Re: ECS-IP in the RPZ-Log?

2021-10-27 Thread Mark Andrews
Submit a issue at https://gitlab.isc.org/

> On 28 Oct 2021, at 01:00, Tom  wrote:
> 
> Hi
> 
> Using BIND-9.16.21. I'm wondering, if it's possible to have the ECS client IP 
> address in the RPZ log.
> In front of our BIND, which has an RPZ configuration, is a dnsdist, which 
> inject the ECS-IP.
> 
> BIND could log the ECS-IP with the builtin "querylog" (rndc querylog on). In 
> the following example, the effective client-IP is 172.16.16.33/32, which is 
> logged fine here:
> 27-Oct-2021 15:41:27.940 queries: info: client @0x7f3db81aa0f8 
> 127.0.0.1#44353 (example.ch): query: example.ch IN A +E(0)K (127.0.0.1) [ECS 
> 172.16.16.33/32/0]
> 
> 
> But in the RPZ log, I can correctly see only the dnsdist IP and not the one 
> from the effective source (172.16.16.33):
> 27-Oct-2021 15:41:27.940 rpz: info: client @0x7f3db81aa0f8 127.0.0.1#44353 
> (example.ch): rpz QNAME NXDOMAIN rewrite example.ch/A/IN via 
> example.ch.blacklist-rpz.test.local
> 
> Is there a way to have/see the ECS-IP in the RPZ log?
> 
> Many thanks.
> Kind regards,
> Tom
> ___
> Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
> from this list
> 
> ISC funds the development of this software with paid support subscriptions. 
> Contact us at https://www.isc.org/contact/ for more information.
> 
> 
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users

-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742  INTERNET: ma...@isc.org

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: DNSSEC questions

2021-10-27 Thread Alessandro Vesely

Hi Matthijs,

thanks for clarifications.

On Wed 27/Oct/2021 17:53:46 +0200 Matthijs Mekking wrote:

On 27-10-2021 12:54, Alessandro Vesely wrote:


I also switched to dnssec-policy.  Somewhere I read that I should have 
defined a policy with keys matching the existing keys.  I also defined a 
"combined" key.  Now I have two DS, two CDS, and two CDNSKEY RRs.  I attach a 
picture of a zone and paste the policy below.


Adding the combined key to the policy means you did not create a policy that 
matched the existing keys. BIND notices that you want three keys, you only have 
two, so it creates the CSK.



Yup, the intention was (and still is) to migrate to CSK, as it's simpler, 
without breaking existing status.  So now I need to get rid of the old keys.



1. Now, how do I get rid of the extra ksk and zsk?  Is it enough to remove 
them from the policy?


You can remove them from the policy yes, but make sure the migration is 
complete. You can check with "rndc dnssec -status " and make sure that 
your key states are in "omnipresent".



Thanks, that's what I was looking for.  I have to check all zones (and two 
views each).  I'll write a script for that.



2. I have double CDS/CDNSKEY records, but they're not in the zone files.  Do 
I have to run rndc dnssec -checkds to remove them?


That's because you added the additional CSK to the policy. It is probably best 
to remove it again from the policy and only change the policy if the migration 
is complete.



Right.  So the script must also check that the new keys have a parental DS.


3. The server produces new .signed and .signed.jnl files every day, which is 
inconvenient as the zone files directory is checked by tripwire.  Is that 
timing determined by the dnskey-ttl?  Would it be okay to set it to one month?


The zone is signed if a signature is about to expire. It is not determined by 
dnskey-ttl. I would exclude these files from tripwire because they need to 
written out anyway.



Then, why does it have to rewrite it every day, if the zone didn't change? 
dnskey-ttl is the only one-day timing thing, except parent-ds-ttl.


BTW, DS RR has a ttl of 10800 at the parent; should I copy that to 
parent-ds-ttl in my policy definition?  What for?



4. Is rndc managed-keys status supposed to display anything meaningful, given 
my setup?  It talks about a non-existing key id.  The sync option produces no 
output at all.  How do I know the overall dnssec status?


"rndc managed-keys status" is for trust anchors, use "rndc dnssec -status 
" instead.



OK.  Thanks again,
Ale
--










___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Query on issue#2389 BIND 9.16.10

2021-10-27 Thread Ondřej Surý

--
Ondřej Surý (He/Him)
ond...@isc.org

> On 27. 10. 2021, at 7:03, Mayank Maheshwari M 
>  wrote:
> 
> Hi Ondrej,
> 
> Thanks for all your responses so far.
> 
> As per the recommendation from BIND community we plan to proceed with an 
> upgrade to latest BIND version (9.16.21) where, as per BIND this issue is 
> fixed.
> But referring to your last email, where you stated that " All the information 
> available is always written down in the issue you have already referenced."
> Based on our findings, we only able to see limited (Single line) information 
> for this issue which is mentioned in below mail. 

Yes, that’s it. The issue states that issues like this were resolved by 
refactoring the TCPDNS component and it was already released by the time we got 
the report. And that’s it.

> I really appreciate if you could direct us with some more details on this 
> issue, this will really help us in explaining the fault to our customers and 
> reproduction of this issue in our labs.

There are no “more details” available anywhere. You should explain to your 
customers that you failed to upgrade the BIND 9 version on time and that’s what 
is causing the fault. There were at least 4 CVEs fixed since BIND 9.16.10.

> Or redirect it to correct person, who have this information.

There’s no other “correct person”.

> Really appreciated your support so far and looking forward for the same.

I already suggested that if you want somebody to look into it, you would have 
to pay for the extra time. Nobody is going to analyse bug in year old version 
of BIND 9 since the bug has been already fixed. But you seem to ignored that 
message and insist we do the work for you, so I am going to repeat it here 
again:

"""
BIND 9.16.10 was tagged and released in December 2020. That’s almost a year 
ago. You can’t and should not expect people do work for free when you slacked 
on updates. You have to carry the costs of the bad decision you made when you 
decided to stick with old version. The word “free” in free software is to be 
interpreted as the word “free” in free speech and not as in free beer. We do 
not limit what can you do with the software beyond MPL-2.0 license, but that’s 
it. There’s no obligation to do any work for free.

For everything else there’s a hint in the mailing list footer, I’ll copy it 
here for your convenience:

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.
"""

> Best Regards
> Mayank Maheshwari
> 
> -Original Message-
> From: Rajnish Kamboj  
> Sent: Tuesday, October 26, 2021 5:50 PM
> To: Ondřej Surý 
> Cc: bind-users@lists.isc.org; Mayank Maheshwari M 
> ; Swaminathan Plsi 
> 
> Subject: RE: Query on issue#2389 BIND 9.16.10
> 
> Hi Ondřej
> 
> We have gone thru the issue " 
> https://gitlab.isc.org/isc-projects/bind9/-/issues/2389; and could not find 
> the scenario which causes this issue.
> Before upgrading to latest BIND, we want to reproduce the issue in our labs.
> 
> In the issue it is mentioned that "The sends is -1 in the coredump which 
> means that there was a double call to the callback.  This class of issues 
> were fixed in !4455 (merged)"
> It would be of great help if the scenario which causes this issue is shared, 
> so that we can reproduce it in our labs, before upgrading BIND.
> 
> 
> 
> 
> Regards
> Rajnish Kamboj
> 
> -Original Message-
> From: Ondřej Surý 
> Sent: Monday, October 18, 2021 4:39 PM
> To: Rajnish Kamboj 
> Cc: bind-users@lists.isc.org
> Subject: Re: Query on issue#2389 BIND 9.16.10
> 
> All the information available is always written down in the issue you have 
> already referenced. That’s always the case - even with security issues, 
> there’s only 1 month+ delay to give people chance to upgrade.
> 
> Ondřej
> --
> Ondřej Surý — ISC (He/Him)
> 
> My working hours and your working hours may be different. Please do not feel 
> obligated to reply outside your normal working hours.
> 
>> On 18. 10. 2021, at 12:58, Rajnish Kamboj  
>> wrote:
>> 
>> Thanks Ondrej for your quick reply,
>> 
>> Upgrading to latest release will fix the issue.
>> Can you also help us with scenarios as to why this issue is occurring?
>> May be this will help us in quick workaround (if possible) till the time we 
>> plan for latest BIND.
>> 
>> 
>> Regards
>> Rajnish Kamboj
>> 
>> -Original Message-
>> From: Ondřej Surý 
>> Sent: Monday, October 18, 2021 3:28 PM
>> To: Rajnish Kamboj 
>> Cc: bind-users@lists.isc.org
>> Subject: Re: Query on issue#2389 BIND 9.16.10
>> 
>> Hi,
>> 
>> there were several security issues since 9.16.10, you should be running 
>> either last 9.16.x release (9.16.21 as of time writing this email) or have 
>> all of the issues patched.
>> 
>> The thing you are asking for is so wrong on so many levels. Don’t do that, 
>> upgrade to last version instead.
>> 
>> Ondrej
>> --
>> Ondřej Surý (He/Him)
>> ond...@isc.org
>> 
>>> On 18. 10. 2021, at 

Re: DNSSEC questions

2021-10-27 Thread Matthijs Mekking

Hi Allesandro,

Your policy has three keys:

   keys {
   ksk key-directory lifetime unlimited algorithm rsasha256 2048;
   zsk key-directory lifetime unlimited algorithm rsasha256 2048;
   csk key-directory lifetime unlimited algorithm rsasha256 2048;
   };

Two of them require DS records (ksk and csk), so that is why you have 
double CDS/CDNSKEY records.


On 27-10-2021 12:54, Alessandro Vesely wrote:

Hi all,

I recently installed version 9.16, and have a number of doubts.  During 
the upgrade, named didn't want to load signed zones because of 
CDS/CDNSKEY inconsistency.  There were CDS records in the zone files, 
which I removed.


I also switched to dnssec-policy.  Somewhere I read that I should have 
defined a policy with keys matching the existing keys.  I also defined a 
"combined" key.  Now I have two DS, two CDS, and two CDNSKEY RRs.  I 
attach a picture of a zone and paste the policy below.


Adding the combined key to the policy means you did not create a policy 
that matched the existing keys. BIND notices that you want three keys, 
you only have two, so it creates the CSK.




The questions:

1. Now, how do I get rid of the extra ksk and zsk?  Is it enough to 
remove them from the policy?


You can remove them from the policy yes, but make sure the migration is 
complete. You can check with "rndc dnssec -status " and make sure 
that your key states are in "omnipresent".



2. I have double CDS/CDNSKEY records, but they're not in the zone 
files.  Do I have to run rndc dnssec -checkds to remove them?


That's because you added the additional CSK to the policy. It is 
probably best to remove it again from the policy and only change the 
policy if the migration is complete.



3. The server produces new .signed and .signed.jnl files every day, 
which is inconvenient as the zone files directory is checked by 
tripwire.  Is that timing determined by the dnskey-ttl?  Would it be 
okay to set it to one month?


The zone is signed if a signature is about to expire. It is not 
determined by dnskey-ttl. I would exclude these files from tripwire 
because they need to written out anyway.



4. Is rndc managed-keys status supposed to display anything meaningful, 
given my setup?  It talks about a non-existing key id.  The sync option 
produces no output at all.  How do I know the overall dnssec status?


"rndc managed-keys status" is for trust anchors, use "rndc dnssec 
-status " instead.



Best regards,

Matthijs



Here's my policy setting:

dnssec-policy "explicit" {
 // Keys
 keys {
     ksk key-directory lifetime unlimited algorithm rsasha256 2048;
     zsk key-directory lifetime unlimited algorithm rsasha256 2048;
     csk key-directory lifetime unlimited algorithm rsasha256 2048;
 };

 nsec3param iterations 1 optout false salt-length 16;

 // Key timings
 dnskey-ttl 86400;
 publish-safety P3W;
 retire-safety P3W;
 purge-keys P1Y;

 // Signature timings
 signatures-refresh P2M;
 signatures-validity P6M;
 signatures-validity-dnskey P6M;

 // Zone parameters
 max-zone-ttl 86400;
 zone-propagation-delay PT1H;

 // Parent parameters
 parent-ds-ttl 86400;
 parent-propagation-delay PT1H;
};


___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


ECS-IP in the RPZ-Log?

2021-10-27 Thread Tom

Hi

Using BIND-9.16.21. I'm wondering, if it's possible to have the ECS 
client IP address in the RPZ log.
In front of our BIND, which has an RPZ configuration, is a dnsdist, 
which inject the ECS-IP.


BIND could log the ECS-IP with the builtin "querylog" (rndc querylog 
on). In the following example, the effective client-IP is 
172.16.16.33/32, which is logged fine here:
27-Oct-2021 15:41:27.940 queries: info: client @0x7f3db81aa0f8 
127.0.0.1#44353 (example.ch): query: example.ch IN A +E(0)K (127.0.0.1) 
[ECS 172.16.16.33/32/0]



But in the RPZ log, I can correctly see only the dnsdist IP and not the 
one from the effective source (172.16.16.33):
27-Oct-2021 15:41:27.940 rpz: info: client @0x7f3db81aa0f8 
127.0.0.1#44353 (example.ch): rpz QNAME NXDOMAIN rewrite example.ch/A/IN 
via example.ch.blacklist-rpz.test.local


Is there a way to have/see the ECS-IP in the RPZ log?

Many thanks.
Kind regards,
Tom
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Resolver failures after stale-answer enabled

2021-10-27 Thread Blažej Krajňák
https://gitlab.isc.org/isc-projects/bind9/-/issues/2982

st 27. 10. 2021 o 11:53 Blažej Krajňák  napísal(a):
>
> Hello,
>
> few days ago I updated our recursive resolvers at AS50242 from Debian
> 10 to 11 to be able to enable stale-answer afer Facebook incident.
> However, today I got bug reports from customers. Their browser often
> fail at page loading with DNS_PROBE_FINISHED_NXDOMAIN. After few
> seconds (and after browser DNS re-query) page will load correctly. In
> Bind9 log I see many of messages like:
>
> Oct 27 11:34:13 srv-snv-production named[576109]:
> configuration.ls.apple.com resolver failure, stale answer unavailable
> Oct 27 11:34:13 srv-snv-production named[576109]: client
> @0x7fc71806cd58 10.202.42.196#58876 (configuration.ls.apple.com): view
> clients: query failed (SERVFAIL) for
> configuration.ls.apple.com/IN/TYPE65 at query.c:5832
> Oct 27 11:34:13 srv-snv-production named[576109]:
> configuration.ls.apple.com resolver failure, stale answer unavailable
> Oct 27 11:34:13 srv-snv-production named[576109]: client
> @0x7fc7180715a8 10.202.42.196#49219 (configuration.ls.apple.com): view
> clients: query failed (SERVFAIL) for configuration.ls.apple.com/IN/A
> at query.c:5832
>
> After I turned off stale-answer, problem looks to be resolved. I'm
> attaching huge debug log of above failures - hope somebody will find
> problem from this. The problematic query starts at 27-Oct-2021
> 11:34:13.858
>
> https://drive.google.com/file/d/1qiyLa8CfNN54PUktth6R4kT8PpohNsde/view?usp=sharing
>
> Linux srv-le-production 5.10.0-9-amd64 #1 SMP Debian 5.10.70-1
> (2021-09-30) x86_64 GNU/Linux
> bind9/stable,now 1:9.16.15-1 amd64
>
>
> Regards,
> Blažej Krajňák
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


DNSSEC questions

2021-10-27 Thread Alessandro Vesely

Hi all,

I recently installed version 9.16, and have a number of doubts.  During the 
upgrade, named didn't want to load signed zones because of CDS/CDNSKEY 
inconsistency.  There were CDS records in the zone files, which I removed.


I also switched to dnssec-policy.  Somewhere I read that I should have defined 
a policy with keys matching the existing keys.  I also defined a "combined" 
key.  Now I have two DS, two CDS, and two CDNSKEY RRs.  I attach a picture of a 
zone and paste the policy below.



The questions:

1. Now, how do I get rid of the extra ksk and zsk?  Is it enough to remove them 
from the policy?


2. I have double CDS/CDNSKEY records, but they're not in the zone files.  Do I 
have to run rndc dnssec -checkds to remove them?


3. The server produces new .signed and .signed.jnl files every day, which is 
inconvenient as the zone files directory is checked by tripwire.  Is that 
timing determined by the dnskey-ttl?  Would it be okay to set it to one month?


4. Is rndc managed-keys status supposed to display anything meaningful, given 
my setup?  It talks about a non-existing key id.  The sync option produces no 
output at all.  How do I know the overall dnssec status?



Here's my policy setting:

dnssec-policy "explicit" {
// Keys
keys {
ksk key-directory lifetime unlimited algorithm rsasha256 2048;
zsk key-directory lifetime unlimited algorithm rsasha256 2048;
csk key-directory lifetime unlimited algorithm rsasha256 2048;
};

nsec3param iterations 1 optout false salt-length 16;

// Key timings
dnskey-ttl 86400;
publish-safety P3W;
retire-safety P3W;
purge-keys P1Y;

// Signature timings
signatures-refresh P2M;
signatures-validity P6M;
signatures-validity-dnskey P6M;

// Zone parameters
max-zone-ttl 86400;
zone-propagation-delay PT1H;

// Parent parameters
parent-ds-ttl 86400;
parent-propagation-delay PT1H;
};

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Resolver failures after stale-answer enabled

2021-10-27 Thread Blažej Krajňák
Hello,

few days ago I updated our recursive resolvers at AS50242 from Debian
10 to 11 to be able to enable stale-answer afer Facebook incident.
However, today I got bug reports from customers. Their browser often
fail at page loading with DNS_PROBE_FINISHED_NXDOMAIN. After few
seconds (and after browser DNS re-query) page will load correctly. In
Bind9 log I see many of messages like:

Oct 27 11:34:13 srv-snv-production named[576109]:
configuration.ls.apple.com resolver failure, stale answer unavailable
Oct 27 11:34:13 srv-snv-production named[576109]: client
@0x7fc71806cd58 10.202.42.196#58876 (configuration.ls.apple.com): view
clients: query failed (SERVFAIL) for
configuration.ls.apple.com/IN/TYPE65 at query.c:5832
Oct 27 11:34:13 srv-snv-production named[576109]:
configuration.ls.apple.com resolver failure, stale answer unavailable
Oct 27 11:34:13 srv-snv-production named[576109]: client
@0x7fc7180715a8 10.202.42.196#49219 (configuration.ls.apple.com): view
clients: query failed (SERVFAIL) for configuration.ls.apple.com/IN/A
at query.c:5832

After I turned off stale-answer, problem looks to be resolved. I'm
attaching huge debug log of above failures - hope somebody will find
problem from this. The problematic query starts at 27-Oct-2021
11:34:13.858

https://drive.google.com/file/d/1qiyLa8CfNN54PUktth6R4kT8PpohNsde/view?usp=sharing

Linux srv-le-production 5.10.0-9-amd64 #1 SMP Debian 5.10.70-1
(2021-09-30) x86_64 GNU/Linux
bind9/stable,now 1:9.16.15-1 amd64


Regards,
Blažej Krajňák
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


dig: couldn't get address for root servers

2021-10-27 Thread salma smaoui
Greetings,

Hope you're all doing great.
Actually, I am using bind 9.11.28-S1, and I am facing some problems : whenever 
I use the command dig +trace, I came across this error : dig: couldn't get 
address for 'F.ROOT-SERVERS.NET': failure.
Does anyone have an idea why I see this error ? It is really causing DNS 
failures.
Best regards.
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users