.gl/EAbCB
 
 Have you changed your DNSKEY's since you did that?  If you have did
 you update the zone in your account on dlv.isc.org?  What does
 dlv.isc.org have to say about fakessh.eu?


I recreate a whole series of keys with a new field TXT I resigned to the
keys I have on my account revalidates isc
I have created to 11am GMT , this



 
and what is this other publication of another DS
 
 In the end you should have a DS RRset published in the .EU zone for
 fakessh.EU.  .EU claim to implement DNSSEC and that should mean
 that you can get DS records addeded for your zone.

this may be the reason for this problem

 
   I have no idea what do you mean by this sentence.
   Torinthiel
 -
  
-- 
gpg --keyserver pgp.mit.edu --recv-key 092164A7
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x092164A7


signature.asc
Description: Ceci est une partie de message	numériquement signée
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: problem validate key of isc dlv

2011-03-20 Thread fakessh @
Yes, I bothered to redeploy new keys, fields TXT, a new signature. 
and more on a new rehabilitation isc dlv. 


I still get the same error

nb : Simply debuggers dnssec still provide all kinds of resultasts
Le lundi 21 mars 2011 à 10:58 +1100, Mark Andrews a écrit :
 In message 1300660825.6651.21.camel@localhost.localdomain, fakessh @ 
 writes
 :
  
  Le dimanche 20 mars 2011 =C3=A0 22:47 +0100, Torinthiel a =C3=A9crit :
   On 03/20/11 22:33, fakessh @ wrote:
and what do I do.=20
  =20
   You have to add your key to ISC's DLV registry. Go to dlv.isc.org,
   create account, login, add a zone, add keys for it and publish a record
   in your zone validating that you're the owner of the zone. You will be
   told what to do after you create zone.
  =20
  
  that's what I did
  I made =E2=80=8B=E2=80=8Ba post on my blog explaining how I do
  goo.gl/EAbCB
 
 Have you changed your DNSKEY's since you did that?  If you have did
 you update the zone in your account on dlv.isc.org?  What does
 dlv.isc.org have to say about fakessh.eu?
 
and what is this other publication of another DS
 
 In the end you should have a DS RRset published in the .EU zone for
 fakessh.EU.  .EU claim to implement DNSSEC and that should mean
 that you can get DS records addeded for your zone.
 
   I have no idea what do you mean by this sentence.
   Torinthiel
  =20
   =20
   =20
Le lundi 21 mars 2011 =C3=A0 08:25 +1100, Mark Andrews a =C3=A9crit :
In message 1300650238.6651.15.camel@localhost.localdomain, fakessh =
  @ writes
:
hello bind network and duru.=20
   
I can not validate the key dlv via the website of the isc.=20
I do not understand why the warning is the isc=20
you have an explanation
SUCCESS 94.23.59.30 answered DNSKEY query with rcode NOERROR
4.502:SUCCESS 87.98.164.164 answered DNSKEY query with rcode NOERROR
4.502:SUCCESS 87.98.186.232 answered DNSKEY query with rcode NOERROR
4.502:INFO Total answers: 3
4.503:DEBUG COMPARE: Comparing results from 94.23.59.30 to 87.98.164.=
  164
4.504:DEBUG COMPARE: Comparing results from 94.23.59.30 to 87.98.186.=
  232
4.504:SUCCESS All DNSKEY responses are identical.
4.515:DEBUG VERIFY-DNSKEY: Checking tag=3D10231 flags=3D257 alg=3DRSA=
  SHA1
AwEAAbwO...8fkjXphfS8=3D
4.515:DEBUG VERIFY-DNSKEY: Ignoring key.
4.515:DEBUG VERIFY-DNSKEY: Checking tag=3D30111 flags=3D256 alg=3DRSA=
  SHA1
AwEAAb1q...jG+UQeAtYE=3D
4.515:DEBUG VERIFY-DNSKEY: Ignoring key.
4.515:INFO VERIFY-DNSKEY: 2 DNSKEYs found.
4.515:INFO VERIFY-DNSKEY: 0 keys found after filtering.
4.515:DEBUG VERIFY-DNSKEY: Using keys:
4.516:DEBUG VERIFY-DNSKEY: To verify rrset type DNSKEY
4.516:FAILURE VERIFY-DNSKEY: No keys found after filtering.
4.516:FAILURE DNSKEY signature did not validate.
4.516:FINAL_FAILURE FAILURE
   
Based on the key tags and the truncated keys I think these keys are
for fakessh.eu and if so there isn't a DLV record or a DS published
for fakessh.eu.  The only other thing the validator can check against
is any installed trust-anchor.
   
Mark
   
;  DiG 9.6.0-APPLE-P2  fakessh.eu.dlv.isc.org dlv
;; global options: +cmd
;; Got answer:
;; -HEADER- opcode: QUERY, status: NXDOMAIN, id: 48161
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
   
;  DiG 9.6.0-APPLE-P2  fakessh.eu ds
;; global options: +cmd
;; Got answer:
;; -HEADER- opcode: QUERY, status: NOERROR, id: 63623
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
   
   
   
--=20
gpg --keyserver pgp.mit.edu --recv-key 092164A7
http://pgp.mit.edu:11371/pks/lookup?op=3Dgetsearch=3D0x092164A7
   
   
   
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users
  =20
  =20
   ___
   bind-users mailing list
   bind-users@lists.isc.org
   https://lists.isc.org/mailman/listinfo/bind-users
  --=20
  gpg --keyserver pgp.mit.edu --recv-key 092164A7
  http://pgp.mit.edu:11371/pks/lookup?op=3Dgetsearch=3D0x092164A7
  
  --=-PTfCUNzbM6WN0AFHL2g3
  Content-Type: application/pgp-signature; name=signature.asc
  Content-Description: Ceci est une partie de message
  =?ISO-8859-1?Q?num=E9riquement?= =?ISO-8859-1?Q?_sign=E9e?=
  
  -BEGIN PGP SIGNATURE-
  Version: GnuPG v1.4.5 (GNU/Linux)
  
  iD8DBQBNhoJZtXI/OwkhZKcRAujMAKCIR7D4r7o+rVlue7jdtUvzrIqAbwCcD9gt
  hw37QYLE5IuLPQXgUQI3qWc=
  =hDB7
  -END PGP SIGNATURE-
  
  --=-PTfCUNzbM6WN0AFHL2g3--
  
  
  --===8269614476746204563==
  Content-Type: text/plain; charset=us-ascii
  MIME-Version: 1.0
  Content-Transfer-Encoding: 7bit
  Content-Disposition: inline
  
  ___
  bind-users mailing list
  bind-users@lists.isc.org
  https://lists.isc.org/mailman/listinfo/bind-users