Re: DNS latency!!!

2010-08-18 Thread Stefan Schmidt
On Aug 16, 2010, at 11:55 , Yohann Lepage wrote: 2010/8/16 Shiva Raman raman.shi...@gmail.com Which is the best method to measure dns latency ? Is there any scripts / programs available to measure the dns latency directly? I would like to remind people of the most obvious one: dig

www.ncbi.nlm.nih.gov / pubmed

2010-08-18 Thread Phil Mayers
All, It seems this zone is broken as of a couple of days ago. Is anyone else seeing it? Is there an appropriate bind workaround? ___ bind-users mailing list bind-users@lists.isc.org https://lists.isc.org/mailman/listinfo/bind-users

RE: www.ncbi.nlm.nih.gov / pubmed

2010-08-18 Thread Lightner, Jeff
It comes right up in Firefox but prompts for a username and password. Dig shows: dig www.ncbi.nlm.nih.gov ; DiG 9.3.6-P1-RedHat-9.3.6-4.P1.el5_4.2 www.ncbi.nlm.nih.gov ;; global options: printcmd ;; Got answer: ;; -HEADER- opcode: QUERY, status: NOERROR, id: 22983 ;; flags: qr rd ra; QUERY:

Re: www.ncbi.nlm.nih.gov / pubmed

2010-08-18 Thread Phil Mayers
On 18/08/10 13:30, Phil Mayers wrote: On 18/08/10 13:15, Lightner, Jeff wrote: It comes right up in Firefox but prompts for a username and password. Do you have DNSSEC validation enabled? Because as per my email, it's a DNSSEC problem. Damn - in fact sorry, scratch that. I realise my

Re: www.ncbi.nlm.nih.gov / pubmed

2010-08-18 Thread Phil Mayers
On 18/08/10 13:15, Lightner, Jeff wrote: It comes right up in Firefox but prompts for a username and password. Do you have DNSSEC validation enabled? Because as per my email, it's a DNSSEC problem. After a bit of investigation, it seems that the problem is a missing NSEC/NSEC3 record in

Re: www.ncbi.nlm.nih.gov / pubmed

2010-08-18 Thread Casey Deccio
On Wed, Aug 18, 2010 at 5:30 AM, Phil Mayers p.may...@imperial.ac.uk wrote: After a bit of investigation, it seems that the problem is a missing NSEC/NSEC3 record in the empty reply for: $ dig +dnssec @165.112.4.230 ncbi.nlm.nih.gov ds ...since the ncbi zone is an unsigned child zone, there

Re: «tsig verify failure» only on some zones

2010-08-18 Thread Joachim Tingvold
On Wed, Aug 18, 2010, at 00:42:40AM GMT+02:00, Hauke Lampe wrote: What TSIG algorithms do you use and how long are the keys? HMAC-MD5, 128 bit. The keys are 24 chars long. I'll try to test with another algorithm, however I find it quite strange; if it works for some zones, why doesn't it

Re: DNS Rebinding Prevention for the Weak Host Model Attacks

2010-08-18 Thread Kevin Darcy
deny-answer-addresses { %source%; }; deny-answer-aliases { %source%; }; Maybe? - Kevin On 8/17/2010 12:22 AM, Bradley Falzon wrote: bind-users, In light of Craig Heffner's

Re: www.ncbi.nlm.nih.gov / pubmed

2010-08-18 Thread Dave Sparro
On 8/18/2010 8:30 AM, Phil Mayers wrote: On 18/08/10 13:15, Lightner, Jeff wrote: It comes right up in Firefox but prompts for a username and password. Do you have DNSSEC validation enabled? Because as per my email, it's a DNSSEC problem. After a bit of investigation, it seems that the

Re: www.ncbi.nlm.nih.gov / pubmed

2010-08-18 Thread Casey Deccio
On Wed, Aug 18, 2010 at 9:48 AM, Dave Sparro dspa...@gmail.com wrote: On 8/18/2010 8:30 AM, Phil Mayers wrote: ...since the ncbi zone is an unsigned child zone, there needs to be an NSEC/NSEC3 record to prove the absence of the DS record, and have a secure delegation to an unsigned child

Re: www.ncbi.nlm.nih.gov / pubmed

2010-08-18 Thread Dave Sparro
On 8/18/2010 1:12 PM, Casey Deccio wrote: On Wed, Aug 18, 2010 at 9:48 AM, Dave Sparrodspa...@gmail.com wrote: On 8/18/2010 8:30 AM, Phil Mayers wrote: ...since the ncbi zone is an unsigned child zone, there needs to be an NSEC/NSEC3 record to prove the absence of the DS record, and have a

Re: www.ncbi.nlm.nih.gov / pubmed

2010-08-18 Thread Casey Deccio
On Wed, Aug 18, 2010 at 10:55 AM, Dave Sparro dspa...@gmail.com wrote: It seems to me that the OP wanted a work-around to the fact that his end users couldn't use the website due to a validation failure. It still seems to me that working around that situation misses the point of using DNSSEC.

Bind as cache DNS and firewall

2010-08-18 Thread Ulrich David
Hi, I'm using Bind as a cache (absolutely not authoritative) DNS for a public network. I have put a firewall in order to refuse incoming packets from people not on my network. Today, inspecting logs, I see this : Aug 18 17:31:44 cns1 [IPT DROP] : IN=eth0 OUT= MAC=00 SRC=195.176.219.26

RRSIGs without DNSKEYs in insecure zone

2010-08-18 Thread Casey Deccio
Using BIND 9.6.2-P2 and 9.7.1.P2 configured for DNSSEC validation with DLV I experience the following issue. When I attempt to resolve www.jobcorps.govI get a SERVFAIL message. The authoritative servers return an RRSIG covering the A RR, but the resolver is unable to validate it because it

Re: RRSIGs without DNSKEYs in insecure zone

2010-08-18 Thread Paul Wouters
On Wed, 18 Aug 2010, Casey Deccio wrote: Using BIND 9.6.2-P2 and 9.7.1.P2 configured for DNSSEC validation with DLV I experience the following issue.  When I attempt to resolve www.jobcorps.gov I get a SERVFAIL message.  The authoritative servers return an RRSIG covering the A RR, but the

Re: RRSIGs without DNSKEYs in insecure zone

2010-08-18 Thread Casey Deccio
On Wed, Aug 18, 2010 at 4:33 PM, Paul Wouters p...@xelerance.com wrote: On Wed, 18 Aug 2010, Casey Deccio wrote: Using BIND 9.6.2-P2 and 9.7.1.P2 configured for DNSSEC validation with DLV I experience the following issue. When I attempt to resolve www.jobcorps.gov I get a SERVFAIL message.

Re: DNS Rebinding Prevention for the Weak Host Model Attacks

2010-08-18 Thread Bradley Falzon
I am looking at the deny-answer-* section for this, but we just need to ensure we minimally affect legitimate applications. This is why I was proposing we only action when the source is apart of the answer AS WELL as another answer. Blocking based on just the source would affect dyn-dns type

Re: «tsig verify failure» only on some zones

2010-08-18 Thread Mark Andrews
First thing. Ensure that the nameservers are properly ntp synced. This should get rid of mosr timing issues. Secondly, for the failing zone run tcpdump on both ends and compare the TCP payload of the packets. They should be byte for byte identical. If they differ then the NAT box is fiddling

Re: Bind as cache DNS and firewall

2010-08-18 Thread Jason Roysdon
On 08/18/2010 02:42 PM, Ulrich David wrote: Hi, I'm using Bind as a cache (absolutely not authoritative) DNS for a public network. I have put a firewall in order to refuse incoming packets from people not on my network. Today, inspecting logs, I see this : Aug 18 17:31:44 cns1 [IPT