Re: Value of a DNSSEC validating resolver

2023-12-01 Thread Mark Andrews
A validating resolver is a prerequisite for validating clients to work. Clients 
don’t have direct access to the authoritative servers so the can’t retrieve 
good answers if the recursive servers don’t filter out the bad answers.

Think of a recursive server as a town water treatment plant. You could filter 
and treat at every house and sometimes you still do like boiling water for baby 
formula but on the most part what you get out of it is good enough for 
consumption as is. 

-- 
Mark Andrews

> On 2 Dec 2023, at 08:14, John Thurston  wrote:
> 
> 
> At first glance, the concept of a validating resolver seemed like a good 
> idea. But in practice, it is turning out to be a hassle.
> 
> I'm starting to think, "If my clients want their answers validated, they 
> should do it." If they *really* care about the quality of the answers they 
> get, why should my clients be trusting *me* to validate them?
> 
> Can someone make a good case to me for continuing to perform DNSSEC 
> validation on my central resolvers?
> 
> -- 
> --
> Do things because you should, not just because you can. 
> 
> John Thurston907-465-8591
> john.thurs...@alaska.gov
> Department of Administration
> State of Alaska
> -- 
> Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
> this list
> 
> ISC funds the development of this software with paid support subscriptions. 
> Contact us at https://www.isc.org/contact/ for more information.
> 
> 
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Value of a DNSSEC validating resolver

2023-12-01 Thread John Thurston
At first glance, the concept of a validating resolver seemed like a good 
idea. But in practice, it is turning out to be a hassle.


I'm starting to think, "If my clients want their answers validated, they 
should do it." If they *really* care about the quality of the answers 
they get, why should my clients be trusting *me* to validate them?


Can someone make a good case to me for continuing to perform DNSSEC 
validation on my central resolvers?


--
--
Do things because you should, not just because you can.

John Thurston907-465-8591
john.thurs...@alaska.gov
Department of Administration
State of Alaska
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: What does it mean "lame-servers: info: success resolving"?

2023-12-01 Thread Alessandro Vesely
Yeah, right.  Thank you.  However, does that allow to infer anything about the 
result of the queries that were put a few seconds before the resolver reached 
that conclusion?


Best
Ale
--

On Fri 01/Dec/2023 11:17:25 +0100 Mark Andrews wrote:

It means that the servers for the zone doesn’t fully implement the DNS 
protocol.  NS queries for intermediate names are not getting the expected 
answer.
-- Mark Andrews

On 1 Dec 2023, at 21:10, Alessandro Vesely  wrote:

Hi all,

I have this in BIND 9.18.19-1~deb12u1-Debian' logs:

north:log$ grep '148.19.188.64.list.dnswl.org' named-qu.log.0
30-Nov-2023 15:58:23.901 queries: info: client @0x7f281e72ff68 127.0.0.1#54827 
(148.19.188.64.list.dnswl.org): view internal: query: 
148.19.188.64.list.dnswl.org IN A + (127.0.0.1)
30-Nov-2023 15:58:28.909 queries: info: client @0x7f281e6add68 127.0.0.1#54827 
(148.19.188.64.list.dnswl.org): view internal: query: 
148.19.188.64.list.dnswl.org IN A + (127.0.0.1)
30-Nov-2023 15:58:30.357 queries: info: client @0x7f2817485f68 127.0.0.1#53802 
(148.19.188.64.list.dnswl.org): view internal: query: 
148.19.188.64.list.dnswl.org IN A + (127.0.0.1)
30-Nov-2023 15:58:31.621 queries: info: client @0x7f281f459f68 127.0.0.1#53122 
(148.19.188.64.list.dnswl.org): view internal: query: 
148.19.188.64.list.dnswl.org IN A + (127.0.0.1)

north:log$ grep '148.19.188.64.list.dnswl.org' named.log.0
30-Nov-2023 15:58:35.689 lame-servers: info: success resolving 
'148.19.188.64.list.dnswl.org/A' after disabling qname minimization due to 
'ncache nxdomain'

north:log$ grep '148.19.188.64.list.dnswl.org' named-dnssec.log.0
30-Nov-2023 15:58:35.689 dnssec: debug 3: view internal: validating 
148.19.188.64.list.dnswl.org/A: starting
30-Nov-2023 15:58:35.689 dnssec: debug 3: view internal: validating 
148.19.188.64.list.dnswl.org/A: attempting negative response validation from 
message
30-Nov-2023 15:58:35.689 dnssec: debug 3: view internal: validating 
148.19.188.64.list.dnswl.org/A: in validator_callback_nsec
30-Nov-2023 15:58:35.689 dnssec: debug 3: view internal: validating 
148.19.188.64.list.dnswl.org/A: resuming validate_nx
30-Nov-2023 15:58:35.689 dnssec: debug 3: view internal: validating 
148.19.188.64.list.dnswl.org/A: nonexistence proof(s) not found
30-Nov-2023 15:58:35.689 dnssec: debug 3: view internal: validating 
148.19.188.64.list.dnswl.org/A: checking existence of DS at 'org'
30-Nov-2023 15:58:35.689 dnssec: debug 3: view internal: validating 
148.19.188.64.list.dnswl.org/A: checking existence of DS at 'dnswl.org'
30-Nov-2023 15:58:35.689 dnssec: debug 3: view internal: validating 
148.19.188.64.list.dnswl.org/A: marking as answer (proveunsecure (4))

The success arrived several seconds after.  Does this mean that the (first) 
queries failed?  The dnssec log seems to indicate that the IP was not listed.

The queries in the first half of the 15:58 minute were part of an SPF evaluation.  (The 
SPF record contains an exists:%{ir}.list.dnswl.org mechanism.).  The SPF evaluation 
returned "error".  I'm trying to understand whether the cause was a DNS hiccup.

Is this a kind of error that could be orchestrated remotely?


TIA
Ale
--



--
Visithttps://lists.isc.org/mailman/listinfo/bind-users  to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us athttps://www.isc.org/contact/  for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users
-- Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list ISC funds the development of this software with paid support 
subscriptions. Contact us at https://www.isc.org/contact/ for more information. 
bind-users mailing list bind-users@lists.isc.org 
https://lists.isc.org/mailman/listinfo/bind-users



--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: What does it mean "lame-servers: info: success resolving"?

2023-12-01 Thread Mark Andrews
It means that the servers for the zone doesn’t fully implement the DNS 
protocol.  NS queries for intermediate names are not getting the expected 
answer. 
-- 
Mark Andrews

> On 1 Dec 2023, at 21:10, Alessandro Vesely  wrote:
> 
> Hi all,
> 
> I have this in BIND 9.18.19-1~deb12u1-Debian' logs:
> 
> north:log$ grep '148.19.188.64.list.dnswl.org' named-qu.log.0
> 30-Nov-2023 15:58:23.901 queries: info: client @0x7f281e72ff68 
> 127.0.0.1#54827 (148.19.188.64.list.dnswl.org): view internal: query: 
> 148.19.188.64.list.dnswl.org IN A + (127.0.0.1)
> 30-Nov-2023 15:58:28.909 queries: info: client @0x7f281e6add68 
> 127.0.0.1#54827 (148.19.188.64.list.dnswl.org): view internal: query: 
> 148.19.188.64.list.dnswl.org IN A + (127.0.0.1)
> 30-Nov-2023 15:58:30.357 queries: info: client @0x7f2817485f68 
> 127.0.0.1#53802 (148.19.188.64.list.dnswl.org): view internal: query: 
> 148.19.188.64.list.dnswl.org IN A + (127.0.0.1)
> 30-Nov-2023 15:58:31.621 queries: info: client @0x7f281f459f68 
> 127.0.0.1#53122 (148.19.188.64.list.dnswl.org): view internal: query: 
> 148.19.188.64.list.dnswl.org IN A + (127.0.0.1)
> 
> north:log$ grep '148.19.188.64.list.dnswl.org' named.log.0
> 30-Nov-2023 15:58:35.689 lame-servers: info: success resolving 
> '148.19.188.64.list.dnswl.org/A' after disabling qname minimization due to 
> 'ncache nxdomain'
> 
> north:log$ grep '148.19.188.64.list.dnswl.org' named-dnssec.log.0
> 30-Nov-2023 15:58:35.689 dnssec: debug 3: view internal: validating 
> 148.19.188.64.list.dnswl.org/A: starting
> 30-Nov-2023 15:58:35.689 dnssec: debug 3: view internal: validating 
> 148.19.188.64.list.dnswl.org/A: attempting negative response validation from 
> message
> 30-Nov-2023 15:58:35.689 dnssec: debug 3: view internal: validating 
> 148.19.188.64.list.dnswl.org/A: in validator_callback_nsec
> 30-Nov-2023 15:58:35.689 dnssec: debug 3: view internal: validating 
> 148.19.188.64.list.dnswl.org/A: resuming validate_nx
> 30-Nov-2023 15:58:35.689 dnssec: debug 3: view internal: validating 
> 148.19.188.64.list.dnswl.org/A: nonexistence proof(s) not found
> 30-Nov-2023 15:58:35.689 dnssec: debug 3: view internal: validating 
> 148.19.188.64.list.dnswl.org/A: checking existence of DS at 'org'
> 30-Nov-2023 15:58:35.689 dnssec: debug 3: view internal: validating 
> 148.19.188.64.list.dnswl.org/A: checking existence of DS at 'dnswl.org'
> 30-Nov-2023 15:58:35.689 dnssec: debug 3: view internal: validating 
> 148.19.188.64.list.dnswl.org/A: marking as answer (proveunsecure (4))
> 
> The success arrived several seconds after.  Does this mean that the (first) 
> queries failed?  The dnssec log seems to indicate that the IP was not listed.
> 
> The queries in the first half of the 15:58 minute were part of an SPF 
> evaluation.  (The SPF record contains an exists:%{ir}.list.dnswl.org 
> mechanism.).  The SPF evaluation returned "error".  I'm trying to understand 
> whether the cause was a DNS hiccup.
> 
> Is this a kind of error that could be orchestrated remotely?
> 
> 
> TIA
> Ale
> -- 
> 
> 
> 
> -- 
> Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
> this list
> 
> ISC funds the development of this software with paid support subscriptions. 
> Contact us at https://www.isc.org/contact/ for more information.
> 
> 
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


What does it mean "lame-servers: info: success resolving"?

2023-12-01 Thread Alessandro Vesely

Hi all,

I have this in BIND 9.18.19-1~deb12u1-Debian' logs:

north:log$ grep '148.19.188.64.list.dnswl.org' named-qu.log.0
30-Nov-2023 15:58:23.901 queries: info: client @0x7f281e72ff68 127.0.0.1#54827 
(148.19.188.64.list.dnswl.org): view internal: query: 
148.19.188.64.list.dnswl.org IN A + (127.0.0.1)
30-Nov-2023 15:58:28.909 queries: info: client @0x7f281e6add68 127.0.0.1#54827 
(148.19.188.64.list.dnswl.org): view internal: query: 
148.19.188.64.list.dnswl.org IN A + (127.0.0.1)
30-Nov-2023 15:58:30.357 queries: info: client @0x7f2817485f68 127.0.0.1#53802 
(148.19.188.64.list.dnswl.org): view internal: query: 
148.19.188.64.list.dnswl.org IN A + (127.0.0.1)
30-Nov-2023 15:58:31.621 queries: info: client @0x7f281f459f68 127.0.0.1#53122 
(148.19.188.64.list.dnswl.org): view internal: query: 
148.19.188.64.list.dnswl.org IN A + (127.0.0.1)

north:log$ grep '148.19.188.64.list.dnswl.org' named.log.0
30-Nov-2023 15:58:35.689 lame-servers: info: success resolving 
'148.19.188.64.list.dnswl.org/A' after disabling qname minimization due to 
'ncache nxdomain'

north:log$ grep '148.19.188.64.list.dnswl.org' named-dnssec.log.0
30-Nov-2023 15:58:35.689 dnssec: debug 3: view internal: validating 
148.19.188.64.list.dnswl.org/A: starting
30-Nov-2023 15:58:35.689 dnssec: debug 3: view internal: validating 
148.19.188.64.list.dnswl.org/A: attempting negative response validation from 
message
30-Nov-2023 15:58:35.689 dnssec: debug 3: view internal: validating 
148.19.188.64.list.dnswl.org/A: in validator_callback_nsec
30-Nov-2023 15:58:35.689 dnssec: debug 3: view internal: validating 
148.19.188.64.list.dnswl.org/A: resuming validate_nx
30-Nov-2023 15:58:35.689 dnssec: debug 3: view internal: validating 
148.19.188.64.list.dnswl.org/A: nonexistence proof(s) not found
30-Nov-2023 15:58:35.689 dnssec: debug 3: view internal: validating 
148.19.188.64.list.dnswl.org/A: checking existence of DS at 'org'
30-Nov-2023 15:58:35.689 dnssec: debug 3: view internal: validating 
148.19.188.64.list.dnswl.org/A: checking existence of DS at 'dnswl.org'
30-Nov-2023 15:58:35.689 dnssec: debug 3: view internal: validating 
148.19.188.64.list.dnswl.org/A: marking as answer (proveunsecure (4))

The success arrived several seconds after.  Does this mean that the (first) 
queries failed?  The dnssec log seems to indicate that the IP was not listed.

The queries in the first half of the 15:58 minute were part of an SPF evaluation.  (The 
SPF record contains an exists:%{ir}.list.dnswl.org mechanism.).  The SPF evaluation 
returned "error".  I'm trying to understand whether the cause was a DNS hiccup.

Is this a kind of error that could be orchestrated remotely?


TIA
Ale
--



--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users