Re: Trying to understand DNSSEC and BIND versions better

2009-06-12 Thread Chris Buxton

On Jun 12, 2009, at 1:50 AM, Adam Tkac wrote:

On Wed, Jun 10, 2009 at 08:37:52PM -0700, Chris Buxton wrote:

A few of our customers, running servers that they describe as
experiencing high traffic (by their own standards), have had to  
have us

rebuild BIND from the stock source code for them to solve frequent
crashing during such high traffic episodes. Frequent in this case
typically means that named either just dies or dumps core within a  
few

seconds of starting up.


Have you ever reported the problems to the Red Hat or Debian bug
tracker? Generally you don't have to be experienced programmer. Your
bug report can contain, for example, named crashed with this INSIST
failure: ... only. Your vendor will ask you more information if
needed.


Since the servers that have been affected were not mine, I did not do  
so.



I think it is a good idea to use package from your vendor because
you don't have to watch bind-announce, don't have to compile each
time when bind is updated etc. You can simply run yum update or
apt-get upgrade and you can be sure you have software without
security issues. But feel free to compile named yourself if you prefer
this approach.


There's a definite argument in favor of this. However, this assumes  
that the vendors are on the ball. For example, for a long time after  
9.3.5-P2 was released, the RH build of BIND on RHEL 5 was still using  
the -P1 patch. This was a real problem for a small number of our  
customers.


For most servers, the vendor-supplied builds work fine. But IMO for  
high-traffic servers, it makes sense for the server administrator to  
do it himself. This would be true whether or not the vendor supplied  
build had stability problems on that server.


Chris Buxton
Professional Services
Men  Mice

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Trying to understand DNSSEC and BIND versions better

2009-06-10 Thread Chris Buxton

On Jun 10, 2009, at 7:01 PM, Chris Adams wrote:

Once upon a time, Chris Buxton cbux...@menandmice.com said:

On the other hand, the builds from the Linux vendors have been less
than perfectly stable at moderately high levels of traffic.  
Rebuilding

from stock source code has always fixed this problem. We've seen this
problem with both the Red Hat build and the Debian build.


What do you mean by moderately high levels of traffic?  We run  
RHEL 5
and its build of BIND with no troubles.  I don't really see anything  
in

the source RPM for BIND that would cause it to be any more or less
stable than a build from the standard distribution (modulo stability
bugs in specific BIND versions itself).


I can't really be any more specific than I have been - the servers in  
question are not our servers, and I'm not able to analyze the source  
code of the patches and of BIND to see what might be causing problems.


A few of our customers, running servers that they describe as  
experiencing high traffic (by their own standards), have had to have  
us rebuild BIND from the stock source code for them to solve frequent  
crashing during such high traffic episodes. Frequent in this case  
typically means that named either just dies or dumps core within a few  
seconds of starting up.


The Red Hat BIND SRPM applies a variety of patches that have been back- 
ported from later versions. These patches appear to not be 100%  
compatible with the older code they use as a base. When we have torn  
apart the SRPM, replacing the base source code and disabling all  
patches except the one that changes the path to the PID files, and  
then rebuilt the RPM, the result has been able to hold up for these  
customers. In such cases, we're not changing the configure options,  
we're installing the result on the same servers that are falling over  
with the RH-supplied version, and the result is a server that runs and  
doesn't crash or dump core.


We have not bothered to build a .deb package for Ubuntu, just compiled  
the stock source code with fairly standard options. Again, this has  
always solved the problem for the affected customers. One such case  
was the most reliable at producing rapid core dumps that I have  
personally seen, until we upgraded them.


Chris Buxton
Professional Services
Men  Mice

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Trying to understand DNSSEC and BIND versions better

2009-06-09 Thread Adam Tkac
On Tue, Jun 09, 2009 at 11:22:12AM +1000, Mark Andrews wrote:
 
 In message 99e6a67a9da87041a8020fbc11f480b3031cc...@exvs01.dsw.net, Jeff 
 Lig
 htner writes:
  BIND versions on RHEL (e.g. 9.3.4-6.0.3.P1.el5_2) have backported
  patches from later BIND versions so it isn't exactly the same animal as
  the EOL 9.3 which is why it isn't listed simply as 9.3
 
 I've yet to see a vendor back port every bug fix and that is what
 would be required to really support a product in a OS which is at
 EOL by the producer.
 
 Mark

This is neverending discord between you (upstream) and vendors.

You are right the ideal approach is to backport all fixes but it
simply consumes much manpower. Update to newer version is not possible
because there are configuration incompatibilities.

Optimal software from economic perspective is usually different from
optimal software from programming perspective. If you combine both
perspectives you probably get answer why vendors backport patches only
for issues which are reported by their customers.

Regards, Adam

  -Original Message-
  From: bind-users-boun...@lists.isc.org
  [mailto:bind-users-boun...@lists.isc.org] On Behalf Of Mark Andrews
  Sent: Friday, June 05, 2009 12:23 AM
  To: Chris Adams
  Cc: comp-protocols-dns-b...@isc.org
  Subject: Re: Trying to understand DNSSEC and BIND versions better=20
  
  
  In message eysdnvogu5esgrxxnz2dnuvz_vudn...@posted.hiwaay2, Chris
  Adams write
  s:
   Since I read that the root is supposed to be signed by the end of the
   year, I am just trying to understand DNSSEC support and the various
   versions of BIND a little better here, so please don't throw too many
   rocks if I ask something stupid...
  =20
   I run the nameservers for an ISP.  For the recursive servers, what are
   the hazzards in enabling DNSSEC (once the root is signed, so no DLV
   necessary I guess)?
  
  Once the root is signed you will be able to validation answers
  where there is a unbroken chaing of trust.  DLV will still be
  useful for zones were the TLD isn't yet signed or there is
  another break in the chain of trust.
  
   I know the things that generally break with
   regular DNS, but I don't know that with DNSSEC (I know there have
  been
   DLV troubles but that's it).
  
  Not having a clean EDNS path between the validator and
  authoritative server can result in validation failures.
  EDNS responses are bigger that plain DNS and may result in
  fagmented responses.  You need to ensure that any NAT's and
  firewalls are configured to handle fragments UDP responses
  up 4096 bytes with a modern BIND.  Any forwarders used
  should also support EDNS and preferably be performing
  validation as well.
  
  Failure to re-sign a zone will cause lookups to fail.
  Failure to update DS records on DNSKEY changes will cause
  lookups to fail.  Failure to update DLV records on DNSKEY
  changes will cause lookups to fail.
  
  dig +cd +dnssec query is your friend.  This will let
  you see what is failing to validate.
  
  dig +cd +multi DNSKEY zone will provide you with the
  keyids necessary to check the signatures.
  
  dig +cd +multi DS zone will provide you with the DS
  records so you can check the linkage between parent and
  child.  Look at the key id field.
  
  dig +cd +multi DLV zone.dlvroot will provide you with the
  DS
  records so you can check the linkage between parent and
  child.  Look at the key id field.
  
  If the zone is using NSEC3 then nsec3hash can be used to
  check workout in the NSEC3 records are sane.
  
  date -u +%Y%m%d%H%M%S returns the system date in a form
  that is easy to comare to the dates in the RRSIG records.
  
  A understand of how DNSSEC works is useful.
  
  Checking if you get a DNSKEY returned, without +cd, at each zone
  cut is useful for working out where to examine more closely.
  
  dig, date and a understanding of DNSSEC is all you should
  need to identify a configuration error.  If the keyid match
  and timestamps are good and associated NSEC/NSEC3 appear
  to be sane the you will most probably have found a
  implementation bug.
  
   Currently, my servers run BIND 9.3.4-10.P1 (as patched by Red Hat in
   RHEL; we typically stick with their security patched version, since
   that's what we pay them for).  What does that mean with .ORG for
   example, where NSEC3 is used?  Would we just not see NXDOMAIN
  responses
   as validated (and what happens to unvalidated responses)?  I've put in
  a
   request to Red Hat to update to a version that supports NSEC3 but I
   don't know what their response will be yet.
  
  BIND 9.3 is already at EOL.
  
   For our authoritative servers, we'll need to set up a system to sign
  the
   zones.  Is it expected that ISPs will sign every zone they serve, or
   just the domains we consider important?  What kind

Trying to understand DNSSEC and BIND versions better

2009-06-04 Thread Chris Adams
Since I read that the root is supposed to be signed by the end of the
year, I am just trying to understand DNSSEC support and the various
versions of BIND a little better here, so please don't throw too many
rocks if I ask something stupid...

I run the nameservers for an ISP.  For the recursive servers, what are
the hazzards in enabling DNSSEC (once the root is signed, so no DLV
necessary I guess)?  I know the things that generally break with
regular DNS, but I don't know that with DNSSEC (I know there have been
DLV troubles but that's it).

Currently, my servers run BIND 9.3.4-10.P1 (as patched by Red Hat in
RHEL; we typically stick with their security patched version, since
that's what we pay them for).  What does that mean with .ORG for
example, where NSEC3 is used?  Would we just not see NXDOMAIN responses
as validated (and what happens to unvalidated responses)?  I've put in a
request to Red Hat to update to a version that supports NSEC3 but I
don't know what their response will be yet.

For our authoritative servers, we'll need to set up a system to sign the
zones.  Is it expected that ISPs will sign every zone they serve, or
just the domains we consider important?  What kind of problems might
be expected here?

In both cases, what kind of CPU and/or RAM overhead will large-scale use
of DNSSEC add?
-- 
Chris Adams cmad...@hiwaay.net
Systems and Network Administrator - HiWAAY Internet Services
I don't speak for anybody but myself - that's enough trouble.
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users