Re: Request to use "Canonical/Mirror"

2022-05-13 Thread Ondřej Surý
Also see https://datatracker.ietf.org/doc/html/rfc8499 for canonical DNS 
terminology document.

Ondrej
--
Ondřej Surý — ISC (He/Him)

My working hours and your working hours may be different. Please do not feel 
obligated to reply outside your normal working hours.

> On 14. 5. 2022, at 1:10, Felicia P  wrote:
> 
> Hello, I see that ISC updated terminology for BIND9 to use primary/secondary 
> in addition to the original master/slave which many projects have been 
> deprecating.
> 
> In the context of BIND9, it seems that 'primary/secondary' is less clear than 
> master/slave.
> 
> My understanding is that it is possible to have a standalone BIND server that 
> is running as a 'master' yet acting as a 'secondary' for a particular domain. 
>  In this context, secondary doesn't necessarily refer to the 'slave' status 
> of the server, but that it is sort of like a backup server in the event that 
> the primary is unavailable.
> 
> Given this, it seems like instead of 'primary/secondary', a better choice of 
> terms would be 'canonical/mirror' which unambiguously conveys the roles of 
> respective servers and does not overlap with other contexts or meanings of 
> primary/secondary.
> 
> 
> 
> -- 
> Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
> this list
> 
> ISC funds the development of this software with paid support subscriptions. 
> Contact us at https://www.isc.org/contact/ for more information.
> 
> 
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Request to use "Canonical/Mirror"

2022-05-13 Thread btb via bind-users
On May 13, 2022, at 19.10, Felicia P  wrote:
> 
> Hello, I see that ISC updated terminology for BIND9 to use primary/secondary 
> in addition to the original master/slave which many projects have been 
> deprecating.
> 
> In the context of BIND9, it seems that 'primary/secondary' is less clear than 
> master/slave.
> 
> My understanding is that it is possible to have a standalone BIND server that 
> is running as a 'master' yet acting as a 'secondary' for a particular domain. 
>  In this context, secondary doesn't necessarily refer to the 'slave' status 
> of the server, but that it is sort of like a backup server in the event that 
> the primary is unavailable.
> 
> Given this, it seems like instead of 'primary/secondary', a better choice of 
> terms would be 'canonical/mirror' which unambiguously conveys the roles of 
> respective servers and does not overlap with other contexts or meanings of 
> primary/secondary.

servers are neither master, nor slave, nor primary, nor secondary.  zones are.
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: per record responses based on originating IP

2022-05-13 Thread Nick Tait via bind-users

On 13/05/22 09:02, Grant Taylor via bind-users wrote:

On 5/12/22 2:41 PM, Nick Tait via bind-users wrote:

This sounds like exactly the sort of use case for Response Policy Zones:


How are you going to have RPZ return different addresses for different 
clients?  Are you suggesting use different RPZs with different 
contents for different clients?


Yes, although now that I think through the details it turns out to be 
much messier than I first thought, because there doesn't seem to be a 
way to specify "not" in the RPZ...


Also I should point out that I'm assuming that a PASSTHRU result in one 
RPZ will still result in subsequent RPZs being processed. I haven't 
actually tested this, so its possible I'm misunderstanding the 
documentation?


Anyway in the interests of following this all the way though, let's 
assume you had 3 clients and you wanted them to each receive a different 
answer to the query "www.example.com":


Suppose their IP addresses are:

   A = 192.0.2.10
   B = 192.0.2.20
   C = 192.0.2.30

Then, if I'm not mistaken, you could create 3 RPZ zones:

Zone file for "a.rpz.mylocaldomain.com" contains (in addition to SOA, etc):

   ; Don't overwrite the answer for queries received from clients B & C
   32.20.2.0.192.rpz-client-ip IN CNAME rpz-passthru.
   32.30.2.0.192.rpz-client-ip IN CNAME rpz-passthru.

   ; Change the answer to the question www.example.com
   www.example.com IN A 10.0.0.1

Zone file for "b.rpz.mylocaldomain.com" contains (in addition to SOA, etc):

   ; Don't overwrite the answer for queries received from clients A & C
   32.10.2.0.192.rpz-client-ip IN CNAME rpz-passthru.
   32.30.2.0.192.rpz-client-ip IN CNAME rpz-passthru.

   ; Change the answer to the question www.example.com
   www.example.com IN A 10.0.0.2

Zone file for "c.rpz.mylocaldomain.com" contains (in addition to SOA, etc):

   ; Don't overwrite the answer for queries received from clients A & B
   32.10.2.0.192.rpz-client-ip IN CNAME rpz-passthru.
   32.20.2.0.192.rpz-client-ip IN CNAME rpz-passthru.

   ; Change the answer to the question www.example.com
   www.example.com IN A 10.0.0.3

And then configure BIND to use all three RPZs:

   response-policy {
    zone "a.rpz.mylocaldomain.com";
    zone "b.rpz.mylocaldomain.com";
    zone "c.rpz.mylocaldomain.com";
   };

Scalability is obviously a challenge with this particular solution! :-(

So on reflection, there are probably better solutions to the problem 
that you are trying to solve. Although I don't personally have 
experience with it, wonder if "dnsmasq" might do what you need?


Thanks,

Nick.
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Request to use "Canonical/Mirror"

2022-05-13 Thread Felicia P
Hello, I see that ISC updated terminology for BIND9 to use 
primary/secondary in addition to the original master/slave which many 
projects have been deprecating.


In the context of BIND9, it seems that 'primary/secondary' is less clear 
than master/slave.


My understanding is that it is possible to have a standalone BIND server 
that is running as a 'master' yet acting as a 'secondary' for a 
particular domain.  In this context, secondary doesn't necessarily refer 
to the 'slave' status of the server, but that it is sort of like a 
backup server in the event that the primary is unavailable.


Given this, it seems like instead of 'primary/secondary', a better 
choice of terms would be 'canonical/mirror' which unambiguously conveys 
the roles of respective servers and does not overlap with other contexts 
or meanings of primary/secondary.




--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Bind9 Server conflicts with docker0 interface

2022-05-13 Thread Maurício Penteado via bind-users
 Hi folks,
I have finally resolved my issue with docker interface.I had to delete my 
Ubuntu and install a brand new Centos on my server.Now everything works as 
expected.
Cheers
Em sábado, 7 de maio de 2022 06:23:32 GMT+1, Nick Tait via bind-users 
 escreveu:  
 
 On 7/05/2022 1:38 am, Maurà cio Penteado via bind-users wrote:
> I added the A-record "ns1  IN  A  172.17.0.1" to my zone-file as 
> suggested and it seems that the order fixed the issue.
> Now my Bind9 clients are getting ip 192.168.0.10 favorably.

Hi Mauricio.

I don't think anyone suggested that you add that address to your zone file?

My suggestion was to simply update the SOA serial number.

Nick.

-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users
  -- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Supporting LOC RR's

2022-05-13 Thread Timothe Litt


On 13-May-22 12:21, Philip Prindeville wrote:

That's interesting, and clever work to solve the problem of making APs into 
reliable location references.

They are doing a more involved/automated version of what I suggested - using 
GPS (in their case built-in GPS, plus AP-AP communication) for APs to locate 
themselves.  Once the AP knows where it is, the clients can find out where they 
are in physical (WGS84 coordinate) space using the APs as references.  Note 
that it's an enterprise solution - definitely not for most homes - since it 
requires at least 4, and probably many more suitable APs.

But LOC records don't have any role in what's described.  They *could* be an 
output (e.g. an AP could use DNS UPDATE to install LOC records).  But there's 
still no obviously useful consumer for the LOCs...so why bother?

If you're in WiFi range of the AP, a client is better off getting precise 
information from its broadcast.  If not, it's useless.  And as previously 
noted, LOC for servers suffers from AnyCast, cache, and CDN uncertainty.

LOC was proposed in simpler times.


Actually, if the AP doesn't have GPS but does offer WiFi Certified Location 
Service, then it could use its own LOC record to provision itself...

-Philip

WiFi Certified Location service computes the *relative* location of 2 
WiFi devices. https://www.wi-fi.org/discover-wi-fi/wi-fi-location To 
offer an absolute location (what LOC provides), at least one AP has to 
know where it is (and broadcast it).  Then additional APs can compute 
their positions relative to it, and compute their absolute location(s).  
Either your AP knows where it is, or it finds out via WCL (or some other 
means: e.g. GPS or configuration).


If you want an AP to find out where it is via LOC, someone has to 
generate the LOC record.  And the AP needs to be able to find it - 
meaning it has been configured with an IP address and/or name.  If you 
want to participate in WCL, you want the LOC to have a precise (and 
accurate) position.  OTOH, if an AP is participating in WCL and doesn't 
know its absolute location, it can compute it using WCL if some other AP 
knows and broadcasts its own absolute location.


This conversation has come full circle.  Where does the LOC record's 
position data come from, and who (or what) provisions it?  And (assuming 
the AP doesn't have GPS or another reference, such as installed WCL APs) 
why is that easier/better than putting the data in the AP's config?


As I noted, *after* an AP knows where it is, it *could* generate a LOC 
record, and even install it. But that makes it an *output* of 
provisioning, not an input.  And there's still no obvious customer.  
Yes, some other AP could then use the first AP's LOC with WCL to 
determine its absolute location.  (Well, you probably need three APs to 
triangulate...)  But it's less work all around to get it from the first 
AP's broadcast.  And you still have the bootstrapping problem.  WCL 
clients have no use for LOC.  If you want to map your APs, you can ask 
them for their locations directly.


Much as some would like it to be, involving DNS isn't the answer to 
everything.


If you still want to convince yourself that LOC is useful: starting with 
an empty building, some unprovisioned APs, and no LOC records, provide 
an algorithm that provisions your AP(s). Specify all inputs and where 
they come from.  Contrast it with the HP video and/or manual 
configuration.  Show what steps your algorithm eliminates and/or 
facilitates, and at what cost.  I don't expect a positive outcome, but 
if I'm wrong, by all means post the details.


Since this has indeed come full circle, I'm done.

Timothe Litt
ACM Distinguished Engineer
--
This communication may not represent the ACM or my employer's views,
if any, on the matters discussed.




OpenPGP_signature
Description: OpenPGP digital signature
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Bind failures following update/reboot w/ 9.18.1

2022-05-13 Thread Greg Choules via bind-users
Your MTU is not the point. It's what happens beyond your equipment that may
have a bearing. However, as I said, I don't think IP fragmentation will be
your problem in this case, so that's a whole other discussion for a
different day.
pcaps are your friend though. From a packet capture you can see exactly
what happened on the wire, rather than speculate.

Cheers, Greg

On Fri, 13 May 2022 at 18:00, Philip Prindeville <
philipp_s...@redfish-solutions.com> wrote:

> My MTU is 1500 bytes, so I don't think that's the problem.
>
> But UDP can fragment via IP...
>
>
> > On May 13, 2022, at 10:34 AM, Greg Choules <
> gregchoules+bindus...@googlemail.com> wrote:
> >
> > Hi Philip.
> > Can you run packet captures? I'm running 9.18.0 (close enough?) in
> Docker and just traced what happens going from "dnssec-validation no;" to
> "dnssec-validation auto;" It makes a DNSKEY query for "." to one of the
> roots. The response size was over 900 bytes, so depending on what UDP
> payload size is advertised there might need to be some retrying over TCP.
> But you'll only know whether that is happening from a pcap.
> > So I'd say.. check EDNS payload size, check what your firewall(s) is/are
> prepared to let through, check whether DNS/TCP is allowed at all, check if
> something is doing IP fragmentation (though I wouldn't expect this to come
> into play with a packet ~1k).
> >
> > I hope some of that is useful.
> > Cheers, Greg
> >
> > On Fri, 13 May 2022 at 17:07, Philip Prindeville <
> philipp_s...@redfish-solutions.com> wrote:
> > After rebooting my OpenWRT router with Bind 9.18.1 yesterday, I started
> seeing a lot of:
> >
> >
> > May 12 19:24:06 OpenWrt named[11061]: validating ./NS: no valid
> signature found
> > May 12 19:24:06 OpenWrt named[11061]: validating net/DS: no valid
> signature found
> > May 12 19:24:06 OpenWrt named[11061]: no valid RRSIG resolving
> './NS/IN': 192.203.230.10#53
> > May 12 19:24:06 OpenWrt named[11061]: no valid RRSIG resolving
> 'net/DS/IN': 8.8.4.4#53
> > May 12 19:24:06 OpenWrt named[11061]: validating com/DS: no valid
> signature found
> > May 12 19:24:06 OpenWrt named[11061]: no valid RRSIG resolving
> 'com/DS/IN': 8.8.4.4#53
> > May 12 19:24:06 OpenWrt named[11061]: validating net/DS: no valid
> signature found
> > May 12 19:24:06 OpenWrt named[11061]: no valid RRSIG resolving
> 'net/DS/IN': 66.232.64.10#53
> > May 12 19:24:06 OpenWrt named[11061]: validating com/DS: no valid
> signature found
> > May 12 19:24:06 OpenWrt named[11061]: no valid RRSIG resolving
> 'com/DS/IN': 66.232.64.10#53
> >
> >
> > In my options, I had:
> >
> > dnssec-validation auto;
> >
> > But had to turn this off.  It had been working.  This is a production
> firewall/router.
> >
> > What troubleshooting should I do to fix this?
> >
> > I had tried:
> >
> > rndc managed-keys refresh
> > rndc managed-keys sync
> >
> > But don't understand why that would have been necessary unless the root
> keys got updated recently.
> >
> > Scrolling to the very top of the logs I see:
> >
> > May 12 19:24:04 OpenWrt named[11061]: managed-keys-zone: Unable to fetch
> DNSKEY set '.': timed out
> >
> > Thanks,
> >
> > -Philip
> >
> >
> > --
> > Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe
> from this list
> >
> > ISC funds the development of this software with paid support
> subscriptions. Contact us at https://www.isc.org/contact/ for more
> information.
> >
> >
> > bind-users mailing list
> > bind-users@lists.isc.org
> > https://lists.isc.org/mailman/listinfo/bind-users
>
>
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Bind failures following update/reboot w/ 9.18.1

2022-05-13 Thread Philip Prindeville
My MTU is 1500 bytes, so I don't think that's the problem.

But UDP can fragment via IP...


> On May 13, 2022, at 10:34 AM, Greg Choules 
>  wrote:
> 
> Hi Philip.
> Can you run packet captures? I'm running 9.18.0 (close enough?) in Docker and 
> just traced what happens going from "dnssec-validation no;" to 
> "dnssec-validation auto;" It makes a DNSKEY query for "." to one of the 
> roots. The response size was over 900 bytes, so depending on what UDP payload 
> size is advertised there might need to be some retrying over TCP. But you'll 
> only know whether that is happening from a pcap.
> So I'd say.. check EDNS payload size, check what your firewall(s) is/are 
> prepared to let through, check whether DNS/TCP is allowed at all, check if 
> something is doing IP fragmentation (though I wouldn't expect this to come 
> into play with a packet ~1k).
> 
> I hope some of that is useful.
> Cheers, Greg
> 
> On Fri, 13 May 2022 at 17:07, Philip Prindeville 
>  wrote:
> After rebooting my OpenWRT router with Bind 9.18.1 yesterday, I started 
> seeing a lot of:
> 
> 
> May 12 19:24:06 OpenWrt named[11061]: validating ./NS: no valid signature 
> found
> May 12 19:24:06 OpenWrt named[11061]: validating net/DS: no valid signature 
> found
> May 12 19:24:06 OpenWrt named[11061]: no valid RRSIG resolving './NS/IN': 
> 192.203.230.10#53
> May 12 19:24:06 OpenWrt named[11061]: no valid RRSIG resolving 'net/DS/IN': 
> 8.8.4.4#53
> May 12 19:24:06 OpenWrt named[11061]: validating com/DS: no valid signature 
> found
> May 12 19:24:06 OpenWrt named[11061]: no valid RRSIG resolving 'com/DS/IN': 
> 8.8.4.4#53
> May 12 19:24:06 OpenWrt named[11061]: validating net/DS: no valid signature 
> found
> May 12 19:24:06 OpenWrt named[11061]: no valid RRSIG resolving 'net/DS/IN': 
> 66.232.64.10#53
> May 12 19:24:06 OpenWrt named[11061]: validating com/DS: no valid signature 
> found
> May 12 19:24:06 OpenWrt named[11061]: no valid RRSIG resolving 'com/DS/IN': 
> 66.232.64.10#53
> 
> 
> In my options, I had:
> 
> dnssec-validation auto;
> 
> But had to turn this off.  It had been working.  This is a production 
> firewall/router.
> 
> What troubleshooting should I do to fix this?
> 
> I had tried:
> 
> rndc managed-keys refresh
> rndc managed-keys sync
> 
> But don't understand why that would have been necessary unless the root keys 
> got updated recently.
> 
> Scrolling to the very top of the logs I see:
> 
> May 12 19:24:04 OpenWrt named[11061]: managed-keys-zone: Unable to fetch 
> DNSKEY set '.': timed out
> 
> Thanks,
> 
> -Philip
> 
> 
> -- 
> Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
> this list
> 
> ISC funds the development of this software with paid support subscriptions. 
> Contact us at https://www.isc.org/contact/ for more information.
> 
> 
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users

-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Bind failures following update/reboot w/ 9.18.1

2022-05-13 Thread Greg Choules via bind-users
Hi Philip.
Can you run packet captures? I'm running 9.18.0 (close enough?) in Docker
and just traced what happens going from "dnssec-validation no;" to
"dnssec-validation auto;" It makes a DNSKEY query for "." to one of the
roots. The response size was over 900 bytes, so depending on what UDP
payload size is advertised there might need to be some retrying over TCP.
But you'll only know whether that is happening from a pcap.
So I'd say.. check EDNS payload size, check what your firewall(s) is/are
prepared to let through, check whether DNS/TCP is allowed at all, check if
something is doing IP fragmentation (though I wouldn't expect this to come
into play with a packet ~1k).

I hope some of that is useful.
Cheers, Greg

On Fri, 13 May 2022 at 17:07, Philip Prindeville <
philipp_s...@redfish-solutions.com> wrote:

> After rebooting my OpenWRT router with Bind 9.18.1 yesterday, I started
> seeing a lot of:
>
>
> May 12 19:24:06 OpenWrt named[11061]: validating ./NS: no valid signature
> found
> May 12 19:24:06 OpenWrt named[11061]: validating net/DS: no valid
> signature found
> May 12 19:24:06 OpenWrt named[11061]: no valid RRSIG resolving './NS/IN':
> 192.203.230.10#53
> May 12 19:24:06 OpenWrt named[11061]: no valid RRSIG resolving
> 'net/DS/IN': 8.8.4.4#53
> May 12 19:24:06 OpenWrt named[11061]: validating com/DS: no valid
> signature found
> May 12 19:24:06 OpenWrt named[11061]: no valid RRSIG resolving
> 'com/DS/IN': 8.8.4.4#53
> May 12 19:24:06 OpenWrt named[11061]: validating net/DS: no valid
> signature found
> May 12 19:24:06 OpenWrt named[11061]: no valid RRSIG resolving
> 'net/DS/IN': 66.232.64.10#53
> May 12 19:24:06 OpenWrt named[11061]: validating com/DS: no valid
> signature found
> May 12 19:24:06 OpenWrt named[11061]: no valid RRSIG resolving
> 'com/DS/IN': 66.232.64.10#53
>
>
> In my options, I had:
>
> dnssec-validation auto;
>
> But had to turn this off.  It had been working.  This is a production
> firewall/router.
>
> What troubleshooting should I do to fix this?
>
> I had tried:
>
> rndc managed-keys refresh
> rndc managed-keys sync
>
> But don't understand why that would have been necessary unless the root
> keys got updated recently.
>
> Scrolling to the very top of the logs I see:
>
> May 12 19:24:04 OpenWrt named[11061]: managed-keys-zone: Unable to fetch
> DNSKEY set '.': timed out
>
> Thanks,
>
> -Philip
>
>
> --
> Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe
> from this list
>
> ISC funds the development of this software with paid support
> subscriptions. Contact us at https://www.isc.org/contact/ for more
> information.
>
>
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users
>
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Supporting LOC RR's

2022-05-13 Thread Philip Prindeville


> That's interesting, and clever work to solve the problem of making APs into 
> reliable location references.  
> 
> They are doing a more involved/automated version of what I suggested - using 
> GPS (in their case built-in GPS, plus AP-AP communication) for APs to locate 
> themselves.  Once the AP knows where it is, the clients can find out where 
> they are in physical (WGS84 coordinate) space using the APs as references.  
> Note that it's an enterprise solution - definitely not for most homes - since 
> it requires at least 4, and probably many more suitable APs.
> 
> But LOC records don't have any role in what's described.  They *could* be an 
> output (e.g. an AP could use DNS UPDATE to install LOC records).  But there's 
> still no obviously useful consumer for the LOCs...so why bother?
> 
> If you're in WiFi range of the AP, a client is better off getting precise 
> information from its broadcast.  If not, it's useless.  And as previously 
> noted, LOC for servers suffers from AnyCast, cache, and CDN uncertainty.
> 
> LOC was proposed in simpler times.


Actually, if the AP doesn't have GPS but does offer WiFi Certified Location 
Service, then it could use its own LOC record to provision itself...

-Philip


-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Bind failures following update/reboot w/ 9.18.1

2022-05-13 Thread Philip Prindeville
After rebooting my OpenWRT router with Bind 9.18.1 yesterday, I started seeing 
a lot of:


May 12 19:24:06 OpenWrt named[11061]: validating ./NS: no valid signature found
May 12 19:24:06 OpenWrt named[11061]: validating net/DS: no valid signature 
found
May 12 19:24:06 OpenWrt named[11061]: no valid RRSIG resolving './NS/IN': 
192.203.230.10#53
May 12 19:24:06 OpenWrt named[11061]: no valid RRSIG resolving 'net/DS/IN': 
8.8.4.4#53
May 12 19:24:06 OpenWrt named[11061]: validating com/DS: no valid signature 
found
May 12 19:24:06 OpenWrt named[11061]: no valid RRSIG resolving 'com/DS/IN': 
8.8.4.4#53
May 12 19:24:06 OpenWrt named[11061]: validating net/DS: no valid signature 
found
May 12 19:24:06 OpenWrt named[11061]: no valid RRSIG resolving 'net/DS/IN': 
66.232.64.10#53
May 12 19:24:06 OpenWrt named[11061]: validating com/DS: no valid signature 
found
May 12 19:24:06 OpenWrt named[11061]: no valid RRSIG resolving 'com/DS/IN': 
66.232.64.10#53


In my options, I had:

dnssec-validation auto;

But had to turn this off.  It had been working.  This is a production 
firewall/router.

What troubleshooting should I do to fix this?

I had tried:

rndc managed-keys refresh
rndc managed-keys sync

But don't understand why that would have been necessary unless the root keys 
got updated recently.

Scrolling to the very top of the logs I see:

May 12 19:24:04 OpenWrt named[11061]: managed-keys-zone: Unable to fetch DNSKEY 
set '.': timed out

Thanks,

-Philip


-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Problem resolving a domain

2022-05-13 Thread Reindl Harald




Am 13.05.22 um 15:16 schrieb Rainer Duffner:

Thanks for the hints!

It does indeed work with these settings.

The problem is also that google and quad9 and most of the rest of the internet 
seem to be able to resolve it


the real problem is that they are working around it - if not the stupid 
upstream dns providers would have pressure to do their jobs and fix it 
at the root cause

--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Bad CNAME treatment consistency beetween direct CNAME request vs A request

2022-05-13 Thread Emmanuel Fusté

Ok understood !

Do you have any opinion on the multi CNAME behavior at the authoritative 
server ?


In python (in the analyzed case), the CNAME resolution will give you the 
second entry generating a dnssec validation failure.

Yes it is a bit convoluted :
- one program said "hey, this entry is a CNAME with this A value" the 
event (this is a CNAME) is recorded for later use.
- another take the event and is only interested by the CNAME value and 
RRSIG and do a CNAME request.

Boom...
That is the origin of the "case".

Thank you.
Emmanuel.
Le 13/05/2022 à 16:02, Ondřej Surý a écrit :

I think you misdiagnosed the issue.

Nothing asks directly for the CNAME under normal circumstances, and

And IN A query returns:

$ dig IN A lb.qual.flash-global.net @ns-160-c.gandi.net.

; <<>> DiG 9.19.0-1+0~20220421.76+debian10~1.gbpa71ef8-Debian <<>> IN A 
lb.qual.flash-global.net @ns-160-c.gandi.net.
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 56926
;; flags: qr aa rd; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
;; WARNING: recursion requested but not available

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 1232
;; QUESTION SECTION:
;lb.qual.flash-global.net.  IN  A

;; ANSWER SECTION:
lb.qual.flash-global.net. 10800 IN  CNAME   lb1.qual.flash-global.net.
lb1.qual.flash-global.net. 600  IN  A   51.68.158.37

;; Query time: 16 msec
;; SERVER: 217.70.187.161#53(ns-160-c.gandi.net.) (UDP)
;; WHEN: Fri May 13 15:57:49 CEST 2022
;; MSG SIZE  rcvd: 87

So, there’s nothing like “cache polution”, named correctly caches the records 
returned by the authoritative servers.

Ondrej
--
Ondřej Surý (He/Him)
ond...@isc.org

My working hours and your working hours may be different. Please do not feel 
obligated to reply outside your normal working hours.


On 13. 5. 2022, at 15:30, Emmanuel Fusté  wrote:

Hello,
I've had a hard time identifying the source of intermittent name
resolution failure for a customer.
The source of the problem is a DNS spec violation with a RRSET with
multiple CNAME:

dig  @ns-29-b.gandi.net CNAME lb.qual.flash-global.net

; <<>> DiG 9.18.2-1+ubuntu20.04.1+isc+3-Ubuntu <<>> @ns-29-b.gandi.net
CNAME lb.qual.flash-global.net
; (2 servers found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 42945
;; flags: qr aa rd; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
;; WARNING: recursion requested but not available

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 1232
;; QUESTION SECTION:
;lb.qual.flash-global.net.  IN  CNAME

;; ANSWER SECTION:
lb.qual.flash-global.net. 10800 IN  CNAME   lb1.qual.flash-global.net.
lb.qual.flash-global.net. 10800 IN  CNAME   lb2.qual.flash-global.net.

;; Query time: 10 msec
;; SERVER: 213.167.230.30#53(ns-29-b.gandi.net) (UDP)
;; WHEN: Fri May 13 15:03:00 CEST 2022
;; MSG SIZE  rcvd: 89

If I try the resolution via my Bind (9.18.2) resolver, cache cold, it
properly return a SERVFAIL:
  dig  @172.29.0.36 +dnssec +cd CNAME lb.qual.flash-global.net

; <<>> DiG 9.18.2-1+ubuntu20.04.1+isc+3-Ubuntu <<>> @172.29.0.36
+dnssec +cd CNAME lb.qual.flash-global.net
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 24053
;; flags: qr rd ra cd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 1232
; COOKIE: 23ac9b539bf16ad00100627e57c0b7d630e657322232 (good)
;; QUESTION SECTION:
;lb.qual.flash-global.net.  IN  CNAME

;; Query time: 30 msec
;; SERVER: 172.29.0.36#53(172.29.0.36) (UDP)
;; WHEN: Fri May 13 15:06:09 CEST 2022
;; MSG SIZE  rcvd: 81

because the authoritative answer is correctly identified as invalid:
named[147998]: FORMERR resolving 'lb.qual.flash-global.net/CNAME/IN':
213.167.230.30#53
named[147998]: FORMERR resolving 'lb.qual.flash-global.net/CNAME/IN':
217.70.187.161#53
named[147998]: FORMERR resolving 'lb.qual.flash-global.net/CNAME/IN':
173.246.100.82#53

Google DNS returns the same.

If I do a A request, I get an (unexpected in my opinion) answer:
dig  @172.29.0.36 +dnssec +cd A lb.qual.flash-global.net

; <<>> DiG 9.18.2-1+ubuntu20.04.1+isc+3-Ubuntu <<>> @172.29.0.36
+dnssec +cd A lb.qual.flash-global.net
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 26546
;; flags: qr rd ra cd; QUERY: 1, ANSWER: 4, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 1232
; COOKIE: b5755aa921e65a440100627e58a481dbcf3655737b6b (good)
;; QUESTION SECTION:
;lb.qual.flash-global.net.  IN  A

;; ANSWER SECTION:
lb.qual.flash-global.net. 10800 IN  CNAME   lb1.qual.flash-global.net.
lb.qual.flash-global.net. 10800 IN  RRSIG   CNAME 13 4 10800
2022052600 2022050500 57605 flash-global.net.
NVDmeCSKkx998LRnmiB6hWz4PdZJ5WPG6CCrDTSP587pLUxxoxeNlCmJ
l8l0p8/l8o+ZmZr1EXqxUA1FXpGbGw==

Re: Problem resolving a domain

2022-05-13 Thread Ondřej Surý
> The problem is also that google and quad9 and most of the rest of the 
> internet seem to be able to resolve it.

Yes, that’s **the problem**. There’s no pressure to get Barclays to fix this.

If you are a customer, complain loudly. Advice your customers who are customers 
to complain loudly.

They are non-compliant and need to deploy the fix at their side.

Ondrej
--
Ondřej Surý (He/Him)
ond...@isc.org

My working hours and your working hours may be different. Please do not feel 
obligated to reply outside your normal working hours.

> On 13. 5. 2022, at 15:16, Rainer Duffner  wrote:
> 
> Hi,
> 
> 
> Thanks for the hints!
> 
> It does indeed work with these settings.
> 
> The problem is also that google and quad9 and most of the rest of the 
> internet seem to be able to resolve it.
> 
> 
> While I investigated this issue, I came around a posting from one or two 
> years ago where similar problems with Barclays were reported.
> 
> And now, because I already spent too much time on this, I did a little 
> digging and found a few job descriptions on their site:
> 
> 
> https://search.jobs.barclays/job/knutsford/network-connectivity-engineer/13015/26345992688
> 
> 
> So, they use Infoblox and F5 - though I guess the problem is more with the 
> firewall before these products…
> 
> Funnily enough, this problem was a reported to us by an entity (a subsidiary 
> of our company) that uses Infoblox.
> 
> I’m half-tempted to contact them so they can contact Barclays - but likely 
> neither side is going to bother - because „It works with Google-DNS“.
> 
> 
> 
> 
> --
> Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
> this list
> 
> ISC funds the development of this software with paid support subscriptions. 
> Contact us at https://www.isc.org/contact/ for more information.
> 
> 
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users



signature.asc
Description: Message signed with OpenPGP
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Bad CNAME treatment consistency beetween direct CNAME request vs A request

2022-05-13 Thread Ondřej Surý
I think you misdiagnosed the issue.

Nothing asks directly for the CNAME under normal circumstances, and

And IN A query returns:

$ dig IN A lb.qual.flash-global.net @ns-160-c.gandi.net.

; <<>> DiG 9.19.0-1+0~20220421.76+debian10~1.gbpa71ef8-Debian <<>> IN A 
lb.qual.flash-global.net @ns-160-c.gandi.net.
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 56926
;; flags: qr aa rd; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
;; WARNING: recursion requested but not available

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 1232
;; QUESTION SECTION:
;lb.qual.flash-global.net.  IN  A

;; ANSWER SECTION:
lb.qual.flash-global.net. 10800 IN  CNAME   lb1.qual.flash-global.net.
lb1.qual.flash-global.net. 600  IN  A   51.68.158.37

;; Query time: 16 msec
;; SERVER: 217.70.187.161#53(ns-160-c.gandi.net.) (UDP)
;; WHEN: Fri May 13 15:57:49 CEST 2022
;; MSG SIZE  rcvd: 87

So, there’s nothing like “cache polution”, named correctly caches the records 
returned by the authoritative servers.

Ondrej
--
Ondřej Surý (He/Him)
ond...@isc.org

My working hours and your working hours may be different. Please do not feel 
obligated to reply outside your normal working hours.

> On 13. 5. 2022, at 15:30, Emmanuel Fusté  wrote:
> 
> Hello,
> I've had a hard time identifying the source of intermittent name
> resolution failure for a customer.
> The source of the problem is a DNS spec violation with a RRSET with
> multiple CNAME:
> 
> dig  @ns-29-b.gandi.net CNAME lb.qual.flash-global.net
> 
> ; <<>> DiG 9.18.2-1+ubuntu20.04.1+isc+3-Ubuntu <<>> @ns-29-b.gandi.net
> CNAME lb.qual.flash-global.net
> ; (2 servers found)
> ;; global options: +cmd
> ;; Got answer:
> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 42945
> ;; flags: qr aa rd; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
> ;; WARNING: recursion requested but not available
> 
> ;; OPT PSEUDOSECTION:
> ; EDNS: version: 0, flags:; udp: 1232
> ;; QUESTION SECTION:
> ;lb.qual.flash-global.net.  IN  CNAME
> 
> ;; ANSWER SECTION:
> lb.qual.flash-global.net. 10800 IN  CNAME   lb1.qual.flash-global.net.
> lb.qual.flash-global.net. 10800 IN  CNAME   lb2.qual.flash-global.net.
> 
> ;; Query time: 10 msec
> ;; SERVER: 213.167.230.30#53(ns-29-b.gandi.net) (UDP)
> ;; WHEN: Fri May 13 15:03:00 CEST 2022
> ;; MSG SIZE  rcvd: 89
> 
> If I try the resolution via my Bind (9.18.2) resolver, cache cold, it
> properly return a SERVFAIL:
>  dig  @172.29.0.36 +dnssec +cd CNAME lb.qual.flash-global.net
> 
> ; <<>> DiG 9.18.2-1+ubuntu20.04.1+isc+3-Ubuntu <<>> @172.29.0.36
> +dnssec +cd CNAME lb.qual.flash-global.net
> ; (1 server found)
> ;; global options: +cmd
> ;; Got answer:
> ;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 24053
> ;; flags: qr rd ra cd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
> 
> ;; OPT PSEUDOSECTION:
> ; EDNS: version: 0, flags: do; udp: 1232
> ; COOKIE: 23ac9b539bf16ad00100627e57c0b7d630e657322232 (good)
> ;; QUESTION SECTION:
> ;lb.qual.flash-global.net.  IN  CNAME
> 
> ;; Query time: 30 msec
> ;; SERVER: 172.29.0.36#53(172.29.0.36) (UDP)
> ;; WHEN: Fri May 13 15:06:09 CEST 2022
> ;; MSG SIZE  rcvd: 81
> 
> because the authoritative answer is correctly identified as invalid:
> named[147998]: FORMERR resolving 'lb.qual.flash-global.net/CNAME/IN':
> 213.167.230.30#53
> named[147998]: FORMERR resolving 'lb.qual.flash-global.net/CNAME/IN':
> 217.70.187.161#53
> named[147998]: FORMERR resolving 'lb.qual.flash-global.net/CNAME/IN':
> 173.246.100.82#53
> 
> Google DNS returns the same.
> 
> If I do a A request, I get an (unexpected in my opinion) answer:
> dig  @172.29.0.36 +dnssec +cd A lb.qual.flash-global.net
> 
> ; <<>> DiG 9.18.2-1+ubuntu20.04.1+isc+3-Ubuntu <<>> @172.29.0.36
> +dnssec +cd A lb.qual.flash-global.net
> ; (1 server found)
> ;; global options: +cmd
> ;; Got answer:
> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 26546
> ;; flags: qr rd ra cd; QUERY: 1, ANSWER: 4, AUTHORITY: 0, ADDITIONAL: 1
> 
> ;; OPT PSEUDOSECTION:
> ; EDNS: version: 0, flags: do; udp: 1232
> ; COOKIE: b5755aa921e65a440100627e58a481dbcf3655737b6b (good)
> ;; QUESTION SECTION:
> ;lb.qual.flash-global.net.  IN  A
> 
> ;; ANSWER SECTION:
> lb.qual.flash-global.net. 10800 IN  CNAME   lb1.qual.flash-global.net.
> lb.qual.flash-global.net. 10800 IN  RRSIG   CNAME 13 4 10800
> 2022052600 2022050500 57605 flash-global.net.
> NVDmeCSKkx998LRnmiB6hWz4PdZJ5WPG6CCrDTSP587pLUxxoxeNlCmJ
> l8l0p8/l8o+ZmZr1EXqxUA1FXpGbGw==
> lb1.qual.flash-global.net. 600  IN  A   51.68.158.37
> lb1.qual.flash-global.net. 600  IN  RRSIG   A 13 4 600
> 2022052600 2022050500 57605 flash-global.net.
> G1YUaDtWVGxj5NbA18crQ912tW/VWra49wi3U1EeRio9kId+2mwo7Vuj
> GH8adlvvjQyps7IBtj9gYVmbewN+GQ==
> 
> ;; Query time: 30 msec
> ;; SERVER: 172.29.0.36#53(172.29.0.36) (UDP)
> ;; WHEN: Fri May 13 15:09:57 CEST 2022
> ;; MSG SIZE  rcvd: 339
> 
> Google DNS  do the 

Bad CNAME treatment consistency beetween direct CNAME request vs A request

2022-05-13 Thread Emmanuel Fusté
Hello,
I've had a hard time identifying the source of intermittent name
resolution failure for a customer.
The source of the problem is a DNS spec violation with a RRSET with
multiple CNAME:

 dig  @ns-29-b.gandi.net CNAME lb.qual.flash-global.net

; <<>> DiG 9.18.2-1+ubuntu20.04.1+isc+3-Ubuntu <<>> @ns-29-b.gandi.net
CNAME lb.qual.flash-global.net
; (2 servers found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 42945
;; flags: qr aa rd; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
;; WARNING: recursion requested but not available

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 1232
;; QUESTION SECTION:
;lb.qual.flash-global.net.  IN  CNAME

;; ANSWER SECTION:
lb.qual.flash-global.net. 10800 IN  CNAME   lb1.qual.flash-global.net.
lb.qual.flash-global.net. 10800 IN  CNAME   lb2.qual.flash-global.net.

;; Query time: 10 msec
;; SERVER: 213.167.230.30#53(ns-29-b.gandi.net) (UDP)
;; WHEN: Fri May 13 15:03:00 CEST 2022
;; MSG SIZE  rcvd: 89

If I try the resolution via my Bind (9.18.2) resolver, cache cold, it
properly return a SERVFAIL:
  dig  @172.29.0.36 +dnssec +cd CNAME lb.qual.flash-global.net

; <<>> DiG 9.18.2-1+ubuntu20.04.1+isc+3-Ubuntu <<>> @172.29.0.36
+dnssec +cd CNAME lb.qual.flash-global.net
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 24053
;; flags: qr rd ra cd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 1232
; COOKIE: 23ac9b539bf16ad00100627e57c0b7d630e657322232 (good)
;; QUESTION SECTION:
;lb.qual.flash-global.net.  IN  CNAME

;; Query time: 30 msec
;; SERVER: 172.29.0.36#53(172.29.0.36) (UDP)
;; WHEN: Fri May 13 15:06:09 CEST 2022
;; MSG SIZE  rcvd: 81

because the authoritative answer is correctly identified as invalid:
named[147998]: FORMERR resolving 'lb.qual.flash-global.net/CNAME/IN':
213.167.230.30#53
named[147998]: FORMERR resolving 'lb.qual.flash-global.net/CNAME/IN':
217.70.187.161#53
named[147998]: FORMERR resolving 'lb.qual.flash-global.net/CNAME/IN':
173.246.100.82#53

Google DNS returns the same.

If I do a A request, I get an (unexpected in my opinion) answer:
dig  @172.29.0.36 +dnssec +cd A lb.qual.flash-global.net

; <<>> DiG 9.18.2-1+ubuntu20.04.1+isc+3-Ubuntu <<>> @172.29.0.36
+dnssec +cd A lb.qual.flash-global.net
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 26546
;; flags: qr rd ra cd; QUERY: 1, ANSWER: 4, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 1232
; COOKIE: b5755aa921e65a440100627e58a481dbcf3655737b6b (good)
;; QUESTION SECTION:
;lb.qual.flash-global.net.  IN  A

;; ANSWER SECTION:
lb.qual.flash-global.net. 10800 IN  CNAME   lb1.qual.flash-global.net.
lb.qual.flash-global.net. 10800 IN  RRSIG   CNAME 13 4 10800
2022052600 2022050500 57605 flash-global.net.
NVDmeCSKkx998LRnmiB6hWz4PdZJ5WPG6CCrDTSP587pLUxxoxeNlCmJ
l8l0p8/l8o+ZmZr1EXqxUA1FXpGbGw==
lb1.qual.flash-global.net. 600  IN  A   51.68.158.37
lb1.qual.flash-global.net. 600  IN  RRSIG   A 13 4 600
2022052600 2022050500 57605 flash-global.net.
G1YUaDtWVGxj5NbA18crQ912tW/VWra49wi3U1EeRio9kId+2mwo7Vuj
GH8adlvvjQyps7IBtj9gYVmbewN+GQ==

;; Query time: 30 msec
;; SERVER: 172.29.0.36#53(172.29.0.36) (UDP)
;; WHEN: Fri May 13 15:09:57 CEST 2022
;; MSG SIZE  rcvd: 339

Google DNS  do the same

BUT

Now on my side I have cache pollution as a new CNAME request  give me

dig  @172.29.0.36 +dnssec +cd CNAME lb.qual.flash-global.net

; <<>> DiG 9.18.2-1+ubuntu20.04.1+isc+3-Ubuntu <<>> @172.29.0.36
+dnssec +cd CNAME lb.qual.flash-global.net
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 42637
;; flags: qr rd ra cd; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 1232
; COOKIE: ea748ef065e32df10100627e59947b2e1424679d72f2 (good)
;; QUESTION SECTION:
;lb.qual.flash-global.net.  IN  CNAME

;; ANSWER SECTION:
lb.qual.flash-global.net. 10560 IN  CNAME   lb1.qual.flash-global.net.
lb.qual.flash-global.net. 10560 IN  RRSIG   CNAME 13 4 10800
2022052600 2022050500 57605 flash-global.net.
NVDmeCSKkx998LRnmiB6hWz4PdZJ5WPG6CCrDTSP587pLUxxoxeNlCmJ
l8l0p8/l8o+ZmZr1EXqxUA1FXpGbGw==

;; Query time: 20 msec
;; SERVER: 172.29.0.36#53(172.29.0.36) (UDP)
;; WHEN: Fri May 13 15:13:56 CEST 2022
;; MSG SIZE  rcvd: 211

until I issue a rndc flush command.
This cache pollution is bad and seems to not happen on the google side
(but there are many DNS behind 8.8.8.8).

I would have expected a SERVFAIL/FORMERR in the A request case. Even
if I could understand a conservative approach from the Google side, I
don't buy it for Bind and expect a configuration directive to reject
it.
If this (the A case) is an expected behavior for Bind, I 

Re: Problem resolving a domain

2022-05-13 Thread Rainer Duffner
Hi, 


Thanks for the hints!

It does indeed work with these settings.

The problem is also that google and quad9 and most of the rest of the internet 
seem to be able to resolve it.


While I investigated this issue, I came around a posting from one or two years 
ago where similar problems with Barclays were reported.

And now, because I already spent too much time on this, I did a little digging 
and found a few job descriptions on their site:


https://search.jobs.barclays/job/knutsford/network-connectivity-engineer/13015/26345992688


So, they use Infoblox and F5 - though I guess the problem is more with the 
firewall before these products…

Funnily enough, this problem was a reported to us by an entity (a subsidiary of 
our company) that uses Infoblox.

I’m half-tempted to contact them so they can contact Barclays - but likely 
neither side is going to bother - because „It works with Google-DNS“.




-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Problem resolving a domain

2022-05-13 Thread Paul Stead
Agreed, but without the upstream provider actually fixing the issue I
couldn't find a way to provide resolution of this domain to my customers -
are there better ways to resolve this from our side?

There seems to be a document about this issue -
https://kb.isc.org/docs/aa-01387

Paul

On Fri, 13 May 2022 at 14:07, Mark Andrews  wrote:

> Working around servers that drop queries causes problems for zones that do
> have protocol compliant servers.   The workarounds cause problems with
> getting DNSSEC responses wic leads to validation failures.
>
> --
> Mark Andrews
>
> On 13 May 2022, at 22:58, Paul Stead  wrote:
>
> 
> Further to this, I've discovered that disabling DNS cookies also seems to
> help with resolution -
>
> $ dig +nocookie +timeout=1 +retries=0 IN A
> myapplication.glbaa.barclays.com. @ns21.barclays.com.
>
> Maybe the send-cookie option could be investigated? YMMV..
>
> On a side note other recursive DNS software seem to fall back gracefully
> and resolve these problems
>
> Paul
>
> On Fri, 13 May 2022 at 13:51, Paul Stead  wrote:
>
>> I have noticed this, too,
>>
>> The problem seems to be related to edns - disabling edns for the upstream
>> servers looks to resolve the issue, this can be seen with later versions of
>> dig -
>>
>> $ dig *+noedns* +timeout=1 +retries=0 IN A
>> myapplication.glbaa.barclays.com. @ns21.barclays.com.
>>
>> I have config along the lines of -
>>
>> server 157.83.102.245 {
>>   edns no;
>> };
>>
>> for each of the problematic upstreams. I contacted Barclays a few months
>> ago about this, but never got a solid response.
>>
>> Paul
>>
>> On Fri, 13 May 2022 at 13:12, Ondřej Surý  wrote:
>>
>>> Hi Rainer,
>>>
>>> I believe this is unrelated to any upgrade. The nameservers for the
>>> domain are broken:
>>>
>>> $ dig IN A myapplication.international.barclays.com @ns2.barcap.com.
>>>
>>> ; <<>> DiG 9.19.0-1+0~20220421.76+debian10~1.gbpa71ef8-Debian <<>> IN A
>>> myapplication.international.barclays.com @ns2.barcap.com.
>>> ;; global options: +cmd
>>> ;; Got answer:
>>> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 26288
>>> ;; flags: qr aa rd; QUERY: 1, ANSWER: 1, AUTHORITY: 4, ADDITIONAL: 5
>>> ;; WARNING: recursion requested but not available
>>>
>>> ;; OPT PSEUDOSECTION:
>>> ; EDNS: version: 0, flags:; udp: 1220
>>> ; COOKIE: 1154fcda62fc8122973932b0627e4a9e96eef4cf1d850adf (good)
>>> ;; QUESTION SECTION:
>>> ;myapplication.international.barclays.com. IN A
>>>
>>> ;; ANSWER SECTION:
>>> myapplication.international.barclays.com. 900 IN CNAME
>>> myapplication.glbaa.barclays.com.
>>>
>>> ;; AUTHORITY SECTION:
>>> glbaa.barclays.com. 900 IN  NS  ns22.barclays.net.
>>> glbaa.barclays.com. 900 IN  NS  ns21.barclays.com.
>>> glbaa.barclays.com. 900 IN  NS  ns24.barclays.net.
>>> glbaa.barclays.com. 900 IN  NS  ns23.barclays.com.
>>>
>>> ;; ADDITIONAL SECTION:
>>> ns21.barclays.com.  900 IN  A   157.83.102.245
>>> ns23.barclays.com.  900 IN  A   157.83.126.245
>>> ns22.barclays.net.  600 IN  A   157.83.102.246
>>> ns24.barclays.net.  600 IN  A   157.83.126.246
>>>
>>> ;; Query time: 196 msec
>>> ;; SERVER: 141.228.196.129#53(ns2.barcap.com.) (UDP)
>>> ;; WHEN: Fri May 13 14:08:49 CEST 2022
>>> ;; MSG SIZE  rcvd: 283
>>>
>>>
>>> and the nameservers itself just timeout:
>>>
>>> $ dig +timeout=1 +retries=0 IN A myapplication.glbaa.barclays.com. @
>>> ns21.barclays.com.
>>>
>>> ; <<>> DiG 9.19.0-1+0~20220421.76+debian10~1.gbpa71ef8-Debian <<>>
>>> +timeout +retries IN A myapplication.glbaa.barclays.com. @
>>> ns21.barclays.com.
>>> ;; global options: +cmd
>>> ;; connection timed out; no servers could be reached
>>>
>>>
>>> DNSVIZ gives the same result:
>>>
>>> https://dnsviz.net/d/myapplication.glbaa.barclays.com/dnssec/
>>>
>>> • glbaa.barclays.com zone: The server(s) were not responsive to
>>> queries over UDP. (157.83.102.245, 157.83.102.246, 157.83.126.245,
>>> 157.83.126.246)
>>>
>>> Ondrej
>>> --
>>> Ondřej Surý (He/Him)
>>> ond...@isc.org
>>>
>>> My working hours and your working hours may be different. Please do not
>>> feel obligated to reply outside your normal working hours.
>>>
>>> > On 13. 5. 2022, at 13:54, Rainer Duffner 
>>> wrote:
>>> >
>>> > Hi,
>>> >
>>> > at work, I have a problem resolving the following domain:
>>> >
>>> > myapplication.international.barclays.com
>>> >
>>> >
>>> > BIND 9.16.27, FreeBSD 12.3-P5.
>>> > 2022Q2 ports.
>>> >
>>> >
>>> > I copied the config to a VM at home - but it did not work there,
>>> either.
>>> >
>>> > I believe it must have happened on the update from BIND 9.16.26 to
>>> 9.16.27.
>>> >
>>> >
>>> > options {
>>> >directory   "/usr/local/etc/namedb/working";
>>> >pid-file"/var/run/named/pid";
>>> >dump-file   "/var/dump/named_dump.db";
>>> >statistics-file "/var/stats/named.stats";
>>> >allow-recursion {"rec";};
>>> >

Re: Problem resolving a domain

2022-05-13 Thread Mark Andrews
Working around servers that drop queries causes problems for zones that do have 
protocol compliant servers.   The workarounds cause problems with getting 
DNSSEC responses wic leads to validation failures. 

-- 
Mark Andrews

> On 13 May 2022, at 22:58, Paul Stead  wrote:
> 
> 
> Further to this, I've discovered that disabling DNS cookies also seems to 
> help with resolution - 
> 
> $ dig +nocookie +timeout=1 +retries=0 IN A myapplication.glbaa.barclays.com. 
> @ns21.barclays.com.
> 
> Maybe the send-cookie option could be investigated? YMMV..
> 
> On a side note other recursive DNS software seem to fall back gracefully and 
> resolve these problems 
> 
> Paul
> 
> On Fri, 13 May 2022 at 13:51, Paul Stead  wrote:
>> I have noticed this, too,
>> 
>> The problem seems to be related to edns - disabling edns for the upstream 
>> servers looks to resolve the issue, this can be seen with later versions of 
>> dig -
>> 
>> $ dig +noedns +timeout=1 +retries=0 IN A myapplication.glbaa.barclays.com. 
>> @ns21.barclays.com.
>> 
>> I have config along the lines of - 
>> 
>> server 157.83.102.245 {
>>   edns no;
>> };
>> 
>> for each of the problematic upstreams. I contacted Barclays a few months ago 
>> about this, but never got a solid response.
>> 
>> Paul
>> 
>> On Fri, 13 May 2022 at 13:12, Ondřej Surý  wrote:
>>> Hi Rainer,
>>> 
>>> I believe this is unrelated to any upgrade. The nameservers for the domain 
>>> are broken:
>>> 
>>> $ dig IN A myapplication.international.barclays.com @ns2.barcap.com.
>>> 
>>> ; <<>> DiG 9.19.0-1+0~20220421.76+debian10~1.gbpa71ef8-Debian <<>> IN A 
>>> myapplication.international.barclays.com @ns2.barcap.com.
>>> ;; global options: +cmd
>>> ;; Got answer:
>>> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 26288
>>> ;; flags: qr aa rd; QUERY: 1, ANSWER: 1, AUTHORITY: 4, ADDITIONAL: 5
>>> ;; WARNING: recursion requested but not available
>>> 
>>> ;; OPT PSEUDOSECTION:
>>> ; EDNS: version: 0, flags:; udp: 1220
>>> ; COOKIE: 1154fcda62fc8122973932b0627e4a9e96eef4cf1d850adf (good)
>>> ;; QUESTION SECTION:
>>> ;myapplication.international.barclays.com. IN A
>>> 
>>> ;; ANSWER SECTION:
>>> myapplication.international.barclays.com. 900 IN CNAME 
>>> myapplication.glbaa.barclays.com.
>>> 
>>> ;; AUTHORITY SECTION:
>>> glbaa.barclays.com. 900 IN  NS  ns22.barclays.net.
>>> glbaa.barclays.com. 900 IN  NS  ns21.barclays.com.
>>> glbaa.barclays.com. 900 IN  NS  ns24.barclays.net.
>>> glbaa.barclays.com. 900 IN  NS  ns23.barclays.com.
>>> 
>>> ;; ADDITIONAL SECTION:
>>> ns21.barclays.com.  900 IN  A   157.83.102.245
>>> ns23.barclays.com.  900 IN  A   157.83.126.245
>>> ns22.barclays.net.  600 IN  A   157.83.102.246
>>> ns24.barclays.net.  600 IN  A   157.83.126.246
>>> 
>>> ;; Query time: 196 msec
>>> ;; SERVER: 141.228.196.129#53(ns2.barcap.com.) (UDP)
>>> ;; WHEN: Fri May 13 14:08:49 CEST 2022
>>> ;; MSG SIZE  rcvd: 283
>>> 
>>> 
>>> and the nameservers itself just timeout:
>>> 
>>> $ dig +timeout=1 +retries=0 IN A myapplication.glbaa.barclays.com. 
>>> @ns21.barclays.com.
>>> 
>>> ; <<>> DiG 9.19.0-1+0~20220421.76+debian10~1.gbpa71ef8-Debian <<>> +timeout 
>>> +retries IN A myapplication.glbaa.barclays.com. @ns21.barclays.com.
>>> ;; global options: +cmd
>>> ;; connection timed out; no servers could be reached
>>> 
>>> 
>>> DNSVIZ gives the same result:
>>> 
>>> https://dnsviz.net/d/myapplication.glbaa.barclays.com/dnssec/
>>> 
>>> • glbaa.barclays.com zone: The server(s) were not responsive to 
>>> queries over UDP. (157.83.102.245, 157.83.102.246, 157.83.126.245, 
>>> 157.83.126.246)
>>> 
>>> Ondrej
>>> --
>>> Ondřej Surý (He/Him)
>>> ond...@isc.org
>>> 
>>> My working hours and your working hours may be different. Please do not 
>>> feel obligated to reply outside your normal working hours.
>>> 
>>> > On 13. 5. 2022, at 13:54, Rainer Duffner  wrote:
>>> > 
>>> > Hi,
>>> > 
>>> > at work, I have a problem resolving the following domain:
>>> > 
>>> > myapplication.international.barclays.com
>>> > 
>>> > 
>>> > BIND 9.16.27, FreeBSD 12.3-P5.
>>> > 2022Q2 ports.
>>> > 
>>> > 
>>> > I copied the config to a VM at home - but it did not work there, either.
>>> > 
>>> > I believe it must have happened on the update from BIND 9.16.26 to 
>>> > 9.16.27.
>>> > 
>>> > 
>>> > options {
>>> >directory   "/usr/local/etc/namedb/working";
>>> >pid-file"/var/run/named/pid";
>>> >dump-file   "/var/dump/named_dump.db";
>>> >statistics-file "/var/stats/named.stats";
>>> >allow-recursion {"rec";};
>>> >allow-query-cache { localhost; "rec" ; };
>>> >// CIS recommended:
>>> >// serverid none;
>>> >// dnssec-enable yes;
>>> >// dnssec-validation auto;
>>> >// dnssec-accept-expired no;
>>> > 
>>> >listen-on   { 192.168.1.61; };
>>> > 
>>> >

Re: Problem resolving a domain

2022-05-13 Thread Paul Stead
Further to this, I've discovered that disabling DNS cookies also seems to
help with resolution -

$ dig +nocookie +timeout=1 +retries=0 IN A myapplication.glbaa.barclays.com.
@ns21.barclays.com.

Maybe the send-cookie option could be investigated? YMMV..

On a side note other recursive DNS software seem to fall back gracefully
and resolve these problems

Paul

On Fri, 13 May 2022 at 13:51, Paul Stead  wrote:

> I have noticed this, too,
>
> The problem seems to be related to edns - disabling edns for the upstream
> servers looks to resolve the issue, this can be seen with later versions of
> dig -
>
> $ dig *+noedns* +timeout=1 +retries=0 IN A
> myapplication.glbaa.barclays.com. @ns21.barclays.com.
>
> I have config along the lines of -
>
> server 157.83.102.245 {
>   edns no;
> };
>
> for each of the problematic upstreams. I contacted Barclays a few months
> ago about this, but never got a solid response.
>
> Paul
>
> On Fri, 13 May 2022 at 13:12, Ondřej Surý  wrote:
>
>> Hi Rainer,
>>
>> I believe this is unrelated to any upgrade. The nameservers for the
>> domain are broken:
>>
>> $ dig IN A myapplication.international.barclays.com @ns2.barcap.com.
>>
>> ; <<>> DiG 9.19.0-1+0~20220421.76+debian10~1.gbpa71ef8-Debian <<>> IN A
>> myapplication.international.barclays.com @ns2.barcap.com.
>> ;; global options: +cmd
>> ;; Got answer:
>> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 26288
>> ;; flags: qr aa rd; QUERY: 1, ANSWER: 1, AUTHORITY: 4, ADDITIONAL: 5
>> ;; WARNING: recursion requested but not available
>>
>> ;; OPT PSEUDOSECTION:
>> ; EDNS: version: 0, flags:; udp: 1220
>> ; COOKIE: 1154fcda62fc8122973932b0627e4a9e96eef4cf1d850adf (good)
>> ;; QUESTION SECTION:
>> ;myapplication.international.barclays.com. IN A
>>
>> ;; ANSWER SECTION:
>> myapplication.international.barclays.com. 900 IN CNAME
>> myapplication.glbaa.barclays.com.
>>
>> ;; AUTHORITY SECTION:
>> glbaa.barclays.com. 900 IN  NS  ns22.barclays.net.
>> glbaa.barclays.com. 900 IN  NS  ns21.barclays.com.
>> glbaa.barclays.com. 900 IN  NS  ns24.barclays.net.
>> glbaa.barclays.com. 900 IN  NS  ns23.barclays.com.
>>
>> ;; ADDITIONAL SECTION:
>> ns21.barclays.com.  900 IN  A   157.83.102.245
>> ns23.barclays.com.  900 IN  A   157.83.126.245
>> ns22.barclays.net.  600 IN  A   157.83.102.246
>> ns24.barclays.net.  600 IN  A   157.83.126.246
>>
>> ;; Query time: 196 msec
>> ;; SERVER: 141.228.196.129#53(ns2.barcap.com.) (UDP)
>> ;; WHEN: Fri May 13 14:08:49 CEST 2022
>> ;; MSG SIZE  rcvd: 283
>>
>>
>> and the nameservers itself just timeout:
>>
>> $ dig +timeout=1 +retries=0 IN A myapplication.glbaa.barclays.com. @
>> ns21.barclays.com.
>>
>> ; <<>> DiG 9.19.0-1+0~20220421.76+debian10~1.gbpa71ef8-Debian <<>>
>> +timeout +retries IN A myapplication.glbaa.barclays.com. @
>> ns21.barclays.com.
>> ;; global options: +cmd
>> ;; connection timed out; no servers could be reached
>>
>>
>> DNSVIZ gives the same result:
>>
>> https://dnsviz.net/d/myapplication.glbaa.barclays.com/dnssec/
>>
>> • glbaa.barclays.com zone: The server(s) were not responsive to
>> queries over UDP. (157.83.102.245, 157.83.102.246, 157.83.126.245,
>> 157.83.126.246)
>>
>> Ondrej
>> --
>> Ondřej Surý (He/Him)
>> ond...@isc.org
>>
>> My working hours and your working hours may be different. Please do not
>> feel obligated to reply outside your normal working hours.
>>
>> > On 13. 5. 2022, at 13:54, Rainer Duffner 
>> wrote:
>> >
>> > Hi,
>> >
>> > at work, I have a problem resolving the following domain:
>> >
>> > myapplication.international.barclays.com
>> >
>> >
>> > BIND 9.16.27, FreeBSD 12.3-P5.
>> > 2022Q2 ports.
>> >
>> >
>> > I copied the config to a VM at home - but it did not work there, either.
>> >
>> > I believe it must have happened on the update from BIND 9.16.26 to
>> 9.16.27.
>> >
>> >
>> > options {
>> >directory   "/usr/local/etc/namedb/working";
>> >pid-file"/var/run/named/pid";
>> >dump-file   "/var/dump/named_dump.db";
>> >statistics-file "/var/stats/named.stats";
>> >allow-recursion {"rec";};
>> >allow-query-cache { localhost; "rec" ; };
>> >// CIS recommended:
>> >// serverid none;
>> >// dnssec-enable yes;
>> >// dnssec-validation auto;
>> >// dnssec-accept-expired no;
>> >
>> >listen-on   { 192.168.1.61; };
>> >
>> >disable-empty-zone "255.255.255.255.IN-ADDR.ARPA";
>> >disable-empty-zone
>> "0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.IP6.ARPA";
>> >disable-empty-zone
>> "1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.IP6.ARPA";
>> >
>> > };
>> >
>> > acl rec {
>> >127.0.0.0/8;
>> >192.168.1.0/24;
>> >::1;
>> > };
>> >
>> > /*  Serving the following zones locally will prevent any queries
>> >for these zones 

Re: Problem resolving a domain

2022-05-13 Thread Paul Stead
I have noticed this, too,

The problem seems to be related to edns - disabling edns for the upstream
servers looks to resolve the issue, this can be seen with later versions of
dig -

$ dig *+noedns* +timeout=1 +retries=0 IN A myapplication.glbaa.barclays.com.
@ns21.barclays.com.

I have config along the lines of -

server 157.83.102.245 {
  edns no;
};

for each of the problematic upstreams. I contacted Barclays a few months
ago about this, but never got a solid response.

Paul

On Fri, 13 May 2022 at 13:12, Ondřej Surý  wrote:

> Hi Rainer,
>
> I believe this is unrelated to any upgrade. The nameservers for the domain
> are broken:
>
> $ dig IN A myapplication.international.barclays.com @ns2.barcap.com.
>
> ; <<>> DiG 9.19.0-1+0~20220421.76+debian10~1.gbpa71ef8-Debian <<>> IN A
> myapplication.international.barclays.com @ns2.barcap.com.
> ;; global options: +cmd
> ;; Got answer:
> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 26288
> ;; flags: qr aa rd; QUERY: 1, ANSWER: 1, AUTHORITY: 4, ADDITIONAL: 5
> ;; WARNING: recursion requested but not available
>
> ;; OPT PSEUDOSECTION:
> ; EDNS: version: 0, flags:; udp: 1220
> ; COOKIE: 1154fcda62fc8122973932b0627e4a9e96eef4cf1d850adf (good)
> ;; QUESTION SECTION:
> ;myapplication.international.barclays.com. IN A
>
> ;; ANSWER SECTION:
> myapplication.international.barclays.com. 900 IN CNAME
> myapplication.glbaa.barclays.com.
>
> ;; AUTHORITY SECTION:
> glbaa.barclays.com. 900 IN  NS  ns22.barclays.net.
> glbaa.barclays.com. 900 IN  NS  ns21.barclays.com.
> glbaa.barclays.com. 900 IN  NS  ns24.barclays.net.
> glbaa.barclays.com. 900 IN  NS  ns23.barclays.com.
>
> ;; ADDITIONAL SECTION:
> ns21.barclays.com.  900 IN  A   157.83.102.245
> ns23.barclays.com.  900 IN  A   157.83.126.245
> ns22.barclays.net.  600 IN  A   157.83.102.246
> ns24.barclays.net.  600 IN  A   157.83.126.246
>
> ;; Query time: 196 msec
> ;; SERVER: 141.228.196.129#53(ns2.barcap.com.) (UDP)
> ;; WHEN: Fri May 13 14:08:49 CEST 2022
> ;; MSG SIZE  rcvd: 283
>
>
> and the nameservers itself just timeout:
>
> $ dig +timeout=1 +retries=0 IN A myapplication.glbaa.barclays.com. @
> ns21.barclays.com.
>
> ; <<>> DiG 9.19.0-1+0~20220421.76+debian10~1.gbpa71ef8-Debian <<>>
> +timeout +retries IN A myapplication.glbaa.barclays.com. @
> ns21.barclays.com.
> ;; global options: +cmd
> ;; connection timed out; no servers could be reached
>
>
> DNSVIZ gives the same result:
>
> https://dnsviz.net/d/myapplication.glbaa.barclays.com/dnssec/
>
> • glbaa.barclays.com zone: The server(s) were not responsive to
> queries over UDP. (157.83.102.245, 157.83.102.246, 157.83.126.245,
> 157.83.126.246)
>
> Ondrej
> --
> Ondřej Surý (He/Him)
> ond...@isc.org
>
> My working hours and your working hours may be different. Please do not
> feel obligated to reply outside your normal working hours.
>
> > On 13. 5. 2022, at 13:54, Rainer Duffner  wrote:
> >
> > Hi,
> >
> > at work, I have a problem resolving the following domain:
> >
> > myapplication.international.barclays.com
> >
> >
> > BIND 9.16.27, FreeBSD 12.3-P5.
> > 2022Q2 ports.
> >
> >
> > I copied the config to a VM at home - but it did not work there, either.
> >
> > I believe it must have happened on the update from BIND 9.16.26 to
> 9.16.27.
> >
> >
> > options {
> >directory   "/usr/local/etc/namedb/working";
> >pid-file"/var/run/named/pid";
> >dump-file   "/var/dump/named_dump.db";
> >statistics-file "/var/stats/named.stats";
> >allow-recursion {"rec";};
> >allow-query-cache { localhost; "rec" ; };
> >// CIS recommended:
> >// serverid none;
> >// dnssec-enable yes;
> >// dnssec-validation auto;
> >// dnssec-accept-expired no;
> >
> >listen-on   { 192.168.1.61; };
> >
> >disable-empty-zone "255.255.255.255.IN-ADDR.ARPA";
> >disable-empty-zone
> "0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.IP6.ARPA";
> >disable-empty-zone
> "1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.IP6.ARPA";
> >
> > };
> >
> > acl rec {
> >127.0.0.0/8;
> >192.168.1.0/24;
> >::1;
> > };
> >
> > /*  Serving the following zones locally will prevent any queries
> >for these zones leaving your network and going to the root
> >name servers.  This has two significant advantages:
> >1. Faster local resolution for your users
> >2. No spurious traffic will be sent from your network to the roots
> > */
> > // RFCs 1912, 5735 and 6303 (and BCP 32 for localhost)
> > zone "localhost"{ type master; file
> "/usr/local/etc/namedb/master/localhost-forward.db"; };
> > zone "127.in-addr.arpa" { type master; file
> "/usr/local/etc/namedb/master/localhost-reverse.db"; };
> > zone "255.in-addr.arpa" { type master; file
> 

Re: Problem resolving a domain

2022-05-13 Thread Ondřej Surý
Hi Rainer,

I believe this is unrelated to any upgrade. The nameservers for the domain are 
broken:

$ dig IN A myapplication.international.barclays.com @ns2.barcap.com.

; <<>> DiG 9.19.0-1+0~20220421.76+debian10~1.gbpa71ef8-Debian <<>> IN A 
myapplication.international.barclays.com @ns2.barcap.com.
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 26288
;; flags: qr aa rd; QUERY: 1, ANSWER: 1, AUTHORITY: 4, ADDITIONAL: 5
;; WARNING: recursion requested but not available

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 1220
; COOKIE: 1154fcda62fc8122973932b0627e4a9e96eef4cf1d850adf (good)
;; QUESTION SECTION:
;myapplication.international.barclays.com. IN A

;; ANSWER SECTION:
myapplication.international.barclays.com. 900 IN CNAME 
myapplication.glbaa.barclays.com.

;; AUTHORITY SECTION:
glbaa.barclays.com. 900 IN  NS  ns22.barclays.net.
glbaa.barclays.com. 900 IN  NS  ns21.barclays.com.
glbaa.barclays.com. 900 IN  NS  ns24.barclays.net.
glbaa.barclays.com. 900 IN  NS  ns23.barclays.com.

;; ADDITIONAL SECTION:
ns21.barclays.com.  900 IN  A   157.83.102.245
ns23.barclays.com.  900 IN  A   157.83.126.245
ns22.barclays.net.  600 IN  A   157.83.102.246
ns24.barclays.net.  600 IN  A   157.83.126.246

;; Query time: 196 msec
;; SERVER: 141.228.196.129#53(ns2.barcap.com.) (UDP)
;; WHEN: Fri May 13 14:08:49 CEST 2022
;; MSG SIZE  rcvd: 283


and the nameservers itself just timeout:

$ dig +timeout=1 +retries=0 IN A myapplication.glbaa.barclays.com. 
@ns21.barclays.com.

; <<>> DiG 9.19.0-1+0~20220421.76+debian10~1.gbpa71ef8-Debian <<>> +timeout 
+retries IN A myapplication.glbaa.barclays.com. @ns21.barclays.com.
;; global options: +cmd
;; connection timed out; no servers could be reached


DNSVIZ gives the same result:

https://dnsviz.net/d/myapplication.glbaa.barclays.com/dnssec/

• glbaa.barclays.com zone: The server(s) were not responsive to queries 
over UDP. (157.83.102.245, 157.83.102.246, 157.83.126.245, 157.83.126.246)

Ondrej
--
Ondřej Surý (He/Him)
ond...@isc.org

My working hours and your working hours may be different. Please do not feel 
obligated to reply outside your normal working hours.

> On 13. 5. 2022, at 13:54, Rainer Duffner  wrote:
> 
> Hi,
> 
> at work, I have a problem resolving the following domain:
> 
> myapplication.international.barclays.com
> 
> 
> BIND 9.16.27, FreeBSD 12.3-P5.
> 2022Q2 ports.
> 
> 
> I copied the config to a VM at home - but it did not work there, either.
> 
> I believe it must have happened on the update from BIND 9.16.26 to 9.16.27.
> 
> 
> options {
>directory   "/usr/local/etc/namedb/working";
>pid-file"/var/run/named/pid";
>dump-file   "/var/dump/named_dump.db";
>statistics-file "/var/stats/named.stats";
>allow-recursion {"rec";};
>allow-query-cache { localhost; "rec" ; };
>// CIS recommended:
>// serverid none;
>// dnssec-enable yes;
>// dnssec-validation auto;
>// dnssec-accept-expired no;
> 
>listen-on   { 192.168.1.61; };
> 
>disable-empty-zone "255.255.255.255.IN-ADDR.ARPA";
>disable-empty-zone 
> "0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.IP6.ARPA";
>disable-empty-zone 
> "1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.IP6.ARPA";
> 
> };
> 
> acl rec {
>127.0.0.0/8;
>192.168.1.0/24;
>::1;
> };
> 
> /*  Serving the following zones locally will prevent any queries
>for these zones leaving your network and going to the root
>name servers.  This has two significant advantages:
>1. Faster local resolution for your users
>2. No spurious traffic will be sent from your network to the roots
> */
> // RFCs 1912, 5735 and 6303 (and BCP 32 for localhost)
> zone "localhost"{ type master; file 
> "/usr/local/etc/namedb/master/localhost-forward.db"; };
> zone "127.in-addr.arpa" { type master; file 
> "/usr/local/etc/namedb/master/localhost-reverse.db"; };
> zone "255.in-addr.arpa" { type master; file 
> "/usr/local/etc/namedb/master/empty.db"; };
> 
> // RFC 1912-style zone for IPv6 localhost address (RFC 6303)
> zone "0.ip6.arpa"   { type master; file 
> "/usr/local/etc/namedb/master/localhost-reverse.db"; };
> 
> // "This" Network (RFCs 1912, 5735 and 6303)
> zone "0.in-addr.arpa"   { type master; file 
> "/usr/local/etc/namedb/master/empty.db"; };
> 
> // Private Use Networks (RFCs 1918, 5735 and 6303)
> zone "10.in-addr.arpa" { type master; file 
> "/usr/local/etc/namedb/master/empty.db"; };
> zone "16.172.in-addr.arpa" { type master; file 
> "/usr/local/etc/namedb/master/empty.db"; };
> zone "17.172.in-addr.arpa" { type master; file 
> "/usr/local/etc/namedb/master/empty.db"; };
> zone "18.172.in-addr.arpa" { type master; file 
> 

Problem resolving a domain

2022-05-13 Thread Rainer Duffner
Hi,

at work, I have a problem resolving the following domain:

myapplication.international.barclays.com


BIND 9.16.27, FreeBSD 12.3-P5.
2022Q2 ports.


I copied the config to a VM at home - but it did not work there, either.

I believe it must have happened on the update from BIND 9.16.26 to 9.16.27.


options {
directory   "/usr/local/etc/namedb/working";
pid-file"/var/run/named/pid";
dump-file   "/var/dump/named_dump.db";
statistics-file "/var/stats/named.stats";
allow-recursion {"rec";};
allow-query-cache { localhost; "rec" ; };
// CIS recommended:
// serverid none;
// dnssec-enable yes;
// dnssec-validation auto;
// dnssec-accept-expired no;

listen-on   { 192.168.1.61; };

disable-empty-zone "255.255.255.255.IN-ADDR.ARPA";
disable-empty-zone 
"0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.IP6.ARPA";
disable-empty-zone 
"1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.IP6.ARPA";

};

acl rec {
127.0.0.0/8;
192.168.1.0/24;
::1;
};

/*  Serving the following zones locally will prevent any queries
for these zones leaving your network and going to the root
name servers.  This has two significant advantages:
1. Faster local resolution for your users
2. No spurious traffic will be sent from your network to the roots
*/
// RFCs 1912, 5735 and 6303 (and BCP 32 for localhost)
zone "localhost"{ type master; file 
"/usr/local/etc/namedb/master/localhost-forward.db"; };
zone "127.in-addr.arpa" { type master; file 
"/usr/local/etc/namedb/master/localhost-reverse.db"; };
zone "255.in-addr.arpa" { type master; file 
"/usr/local/etc/namedb/master/empty.db"; };

// RFC 1912-style zone for IPv6 localhost address (RFC 6303)
zone "0.ip6.arpa"   { type master; file 
"/usr/local/etc/namedb/master/localhost-reverse.db"; };

// "This" Network (RFCs 1912, 5735 and 6303)
zone "0.in-addr.arpa"   { type master; file 
"/usr/local/etc/namedb/master/empty.db"; };

// Private Use Networks (RFCs 1918, 5735 and 6303)
zone "10.in-addr.arpa" { type master; file 
"/usr/local/etc/namedb/master/empty.db"; };
zone "16.172.in-addr.arpa" { type master; file 
"/usr/local/etc/namedb/master/empty.db"; };
zone "17.172.in-addr.arpa" { type master; file 
"/usr/local/etc/namedb/master/empty.db"; };
zone "18.172.in-addr.arpa" { type master; file 
"/usr/local/etc/namedb/master/empty.db"; };
zone "19.172.in-addr.arpa" { type master; file 
"/usr/local/etc/namedb/master/empty.db"; };
zone "20.172.in-addr.arpa" { type master; file 
"/usr/local/etc/namedb/master/empty.db"; };
zone "21.172.in-addr.arpa" { type master; file 
"/usr/local/etc/namedb/master/empty.db"; };
zone "22.172.in-addr.arpa" { type master; file 
"/usr/local/etc/namedb/master/empty.db"; };
zone "23.172.in-addr.arpa" { type master; file 
"/usr/local/etc/namedb/master/empty.db"; };
zone "24.172.in-addr.arpa" { type master; file 
"/usr/local/etc/namedb/master/empty.db"; };
zone "25.172.in-addr.arpa" { type master; file 
"/usr/local/etc/namedb/master/empty.db"; };
zone "26.172.in-addr.arpa" { type master; file 
"/usr/local/etc/namedb/master/empty.db"; };
zone "27.172.in-addr.arpa" { type master; file 
"/usr/local/etc/namedb/master/empty.db"; };
zone "28.172.in-addr.arpa" { type master; file 
"/usr/local/etc/namedb/master/empty.db"; };
zone "29.172.in-addr.arpa" { type master; file 
"/usr/local/etc/namedb/master/empty.db"; };
zone "30.172.in-addr.arpa" { type master; file 
"/usr/local/etc/namedb/master/empty.db"; };
zone "31.172.in-addr.arpa" { type master; file 
"/usr/local/etc/namedb/master/empty.db"; };
zone "168.192.in-addr.arpa" { type master; file 
"/usr/local/etc/namedb/master/empty.db"; };

// Shared Address Space (RFC 6598)
zone "64.100.in-addr.arpa" { type master; file 
"/usr/local/etc/namedb/master/empty.db"; };
zone "65.100.in-addr.arpa" { type master; file 
"/usr/local/etc/namedb/master/empty.db"; };
zone "66.100.in-addr.arpa" { type master; file 
"/usr/local/etc/namedb/master/empty.db"; };
zone "67.100.in-addr.arpa" { type master; file 
"/usr/local/etc/namedb/master/empty.db"; };
zone "68.100.in-addr.arpa" { type master; file 
"/usr/local/etc/namedb/master/empty.db"; };
zone "69.100.in-addr.arpa" { type master; file 
"/usr/local/etc/namedb/master/empty.db"; };
zone "70.100.in-addr.arpa" { type master; file 
"/usr/local/etc/namedb/master/empty.db"; };
zone "71.100.in-addr.arpa" { type master; file 
"/usr/local/etc/namedb/master/empty.db"; };
zone "72.100.in-addr.arpa" { type master; file 
"/usr/local/etc/namedb/master/empty.db"; };
zone "73.100.in-addr.arpa" { type master; file 
"/usr/local/etc/namedb/master/empty.db"; };
zone "74.100.in-addr.arpa" { type master; file 
"/usr/local/etc/namedb/master/empty.db"; };
zone "75.100.in-addr.arpa" { type master; file 
"/usr/local/etc/namedb/master/empty.db"; };
zone "76.100.in-addr.arpa" {