BIND and ulimit's on Linux

2017-09-05 Thread Browne, Stuart via bind-users
Hi, Just a quick question. I've recently run in to another daemon (not associated with BIND) that inherited its 'nofile' ulimit before dropping privileges and was wanting to confirm that BIND doesn't work this way. On some of our servers (zone distribution points) where lots of AXFR's (over

RE: Stopping name server abuse

2018-06-24 Thread Browne, Stuart via bind-users
If the incoming query has already been parsed and it BIND instance now knows it doesn't need to respond, it's already done all the work, so there's no point not sending the response. To introduce something before the BIND instance in userspace, then for every legitimate query you are

RE: named tcp dos?

2018-08-02 Thread Browne, Stuart via bind-users
> -Original Message- > From: bind-users [mailto:bind-users-boun...@lists.isc.org] On Behalf Of > Randy Bush > Sent: Friday, 3 August 2018 6:08 AM > > >> ... are there that many folk doing tcp out there? > > All name servers fall back to TCP when they receive truncated replies. > > we

RE: Authoritative dns with private IP for hostname

2018-07-30 Thread Browne, Stuart via bind-users
Be wary of DNAME's; they can be quite limited. Here's an example from our old system: internal. 3600IN SOA mgmt1.mel.internal.local. sysadmin.external.com.au. 2014051201 28800 14400 360 86400 internal. 3600IN NS mgmt1.mel.internal.local. internal. 3600IN

'tsig-keygen' vs 'dnssec-keygen' - keysize

2018-09-04 Thread Browne, Stuart via bind-users
Was adding in some new internal functionality and noted that the 'tsig-keygen' tool doesn't give the ability to alter the keysize like dnssec-keygen does for generating HMAC based tsig keys. I also noticed that in 9.13, dnssec-keygen will no longer be able to generate HMAC tsig's, so I'm

RE: 'tsig-keygen' vs 'dnssec-keygen' - keysize

2018-09-05 Thread Browne, Stuart via bind-users
2018 3:40 PM > To: Browne, Stuart > Cc: bind-users@lists.isc.org > Subject: Re: 'tsig-keygen' vs 'dnssec-keygen' - keysize > > > > On 5 Sep 2018, at 2:50 pm, Browne, Stuart via bind-users us...@lists.isc.org> wrote: > > > > Was adding in some new internal fun

RE: [BIND] RE: KSK Rollover

2018-09-06 Thread Browne, Stuart via bind-users
The kicker was probably this line: Sep 6 15:44:40 ns3 audit: { write } for pid=15447 comm="named" name="named.secroots" dev="dm-0" ino=135707451 scontext=system_u:system_r:named_t:s0 tcontext=unconfined_u:object_r:etc_t:s0 tclass=file permissive=0 The SELinux context that BIND runs in on a

RE: 'tsig-keygen' vs 'dnssec-keygen' - keysize

2018-09-06 Thread Browne, Stuart via bind-users
> -Original Message- > From: Evan Hunt [mailto:e...@isc.org] > Sent: Thursday, 6 September 2018 4:35 PM > To: Browne, Stuart > Cc: Mark Andrews; bind-users@lists.isc.org > Subject: Re: 'tsig-keygen' vs 'dnssec-keygen' - keysize > > > Is there no cryptographic difference between the

RE: Logrotate for bind9

2018-07-05 Thread Browne, Stuart via bind-users
How about a clear, direct example of using external service 'logrotate' (this is from one of my redhat systems, but the same concept applies to Ubuntu/Debian): [be...@dns-nomnom1.den ~]$ cat /etc/logrotate.d/named /var/log/named/*.log { compress create 0644 named named daily dateext

RE: Stealth NS records

2018-04-03 Thread Browne, Stuart via bind-users
A number of places use a 'stealth' (or 'hidden') master as a bit of protection from potential bad actors. It's a network domain barrier between the master (usually on an internal-only network) from a public network with potential bad actors. For example, a dynamic update for a zone will

RE: Handling expired domains

2018-06-28 Thread Browne, Stuart via bind-users
Assuming the slave can retrieve the SOA and zone, yup. It should just come right back online. Stuart From: bind-users [mailto:bind-users-boun...@lists.isc.org] On Behalf Of rohan.henry cwjamaica.com Sent: Friday, 29 June 2018 8:48 AM To: bind-users@lists.isc.org Subject: Handling expired

RE: concurrent-session

2018-11-01 Thread Browne, Stuart via bind-users
It does depend somewhat on what you mean by concurrent sessions. Do you mean incoming queries? Do you mean incoming zone transfers? Do you mean outgoing zone transfers? Each is a different tunable. Ultimately, system-wide file descriptor limits do come in to play, but the zone transfers listed

RE: BIND and UDP tuning

2018-09-30 Thread Browne, Stuart via bind-users
> -Original Message- > From: bind-users On Behalf Of Alex > I'm leaning towards that, too. The problem persists even when using > the provider's DNS servers. I thought for sure I'd see some verifiable > info from other people having problems with cable, such as from > dslreports, etc,

RE: Beginner - Bind - Bad dotted quad

2018-09-23 Thread Browne, Stuart via bind-users
>From my reading of the error message and the zone data provided, they don't >match. The error is stating near db.fin line 17 that the label is 'hp4000.' (note the full-stop); this doesn't appear to be the case with the pasted data. Did you modify the zone data before pasting it in (i.e. mask

RE: BIND and UDP tuning

2018-09-26 Thread Browne, Stuart via bind-users
> -Original Message- > From: bind-users [mailto:bind-users-boun...@lists.isc.org] On Behalf Of > Alex > Sent: Thursday, 27 September 2018 2:52 AM > To: bind-users@lists.isc.org > Subject: BIND and UDP tuning > > Hi, > > I reported a few weeks ago that I was experiencing a really high >

RE: BIND and UDP tuning

2018-09-27 Thread Browne, Stuart via bind-users
> -Original Message- > From: Tony Finch [mailto:d...@dotat.at] > > > - { name: 'net.ipv4.tcp_sack', value: 0 } > > Why? SACK is super important for TCP performance over links that have any > degree of lossiness, and I don't recall hearing of any caveats. > > Tony. > -- >

Views, Match-Destination, Alternate Ports

2018-12-05 Thread Browne, Stuart via bind-users
Hi, Whilst I've confirmed that notifies can be sent to alternate ports (using masters definitions), I can't seem to mangle BIND to use an alternate port in a view's match-destination configuration item (as it takes an ACL and they don't take ports from what I can read/test). Am I missing

BIND and persistent connections

2018-12-18 Thread Browne, Stuart via bind-users
Hi, I noticed that over the last few days on a number of our name servers in Tokyo that Google has started making persistent TCP connections to our name servers. I'm all for this as a concept, but it appears they're making many thousands of connections and not tearing them down after any given

RE: what is this python stuff in 9.11.7 ??

2019-05-30 Thread Browne, Stuart via bind-users
Maybe to state a little clearer; the dnssec-keymgr is for the automation of creation and date management of keys. All of the actual signing does not require the new python bit. If you're happy managing your keys with dnssec-keygen and dnssec-settime, you can continue using those (non-python)

RE: Bind9 stops responding for some clients

2019-05-30 Thread Browne, Stuart via bind-users
Whilst you mentioned 150 seats and you mentioned 'no firewalls', you didn't mention the network topology at all, in particular is traffic passing through a commercial firewall/router (hardware or virtualized) to get to the DNS server? If there is, it may be worth checking what packet inspection

RE: Bind9 stops responding for some clients

2019-06-06 Thread Browne, Stuart via bind-users
Congratulations on finding the cause. Sometimes, it's the simplest of things. Stuart From: bind-users [mailto:bind-users-boun...@lists.isc.org] On Behalf Of Gregory Sloop Sent: Thursday, 6 June 2019 12:37 PM To: bind-users@lists.isc.org Subject: Re: Bind9 stops responding for some clients

RE: A policy for removing named.conf options.

2019-06-13 Thread Browne, Stuart via bind-users
> -Original Message- > From: bind-users [mailto:bind-users-boun...@lists.isc.org] On Behalf Of > Evan Hunt > Sent: Friday, 14 June 2019 5:40 AM > To: Warren Kumari > Cc: Ondřej Surý; comp-protocols-dns-b...@isc.org > Subject: Re: A policy for removing named.conf options. > > On Thu,

RE: SERVFAIL when looking up TXT from particular domain

2019-06-26 Thread Browne, Stuart via bind-users
Trying with +cd, +noedns and +tcp elicits a similar result; a SERVFAIL. As these work fine if querying the authoritative servers directly (or using +trace), it appears to be a quirk in the resolver code. Stuart > -Original Message- > From: bind-users

RE: BIND and persistent connections

2019-11-14 Thread Browne, Stuart via bind-users
gt; > Browne, Stuart via bind-users wrote: > > > > I was wondering if anybody had any thoughts on how to limit the > > concurrency or at least the lifetime of these persistent connections > > within BIND. > > If you are running BIND 9.12, you have a bunch of new

RE: Bind 9.14 and bind-tools 9.16

2020-03-01 Thread Browne, Stuart via bind-users
It looks to me as if you are trying to generate a TSIG key for DNS updates. Try using "tsig-keygen" instead. Stuart > -Original Message- > From: bind-users [mailto:bind-users-boun...@lists.isc.org] On Behalf Of > @lbutlr > Sent: Monday, 2 March 2020 1:13 PM > To: bind-users > Subject:

RE: DNSSEC zones not updated

2020-01-22 Thread Browne, Stuart via bind-users
Sadly, no ideas other than a shared experience. It's not just the Windows release nor is it just the 9.14 series of releases; we've been witnessing this since the 9.10 releases on Linux (whilst using inline-signing). I don't recall off the top of my head if we saw it in the 9.9 series; even for

Re: DoH plugin for BIND

2020-05-05 Thread Browne, Stuart via bind-users
On 6/5/20, 02:21, "bind-users on behalf of Chuck Aurora" wrote: On 2020-05-02 14:35, Reindl Harald wrote: > Am 02.05.20 um 21:31 schrieb Chuck Aurora: >> On 2020-05-02 13:23, Erich Eckner wrote: >>> Will there be client-side DoT/DoH support in bind, too? E.g. will my >>>

Re: queries for external hostnames inside my domain?

2020-09-07 Thread Browne, Stuart via bind-users
You might want to look at the requestor machine's "search" domains. If the stub resolver starts appending search domains when it doesn't get a response it can use. Stuart On 8/9/20, 09:51, "bind-users on behalf of L. A. Walsh" wrote: Notice: This email is from an external sender.

Re: Request for review of performance advice

2020-07-07 Thread Browne, Stuart via bind-users
Just one quick one before I run off to lunch with regards to section 2: - Try to avoid crossing NUMA boundaries. At high throughput, the context switching and far memory calls kills performance. Stuart From: bind-users on behalf of Victoria Risk Date: Wednesday, 8 July 2020 at 11:58 To: