Re: DNS requests error sending response: host unreachable

2012-03-13 Thread Romgo
I see, but It should be statefull right ?


On 12 March 2012 23:57, Mark Andrews ma...@isc.org wrote:


 In message 
 caaoqnkg-xfkws_fen9kedub7w19vf4jocsfp52lb8ixv5+g...@mail.gmail.com
 , Romgo writes:
 
  Here is my Iptables configuration for bind :
 
  # prod.dns.in
  $IPTABLES -t filter -A INPUT -j LOGACCEPT -p udp --dport 53 -i eth1-d
  192.168.201.2 -s 0/0
  $IPTABLES -t filter -A INPUT -j LOGACCEPT -p tcp --dport 53 -i eth1 -d
  192.168.201.2 -s 0/0
 
 
  # OUTPUT
  #-
  # prod.dns.out
  $IPTABLES -t filter -A OUTPUT -j LOGACCEPT -p tcp --dport 53 -o eth1 -s
  192.168.201.2 -d 0/0
  $IPTABLES -t filter -A OUTPUT -j LOGACCEPT -p udp --dport 53 -o eth1 -s
  192.168.201.2 -d 0/0

 This is obviously wrong.  You want to be looking at the source port not
 the destination port for reply traffic.

 Mark
 --
 Mark Andrews, ISC
 1 Seymour St., Dundas Valley, NSW 2117, Australia
 PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org


___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: DNS requests error sending response: host unreachable

2012-03-13 Thread lst_hoe02

Zitat von Romgo ro...@free.fr:


I see, but It should be statefull right ?



If using stateful UPD filtering you might get hit by short timeout  
values for UDP state matching, so packets get dropped if the query is  
too slow.


Regards

Andreas


___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Recursive queries fail after bind has been running for a few hours

2012-03-13 Thread G.W. Haywood

B0;261;0cHi there,

On Mon, Mar 12, 2012 at 12:05 PM, Mr X xproject...@gmail.com wrote:


I'm having a bizarre issue with 9.7.3-P3-RedHat-9.7.3-8.P3.el6_2.2 -
recursive queries stop functioning after bind has been running for a few
hours. It's a very low volume system (dev), maybe a few queries per hour
...


I saw something very similar with versions of 9.7 and I believe 9.8.

I was never able to pin it down, and never collected any evidence that
it was BIND itself that was the problem, but I did have to restart it
on several occasions when recursive queries suddenly started to fail.

Your suspicions are similar to mine although your setup appears not to
be.  I was using self-compiled binaries on a Debian system, but I do
run DNSSEC.  Now that I'm runnning 9.9 the problem seems to have gone.

Try upgrading?

Is your server also authoritative?

--

73,
Ged.
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


[no subject]

2012-03-13 Thread hugo hugoo

Dear all,
 
I have a problem in the understanding of the creation of a subzone.
Here the situation; let's call the name server ns1.xxx.be
 
 
I have zone toto.be with some records (not important)
 
In the same name server, I want to create the subzone titi.toto.be with some 
records.
 
 
== do I have to create in zone toto.be the following NS record:
 
 titi.toto.be.   TTL   IN   NSns1.xxx.be
 
 
I have found cases where this situation is present and other when it is not 
present...and both cases seems to work.
What is the difference?
   
 
thanks for any feedback,
 
Hugo,.___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

with subject: NS record for subzone definition

2012-03-13 Thread hugo hugoo

Dear all,
 
I have a problem in the understanding of the creation of a subzone.
Here the situation; let's call the name server ns1.xxx.be
 
 
I have zone toto.be with some records (not important)
 
In the same name server, I want to create the subzone titi.toto.be with some 
records.
 
 
== do I have to create in zone toto.be the following NS record:
 
 titi.toto.be.   TTL   IN   NSns1.xxx.be
 
 
I have found cases where this situation is present and other when it is not 
present...and both cases seems to work.
What is the difference?
   
 
thanks for any feedback,
 
Hugo,. 
  ___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re:

2012-03-13 Thread Daniel McDonald



On 3/13/12 8:20 AM, hugo hugoo hugo...@hotmail.com wrote:

 == do I have to create in zone toto.be the following NS record:
  
  titi.toto.be.   TTL   IN   NSns1.xxx.be
  
  
 I have found cases where this situation is present and other when it is not
 present...and both cases seems to work.
 What is the difference?

The glue records aren't necessary when both the zone and subzone are on the
same server, although it is good to have them for completeness.  When the
zones are on different servers you need the glue records.



-- 
Daniel J McDonald, CCIE # 2495, CISSP # 78281

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: NS records

2012-03-13 Thread Bill Owens
On Tue, Mar 13, 2012 at 08:26:02AM -0500, Daniel McDonald wrote:
 
 On 3/13/12 8:20 AM, hugo hugoo hugo...@hotmail.com wrote:
 
  == do I have to create in zone toto.be the following NS record:
   
   titi.toto.be.   TTL   IN   NSns1.xxx.be
   
   
  I have found cases where this situation is present and other when it is not
  present...and both cases seems to work.
  What is the difference?
 
 The glue records aren't necessary when both the zone and subzone are on the
 same server, although it is good to have them for completeness.  When the
 zones are on different servers you need the glue records.

That's true, and it also becomes a problem when you want to sign the zones with
DNSSEC; if there's no NS record in the parent, there can't be a chain of trust
from the parent to the child. Assuming that you'll someday want to sign
toto.be, you should put the parent NS records in place now. 

Bill.
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: DNS Amplification Attack Mitigation

2012-03-13 Thread Fr34k
Hello,

Did I miss any feedback on this, or perhaps there isn't any to offer (?)
Thank you.





 From: Fr34k freaknet...@yahoo.com
To: Bindlist bind-us...@isc.org 
Sent: Friday, March 9, 2012 10:30 AM
Subject: DNS Amplification Attack Mitigation
 


All,

I am (we all are (?)) interested in techniques for mitigating DNS 
amplification attacks for both recursive and authoritative BIND servers 
(versions 9.x).


Google found http://www.secureworks.com/research/threats/dns-amplification/ 
and http://www.publicsafety.gc.ca/prg/em/ccirc/2009/av09-011-eng.aspx
which mention limiting clients via ACLs and using additional-from-cache no; 
as mitigation techniques.


Good articles, but written several years ago so there might be additional 
configuration suggestions from the community since 2009.
Are there and, if so, what are they?
Perhaps said another way, what other named.conf settings could we be looking 
at in this effort?


Thank you.

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

NS record outside of our name space

2012-03-13 Thread King, Harold Clyde (Hal)
How can I make a record that will allow outside DNS to control a subdomain in 
our space.

We own example.com
We have a zone call wordpress.example.com
If I make an NS record in the zone nothing seems to happen?

ORIGIN wordpress.example.com
NS wordpress.outside.com

--
Hal King  - h...@utk.edumailto:h...@utk.edu
Systems Administrator
Office of Information Technology
Systems: Business Information Systems

The University of Tennessee
135D Kingston Pike Building
2309 Kingston Pk. Knoxville, TN 37996
Phone: 974-1599
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

RE:

2012-03-13 Thread hugo hugoo

Thanks for the feedback.
Is this a glue record? I do not have any IP defined in the NS record.
 
What is the flow of a request to a subzone?
Is the content of the zone checked before checking the subzone?

 

 Date: Tue, 13 Mar 2012 08:26:02 -0500
 Subject: Re: 
 From: dan.mcdon...@austinenergy.com
 To: hugo...@hotmail.com; bind-users@lists.isc.org
 
 
 
 
 On 3/13/12 8:20 AM, hugo hugoo hugo...@hotmail.com wrote:
 
  == do I have to create in zone toto.be the following NS record:
  
  titi.toto.be. TTL IN NS ns1.xxx.be
  
  
  I have found cases where this situation is present and other when it is not
  present...and both cases seems to work.
  What is the difference?
 
 The glue records aren't necessary when both the zone and subzone are on the
 same server, although it is good to have them for completeness. When the
 zones are on different servers you need the glue records.
 
 
 
 -- 
 Daniel J McDonald, CCIE # 2495, CISSP # 78281
 
  ___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: NS record outside of our name space

2012-03-13 Thread King, Harold Clyde (Hal)
Here's an example of my zone record:

$ORIGIN .
$TTL 1800   ; 30 minutes
Wordpress.example.com. IN SOA  hiddenmaster.example.com. 
ipmgr.example.com. (
2012020601 ; serial
10800  ; refresh (3 hours)
1800   ; retry (30 minutes)
604800 ; expire (1 week)
900; minimum (15 minutes)
)
$TTL 28800  ; 8 hours
NS  NS1.WORDPRESS.COM.
NS  NS2.WORDPRESS.COM.
NS  NS3.WORDPRESS.COM.
$ORIGIN wordpress.example.com.
$TTL 900; 15 minutes
www CNAME   wordpress.example.com.


--
Hal King  - h...@utk.edumailto:h...@utk.edu
Systems Administrator
Office of Information Technology
Systems: Business Information Systems

The University of Tennessee
135D Kingston Pike Building
2309 Kingston Pk. Knoxville, TN 37996
Phone: 974-1599

From: Hal King h...@utk.edumailto:h...@utk.edu
Date: Tue, 13 Mar 2012 13:40:54 +
To: Bind Users bind-users@lists.isc.orgmailto:bind-users@lists.isc.org
Subject: NS record outside of our name space

How can I make a record that will allow outside DNS to control a subdomain in 
our space.

We own example.com
We have a zone call wordpress.example.com
If I make an NS record in the zone nothing seems to happen?

ORIGIN wordpress.example.com
NS wordpress.outside.com

--
Hal King  - h...@utk.edumailto:h...@utk.edu
Systems Administrator
Office of Information Technology
Systems: Business Information Systems

The University of Tennessee
135D Kingston Pike Building
2309 Kingston Pk. Knoxville, TN 37996
Phone: 974-1599
___ Please visit 
https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list 
bind-users mailing list 
bind-users@lists.isc.orgmailto:bind-users@lists.isc.org 
https://lists.isc.org/mailman/listinfo/bind-users
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re:

2012-03-13 Thread Bill Owens
On Tue, Mar 13, 2012 at 01:42:00PM +, hugo hugoo wrote:
 
 Thanks for the feedback.
 Is this a glue record? I do not have any IP defined in the NS record.

No, a glue record is an address record (A or ) for an NS record in the 
parent zone, to avoid the problem of having the child zone needed to resolve 
the nameservers that would serve the child zone. For example, if your child 
zone is 'titi.toto.be' and the nameservers are 'ns.titi.toto.be' and 
'ns1.titi.toto.be', glue records in the parent are needed in order to allow a 
querier to follow the delegation.

 What is the flow of a request to a subzone?

Walking down the names from right to left, starting at the root, then 'be', 
then 'toto.be', and 'titi.toto.be' The easiest way to visualize it is to do a 
query with 'dig +trace'.

 Is the content of the zone checked before checking the subzone?

I'm not sure what you mean by 'checked'; it isn't verified in any way, but in 
the normal progression there would be a query for 'titi.toto.be' at the 
authoritative server for 'toto.be', which would return NS records; one of those 
nameservers would then be queried for records in 'titi.toto.be'.

Bill.
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


RE:

2012-03-13 Thread Ben Croswell
If you do not delegate the subdomains with NS records you are not fully
delegating the subdomain.
It will work fine in the short term, but are setting up a landmine for
someone to step on later.
If decide to move that subdomain to other dns servers later it will
disappear without the NS records.

The best practice is to always put the NS records and not leave it to
chance.
On Mar 13, 2012 9:43 AM, hugo hugoo hugo...@hotmail.com wrote:

  Thanks for the feedback.
 Is this a glue record? I do not have any IP defined in the NS record.

 What is the flow of a request to a subzone?
 Is the content of the zone checked before checking the subzone?


   Date: Tue, 13 Mar 2012 08:26:02 -0500
  Subject: Re:
  From: dan.mcdon...@austinenergy.com
  To: hugo...@hotmail.com; bind-users@lists.isc.org
 
 
 
 
  On 3/13/12 8:20 AM, hugo hugoo hugo...@hotmail.com wrote:
 
   == do I have to create in zone toto.be the following NS record:
  
   titi.toto.be. TTL IN NS ns1.xxx.be
  
  
   I have found cases where this situation is present and other when it
 is not
   present...and both cases seems to work.
   What is the difference?
 
  The glue records aren't necessary when both the zone and subzone are on
 the
  same server, although it is good to have them for completeness. When the
  zones are on different servers you need the glue records.
 
 
 
  --
  Daniel J McDonald, CCIE # 2495, CISSP # 78281
 

 ___
 Please visit https://lists.isc.org/mailman/listinfo/bind-users to
 unsubscribe from this list

 bind-users mailing list
 bind-users@lists.isc.org
 https://lists.isc.org/mailman/listinfo/bind-users

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

RE:

2012-03-13 Thread hugo hugoo

Thanks for this clear feedback.
I understand the problem if the subdomain is not on the same name servers as 
the domain.
The NS record is needed to could find the subdomain on the other name server.
 
You said that the NS is not mandatory (it will work fine in the short term) in 
case of the same name server for the domai nand the subdomain.
But how does it work then if no NS is found?
 
 
regards,
 
 
Hugo,
 



Date: Tue, 13 Mar 2012 10:02:32 -0400
Subject: RE:
From: ben.crosw...@gmail.com
To: hugo...@hotmail.com
CC: bind-users@lists.isc.org; dan.mcdon...@austinenergy.com


If you do not delegate the subdomains with NS records you are not fully 
delegating the subdomain. 
It will work fine in the short term, but are setting up a landmine for someone 
to step on later.
If decide to move that subdomain to other dns servers later it will disappear 
without the NS records. 
The best practice is to always put the NS records and not leave it to chance. 
On Mar 13, 2012 9:43 AM, hugo hugoo hugo...@hotmail.com wrote:



Thanks for the feedback.
Is this a glue record? I do not have any IP defined in the NS record.
 
What is the flow of a request to a subzone?
Is the content of the zone checked before checking the subzone?

 


 Date: Tue, 13 Mar 2012 08:26:02 -0500
 Subject: Re: 
 From: dan.mcdon...@austinenergy.com
 To: hugo...@hotmail.com; bind-users@lists.isc.org
 
 
 
 
 On 3/13/12 8:20 AM, hugo hugoo hugo...@hotmail.com wrote:
 
  == do I have to create in zone toto.be the following NS record:
  
  titi.toto.be. TTL IN NS ns1.xxx.be
  
  
  I have found cases where this situation is present and other when it is not
  present...and both cases seems to work.
  What is the difference?
 
 The glue records aren't necessary when both the zone and subzone are on the
 same server, although it is good to have them for completeness. When the
 zones are on different servers you need the glue records.
 
 
 
 -- 
 Daniel J McDonald, CCIE # 2495, CISSP # 78281
 

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users
  ___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: NS record for subzone definition

2012-03-13 Thread Chris Thompson

On Mar 13 2012, hugo hugoo wrote:


Thanks for this clear feedback.

I understand the problem if the subdomain is not on the same name servers
as the domain. The NS record is needed to could find the subdomain on the
other name server.

You said that the NS is not mandatory (it will work fine in the short term)
in case of the same name server for the domai nand the subdomain. But how
does it work then if no NS is found?


When asked about tutu.titi.toto.be, the be nameservers give a referral
to the nameservers for toto.be. When *they* are asked, if they are already
authoritative for the zone titi.toto.be, they can answer the question
without giving another referral.

But as has been pointed out, such a configuration is horribly fragile. The
set of nameservers (official *and* unofficial) for the zones have to be
the same, and it won't work anyway if the zones are signed, and so on.

One question to ask is: if the set of nameservers for toto.be and
titi.toto.be are now and for evermore going to be the same, why would
you want to make them separate zones at all? A single zone can have
domain names nested as deep as you like[*] without you needing to make
a zone cut.

[*] subject to the overall limit of 253 characters on the fully
   qualified name

--
Chris Thompson
Email: c...@cam.ac.uk
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: NS record outside of our name space

2012-03-13 Thread Alan Clegg
On 3/13/2012 9:49 AM, King, Harold Clyde (Hal) wrote:
 Here's an example of my zone record:
 
 $ORIGIN .
 $TTL 1800   ; 30 minutes
 Wordpress.example.com. IN SOA  hiddenmaster.example.com.
 ipmgr.example.com. (
 2012020601 ; serial
 10800  ; refresh (3 hours)
 1800   ; retry (30 minutes)
 604800 ; expire (1 week)
 900; minimum (15 minutes)
 )
 $TTL 28800  ; 8 hours
 NS  NS1.WORDPRESS.COM.
 NS  NS2.WORDPRESS.COM.
 NS  NS3.WORDPRESS.COM.
 $ORIGIN wordpress.example.com.
 $TTL 900; 15 minutes
 www CNAME   wordpress.example.com.

What are you actually trying to do?  If all you are trying to do is
give away the zone, you want these NS records to be in the
example.com. zone .. ie:

example.com.IN SOA ( ... )
IN NS  ns1.example.com.
IN NS  ns2.example.com.

wordpress   IN NS  ns1.wordpress.com.
IN NS  ns2.wordpress.com.
IN NS  ns3.wordpress.com.

AlanC
-- 
a...@clegg.com | 1.919.355.8851



signature.asc
Description: OpenPGP digital signature
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: Recursive queries fail after bind has been running for a few hours

2012-03-13 Thread Mr X
On Mon, Mar 12, 2012 at 3:37 PM, Kevin Oberman kob6...@gmail.com wrote:

 On Mon, Mar 12, 2012 at 12:05 PM, Mr X xproject...@gmail.com wrote:
  Hey there
 
  I'm having a bizarre issue with 9.7.3-P3-RedHat-9.7.3-8.P3.el6_2.2 -
  recursive queries stop functioning after bind has been running for a few
  hours. It's a very low volume system (dev), maybe a few queries per hour
 at
  most. It's not due to cache filling or anything like I've dealt with in
 the
  past. I suspect it's related to DNSSEC and root-server validation but I
  could use another set of eyes on my debug log. Sorry for posting from a
  inconspicuous e-mail address. My employer asks that I'm careful about the
  information I disclose on public mailing lists.
 
  You can see my debug log during a failed query
  http://pastebin.com/5hh05WjM
 
  Successful query here
  http://pastebin.com/H9qSQcyG
 
  If you would like to see my config, I can include portions, but it's
 huge so
  please let me know exactly what parts you're looking for.

 You are getting timeouts for some reason. The obvious question is
 whether the queries are actually being sent or whether they and and
 responses are not coming back. Or,perhaps the response IS coming back,
 but named is not picking them up.

 Could you try getting a packet capture? As these are UDP and assuming
 Unix, something like 'tcpdump -w badquery.bpf -s0 -p port 53`. This
 will capture all DNS traffic to/from this system, but you say it is
 not all that much, so it should be tractable.

 Once you have captured the data, you can use a tool like wireshark to
 look at it.



I had to sanitize some data, so the -vvv output of the packet capture is
here:

http://pastebin.com/GKSspL2L

Unfortunately this server is both authoritative and recursive. I have an
upcoming project to segment these two functions, but for now getting this
host operational is my priority. It's also worth mentioning that I have IO
data center nameservers as a forwarder as seen in this packet capture. When
bind is in a failed state I can query against these nameservers directly -
so I had not considered this a potential cause.

I really appreciate everyones help.


 --
 R. Kevin Oberman, Network Engineer
 E-mail: kob6...@gmail.com

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

RE: NS record for subzone definition

2012-03-13 Thread hugo hugoo

Thanks for this interesting feedback.
Now I have the problem to detect this kind of bad configuration.
 
If I have:
 
Zone toto.be:
 
toto.be.
 
NS  ns1.xxx.be
 
+ some records
 
 
Zone titi.toto.be:
 
 
titi.toto.be.
 
 NS   ns1.xxx.be
 
  + some records.
 
 
What will be the command to detect that zone toto.be has no NS for titi.toto.be 
??
 
 
Regards,
 
Hugo,

 

 Date: Tue, 13 Mar 2012 15:03:38 +
 From: c...@cam.ac.uk
 To: hugo...@hotmail.com
 CC: ben.crosw...@gmail.com; bind-users@lists.isc.org
 Subject: Re: NS record for subzone definition
 
 On Mar 13 2012, hugo hugoo wrote:
 
 Thanks for this clear feedback.
 
 I understand the problem if the subdomain is not on the same name servers
 as the domain. The NS record is needed to could find the subdomain on the
 other name server.
  
 You said that the NS is not mandatory (it will work fine in the short term)
 in case of the same name server for the domai nand the subdomain. But how
 does it work then if no NS is found?
 
 When asked about tutu.titi.toto.be, the be nameservers give a referral
 to the nameservers for toto.be. When *they* are asked, if they are already
 authoritative for the zone titi.toto.be, they can answer the question
 without giving another referral.
 
 But as has been pointed out, such a configuration is horribly fragile. The
 set of nameservers (official *and* unofficial) for the zones have to be
 the same, and it won't work anyway if the zones are signed, and so on.
 
 One question to ask is: if the set of nameservers for toto.be and
 titi.toto.be are now and for evermore going to be the same, why would
 you want to make them separate zones at all? A single zone can have
 domain names nested as deep as you like[*] without you needing to make
 a zone cut.
 
 [*] subject to the overall limit of 253 characters on the fully
 qualified name
 
 -- 
 Chris Thompson
 Email: c...@cam.ac.uk
  ___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: DNS requests error sending response: host unreachable

2012-03-13 Thread Romgo
All right.

this seems to correct the issue.
But that's the first time I had to open the firewall for a packet answer.

weird.

Thanks for the help.



On 13 March 2012 10:19, lst_ho...@kwsoft.de wrote:

 Zitat von Romgo ro...@free.fr:


  I see, but It should be statefull right ?


 If using stateful UPD filtering you might get hit by short timeout values
 for UDP state matching, so packets get dropped if the query is too slow.

 Regards

 Andreas


 __**_
 Please visit 
 https://lists.isc.org/mailman/**listinfo/bind-usershttps://lists.isc.org/mailman/listinfo/bind-usersto
  unsubscribe from this list

 bind-users mailing list
 bind-users@lists.isc.org
 https://lists.isc.org/mailman/**listinfo/bind-usershttps://lists.isc.org/mailman/listinfo/bind-users


___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: NS record outside of our name space

2012-03-13 Thread King, Harold Clyde (Hal)
I tried adding the NS records but it looked like the entire example.com
was now subject to the NS of wordpress.com. I just want the sub domain to
get it's DNS from the wordpress.com NS servers. Not to give away my  whole
example.com domain.
 

-- 
Hal King  - h...@utk.edu
Systems Administrator
Office of Information Technology
Systems: Business Information Systems

The University of Tennessee
135D Kingston Pike Building
2309 Kingston Pk. Knoxville, TN 37996
Phone: 974-1599





On 3/13/12 11:04 AM, Alan Clegg a...@clegg.com wrote:

On 3/13/2012 9:49 AM, King, Harold Clyde (Hal) wrote:
 Here's an example of my zone record:
 
 $ORIGIN .
 $TTL 1800   ; 30 minutes
 Wordpress.example.com. IN SOA  hiddenmaster.example.com.
 ipmgr.example.com. (
 2012020601 ; serial
 10800  ; refresh (3 hours)
 1800   ; retry (30 minutes)
 604800 ; expire (1 week)
 900; minimum (15 minutes)
 )
 $TTL 28800  ; 8 hours
 NS  NS1.WORDPRESS.COM.
 NS  NS2.WORDPRESS.COM.
 NS  NS3.WORDPRESS.COM.
 $ORIGIN wordpress.example.com.
 $TTL 900; 15 minutes
 www CNAME   wordpress.example.com.

What are you actually trying to do?  If all you are trying to do is
give away the zone, you want these NS records to be in the
example.com. zone .. ie:

example.com.   IN SOA ( ... )
   IN NS  ns1.example.com.
   IN NS  ns2.example.com.

wordpress  IN NS  ns1.wordpress.com.
   IN NS  ns2.wordpress.com.
   IN NS  ns3.wordpress.com.

AlanC
-- 
a...@clegg.com | 1.919.355.8851

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to
unsubscribe from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: NS record outside of our name space

2012-03-13 Thread Alan Clegg
On 3/13/2012 1:35 PM, King, Harold Clyde (Hal) wrote:
 I tried adding the NS records but it looked like the entire example.com
 was now subject to the NS of wordpress.com. I just want the sub domain to
 get it's DNS from the wordpress.com NS servers. Not to give away my  whole
 example.com domain.

Not if you followed the example I gave.

The NS records at the zone apex (with nothing in the label field, thus
example.com) define the zone.

The NS records at the wordpress label delegate that zone to the given
servers.

AlanC
-- 
a...@clegg.com | 1.919.355.8851



signature.asc
Description: OpenPGP digital signature
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re:

2012-03-13 Thread Mark Andrews

In message cb84b51a.4a53a%dan.mcdon...@austinenergy.com, Daniel McDonald writ
es:
 
 On 3/13/12 8:20 AM, hugo hugoo hugo...@hotmail.com wrote:
 
  == do I have to create in zone toto.be the following NS record:
   
   titi.toto.be.   TTL   IN   NSns1.xxx.be
   
   
  I have found cases where this situation is present and other when it is not
  present...and both cases seems to work.
  What is the difference?
 
 The glue records aren't necessary when both the zone and subzone are on the
 same server, although it is good to have them for completeness.  When the
 zones are on different servers you need the glue records.

No, they *are* necessary.  Just because their lack does not cause
a resolution failure in all cases it doesn't mean they are not
necessary.

If the parent zone is signed but the child zone is unsigned then
the lack of NS records *will* cause validation failures unless
OPTOUT is in use even when both zones are only served by a common
set of servers.

DNSSEC catches out lots of bad practices that mostly pass unnoticed
with plain DNS.

Mark
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: with subject: NS record for subzone definition

2012-03-13 Thread Chris Buxton
On Mar 13, 2012, at 6:23 AM, hugo hugoo wrote:
 I have zone toto.be with some records (not important)
  
 In the same name server, I want to create the subzone titi.toto.be with 
 some records.
  
  
 == do I have to create in zone toto.be the following NS record:
  
  titi.toto.be.   TTL   IN   NSns1.xxx.be
  
  
 I have found cases where this situation is present and other when it is not 
 present...and both cases seems to work.
 What is the difference?

Yes, you should create the NS records. If you are using the exact same set of 
servers for the subzone as for the child, and are not using DNSSEC, you can get 
away without the NS records, but you shouldn't get into this bad habit.

Regards,
Chris Buxton
BlueCat Networks

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

max-cache-ttl usage and best-practices

2012-03-13 Thread Fr34k


Hi All,


I wanted some feedback on max-cache-ttl usage and best-practices, please.


The BIND 9 ARM says:
max-cache-ttl Sets the maximum time for which the server will cache ordinary 
(positive) answers. The
default is one week (7 days). A value of zero may cause all queries to return 
SERVFAIL, because
of lost caches of intermediate RRsets (such as NS and glue /A records) in 
the resolution
process.

I was considering changing this setting to something less than the default of a 
week with the following potential positive outcomes in mind:

 1 - mitigating cache abuse (e.g., ghost domains),
 2 - reducing the caching of bad records (e.g., poor hostname migration 
planning on the part of external party turns into an emergency on our part to 
flush the bad record(s) from the cache),
 3- or something else for which others may be using this setting for (?)

Perhaps regardless of the above, anyone have some experiences to share?

Thank you.



ADDITIONAL INFO: 


http://dyn.com/dyn-tech-everything-you-ever-wanted-to-know-about-ttls/
 A good rule of thumb is never have any TTL higher than 1 day as the 
benefits of DNS caching really diminish after that point and it makes 
propagation waits extremely long.


http://en.wikipedia.org/wiki/Time_to_live
 An older common TTL value for DNS was 86400 seconds, which is 24 hours.  
and  Newer DNS methods that are part of a DR (Disaster Recovery) system may 
have some records deliberately set extremely low on TTL. For example a 
300 second TTL...


It would not be fair to exclude the negative aspects of some too low 
setting.  For example, contributing to cache misses and, thus, a decrease in 
performance (a la http://code.google.com/speed/public-dns/docs/performance.html 
and, to some extent, the data found in the research for 
http://lib.tkk.fi/Diss/2006/isbn9512282151/article2.pdf).
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


BIND 9.6-ESV-R6rc2 is now available

2012-03-13 Thread Michael McNally
Introduction

  BIND 9.6-ESV-R6rc2 is the second release candidate for BIND 9.6-ESV-R6.

  This document summarizes changes from BIND 9.6-ESV-R5 to BIND
  9.6-ESV-R6rc2.  Please see the CHANGES file in the source code
  release for a complete list of all changes.  Please see the CHANGES
  file in the source code release for a complete list of all changes.

Download

  The latest versions of BIND 9 software can always be found on our
  web site at http://www.isc.org/downloads/all. There you will find
  additional information about each release, source code, and
  pre-compiled versions for Microsoft Windows operating systems.

Support

  Product support information is available on
  http://www.isc.org/services/support for paid support options.
  Free support is provided by our user community via a mailing list.
  Information on all public email lists is available at
  https://lists.isc.org/mailman/listinfo.

Security Fixes

 Previously included in 9.6-ESV-R6rc1

  + BIND 9 nameservers performing recursive queries could cache an
invalid record and subsequent queries for that record could
crash the resolvers with an assertion failure. [RT #26590]
[CVE-2011-4313]

Feature Changes

 Previously included in 9.6-ESV-R6rc1

  + Improves initial start-up and server reload time by increasing
the default size of the hash table the configuration parser
uses to keep track of loaded zones and allowing it to grow
dynamically to better handle systems with large numbers of
zones.  [RT #26523]

  + --enable-developer, a new composite argument to the configure
script, enables a set of build options normally disabled but
frequently selected in test or development builds, specifically:
enable_fixed_rrset, with_atf, enable_filter_, enable_rpz_nsip,
enable_rpz_nsdname, and with_dlz_filesystem (and on Linux and
Darwin, also enable_exportlib) [RT #27103]

Bug Fixes

 Newly added in 9.6-ESV-R6rc2

  + Corrects a potential overflow problem in the computation of
RRSIG expiration times. [RT #23311]

  + The maximum number of NSEC3 iterations for a DNSKEY RRset was
not being properly computed.  [RT #26543]

  + Error reporting has been improved for failures encountered
when sending or receiving network packets.  In particular
some memory allocation failures were being logged as unexpected
error - these will now be reported accurately.  A new
ISC_R_UNSET result code has also been added to cover those
situations where there is no error code returned by the OS
sockets implementation.  [RT #27336]

  + Corrects an INSIST failure by addressing race conditions in
the handling of rbtnode.deadlink. [RT #27738]

  + SOA refresh queries could be treated as cancelled despite
succeeding over the loopback interface. [RT #27782]

  + When replacing an NS RRset, BIND now restricts the TTL of the
new NS RRset to no more than that of the NS RRset it replaces
to fix a timing problem that can arise when removing a delegation. 
[RT #27792/27884]

  + Raw zones with with more than 512 records in a RRset previously
failed to load. [RT #27863]

 Previously included in 9.6-ESV-R6rc1

  + Some query patterns could cause responses not to be returned
in cyclic order though rrset-order cyclic was set.  [RT
#27170/27185]

  + named-compilezone now longer emits dump zone to file message
when writing to stdout.  [RT #27109]

  + Sets isc_socket_ipv6only() on the IPv6 control channels.  This
addresses IPv6 socket binding problems that can occur in some
configurations when bindv6only=1 is set globally.   [RT #22249]

  + named now reports a syntax error when a TXT record longer than
255 characters is configured.  [RT #26956]

  + Addresses race conditions in the resolver code that can cause
named to abort.   [RT #26889]

  + Fixed a bug that could cause named to crash while loading a
zone with invalid DNSKEY records.  [RT #26913]

  + Prevents  dig -6 +trace from terminating with an error when
encountering a root nameserver without an  record. RT #26906]

  + An unusual corner-case buffer handling issue in zone transfers
is corrected.  The symptom was that zones that contain record
types that do not compress when converted to wire format could
fail to transfer.  [RT #26796]

  + Addresses a selection of minor resource leaks (that were
identified via code checking tools but which have not been
reported from any production environments).  [RT #26624]

  + Fixed a corner case race condition in the validator that may
cause an assert in a multi-threaded build of BIND.  [RT #26478]

  + named now correctly validates DNSSEC positive wildcard responses
from NSEC3 signed zones. [RT #26200]

  + The order in which we process the reactivation of a dead node
in cache and the incrementing of its reference count created a
small timing window during which an inconsistency could be
detected and an 

BIND 9.7.5rc2 is now available

2012-03-13 Thread Michael McNally
Introduction

  BIND 9.7.5rc2 is the second release candidate for BIND 9.7.5.

  This document summarizes changes from BIND 9.7.4 to BIND 9.7.5rc2.
  Please see the CHANGES file in the source code release for a
  complete list of all changes.

Download

  The latest versions of BIND 9 software can always be found on our
  web site at http://www.isc.org/downloads/all. There you will find
  additional information about each release, source code, and
  pre-compiled versions for Microsoft Windows operating systems.

Support

  Product support information is available on
  http://www.isc.org/services/support for paid support options.
  Free support is provided by our user community via a mailing list.
  Information on all public email lists is available at
  https://lists.isc.org/mailman/listinfo.

Security Fixes

 Previously included in 9.7.5rc1

  + BIND 9 nameservers performing recursive queries could cache an
invalid record and subsequent queries for that record could
crash the resolvers with an assertion failure. [RT #26590]
[CVE-2011-4313]

Feature Changes

 Previously included in 9.7.5rc1

  + It is now possible to explicitly disable DLV in named.conf by
specifying dnssec-lookaside no;. This is the default, but the
ability to configure it makes it clearly visible to administrators.
[RT #24858]

  + --enable-developer, a new composite argument to the configure
script, enables a set of build options normally disabled but
frequently selected in test or development builds, specifically:
enable_fixed_rrset, with_atf, enable_filter_, enable_rpz_nsip,
enable_rpz_nsdname, and with_dlz_filesystem (and on Linux and
Darwin, also enable_exportlib) [RT #27103]

Bug Fixes

 Newly added in 9.7.5rc2

  + Corrects a potential overflow problem in the computation of
RRSIG expiration times. [RT #23311]

  + The maximum number of NSEC3 iterations for a DNSKEY RRset was
not being properly computed.  [RT #26543]

  + Error reporting has been improved for failures encountered
when sending or receiving network packets.  In particular
some memory allocation failures were being logged as unexpected
error - these will now be reported accurately.  A new
ISC_R_UNSET result code has also been added to cover those
situations where there is no error code returned by the OS
sockets implementation.  [RT #27336]

  + Corrects an INSIST failure by addressing race conditions in
the handling of rbtnode.deadlink. [RT #27738]

  + SOA refresh queries could be treated as cancelled despite
succeeding over the loopback interface. [RT #27782]

  + When replacing an NS RRset, BIND now restricts the TTL of the
new NS RRset to no more than that of the NS RRset it replaces
to fix a timing problem that can arise when removing a delegation.
[RT #27792/27884]

  + Raw zones with with more than 512 records in a RRset previously
failed to load. [RT #27863]

  + Make sure automatic key maintenance is started when rndc reconfig 
is issued if auto-dnssec maintain is turned on. [RT #26805]

  + Windows builds are now restricted to a single listener thread
until incompatibility with the multiple listeners code can be
addressed [RT #27696]

  +  responses could be returned in the additional section even
when filter--on-v4 was in use. [RT #27292]

 Previously included in 9.7.5rc1

  + Some query patterns could cause responses not to be returned
in cyclic order though rrset-order cyclic was set.  [RT
#27170/27185]

  + named-compilezone now longer emits dump zone to file message
when writing to stdout.  [RT #27109]

  + Sets isc_socket_ipv6only() on the IPv6 control channels.  This
addresses IPv6 socket binding problems that can occur in some
configurations when bindv6only=1 is set globally.   [RT #22249]

  + named now reports a syntax error when a TXT record longer than
255 characters is configured.  [RT #26956]

  + Addresses race conditions in the resolver code that can cause
named to abort.   [RT #26889]

  + Fixed a bug that could cause named to crash while loading a
zone with invalid DNSKEY records.  [RT #26913]

  + Prevents  dig -6 +trace from terminating with an error when
encountering a root nameserver without an  record. RT #26906]

  + Prevents DNSKEY state change events from being missed by ensuring
that the timestamps used to determine which keys are in use are
set appropriately.  [RT #26874]

  + When processing a list of keys, named now consistently compares
them with the same timestamp. [RT #26883]

  + Fixed a corner case race condition in the validator that may
cause an assert in a multi-threaded build of BIND.  [RT #26478]

  + Poor error handling could cause named to hang during shutdown.
[RT #26372]

  + named now correctly validates DNSSEC positive wildcard responses
from NSEC3 signed zones. [RT #26200]

  + The order in which we process the 

BIND 9.8.2rc2 is now available

2012-03-13 Thread Michael McNally
Introduction
 
  BIND 9.8.2rc2 is the second release candidate for BIND 9.8.2.

  This document summarizes changes from BIND 9.8.1 to BIND 9.8.2rc2.
  Please see the CHANGES file in the source code release for a complete
  list of all changes.

Download
   
  The latest versions of BIND 9 software can always be found on our
  web site at http://www.isc.org/downloads/all. There you will find
  additional information about each release, source code, and
  pre-compiled versions for Microsoft Windows operating systems.

Support

  Product support information is available on
  http://www.isc.org/services/support for paid support options. Free
  support is provided by our user community via a mailing list.
  Information on all public email lists is available at
  https://lists.isc.org/mailman/listinfo.

Security Fixes

 Previously included in 9.8.2rc1

  + BIND 9 nameservers performing recursive queries could cache an
invalid record and subsequent queries for that record could
crash the resolvers with an assertion failure. [RT #26590]
[CVE-2011-4313]

Feature Changes

 Newly added in 9.8.2rc2

  + RPZ implementation now conforms to version 3 of the specification.
[RT #27316] 

 Previously included in 9.8.2rc1

  + It is now possible to explicitly disable DLV in named.conf by
specifying dnssec-lookaside no;. This is the default, but the
ability to configure it makes it clearly visible to administrators.
[RT #24858]

  + --enable-developer, a new composite argument to the configure
script, enables a set of build options normally disabled but
frequently selected in test or development builds, specifically:
enable_fixed_rrset, with_atf, enable_filter_, enable_rpz_nsip,
enable_rpz_nsdname, and with_dlz_filesystem (and on Linux and
Darwin, also enable_exportlib) [RT #27103]

Bug Fixes

 Newly added in 9.8.2rc2

  + Corrects a potential overflow problem in the computation of
RRSIG expiration times. [RT #23311]

  + The maximum number of NSEC3 iterations for a DNSKEY RRset was
not being properly computed.  [RT #26543]

  + Error reporting has been improved for failures encountered
when sending or receiving network packets.  In particular
some memory allocation failures were being logged as unexpected
error - these will now be reported accurately.  A new
ISC_R_UNSET result code has also been added to cover those
situations where there is no error code returned by the OS
sockets implementation.  [RT #27336]

  + Corrects an INSIST failure by addressing race conditions in
the handling of rbtnode.deadlink. [RT #27738]

  + SOA refresh queries could be treated as cancelled despite
succeeding over the loopback interface. [RT #27782]

  + When replacing an NS RRset, BIND now restricts the TTL of the
new NS RRset to no more than that of the NS RRset it replaces
to fix a timing problem that can arise when removing a delegation.
[RT #27792/27884]

  + Raw zones with with more than 512 records in a RRset previously
failed to load. [RT #27863]

  + Make sure automatic key maintenance is started when rndc reconfig
is issued if auto-dnssec maintain is turned on. [RT #26805]

  + Windows builds are now restricted to a single listener thread
until incompatibility with the multiple listeners code can be
addressed [RT #27696]

  +  responses could be returned in the additional section even
when filter--on-v4 was in use. [RT #27292]

  + An error handling an out of memory condition could cause a stored
rdataset to be freed twice using DNS64. [RT #27762]

 Previously included in 9.8.2rc1

  + Some query patterns could cause responses not to be returned
in cyclic order though rrset-order cyclic was set.  [RT
#27170/27185]

  + named-compilezone now longer emits dump zone to file message
when writing to stdout.  [RT #27109]

  + Sets isc_socket_ipv6only() on the IPv6 control channels.  This
addresses IPv6 socket binding problems that can occur in some
configurations when bindv6only=1 is set globally.   [RT #22249]

  + named now reports a syntax error when a TXT record longer than
255 characters is configured.  [RT #26956]

  + Addresses race conditions in the resolver code that can cause
named to abort.   [RT #26889]

  + Fixed a bug that could cause named to crash while loading a
zone with invalid DNSKEY records.  [RT #26913]

  + Prevents  dig -6 +trace from terminating with an error when
encountering a root nameserver without an  record. RT #26906]

  + Prevents DNSKEY state change events from being missed by ensuring
that the timestamps used to determine which keys are in use are
set appropriately.  [RT #26874]

  + When processing a list of keys, named now consistently compares
them with the same timestamp. [RT #26883]

  + Fixed a corner case race condition in the validator that may
cause an assert in a multi-threaded build of BIND.