Re: [dns-operations] COM zone operational announcement: DNSSEC algorithm rollover

2023-12-07 Thread Wessels, Duane via dns-operations
--- Begin Message ---
Verisign is pleased to announce that an algorithm 13 (ECDSA) DS record has been 
published for the
COM zone, and the algorithm 8 record has been removed. Over the next few days, 
the algorithm 8
DNSKEY records will be removed from the COM zone, followed by the removal of 
algorithm 8 signatures.

We continue to expect no operational impacts for end users, but please feel 
free to reach out to us
with concerns or any observations of anomalous behavior related to this 
algorithm rollover.

DW


--- End Message ---
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] Root zone operational announcement: introducing ZONEMD for the root zone

2023-12-06 Thread Wessels, Duane via dns-operations
--- Begin Message ---
I’m happy to announce that the second phase of ZONEMD deployment for the root 
zone is now complete.  As of serial 2023120602, the hash algorithm field is set 
to 1:

;; ANSWER SECTION:
. 86400 IN ZONEMD 2023120602 1 1 
9E877AB7584FF83F738D3F51CC914AF396741B7A49E50D0C9ED9BA05 
ACA08FC9B62A56673D2D93D5720E4DD505733932

DW


> On Sep 21, 2023, at 8:04 AM, Wessels, Duane  wrote:
> 
> This work is now complete and as of approximately 13:20 UTC today all DNS 
> root servers have begun serving a root zone that includes a ZONEMD record, 
> with a private use algorithm number.
> 
> On December 6th we plan to change the root zone ZONEMD record to the SHA384 
> algorithm number, at which time it will become fully verifiable.
> 
> 
> DW
> 
>> On Sep 12, 2023, at 2:44 PM, Wessels, Duane via dns-operations 
>>  wrote:
>> 
>> 
>> 
>> Verisign and ICANN were originally planning to enable ZONEMD for
>> the root zone tomorrow, September 13th.  During a deployment to the
>> operational testing environment, we discovered a minor issue.  As
>> a result, we, in cooperation with ICANN, have decided to postpone
>> the production deployment of ZONEMD until next week, on September
>> 21st.
>> 
>> DW
> 


--- End Message ---
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


[dns-operations] COM zone operational announcement: DNSSEC algorithm rollover

2023-11-28 Thread Wessels, Duane via dns-operations
--- Begin Message ---
Verisign will soon begin the transition to DNSSEC algorithm 13 (ECDSA) for the 
COM zone. Over the
next few days, algorithm 13 signatures will start to appear in the zone, 
followed by the algorithm
13 DNSKEY records. We expect the DS record for the COM zone to change from 
algorithm 8 to algorithm
13 on or around December 7. Additional information can be found at our blog 
post and DNS-OARC
presentation URLs below:

https://blog.verisign.com/security/dnssec-algorithm-update/
https://indico.dns-oarc.net/event/47/contributions/1012/

We expect no operational impacts for end users, but please feel free to reach 
out to us with concerns
or any observations of anomalous behavior related to this algorithm rollover.

DW


--- End Message ---
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] NET zone operational announcement: DNSSEC algorithm rollover

2023-11-08 Thread Wessels, Duane via dns-operations
--- Begin Message ---
Verisign is pleased to announce that an algorithm 13 (ECDSA) DS record has been 
published for the
NET zone, and the algorithm 8 record has been removed. Over the next few days, 
the algorithm 8
DNSKEY records will be removed from the NET zone, followed by the removal of 
algorithm 8 signatures.

We continue to expect no operational impacts for end users, but please feel 
free to reach out to us
with concerns or any observations of anomalous behavior related to this 
algorithm rollover.

DW


--- End Message ---
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


[dns-operations] NET zone operational announcement: DNSSEC algorithm rollover

2023-10-31 Thread Wessels, Duane via dns-operations
--- Begin Message ---
Verisign will soon begin the transition to DNSSEC algorithm 13 (ECDSA) for the 
NET zone. Over the next few days, algorithm 13 signatures will start to appear 
in the zone, followed by the algorithm 13 DNSKEY records. We expect the DS 
record for the NET zone to change from algorithm 8 to algorithm 13 on or around 
November 8th. Additional information can be found at our blog post and DNS-OARC 
presentation URLs below:

https://blog.verisign.com/security/dnssec-algorithm-update/
https://indico.dns-oarc.net/event/47/contributions/1012/

We expect no operational impacts for end users, but please feel free to reach 
out to us with concerns or any observations of anomalous behavior related to 
this algorithm rollover.

DW


--- End Message ---
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] Root zone operational announcement: introducing ZONEMD for the root zone

2023-09-21 Thread Wessels, Duane via dns-operations
--- Begin Message ---
This work is now complete and as of approximately 13:20 UTC today all DNS root 
servers have begun serving a root zone that includes a ZONEMD record, with a 
private use algorithm number.

On December 6th we plan to change the root zone ZONEMD record to the SHA384 
algorithm number, at which time it will become fully verifiable.


DW

> On Sep 12, 2023, at 2:44 PM, Wessels, Duane via dns-operations 
>  wrote:
> 
> 
> 
> Verisign and ICANN were originally planning to enable ZONEMD for
> the root zone tomorrow, September 13th.  During a deployment to the
> operational testing environment, we discovered a minor issue.  As
> a result, we, in cooperation with ICANN, have decided to postpone
> the production deployment of ZONEMD until next week, on September
> 21st.
> 
> DW


--- End Message ---
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] Root zone operational announcement: introducing ZONEMD for the root zone

2023-09-12 Thread Wessels, Duane via dns-operations
--- Begin Message ---
Verisign and ICANN were originally planning to enable ZONEMD for
the root zone tomorrow, September 13th.  During a deployment to the
operational testing environment, we discovered a minor issue.  As
a result, we, in cooperation with ICANN, have decided to postpone
the production deployment of ZONEMD until next week, on September
21st.

DW

--- End Message ---
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


[dns-operations] EDU zone operational announcement: DNSSEC algorithm rollover

2023-09-12 Thread Wessels, Duane via dns-operations
--- Begin Message ---
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Verisign is pleased to announce that an algorithm 13 (ECDSA) DS record
has been published for the EDU zone, and the algorithm 8 record has
been removed. Over the next few days, the algorithm 8 DNSKEY records
will be removed from the EDU zone, followed by the removal of algorithm
8 signatures.

We continue to expect no operational impacts for end users, but please
feel free to reach out to us with concerns or any observations of
anomalous behavior related to this algorithm rollover.

DW
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (GNU/Linux)

iQEcBAEBCAAGBQJlAIwcAAoJEGyZpGmowJiNEj4H/R07bC4outa2znVIh7BIsolu
mamlG2+NlOBmdAOTzk8vdmoUMy11RHeG0W+6o6oQS9gALUgj4shxPF5z+Je0R6Us
Y54HDnE4mi1KAGKOtg/AE5RYCZeA/rhLk/qxRnLiUBtlmuRwMpjkJ5k+viCEFVX+
IyZPWEJyDSC8bFx4LThYt7AP093r74vjKHa2wMffa+3VHZgrEpHReL6Na149+u3L
Idb1In9cCs6nYFp/DuMopdVHy3EqK6psPSCt7jCG27qAtM4+ormsCPYYo4KI7RUo
lF7X2SdDmVUfoL4lzrLUzl7MFBxJxNYCt/yPvN/VBLw2Yby2AhPHVQt7lpjIQXo=
=/uAl
-END PGP SIGNATURE-

--- End Message ---
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


[dns-operations] EDU zone operational announcement: DNSSEC algorithm rollover

2023-09-05 Thread Wessels, Duane via dns-operations
--- Begin Message ---
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Verisign will soon begin the transition to DNSSEC algorithm 13 (ECDSA)
for the EDU zone.  Over the next few days, algorithm 13 signatures will
start to appear in the zone, followed by the algorithm 13 DNSKEY records.
We expect the DS record for the EDU zone to change from algorithm 8
to algorithm 13 between September 12-15. Additional information can be
found at our blog post and DNS-OARC presentation URLs below:

https://blog.verisign.com/security/dnssec-algorithm-update/
https://indico.dns-oarc.net/event/47/contributions/1012/

We expect no operational impacts for end users, but please feel free to
reach out to us with concerns or any observations of anomalous behavior
related to this algorithm rollover.

DW
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (GNU/Linux)

iQEcBAEBCAAGBQJk90tSAAoJEGyZpGmowJiNynsIAIWBx6Gc8CyOl0pcr65a3aUh
FnrrteufEs1KvNk+HtexDs8opUGz8sKf4zG/ABj4NtTQFRwsvD/nxh8q+fnu4Vci
niSPbJLZcadY+344FioGNE4/jE28jKmItx7fFmTBoaBcF5iy1aS5xSh4vOA6fcSy
snJeYd6VsnrezK6IujgmiqAg7iLwl+YHvPnu8lJuXEpUPqBmO/EEHZPn7oEps8Xf
A8duusfKIvP6zrIF0vnnqwS0TgUpTdam5MGtVAkv+JUlpzRmqAYNcQd872nYUVIp
5qZ1R+pjHsngwe+8pf/LQtpYwKjaiP06CUbZH8hlg3ioDWSLEAjs0NEgb45Wmhw=
=Wi2m
-END PGP SIGNATURE-

--- End Message ---
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] Root zone operational announcement: introducing ZONEMD for the root zone

2023-07-22 Thread Wessels, Duane via dns-operations
--- Begin Message ---
Hi Otto,

I see now.  My email had a typo / mistake.  Sept 6th should be Sept 13th.  

DW



> On Jul 21, 2023, at 11:48 PM, Otto Moerbeek  wrote:
> 
> Thanks, but I'm stilll puzzled,
> 
> According to your original post the publishing of the downloadable
> root zone with a ZONEMD record starts at Sept 6. It is not clear to me
> what Hash Algorithm it will use on that date, as the date is before
> Sept 13.
> 
> -Otto
> 
> 
> On Sat, Jul 22, 2023 at 05:04:53AM +, Wessels, Duane wrote:
> 
>> Hi Otto,
>> 
>> From 2023-09-13 to 2023-12-06 the Hash Algorithm field of the ZONEMD record 
>> will be set to 241 (the first value in the private use range). 
>> 
>> On 2023-12-06 we will change it to Hash Algorithm 1, which is SHA-384.
>> 
>> DW
>> 
>> 
>>> On Jul 20, 2023, at 11:02 PM, Otto Moerbeek  wrote:
>>> 
>>> Hello,
>>> 
>>> thanks you for working on this!
>>> 
>>> From the description it is not clear what the Hash Algorithm of the
>>> ZONEMD record included in the downloadable zone file will be per Sept
>>> 6th. Will this ZONEMD record also use a private algorihtm and switch
>>> to SHA-384 at a later moment? If so, when?
>>> 
>>> Thanks,
>>> 
>>> -Otto
>>> 
>>> On Wed, Jul 19, 2023 at 04:10:25PM +, Wessels, Duane via dns-operations 
>>> wrote:
>>> 
>>>> Date: Wed, 19 Jul 2023 16:10:25 +
>>>> From: "Wessels, Duane" 
>>>> To: Andy Smith via dns-operations 
>>>> Subject: Root zone operational announcement: introducing ZONEMD for the
>>>> root zone
>>>> 
>>>> I am pleased to announce that Message Digests for DNS Zones, also known as 
>>>> ZONEMD, will be added to the root zone later this year.  This feature, 
>>>> specified in RFC 8976, adds cryptographic data protections to the zone as 
>>>> a whole, allowing the recipient to verify the authenticity of the zone’s 
>>>> contents.
>>>> 
>>>> ZONEMD will be added to the root zone using a phased approach.  On 
>>>> September 13, 2023, a ZONEMD record will make its first appearance in the 
>>>> root zone.  At this time the Hash Algorithm field will be set to a private 
>>>> use algorithm number, making the ZONEMD record deliberately unverifiable.
>>>> 
>>>> On December 6, 2023, the ZONEMD record will be published with the SHA-384 
>>>> Hash Algorithm, thereby making it verifiable.
>>>> 
>>>> We expect no operational impacts for end users.  ZONEMD does not affect 
>>>> root zone queries and responses.  The root server operators have agreed to 
>>>> not alter their zone ingestion processes for at least a year after ZONEMD 
>>>> is first introduced.
>>>> 
>>>> Anyone that downloads the root zone file from 
>>>> http://secure-web.cisco.com/13zHe0PSUNNCJBM54qbqfvmLTQg1GfbkWLEKyj11uJKxr0cKwV4m8nmumCACCRc4TgWQiGSCfSGuab49nQ6t190PzZtdsghnWGBape45q7yscRuI72y4rVA9FKtruoIUJQOYRD6hxmpgoa0lss35RtP8oNP419dfbfY8ihpz2HiszKMFbjYaocQQtWkQRKyEoPgOCXuUYIOZH5HpdhzIBT3zEwLzflnqL6eR3vOHzkuaVR_loD-7WM4o8M-F3-mIdQ6_IU5BkH_ZZ8ZDDpoXPLuPtbA4-cR5rjj38JhobF0bvH1PXHByckj2a54_02zMz/http%3A%2F%2Fwww.internic.net
>>>>  or rs.internic.net should be aware that it will include the new ZONEMD 
>>>> resource record in its native presentation format starting on September 
>>>> 6th.
>>>> 
>>>> Please feel free to follow up with any questions or concerns.
>>>> 
>>>> References and further reading:
>>>> 
>>>> [1] RFC 8976: “Message Digest for DNS Zones”, 
>>>> https://secure-web.cisco.com/1XacvzAe3KCmD305ieQ292ovYQ65x-D9JyNQdhLvttzBjgk_MG_6FPETg8ekoItXo6qHCk148b0VNJDrijtKvnuhj8UrvfHd7HBzGvj4F4ggvNm8WmQRjo5OBRwa5Oq9zVIsC8y89tmSj2huHT0eluDy04igbLGg3IfodIUxONEjurDcYsu6e9cKU0ovYEEg-lW5fWr5WHv3k35aCnqYXpmej0QhYGklxxdrPwiuQCW49VFfxdg_MFcumelbQdTeOIBwvSoHdjUP3Cy6h-jFkMLRcMch-gtVEooh55H6OUK7QqXX-lgDEjF1Y7kfAR5xz/https%3A%2F%2Fwww.rfc-editor.org%2Frfc%2Frfc8976
>>>> [2] Root Server Operators Statement on adding ZONEMD to the root zone, 
>>>> https://secure-web.cisco.com/1csi7pcWnfEk3MLCMTDpMIepUdApvVU-b-tnpRX8PnOKn9nNkbrgZcZH62k21N7DUG8idMbIuxr-PBwCg3jX0SY2AegsYwVyMTfeARtd1s8147gy-akpwRWMoYlEgiJeWr4cw-JDy68YPNrnP0kNTeaWXhUsXID92S4aPLSCsW1xsNRaXBxRoeLaTw4BJnfQXdKOWbCUPpgIKwolYYobY4I0A3vwcYS-PnVIxOcaCMe3k8haS7ZzAP0Udcs1prvi9xIIdE3FL1lXocAMOJeZiNlri6V4KDKge_hGAMm32TFeDk5oC_eoM68noNMSAjTCI/https%3A%2F%2Froot-servers.org%2Fmedia%2Fnews%2F2022-08-Statement_on

Re: [dns-operations] Root zone operational announcement: introducing ZONEMD for the root zone

2023-07-21 Thread Wessels, Duane via dns-operations
--- Begin Message ---
Hi Otto,

>From 2023-09-13 to 2023-12-06 the Hash Algorithm field of the ZONEMD record 
>will be set to 241 (the first value in the private use range). 

On 2023-12-06 we will change it to Hash Algorithm 1, which is SHA-384.

DW


> On Jul 20, 2023, at 11:02 PM, Otto Moerbeek  wrote:
> 
> Hello,
> 
> thanks you for working on this!
> 
> From the description it is not clear what the Hash Algorithm of the
> ZONEMD record included in the downloadable zone file will be per Sept
> 6th. Will this ZONEMD record also use a private algorihtm and switch
> to SHA-384 at a later moment? If so, when?
> 
> Thanks,
> 
> -Otto
> 
> On Wed, Jul 19, 2023 at 04:10:25PM +, Wessels, Duane via dns-operations 
> wrote:
> 
>> Date: Wed, 19 Jul 2023 16:10:25 +
>> From: "Wessels, Duane" 
>> To: Andy Smith via dns-operations 
>> Subject: Root zone operational announcement: introducing ZONEMD for the
>> root zone
>> 
>> I am pleased to announce that Message Digests for DNS Zones, also known as 
>> ZONEMD, will be added to the root zone later this year.  This feature, 
>> specified in RFC 8976, adds cryptographic data protections to the zone as a 
>> whole, allowing the recipient to verify the authenticity of the zone’s 
>> contents.
>> 
>> ZONEMD will be added to the root zone using a phased approach.  On September 
>> 13, 2023, a ZONEMD record will make its first appearance in the root zone.  
>> At this time the Hash Algorithm field will be set to a private use algorithm 
>> number, making the ZONEMD record deliberately unverifiable.
>> 
>> On December 6, 2023, the ZONEMD record will be published with the SHA-384 
>> Hash Algorithm, thereby making it verifiable.
>> 
>> We expect no operational impacts for end users.  ZONEMD does not affect root 
>> zone queries and responses.  The root server operators have agreed to not 
>> alter their zone ingestion processes for at least a year after ZONEMD is 
>> first introduced.
>> 
>> Anyone that downloads the root zone file from 
>> http://secure-web.cisco.com/13zHe0PSUNNCJBM54qbqfvmLTQg1GfbkWLEKyj11uJKxr0cKwV4m8nmumCACCRc4TgWQiGSCfSGuab49nQ6t190PzZtdsghnWGBape45q7yscRuI72y4rVA9FKtruoIUJQOYRD6hxmpgoa0lss35RtP8oNP419dfbfY8ihpz2HiszKMFbjYaocQQtWkQRKyEoPgOCXuUYIOZH5HpdhzIBT3zEwLzflnqL6eR3vOHzkuaVR_loD-7WM4o8M-F3-mIdQ6_IU5BkH_ZZ8ZDDpoXPLuPtbA4-cR5rjj38JhobF0bvH1PXHByckj2a54_02zMz/http%3A%2F%2Fwww.internic.net
>>  or rs.internic.net should be aware that it will include the new ZONEMD 
>> resource record in its native presentation format starting on September 6th.
>> 
>> Please feel free to follow up with any questions or concerns.
>> 
>> References and further reading:
>> 
>> [1] RFC 8976: “Message Digest for DNS Zones”, 
>> https://secure-web.cisco.com/1XacvzAe3KCmD305ieQ292ovYQ65x-D9JyNQdhLvttzBjgk_MG_6FPETg8ekoItXo6qHCk148b0VNJDrijtKvnuhj8UrvfHd7HBzGvj4F4ggvNm8WmQRjo5OBRwa5Oq9zVIsC8y89tmSj2huHT0eluDy04igbLGg3IfodIUxONEjurDcYsu6e9cKU0ovYEEg-lW5fWr5WHv3k35aCnqYXpmej0QhYGklxxdrPwiuQCW49VFfxdg_MFcumelbQdTeOIBwvSoHdjUP3Cy6h-jFkMLRcMch-gtVEooh55H6OUK7QqXX-lgDEjF1Y7kfAR5xz/https%3A%2F%2Fwww.rfc-editor.org%2Frfc%2Frfc8976
>> [2] Root Server Operators Statement on adding ZONEMD to the root zone, 
>> https://secure-web.cisco.com/1csi7pcWnfEk3MLCMTDpMIepUdApvVU-b-tnpRX8PnOKn9nNkbrgZcZH62k21N7DUG8idMbIuxr-PBwCg3jX0SY2AegsYwVyMTfeARtd1s8147gy-akpwRWMoYlEgiJeWr4cw-JDy68YPNrnP0kNTeaWXhUsXID92S4aPLSCsW1xsNRaXBxRoeLaTw4BJnfQXdKOWbCUPpgIKwolYYobY4I0A3vwcYS-PnVIxOcaCMe3k8haS7ZzAP0Udcs1prvi9xIIdE3FL1lXocAMOJeZiNlri6V4KDKge_hGAMm32TFeDk5oC_eoM68noNMSAjTCI/https%3A%2F%2Froot-servers.org%2Fmedia%2Fnews%2F2022-08-Statement_on_ZONEMD.pdf
>> [3] RZERC003: “Adding Zone Data Protections to the Root Zone”, 
>> https://secure-web.cisco.com/12BOkeZeIXXEc8bHPskskIPYYEB5j6atSHInZVGViHpuEsWFd3i3ORxxQF3d-hBwCUZsL9QLcUDwYl0JO1OMo_1bDLdiEr6SE4gT85zTFYDCN-Y3z0bBPvh6FYjzXltQy1zQY4L4-Z3BrnqpukWZRGIr3SkjWMkw8638PhkW8B41dLIS-IHIwqzAAvoY3lvNNWBJ-Eqon1isiSlBcfFrjJmbexUozG_3TRgPeaPMfzWUYfAAXeJ3wuOe3ym7K6QjqtXdi1KbHhX8_0K0hKVLNAoQ3kqKE8jzExHxgqEJtBrAU-pw_Zd23n-_lt66FBC13/https%3A%2F%2Fwww.icann.org%2Fuploads%2Fckeditor%2Frzerc-003-en.pdf
>> [4] Verisign Blog: “Adding ZONEMD Protections to the Root Zone”, 
>> https://blog.verisign.com/security/root-zone-zonemd/
>> [5] APNIC Ping Podcast episode “Adding ZONEMD protections to the root zone”, 
>> https://secure-web.cisco.com/18iOqVl2cAOdTphmSsXOmBUjIRxkAH7WRakcRt_PS4P13-NQr-6u5XqSCjbCDss9R8Zm5S3akf5o1AEq5ib0ezfpX-l0Ev3ZXbLj2p-WCMQHti2hedZNF99ok0C33OrnviXVDn5Qnrqa7BnBIP9ec38evs3V4ucParLvxRoMmYIY9lA_-GuAvcWpDTLphlhWTXXbV7LNUzprP0MOKGCw67sbVz5VX98v7N1bGZuGQrft-PzTS_P_oa9i2NA8ZI4niQK7xED4v8dKK4NXNyTRJjvBEPGQ-D9B0oVzm

[dns-operations] Root zone operational announcement: introducing ZONEMD for the root zone

2023-07-19 Thread Wessels, Duane via dns-operations
--- Begin Message ---
I am pleased to announce that Message Digests for DNS Zones, also known as 
ZONEMD, will be added to the root zone later this year.  This feature, 
specified in RFC 8976, adds cryptographic data protections to the zone as a 
whole, allowing the recipient to verify the authenticity of the zone’s contents.

ZONEMD will be added to the root zone using a phased approach.  On September 
13, 2023, a ZONEMD record will make its first appearance in the root zone.  At 
this time the Hash Algorithm field will be set to a private use algorithm 
number, making the ZONEMD record deliberately unverifiable.

On December 6, 2023, the ZONEMD record will be published with the SHA-384 Hash 
Algorithm, thereby making it verifiable.

We expect no operational impacts for end users.  ZONEMD does not affect root 
zone queries and responses.  The root server operators have agreed to not alter 
their zone ingestion processes for at least a year after ZONEMD is first 
introduced.

Anyone that downloads the root zone file from www.internic.net or 
rs.internic.net should be aware that it will include the new ZONEMD resource 
record in its native presentation format starting on September 6th.

Please feel free to follow up with any questions or concerns.

References and further reading:

[1] RFC 8976: “Message Digest for DNS Zones”, 
https://www.rfc-editor.org/rfc/rfc8976
[2] Root Server Operators Statement on adding ZONEMD to the root zone, 
https://root-servers.org/media/news/2022-08-Statement_on_ZONEMD.pdf
[3] RZERC003: “Adding Zone Data Protections to the Root Zone”, 
https://www.icann.org/uploads/ckeditor/rzerc-003-en.pdf
[4] Verisign Blog: “Adding ZONEMD Protections to the Root Zone”, 
https://blog.verisign.com/security/root-zone-zonemd/
[5] APNIC Ping Podcast episode “Adding ZONEMD protections to the root zone”, 
https://blubrry.com/ping_podcast/108940688/adding-zonemd-protections-to-the-root-zone/


DW


--- End Message ---
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


[dns-operations] DNS .com/.net resolution problems in the Asia/Pacific region

2023-07-11 Thread Wessels, Duane via dns-operations
--- Begin Message ---
All,

Last week, during a migration of one of our DNS resolution sites in Singapore, 
from one provider to another, we unexpectedly lost management access and the 
ability to deliver changes and DNS updates to the site. Following our standard 
procedure, we disabled all transit links to the affected site. Unfortunately, a 
peering router remained active, which was not immediately obvious to our teams 
due to the lack of connectivity there.

Over the weekend, this caused an issue that may have affected the ability of 
some internet users in the region to reach some .com and .net domains, as 
DNSSEC signatures on the site began expiring. The issue was resolved by 
powering off the site’s peering router, causing the anycast route announcement 
to be withdrawn and traffic to be directed to other sites.

We are updating our processes and procedures and will work to prevent such 
issues from recurring in the future.

The Singapore site is part of a highly redundant constellation of more than 200 
sites that make up our global network. This issue had no effect on the core 
resolution of .com and .net resolution globally. We apologize to those who may 
have been affected.

DW


--- End Message ---
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] What is the reason of J-Root doesn't serve the arpa zone?

2021-12-04 Thread Wessels, Duane via dns-operations
--- Begin Message ---


> On Dec 3, 2021, at 7:05 PM, Paul Vixie via dns-operations 
>  wrote:
> 
> 
> 2870 was wrong in this respect, and should be revised to allow ARPA.
> 
> vixie

Well, it sort of was.  2870 was updated by 7720, which notes that the 
operational requirements are
given in RSSAC001, which in turn says:

Root Servers also serve additional zones.  All Root Servers are
authoritative for the ROOT-SERVERS.NET zone and currently twelve of
the thirteen are authoritative for the ARPA zone.

DW


--- End Message ---
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] What is the reason of J-Root doesn't serve the arpa zone?

2021-12-03 Thread Wessels, Duane via dns-operations
--- Begin Message ---
Thanks for the opportunity to add some clarity around J-root and
the arpa zone.  Here is a brief history of events that can provide
some context:

In the 1996 time frame there were 9 root servers: A through I.  In
addition to the root zone, they also served a number of TLDs,
including com, net, org, and arpa.

It is important to understand that when Jon Postel expanded the
root servers in 1997 to include J, K, L, and M, the new ones only
served the root and root-servers.net zones.

In June 2000 RFC 2870 was published with section 2.5 stating:

  [root servers] also MUST NOT provide secondary service for
  any zones other than the root and root-servers.net zones.

Around this same time (+/- 1 year) the first nine root servers
stopped serving com, net, and org, but not arpa.

In November 2002 K, L, and M were added to the NS list for arpa,
but J was not.  We can't speak to decisions made by the other
operators, but Verisign chose not to put j.root-servers.net in the
NS set based on the language of RFC 2870.

DW


> On Dec 2, 2021, at 10:08 PM, Yasuhiro Orange Morishita / 森下泰宏 
>  wrote:
> 
> Caution: This email originated from outside the organization. Do not click 
> links or open attachments unless you recognize the sender and know the 
> content is safe. 
> 
> Hi,
> 
> Now I'm writing an article for Japanese people that introduces the
> IETF's recent DNS-related activities, and I have a question about the
> current "arpa" zone.
> 
> RFC 9120 says:
> 
>   Historically, the "arpa" zone has been hosted on almost all of the
>   root nameservers (NSs), and [RFC3172] envisages the "arpa" domain to
>   be "sufficiently critical that the operational requirements for the
>   root servers apply to the operational requirements of the "arpa"
>   servers".  To date, this has been implemented by serving the "arpa"
>   domain directly on a subset of the root server infrastructure.
> 
> Yes, it is "almost all", not "all".  Currently, the "arpa" zone has
> been hosted on 12 root servers, except to J-Root.
> 
> Probably, this is a part of the "Historically", but I want to know why.
> 
> -- Orange
> 
> -- 
> Yasuhiro 'Orange' Morishita 
> ___
> dns-operations mailing list
> dns-operations@lists.dns-oarc.net
> https://secure-web.cisco.com/1UPWQoE5QZLgSrY5t3Pk7jXYfTh275uVJ8x1xZqeVty8lc-Yaa_VRvU_qscPHa63slHPejQEwqAeGcHQqGLFc8cxEazngQZbzGtRJs-kpGh1Ix2ImAu6_Db9Ei0BEH7ExEYpVkdqdAdQoOhIczU-CA_RzUA5Q2ZcnDm3-NF07D4OKwhGGmE81IOScm_VxTGW5pUfkPp1xa7_aUn26-u0HJ6CCRP33Yi1TAEz0TCAxZtMHo4t0TVlG9rqLS6IBN0is8o8vD9eZMN5UAsokuWH72Q/https%3A%2F%2Flists.dns-oarc.net%2Fmailman%2Flistinfo%2Fdns-operations
> 


--- End Message ---
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] Lot's of TXT queries from Google

2021-10-07 Thread Wessels, Duane via dns-operations
--- Begin Message ---
Moritz,

I can't explain the TXT queries, but the NS queries seem to be Google's method 
of doing qname minimization, with an added nonce value.  See 
https://indico.dns-oarc.net/event/39/contributions/864/ and 
https://developers.google.com/speed/public-dns/docs/security?hl=en#nonce_prefixes

DW


> On Oct 7, 2021, at 4:50 AM, Moritz Müller via dns-operations 
>  wrote:
> 
> 
> From: Moritz Müller 
> Subject: Lot's of TXT queries from Google
> Date: October 7, 2021 at 4:50:21 AM PDT
> To: 
> 
> 
> Hi,
> 
> For the second time in a few weeks we noticed a significant increase in 
> queries for NS and TXT records at our .nl name servers, originating almost 
> exclusively from the Public DNS resolvers of Google
> Did someone else noticed something similar or has an explanation?
> 
> In comparison to beginning of September, the number of NS queries increased 2 
> fold and the number of TXT queries almost 6 fold.
> At some point, 25% of all queries to our name servers for .nl where for TXT 
> record.
> 
> The resolvers query either for a domain name following the pattern 
> _dmarc.foo.nl or default._domainkey.foo.nl.
> Where foo is a random string, 12 characters long.
> 
> Examples are:
> _dmarc.mdvlxtagogij.nl.
> default._domainkey.vppj4svmbclt.nl.
> 
> The queried second level domain names are not registered and queries for the 
> same domain name are repeated 3 to 5 times.
> At some point, 80% of all TXT queries from google had these patterns, 36% of 
> all queries from Google resolvers.
> 
> The queries started ramping up around 2021-09-05 and reached their peak at 
> 2021-09-18. They never reached a concerning level, but we first noticed them 
> because our machine processing the incoming PCAP files couldn’t cope anymore.
> 
> We assume that this is likely not an attack but some tests/measurements, 
> which got a bit out of hand. But since we don’t see the origin of the queries 
> behind the Google resolvers, we’re not sure to whom to reach out.
> 
> —
> Moritz
> 
> —
> SIDN | Meander 501 | 6825 MD | Postbus 5022 | 6802 EA | ARNHEM
> T +31 (0)26 352 55 00
> moritz.mul...@sidn.nl | www.sidn.nl
> pgp key: https://pgp.mit.edu/pks/lookup?op=get=0x0AF8922B1659B448
> 
> 
> 
> Caution: This email originated from outside the organization. Do not click 
> links or open attachments unless you recognize the sender and know the 
> content is safe. 
> 
> ___
> dns-operations mailing list
> dns-operations@lists.dns-oarc.net
> https://secure-web.cisco.com/1j0tUWdtkXBzH95d3NJuJ85PVsyNQjXNWdO32ER-v_iT_UjT59vzGAmM02xy_33dtoTHStrRux8cAZ5IJLBUBd0AnsjCN0CSNyR6a3HYO9F4zJlt7_KL2YK4NW13MBo9xJN5dqR6R0rKlERPBOlMfhxmZBw7tIJHwfTHN6lsPwpxyH2XxqTPH9HQTFkJ9A84Bq6Uhc9MQjU-TlN6ef9LLrCbsG7abZ9xqHMbBQLToaQcMLkmMTLbepYwv1EZH_Bn7UZUhfEVyND7-IIZxugF3ow/https%3A%2F%2Flists.dns-oarc.net%2Fmailman%2Flistinfo%2Fdns-operations



smime.p7s
Description: S/MIME cryptographic signature
--- End Message ---
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] RRSIG expiry versus TTL

2021-09-07 Thread Wessels, Duane via dns-operations
--- Begin Message ---


> On Sep 5, 2021, at 9:08 AM, Matthew Richardson  
> wrote:
> 
>> the RRSIG TTL should match the NS record TTL, but ..., the validating 
>> resolver does not care, and should not, about RRSIG TTL. So the 
>> difference between the expiration of the rrsig and the TTL shouldn't 
>> or doesn't impact the online services.
> 

That may be true for validating recursive name servers, because the spec
says the validator should use the minimum of the two TTLs if they differ.
However, if there is a non-validating resolver (cache) in the resolution
path then they can be cached differently and the wrong signatures could
be returned to a client.

DW



smime.p7s
Description: S/MIME cryptographic signature
--- End Message ---
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] Verisign won't delete obsolete glue records?

2021-03-02 Thread Wessels, Duane via dns-operations
--- Begin Message ---


> On Mar 2, 2021, at 12:10 PM, Doug Barton  wrote:
> 
> On 3/2/21 11:49 AM, Andrew Sullivan wrote:
>> On Mon, Mar 01, 2021 at 04:35:47PM -0800, Doug Barton wrote:
>>> 
>>> 
>>> Perhaps I didn't ask my question clearly enough. Let's take a delegation 
>>> for example.com to ns1.example.info and ns2.example.info. There will be no 
>>> host records at Verisign for those two names, right? 
>> If the registry uses both domain objects and host objects ...
> 
> I think you missed my followup where I indicated that from what I can see, 
> Verisign is creating host objects for every host mentioned in a delegation 
> regardless of bailiwick, but not putting glue records into the zone where 
> they are not needed.

Hi Doug,

Verisign does not create these on its own, but rather requires the registrant 
to set at least one IP address on what the EPP RFC 5732 calls an "internal 
host."  Any .COM or .NET host in the registry is considered an internal host.

An internal host can be used as a delegating name server for any .COM or .NET 
domain in the registry.  The delegation is made in the registry on the creation 
of a domain or an update of a domain. The host must exist prior to the 
delegation from a domain, so they must be set with the IP addresses to cover 
the case of an in-bailiwick name server.

You said "but not putting glue records into the zone where they are not 
needed."  The only time something like that would happen is for what is called 
orphan glue.  As has been discussed on this list before, Verisign does not 
publish orphan glue records in the zone files you can get (e.g. via CZDS) but 
will include orphan glue records in DNS delegation responses when needed.  But 
I don't think that's what's happening in your case.

DW


> 
> For peace of mind I would much rather see the IP addresses in those host 
> objects removed when they are not needed as glue, rather than being ignored, 
> since that reduces the chance of a spurious glue record being published 
> accidentally.
> 
> Doug
> ___
> dns-operations mailing list
> dns-operations@lists.dns-oarc.net
> https://secure-web.cisco.com/11YBI52gE988BTx9qH-YZJ5y3kkSasGz65vyjTzgs3vqRFY7nRoAyfkfxumG1bZPJotjwx4uuIjryH2_f8ueNVktf2X_rFnINGggkxbDxCA3Q0NreJNioDmaQpThWqEd49BUHiEjovZuDVKmAzbGVW1Ky5NolUVR-KMq4Qs-JhSSIZ7hQyTxFf-iwVJe6snj2oLUXSiDqfX2DSPEjtQkxA67-QfywcNTu_e6hvxvMa_Dl_xNgiwCu5J28JCNaZIr2_7o8VDqqoCjcINVEQFSiBg/https%3A%2F%2Flists.dns-oarc.net%2Fmailman%2Flistinfo%2Fdns-operations
> 



smime.p7s
Description: S/MIME cryptographic signature
--- End Message ---
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] Verisign won't delete obsolete glue records?

2021-03-01 Thread Wessels, Duane via dns-operations
--- Begin Message ---


> On Mar 1, 2021, at 4:01 PM, Jim Reid  wrote:
> 
> The original glue records will not be obsolete even though you believe they 
> are. There must be at least one other delegation in the .com registry which 
> references the nameserver object(s) for the glue record(s) you think are no 
> longer relevant.

This would be my guess as well.

You can use dns.coffee to find occurrences of this.  For example:

https://dns.coffee/nameservers/b.iana-servers.net

DW



smime.p7s
Description: S/MIME cryptographic signature
--- End Message ---
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


[dns-operations] Incorrect NSEC responses from Verisign root server instances

2021-02-26 Thread Wessels, Duane via dns-operations
--- Begin Message ---
On February 26, 2021 at ~1431 EST, Verisign was notified that some
of its root server instances were returning incorrect responses for
queries of type NSEC.  We identified the subset of instances affected
and took them out of service (as of ~1506 EST).  The remainder of
our systems are responding appropriately.

The NSEC resource record is used in some DNSSEC-signed zones to
provide proofs of non-existence.  In the normal process of iterating
and resolving domain names, validating recursive name servers do
not send queries of type NSEC.  However, an end-user of a recursive
name server may generate NSEC queries using custom software or
debugging tools, such as 'dig'. These queries are extremely rare
and infrequent in nature and the normal internet user would be
agnostic to this condition existing.

The incorrect responses from Verisign's root server instances
provided an empty owner name in the Authority section records of a
delegation response to the NSEC query.  The empty owner name
corresponds to the root label.  A recursive name server that processed
one of these incorrect responses could change its cached root NS
RRset, meaning that future queries to be resolved in the context
of the root zone could be sent to incorrect names servers which are
not authoritative for the root zone.

Verisign is in the process of patching affected systems, and rolling
out the new version, and bringing affected instances back into
service in accordance with established operational procedures.

Additionally, we expect this may bring some new attention to the
way in which authoritative name servers respond to queries of type
NSEC.  Some implementations respond with referrals, while others
respond with an NSEC RR in the Answer section.  Verisign will be
pleased to work with the community if there are ambiguities in the
relevant RFCs (e.g. 4035) that would benefit from clarification,
as current behavior beyond this subset of our name servers suggests.

Thank you to David Kinzel of Shaw Communications for bringing this to
our attention.

-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (GNU/Linux)

iQEcBAABAgAGBQJgOaBzAAoJEGyZpGmowJiNJqoH/iQcOWk3eMBondU4qyWR8V+M
sGj61eugKxsj5oTRx8kdDDYqCGxxnvdDZrHqxN5aQlVuXePfwuA3bxne+Mm7Oluo
RH4lWfuLJntrIHD+AStxfthQZGUCUV/LwX/1wRje1+DbxoGUl5dStu/DV03ViNiO
V7SQJf7yxeTtw3Hsb4zrTL/r/gLhy1lXeG9VzW1NIDrLCd1JJQ82WRvWr0YDSEBh
PRHT6p89uzLzGnkAsmp0GlfZ1G5oia2Svc/YlKowbBG28Egmgmu5IrZcyXzltYgg
oLi/YD3HWAxpIvDFEIPLLbbwLKOGowdleKUYlQXNhewkrsH282SyOaewyjGXQX4=
=h364
-END PGP SIGNATURE-



smime.p7s
Description: S/MIME cryptographic signature
--- End Message ---
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] anybody awake over at comcast.net?

2021-02-09 Thread Wessels, Duane via dns-operations
--- Begin Message ---


> On Feb 9, 2021, at 9:58 AM, Matthew Richardson  
> wrote:
> 
> On Tue, 9 Feb 2021 16:43:20 +, Duane Wessels wrote:-
> 
>> If you use Nagios or something compatible, there is this:
>> 
>> http://secure-web.cisco.com/1ZWcEZ_A3D0HVUDh0W30HiqK06_fxVH7k6Y8MQ0xEkq1R7DisrP18NBN1e4yKETi4R0R3tKtYvbgbceXgcgJ9C21mjdIL9Y0Pi_Vi2A0Bec1tUqiBtCl2wuBuf4RT9Knwd995i-JtjkwjqGTjcDaMcEBN2Wd3J0kKflgMjk2Quq2zjxyDzHe1onv98qw0k-KwnjHmEXxC0KV139PzFEJNQuXFh0FvDW6UESHUbtewefOJN2wnn7lvU7iwPnTztW2X_FiaYT56yvFT9z4BFBcAwg/http%3A%2F%2Fdns.measurement-factory.com%2Ftools%2Fnagios-plugins%2Fcheck_zone_rrsig_expiration.html
>> 
>> But it only checks one RR (default SOA) since it doesn't assume access to 
>> the whole zone.
>> That would be a good upgrade, though, to have it axfr the zone and check 
>> everything.
> 
> Are there any existing tools which would take a whole zonefile and check
> the expirations?  In a similar way to (for example) dnssec-verify from
> Bind.


YAZVS: Yet Another Zone Validation Script

https://github.com/verisign/yazvs

It is designed to also show changes between a new and current zone, but you can 
skip that part with the -x option.

DW




smime.p7s
Description: S/MIME cryptographic signature
--- End Message ---
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] anybody awake over at comcast.net?

2021-02-09 Thread Wessels, Duane via dns-operations
--- Begin Message ---


> On Feb 8, 2021, at 9:27 PM, Paul Vixie  wrote:
> 
> i expect i'll crib together some bourne shellack to check my whole signature
> chains and warn me when there's less than 72 hours remaining in any validity
> period. going into SERVFAIL like this is an operational risk i shouldn't take.

If you use Nagios or something compatible, there is this:

http://dns.measurement-factory.com/tools/nagios-plugins/check_zone_rrsig_expiration.html

But it only checks one RR (default SOA) since it doesn't assume access to the 
whole zone.
That would be a good upgrade, though, to have it axfr the zone and check 
everything.

DW



smime.p7s
Description: S/MIME cryptographic signature
--- End Message ---
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] anybody awake over at comcast.net?

2021-02-09 Thread Wessels, Duane via dns-operations
--- Begin Message ---


> On Feb 8, 2021, at 9:27 PM, Paul Vixie  wrote:
> 
> i expect i'll crib together some bourne shellack to check my whole signature
> chains and warn me when there's less than 72 hours remaining in any validity
> period. going into SERVFAIL like this is an operational risk i shouldn't take.

If you use Nagios or something compatible, there is this:

http://dns.measurement-factory.com/tools/nagios-plugins/check_zone_rrsig_expiration.html

But it only checks one RR (default SOA) since it doesn't assume access to the 
whole zone.
That would be a good upgrade, though, to have it axfr the zone and check 
everything.

DW



smime.p7s
Description: S/MIME cryptographic signature
--- End Message ---
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] https://secure-web.cisco.com/1ZjyzJskkYQq7sVMAaORAQUNbtLnCDdiphJXoIUgaA7_oFL6tHC8iV070aZrCZfTyULjhkVi3xJfW5opBdNn-YVZVvneE8CazN4a3cBB_5D0ERlfp-D-9kGVsbAT_XzThiOOKiL1K02Z_t969017Ug

2020-11-09 Thread Wessels, Duane via dns-operations
--- Begin Message ---


> On Nov 9, 2020, at 11:44 AM, Warren Kumari  wrote:
> 
> Erm, what sort of glitch? (seems to work for me - wondering if it is
> transient, or ...)


It was easily fixed.  The glitch was a bug in the backend script such that 
every request led to an "Internal Server Error".

DW




smime.p7s
Description: S/MIME cryptographic signature
--- End Message ---
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] https://secure-web.cisco.com/1QObC8qh53iR__TlqRff59E5B8JFiAV2VUGirT2kdLKo0yz-mYw9xle11YYObM5lxuamt1wUA26DRNfoRK6v8IXYl9zUeX7VkWIaBof6KLCFjBHsfqxnMrN2Muac7SkNMlWXCdqDvPKJTAORrYe1s9

2020-11-09 Thread Wessels, Duane via dns-operations
--- Begin Message ---
Hi Calvin, you can poke me.

DW



> On Nov 9, 2020, at 1:05 AM, Calvin Browne  wrote:
> 
> Caution: This email originated from outside the organization. Do not click 
> links or open attachments unless you recognize the sender and know the 
> content is safe. 
> 
> 
> 
> 
> Hi Guys,
> 
> 
> 
> seems https://trans-trust.verisignlabs.com/ has developed a glitch - anyone 
> know who to poke (with thanks of course).
> 
> 
> 
> regards
> 
> 
> 
> --Calvin
> 
> ___
> dns-operations mailing list
> dns-operations@lists.dns-oarc.net
> https://secure-web.cisco.com/1FMqJkV7gNbINx1vDfXazKCpr3zOuXT9N9057UPMBMfmLvhPO6UDpMKy56BJCPP6QvU4kTfnSpRBQiMSWbbs22CgJLomyJ05g-47OkggZhX_YF87ua5GFmPtGZ6N8mSwtBle3uNNh3g0gq0QKTGLoz_8Pc3BxD21O_w4exYKJ_gV5_BSOk9biufi118dEseS3ukd0T7E4q7VOEEvY-vGY3PiDu13L5LQhGkCLZbKgvPCNLgKTZTI97BthigpvvQdSgvy7AVC_FnNLo8XMXzfYyQ/https%3A%2F%2Flists.dns-oarc.net%2Fmailman%2Flistinfo%2Fdns-operations



smime.p7s
Description: S/MIME cryptographic signature
--- End Message ---
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] .com delegation responses when glue addresses don't fit

2020-08-25 Thread Wessels, Duane via dns-operations
--- Begin Message ---
Hi Mukund,

We are aware that this situation can arise given certain combinations of 
referral size and EDNS0 buffer size.  We're also aware of 
draft-ietf-dnsop-glue-is-not-optional, and our engineers are figuring out how 
best to update our software in that context.  It would be nice if some of the 
open questions around that draft could come to consensus.

I would be interested to know more about the resolvers you mention as having 
trouble with this case.  Either privately or on list.

In the meantime, of course, the registrant could certainly remove some of the 
superfluous type 1 DS records to bring the referral size down if necessary.

(My apologies for the delay in responding, I was out of the office for a few 
days.)

DW



> On Aug 19, 2020, at 10:33 AM, Mukund Sivaraman  wrote:
> 
> We notice the following response from .com's namesevers:
> 
> [muks@mx ~]$ dig +nord +dnssec +bufsize=512 @2001:502:1ca1::30 infoblox.com
> 
> ; <<>> DiG 1.1.1.20200608151533.e8a2352e96 <<>> +nord +dnssec +bufsize=512 
> @2001:502:1ca1::30 infoblox.com
> ; (1 server found)
> ;; global options: +cmd
> ;; Got answer:
> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 15448
> ;; flags: qr; QUERY: 1, ANSWER: 0, AUTHORITY: 11, ADDITIONAL: 1
> 
> ;; OPT PSEUDOSECTION:
> ; EDNS: version: 0, flags: do; udp: 4096
> ;; QUESTION SECTION:
> ;infoblox.com.IN  A
> 
> ;; AUTHORITY SECTION:
> infoblox.com. 172800  IN  NS  ns1.infoblox.com.
> infoblox.com. 172800  IN  NS  ns2.infoblox.com.
> infoblox.com. 172800  IN  NS  ns3.infoblox.com.
> infoblox.com. 172800  IN  NS  ns4.infoblox.com.
> infoblox.com. 172800  IN  NS  ns5.infoblox.com.
> infoblox.com. 172800  IN  NS  ns6.infoblox.com.
> infoblox.com. 86400   IN  DS  33613 5 2 
> 339462CBAEB1773800EA8B688D2CA048FCAB0EB2933A97AEE2B86A9A 212F37C5
> infoblox.com. 86400   IN  DS  33613 5 1 
> 629C2D6C060E2133CD0F4470F3ECC8834DA4FAD6
> infoblox.com. 86400   IN  DS  49879 5 2 
> 605656DB7C9DFE4D8A453C350B3DA63039A78878DA089AD4247AB9A0 D3B43998
> infoblox.com. 86400   IN  DS  49879 5 1 
> C1DB78AD9A8928CB15A7E0CE9E4468D433F5C638
> infoblox.com. 86400   IN  RRSIG   DS 8 2 86400 20200823050241 
> 20200816035241 24966 com. 
> 0s/TnWuxLdVzCQqY0tVauNXeCpirT5rYacvEpxaQfTxCjP2XfZkqHy4A 
> SNoGyYWGZQdxTa7zXVgrKuWOoKZ2CKxC/kd++VnEJKoFw3llOoq56Wz+ 
> lq65BS7E6/ZlE4Qgce8rhbBQVkE6Sk1YXkuxDbwoPYfvkHlfWaboeiNO 
> 6y731Xcrq3vjqdG6YZCHyH64SSnVFypUiRN26H2HPsYsSg==
> 
> ;; Query time: 19 msec
> ;; SERVER: 2001:502:1ca1::30#53(2001:502:1ca1::30)
> ;; WHEN: Wed Aug 19 17:30:29 GMT 2020
> ;; MSG SIZE  rcvd: 512
> 
> [muks@mx ~]$
> 
> 
> Glue address records are required in this delegation response, but none
> are returned. TC=1 is not set. This causes problems with some resolvers.
> 
> Can someone at Verisign please check correctness of this response, and
> set TC=1 for such responses?
> 
> It appears to be the problem statement of:
> https://secure-web.cisco.com/1QqHmwaQO268IxVLQk1vG77QkwUfoXr_FsBcOFC3WbBL0-z1sBokN2TQSQUIlO5MUEk8n-QDt5OqsF2XYKXj6HmPtF7d9WVmdFz1IvQLk5erNHt_LWYVK0dBO9yptLYEZ4EBBtErw5M_g__bNhppxQCIjmLWHTgO0OyJsUxZiJJT4oYqXZzP4WdRRZ9lBHWdA0TIjUw4AjyMyrwihFu9kPJxJ22ik6H8Tj5rP77dh9QCAC1kZc3pHQncJpgS7nil_fOSDWB4i_QxV7flDEQV89MBaqKba3UIaPlgYF2ejb0Q/https%3A%2F%2Ftools.ietf.org%2Fhtml%2Fdraft-andrews-dnsop-glue-is-not-optional-01
> 
>   Mukund
> ___
> dns-operations mailing list
> dns-operations@lists.dns-oarc.net
> https://secure-web.cisco.com/1ljZcR9ZM3atIeerJ95hsiha_l2uLsF6l6BLGUj7DskdX3f7uA1u_NsaWrLIFO0R4nD5Fd00JnD_E-VdYECtCPH8AiaDf9RoKTjaMGQd33oDfDdigZM1kLFHE0B4yN-PkznyZErWteBP6maqSgpcDUlIH8ce45yn4tCqmwEG5xov3TgvL7UzNr5jc59fZFWiPG4_n-jcN49u7IflMRhvdrTpcQpFxQRdMQqhqjsVBV0egt2YULsp8I6r81z_yjdThfWvK7iyvJPW9aLTkHJeuoQ/https%3A%2F%2Flists.dns-oarc.net%2Fmailman%2Flistinfo%2Fdns-operations



smime.p7s
Description: S/MIME cryptographic signature
--- End Message ---
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] Disclosure of root zone TSIG keys

2020-05-29 Thread Wessels, Duane via dns-operations
--- Begin Message ---
> On May 29, 2020, at 2:29 AM, Shane Kerr  wrote:
> 
> Duane,
> 
> I really appreciate this level of transparency, thank you.
> 
> This does make me think of a couple of questions.
> 
> 
> First, I assume that the main goal of TSIG is to prevent modification of the 
> zone file(s) in transit, more than preventing access. The root zone is 
> public, right?

That is correct.  There was a time when we did not have IP ACLs and TSIG was 
the only method of access control, but that is no longer the case.

> 
> Since the goal is to prevent modification, I guess the root server operators 
> could fetch PGP signatures from the Internic server and verify the zone 
> today. Do you know if there is any documentation covering the operational 
> practices of the root server operators in this regard?

I'm not aware of any such documentation or of any operators that actually do 
that.

> 
> In the future, adding message digests (draft-ietf-dnsop-dns-zone-digest) to 
> the zones and having both that and the DNSSEC signatures verified by root 
> server operators before accepting a new version of the root zone would be a 
> nice additional check. (Whoever thought of those digests seems really 
> on-the-ball. )

Yes, we would very much like to see ZONEMD advance so we can have that check.

> 
> 
> Second, while it is nice that there are IP-based whitelists protecting zone 
> transfers, are there any requirements for IP's on the whitelists to use RPKI 
> or other routing protections? Even if there are no requirements, does 
> Verisign check RPKI if the root server operators *do* sign their routes? We 
> know that there is BGP hijacking in the wild today, so using and encouraging 
> secured routing seems reasonable to me.

Interesting you mention this.  We have been evaluating the pros and cons of 
RPKI publication for our number resources as well as origin validation for 
received routes.  While we are working on this and intend to fully implement 
RPKI given new dependencies it introduces we are being very deliberate and 
working closely with our carrier partners, etc.. to minimize the new risks it 
introduces.  More to come on that in the coming months.

Work is underway now to ensure that we monitor all the root zone distribution 
prefixes just as we monitor own prefixes (commercial and bespoke tools for 
routing system prefixes, attributes, and changes, IRR objects, and RPKI 
objects).  

DW

> 
> 
> Thanks again for the transparency and keep up the good work! 
> 
> --
> Shane




smime.p7s
Description: S/MIME cryptographic signature
--- End Message ---
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


[dns-operations] Disclosure of root zone TSIG keys

2020-05-28 Thread Wessels, Duane via dns-operations
--- Begin Message ---
Dear DNS operations community,

Last week Verisign determined that the transaction signature (TSIG) keys used 
to authenticate and secure root zone transfers from our zone distribution 
servers to root server operators were exposed to one or more unauthorized 
parties. For the explanation behind the disclosure, please refer to Appendix A 
below.

We believe that the risks to the root zone from this disclosure were low. Zone 
transfers from Verisign's distribution servers are first protected by whitelist 
access control lists (ACLs) provided by each operator, and the root zone 
content is not sensitive.

Nonetheless, upon learning of the disclosure, we notified ICANN and then worked 
quickly with the root server operators to roll to a new active TSIG key. That 
work was completed by May 26 and all root operators were confirmed to be using 
the new key. The urgency for rolling the key across a series of systems and a 
diverse set of root operators in just a few days rather than weeks / months was 
in part motivated by a recent BIND TSIG bug, which was seen as heightening the 
risk of the disclosure, albeit only slightly. More background on the TSIG 
vulnerability is included in Appendix B below.

If you have questions regarding this disclosure please don’t hesitate to 
contact us at i...@verisign-grs.com

---

Appendix A: Background information on recent root TSIG disclosure

On May 20, 2020 security tools alerted Verisign security teams that two 
internal servers were publicly accessible via a file copy service. Upon 
investigation our teams identified two additional servers that were also 
accessible. Altogether, these four servers were used for testing and/or staging 
functions. We have determined that a failure of network access controls was the 
root cause and that the scope of exposure involves read-only access to a 
constrained set of directories via the file copy service on these four servers.

The DNSSEC keying materials for any Verisign managed zones were not impacted by 
this incident as the impact was limited to testing and staging environments. 
Verisign signing servers and related infrastructure are operated in accordance 
with published DNSSEC practice statements and DNSSEC keys are held in FIPs 
140-2 level 3+ validated Hardware Security Modules (HSMs) as well as offline 
cryptographic systems to ensure the integrity of the signed zones operated by 
Verisign. No Verisign operated TLDs (e.g., COM, NET, etc.), registry 
operations, or other services were impacted by this incident.

Information contained on the servers did include transaction signature (TSIG) 
keys used for distribution of the root zone from Verisign’s servers to the root 
server operators, as well as TSIG keys used by Verisign to retrieve 103 
in-addr.arpa child domains from ARIN. Facts related to the incident include:

• We have concluded the exposure was introduced on August 21, 2019

• Our analysis has determined that files in the read-only directories, 
to include the root zone TSIG keys, as well as TSIG keys for in-addr.arpa child 
zones fetched from ARIN, were accessed by unauthorized parties

• The accessible service had been legitimately enabled on these servers 
for use by Verisign teams; the service should not have been internet-accessible

• The files were legitimately placed on the four servers for testing 
and/or staging purposes

• The directories accessible to the service were read-only

• The operational security stack for the environment was properly 
functioning and the four servers were properly logging to local and remote 
facilities at the time of the investigation

• High frequency internal and external vulnerability scanners were 
properly identifying the services and archiving the condition but not properly 
alerting on them; a supplementary security tool alerted internal teams to the 
issue

• The systems in these environments are continuously patched and are 
frequently wiped and rebuilt

• No personal information was stored on the servers

• The keys used to fetch the ARIN zones were changed on May 22, and the 
keys used for root zone distribution were changed over a ~3-day period and 
completed May 26.

Identified control deficiencies have been corrected to prevent further 
unauthorized access, alerting has been enhanced and new capabilities have been 
developed to prevent and/or more quickly detect and alert on any similar 
incidents going forward.

Current information suggests with a high confidence that no broader internal 
exposure resulted from the incident (e.g., there were no indications of 
unauthorized activity beyond access to the read-only directories, there were no 
indications of system-level compromise, lateral movement, or other subsequent 
related activities).

There are multiple controls around distribution of the root zone file to root 
operators and the contents of the 

Re: [dns-operations] SOA rname breakage (first label split on internal dots) from Verisign public DNS

2020-03-27 Thread Wessels, Duane via dns-operations
--- Begin Message ---
Viktor,

Thanks again for reporting this.  We have identified the source of the problem 
and have begun developing a fix.  We'll let you know once it has been deployed.

DW


> On Mar 24, 2020, at 8:02 AM, Wessels, Duane  wrote:
> 
> Thanks Viktor, we will investigate and report back.
> 
> DW
> 
> 
>> On Mar 23, 2020, at 11:39 PM, Viktor Dukhovni  wrote:
>> 
>> The podotrack.nl domain has two authoritative servers: 
>> 
>>   podotrack.nl. IN NS ns1.exsilia.net.
>>   podotrack.nl. IN NS ns2.exsilia.net.
>> 
>> Both return the same SOA RR with a escaped "." in the first label of the SOA 
>> "rname":
>> 
>>   $ dig +norecur +dnssec -t SOA +noall +ans podotrack.nl @ns1.exsilia.net
>>   podotrack.nl.   86400   IN  RRSIG   SOA 8 2 86400 
>> 2020040200 2020031200 16285 podotrack.nl. 
>> QaAaTslfbdObE8V2vsPtN9j3VEiW5rb1Rq/K7xb9IlDShj06tw3ruRfx 
>> wmeyaKEqiD+HmXwERervVbx+ilgIcNwD8emqJ+BfZxv4lyhwyVnmPpIW 
>> /ggeijP4L7EywS7lsO0zs2nwB/Bhv/f5KwFIQy4Cm+hj99zbvULaNuNf ibw=
>>   podotrack.nl.   86400   IN  SOA ns2.exsilia.net. 
>> j\.deklein.lijnco.nl. 201901 10800 3600 604800 10800
>> 
>>   $ dig +norecur +dnssec -t SOA +noall +ans podotrack.nl @ns2.exsilia.net
>>   podotrack.nl.   86400   IN  SOA ns2.exsilia.net. 
>> j\.deklein.lijnco.nl. 201901 10800 3600 604800 10800
>>   podotrack.nl.   86400   IN  RRSIG   SOA 8 2 86400 
>> 2020040200 2020031200 16285 podotrack.nl. 
>> QaAaTslfbdObE8V2vsPtN9j3VEiW5rb1Rq/K7xb9IlDShj06tw3ruRfx 
>> wmeyaKEqiD+HmXwERervVbx+ilgIcNwD8emqJ+BfZxv4lyhwyVnmPpIW 
>> /ggeijP4L7EywS7lsO0zs2nwB/Bhv/f5KwFIQy4Cm+hj99zbvULaNuNf ibw=
>> 
>> But that is *not* what I see from Verisign public DNS:
>> 
>>   $ dig +dnssec -t SOA +noall +ans podotrack.nl @64.6.64.6
>>   podotrack.nl.   86400   IN  SOA ns2.exsilia.net. 
>> j.deklein.lijnco.nl. 201901 10800 3600 604800 10800
>>   podotrack.nl.   86400   IN  RRSIG   SOA 8 2 86400 
>> 2020040200 2020031200 16285 podotrack.nl. 
>> QaAaTslfbdObE8V2vsPtN9j3VEiW5rb1Rq/K7xb9IlDShj06tw3ruRfx 
>> wmeyaKEqiD+HmXwERervVbx+ilgIcNwD8emqJ+BfZxv4lyhwyVnmPpIW 
>> /ggeijP4L7EywS7lsO0zs2nwB/Bhv/f5KwFIQy4Cm+hj99zbvULaNuNf ibw=
>> 
>> Even though the serial number and RRSIG are the same, the first label is
>> not escaped!  The answer has a TTL of 86400 and looks fresh (!cached).
>> This breaks the SOA RRSIG and denial of existence of TLSA RRs, ...
>> 
>> The remaining usual suspects all return the expected rname:
>> 
>>   $ dig +dnssec -t SOA +noall +ans podotrack.nl @8.8.8.8
>>   podotrack.nl.   21599   IN  RRSIG   SOA 8 2 86400 
>> 2020040200 2020031200 16285 podotrack.nl. 
>> QaAaTslfbdObE8V2vsPtN9j3VEiW5rb1Rq/K7xb9IlDShj06tw3ruRfx 
>> wmeyaKEqiD+HmXwERervVbx+ilgIcNwD8emqJ+BfZxv4lyhwyVnmPpIW 
>> /ggeijP4L7EywS7lsO0zs2nwB/Bhv/f5KwFIQy4Cm+hj99zbvULaNuNf ibw=
>>   podotrack.nl.   21599   IN  SOA ns2.exsilia.net. 
>> j\.deklein.lijnco.nl. 201901 10800 3600 604800 10800
>> 
>>   $ dig +dnssec -t SOA +noall +ans podotrack.nl @1.1.1.1
>>   podotrack.nl.   10596   IN  SOA ns2.exsilia.net. 
>> j\.deklein.lijnco.nl. 201901 10800 3600 604800 10800
>>   podotrack.nl.   10596   IN  RRSIG   SOA 8 2 86400 
>> 2020040200 2020031200 16285 podotrack.nl. 
>> QaAaTslfbdObE8V2vsPtN9j3VEiW5rb1Rq/K7xb9IlDShj06tw3ruRfx 
>> wmeyaKEqiD+HmXwERervVbx+ilgIcNwD8emqJ+BfZxv4lyhwyVnmPpIW 
>> /ggeijP4L7EywS7lsO0zs2nwB/Bhv/f5KwFIQy4Cm+hj99zbvULaNuNf ibw=
>> 
>>   $ dig +dnssec -t SOA +noall +ans podotrack.nl @9.9.9.10
>>   podotrack.nl.   43200   IN  SOA ns2.exsilia.net. 
>> j\.deklein.lijnco.nl. 201901 10800 3600 604800 10800
>>   podotrack.nl.   43200   IN  RRSIG   SOA 8 2 86400 
>> 2020040200 2020031200 16285 podotrack.nl. 
>> QaAaTslfbdObE8V2vsPtN9j3VEiW5rb1Rq/K7xb9IlDShj06tw3ruRfx 
>> wmeyaKEqiD+HmXwERervVbx+ilgIcNwD8emqJ+BfZxv4lyhwyVnmPpIW 
>> /ggeijP4L7EywS7lsO0zs2nwB/Bhv/f5KwFIQy4Cm+hj99zbvULaNuNf ibw=
>> 
>> Checking army.mil (lots of dots in the first rname label), I find the
>> same symptoms:
>> 
>>   $ dig +dnssec -t soa +noall +ans +add army.mil @64.6.64.6
>>   army.mil.   1700IN  SOA ns01.army.mil. 
>> usarmy.huachuca.netcom.mesg.epdns-global.mail.mil. 2007040001 900 90 2419200 
>> 300
>>   army.mil.   1700IN  RRSIG   SOA 8 2 3600 
>> 20200328054853 20200324044853 51378 army.mil. 
>> gKsZWexzUD9tYM09JQnF/5pnd1ZKwxtBd9FjWtRTIimQRqldhMwFdALV 
>> 3vg4UGde6iSS1xH0jmXLeBPlk0ETNLtXwGRl7ywko8Q12eVy7XgUASwM 
>> OM3Sv6XEfaNglTHbqmeJo987BSlkNqwUFIlCnvI0OFiboLX9le+xl6eI 
>> bw2GsGrd+/Q+XU37JvDAQ55X9mECMM1jHjraBD2NKfcPGRP700Myie+q 
>> WgUuQrs40YGR8jFLrxk5/R/A4uPK0hlXVpjHv6cmrlAW00BS7LlP+5Ha 
>> H+oh10/0hQkofrjhQWINXUKCSHI4mMSO6liubK74cjS5fxg07BnvaMKJ OtoIuQ==
>> 
>>   $ dig +dnssec -t soa +noall +ans +add army.mil @8.8.8.8
>>   army.mil.   2830IN  SOA ns01.army.mil. 
>> 

Re: [dns-operations] SOA rname breakage (first label split on internal dots) from Verisign public DNS

2020-03-24 Thread Wessels, Duane via dns-operations
--- Begin Message ---
Thanks Viktor, we will investigate and report back.

DW


> On Mar 23, 2020, at 11:39 PM, Viktor Dukhovni  wrote:
> 
> The podotrack.nl domain has two authoritative servers: 
> 
>podotrack.nl. IN NS ns1.exsilia.net.
>podotrack.nl. IN NS ns2.exsilia.net.
> 
> Both return the same SOA RR with a escaped "." in the first label of the SOA 
> "rname":
> 
>$ dig +norecur +dnssec -t SOA +noall +ans podotrack.nl @ns1.exsilia.net
>podotrack.nl.   86400   IN  RRSIG   SOA 8 2 86400 
> 2020040200 2020031200 16285 podotrack.nl. 
> QaAaTslfbdObE8V2vsPtN9j3VEiW5rb1Rq/K7xb9IlDShj06tw3ruRfx 
> wmeyaKEqiD+HmXwERervVbx+ilgIcNwD8emqJ+BfZxv4lyhwyVnmPpIW 
> /ggeijP4L7EywS7lsO0zs2nwB/Bhv/f5KwFIQy4Cm+hj99zbvULaNuNf ibw=
>podotrack.nl.   86400   IN  SOA ns2.exsilia.net. 
> j\.deklein.lijnco.nl. 201901 10800 3600 604800 10800
> 
>$ dig +norecur +dnssec -t SOA +noall +ans podotrack.nl @ns2.exsilia.net
>podotrack.nl.   86400   IN  SOA ns2.exsilia.net. 
> j\.deklein.lijnco.nl. 201901 10800 3600 604800 10800
>podotrack.nl.   86400   IN  RRSIG   SOA 8 2 86400 
> 2020040200 2020031200 16285 podotrack.nl. 
> QaAaTslfbdObE8V2vsPtN9j3VEiW5rb1Rq/K7xb9IlDShj06tw3ruRfx 
> wmeyaKEqiD+HmXwERervVbx+ilgIcNwD8emqJ+BfZxv4lyhwyVnmPpIW 
> /ggeijP4L7EywS7lsO0zs2nwB/Bhv/f5KwFIQy4Cm+hj99zbvULaNuNf ibw=
> 
> But that is *not* what I see from Verisign public DNS:
> 
>$ dig +dnssec -t SOA +noall +ans podotrack.nl @64.6.64.6
>podotrack.nl.   86400   IN  SOA ns2.exsilia.net. 
> j.deklein.lijnco.nl. 201901 10800 3600 604800 10800
>podotrack.nl.   86400   IN  RRSIG   SOA 8 2 86400 
> 2020040200 2020031200 16285 podotrack.nl. 
> QaAaTslfbdObE8V2vsPtN9j3VEiW5rb1Rq/K7xb9IlDShj06tw3ruRfx 
> wmeyaKEqiD+HmXwERervVbx+ilgIcNwD8emqJ+BfZxv4lyhwyVnmPpIW 
> /ggeijP4L7EywS7lsO0zs2nwB/Bhv/f5KwFIQy4Cm+hj99zbvULaNuNf ibw=
> 
> Even though the serial number and RRSIG are the same, the first label is
> not escaped!  The answer has a TTL of 86400 and looks fresh (!cached).
> This breaks the SOA RRSIG and denial of existence of TLSA RRs, ...
> 
> The remaining usual suspects all return the expected rname:
> 
>$ dig +dnssec -t SOA +noall +ans podotrack.nl @8.8.8.8
>podotrack.nl.   21599   IN  RRSIG   SOA 8 2 86400 
> 2020040200 2020031200 16285 podotrack.nl. 
> QaAaTslfbdObE8V2vsPtN9j3VEiW5rb1Rq/K7xb9IlDShj06tw3ruRfx 
> wmeyaKEqiD+HmXwERervVbx+ilgIcNwD8emqJ+BfZxv4lyhwyVnmPpIW 
> /ggeijP4L7EywS7lsO0zs2nwB/Bhv/f5KwFIQy4Cm+hj99zbvULaNuNf ibw=
>podotrack.nl.   21599   IN  SOA ns2.exsilia.net. 
> j\.deklein.lijnco.nl. 201901 10800 3600 604800 10800
> 
>$ dig +dnssec -t SOA +noall +ans podotrack.nl @1.1.1.1
>podotrack.nl.   10596   IN  SOA ns2.exsilia.net. 
> j\.deklein.lijnco.nl. 201901 10800 3600 604800 10800
>podotrack.nl.   10596   IN  RRSIG   SOA 8 2 86400 
> 2020040200 2020031200 16285 podotrack.nl. 
> QaAaTslfbdObE8V2vsPtN9j3VEiW5rb1Rq/K7xb9IlDShj06tw3ruRfx 
> wmeyaKEqiD+HmXwERervVbx+ilgIcNwD8emqJ+BfZxv4lyhwyVnmPpIW 
> /ggeijP4L7EywS7lsO0zs2nwB/Bhv/f5KwFIQy4Cm+hj99zbvULaNuNf ibw=
> 
>$ dig +dnssec -t SOA +noall +ans podotrack.nl @9.9.9.10
>podotrack.nl.   43200   IN  SOA ns2.exsilia.net. 
> j\.deklein.lijnco.nl. 201901 10800 3600 604800 10800
>podotrack.nl.   43200   IN  RRSIG   SOA 8 2 86400 
> 2020040200 2020031200 16285 podotrack.nl. 
> QaAaTslfbdObE8V2vsPtN9j3VEiW5rb1Rq/K7xb9IlDShj06tw3ruRfx 
> wmeyaKEqiD+HmXwERervVbx+ilgIcNwD8emqJ+BfZxv4lyhwyVnmPpIW 
> /ggeijP4L7EywS7lsO0zs2nwB/Bhv/f5KwFIQy4Cm+hj99zbvULaNuNf ibw=
> 
> Checking army.mil (lots of dots in the first rname label), I find the
> same symptoms:
> 
>$ dig +dnssec -t soa +noall +ans +add army.mil @64.6.64.6
>army.mil.   1700IN  SOA ns01.army.mil. 
> usarmy.huachuca.netcom.mesg.epdns-global.mail.mil. 2007040001 900 90 2419200 
> 300
>army.mil.   1700IN  RRSIG   SOA 8 2 3600 
> 20200328054853 20200324044853 51378 army.mil. 
> gKsZWexzUD9tYM09JQnF/5pnd1ZKwxtBd9FjWtRTIimQRqldhMwFdALV 
> 3vg4UGde6iSS1xH0jmXLeBPlk0ETNLtXwGRl7ywko8Q12eVy7XgUASwM 
> OM3Sv6XEfaNglTHbqmeJo987BSlkNqwUFIlCnvI0OFiboLX9le+xl6eI 
> bw2GsGrd+/Q+XU37JvDAQ55X9mECMM1jHjraBD2NKfcPGRP700Myie+q 
> WgUuQrs40YGR8jFLrxk5/R/A4uPK0hlXVpjHv6cmrlAW00BS7LlP+5Ha 
> H+oh10/0hQkofrjhQWINXUKCSHI4mMSO6liubK74cjS5fxg07BnvaMKJ OtoIuQ==
> 
>$ dig +dnssec -t soa +noall +ans +add army.mil @8.8.8.8
>army.mil.   2830IN  SOA ns01.army.mil. 
> usarmy\.huachuca\.netcom\.mesg\.epdns-global.mail.mil. 2007040004 900 90 
> 2419200 300
>army.mil.   2830IN  RRSIG   SOA 8 2 3600 
> 20200328061900 20200324051900 51378 army.mil. 
> WVAHvrkjdrq4Z1QShUec3xqGT3DSPJIx6vABFUVlO+mQfI4w9ZclXYqP 
> 

Re: [dns-operations] .COM Zone DNSSEC Operational Update -- ZSK length change

2020-01-02 Thread Wessels, Duane via dns-operations
--- Begin Message ---


> On Dec 28, 2019, at 8:50 AM, Matt Nordhoff  wrote:
> 
> On Mon, Oct 14, 2019 at 6:34 PM Wessels, Duane via dns-operations
>  wrote:
>> All,
>> 
>> Verisign is in the process of increasing the size and strength of
>> the DNSSEC Zone Signing Keys (ZSKs) for the top-level domains that
>> it operates.  As part of this process, the ZSK for the .COM zone will
>> be increased in size from 1024 to 1280 bits.
>> 
>> On October 10, 2019 the 1280 bit ZSK was pre-published in the .COM zone.
>> On October 15, we plan to sign the .COM zone with the 1280 bit ZSK.
>> On October 20, we plan to remove the old 1024 bit ZSK from the zone.
> 
> D'y'all have an updated ETA on step 3?
> 

Matt,

My apologies for the incorrect information in the initial message.  The old
1024-bit ZSK was post-published for an extended period of time.  It was removed
as of Jan 1.

DW




smime.p7s
Description: S/MIME cryptographic signature
--- End Message ---
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] root? we don't need no stinkin' root!

2019-11-27 Thread Wessels, Duane via dns-operations
--- Begin Message ---


> On Nov 25, 2019, at 1:23 PM, Bill Woodcock  wrote:
> 
>> On Nov 25, 2019, at 9:54 PM, Florian Weimer  wrote:
>> The query numbers are surprisingly low.  To me at last.
> 
> Duane Wessels did a good study some time ago of queries to the root.  I 
> believe over 99% were bogus, not real queries for resolvable things.

For the record, the number from that study (2003!) was 98%.  I believe it has 
since been reconfirmed to be about the same level in a number of subsequent 
studies by others.

DW




smime.p7s
Description: S/MIME cryptographic signature
--- End Message ---
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] root? we don't need no stinkin' root!

2019-11-27 Thread Wessels, Duane via dns-operations
--- Begin Message ---


> On Nov 25, 2019, at 2:19 PM, Florian Weimer  wrote:
> 
> * Jim Reid:
> 
>>> On 25 Nov 2019, at 20:54, Florian Weimer  wrote:
>>> Is it because of the incoming data is interesting?
>> 
>> Define interesting.
> 
> The data could have monetary value.  Passwords that are otherwise
> difficult to come by might be leaking.

Hi Florian,

I can assure you that Verisign does not monetize the root server data.  If
any other operators do, I'm not aware of it.

We do utilize root server data for research purposes from time-to-time.
Recent examples include the KSK rollover and name collisions.  Less recent
examples include understanding TTL/caching behavior and preparing for the
root ZSK size increase.  When DDoS attacks happen, we often analyze the
data to see if we can understand how and why it happened, and to be better
prepared for the next one.

DW




smime.p7s
Description: S/MIME cryptographic signature
--- End Message ---
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations