Re: static stub zone not working as expected

2019-07-13 Thread Jay Ford

I'm still confused about why named looks further up the tree than
c.0.d.7.5.7.c.2.a.9.d.f.ip6.arpa which it holds authoritatively via
master/slave zone type.  That seems like incorrect behavior.

Is this something I can fix or work around?

__
Jay Ford , Network Engineering, University of Iowa

On Sat, 13 Jul 2019, Mark Andrews wrote:

I suspect this will be negative response synthesis. The cache has learnt that 
d.f.ip6.arpa doesn’t exist in ip6.arpa and when the name in question is looked 
up the covering NSEC is returned which covers all of ULA space.

If I’m right querying for DS d.f.ip6.arpa will load the cache appropriately to 
allow this to be triggered.  One then needs to trigger a lookup for a name 
which finds the covering NSEC in the search back through the cache.  Named 
skips some responses in the search depending on the content but aborts it on 
others content.
--
Mark Andrews


On 13 Jul 2019, at 00:42, Jay Ford  wrote:

On Fri, 12 Jul 2019, Mark Andrews wrote:

On 12 Jul 2019, at 1:00 pm, Mark Andrews  wrote:


On 12 Jul 2019, at 11:12 am, Jay Ford  wrote:

I have a similar problem with zones for IPv6 ULA space.  I'm running BIND 
9.14.3.  I had hoped that validate-except would do the trick, such as:

 validate-except { "f.ip6.arpa"; };

but alas, no.

Extra puzzling so far is that the behavior is time-variable: delegated zones 
will resolve most of the time, but then fail (NXDOMAIN) for a while.

In the ULA space it doesn't seem trivial to own the top zone (ip6.arpa) without 
breaking stuff.  Any suggestions for that case?


ULA space it trivial to own.  D.F.IP6.ARPA is what you use if you have multiple 
ULA prefixes.
If you have a single ULA prefix in use then just use that.  e.g. 
e.8.b.0.5.6.0.7.2.9.d.f.ip6.arpa
which matches the ULA prefix used in the system tests (fd92:7065:b8e::/48).

This is no different to using 10.in-addr.arpa, 168.192.in-addr.arpa or one of 
16.172.in-addr.arpa
though 31.172.in-addr.arpa for RFC 1918 space.

If fc00::/8 is ever used then you would also have C.F.IP6.ARPA.

Named creates the D.F.IP6.ARPA zone automatically if you don’t create it when 
the view is
configured for recursion.  This is done to stop reverse lookups leaking onto 
the internet
as a whole.

% dig soa d.f.ip6.arpa
;; BADCOOKIE, retrying.

; <<>> DiG 9.15.1 <<>> soa d.f.ip6.arpa
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 23519
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
; COOKIE: aa8a24a1cce6c010b9d3a1b75d28009bb013cb0a2f58a961 (good)
;; QUESTION SECTION:
;d.f.ip6.arpa.INSOA

;; ANSWER SECTION:
D.F.IP6.ARPA.86400INSOAD.F.IP6.ARPA. . 0 28800 7200 604800 
86400

;; Query time: 0 msec
;; SERVER: 127.0.0.1#53(127.0.0.1)
;; WHEN: Fri Jul 12 13:38:03 AEST 2019
;; MSG SIZE  rcvd: 116


Yep, that's what I thought.  I have master/slave for the zone corresponding
to my ULA /48 (c.0.d.7.5.7.c.2.a.9.d.f.ip6.arpa), which is solid including
zones under it also handled as master/slave, but not for zones which are
delegated via NS records to other servers (not master/slave), such as
d.0.8.6.c.0.d.7.5.7.c.2.a.9.d.f.ip6.arpa which usually resolves like this:

  % dig -t ns d.0.8.6.c.0.d.7.5.7.c.2.a.9.d.f.ip6.arpa @dns-itf.uiowa.edu

  ; <<>> DiG 9.10.3-P4-Debian <<>> -t ns 
d.0.8.6.c.0.d.7.5.7.c.2.a.9.d.f.ip6.arpa @dns-itf.uiowa.edu
  ;; global options: +cmd
  ;; Got answer:
  ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 23886
  ;; flags: qr rd ra; QUERY: 1, ANSWER: 6, AUTHORITY: 0, ADDITIONAL: 1

  ;; OPT PSEUDOSECTION:
  ; EDNS: version: 0, flags:; udp: 4096
  ;; QUESTION SECTION:
  ;d.0.8.6.c.0.d.7.5.7.c.2.a.9.d.f.ip6.arpa. IN NS

  ;; ANSWER SECTION:
  d.0.8.6.c.0.d.7.5.7.c.2.a.9.d.f.ip6.arpa. 3600 IN NS iowadc1.iowa.uiowa.edu.
  d.0.8.6.c.0.d.7.5.7.c.2.a.9.d.f.ip6.arpa. 3600 IN NS iowadc4.iowa.uiowa.edu.
  d.0.8.6.c.0.d.7.5.7.c.2.a.9.d.f.ip6.arpa. 3600 IN NS iowadc3.iowa.uiowa.edu.
  d.0.8.6.c.0.d.7.5.7.c.2.a.9.d.f.ip6.arpa. 3600 IN NS iowadc5.iowa.uiowa.edu.
  d.0.8.6.c.0.d.7.5.7.c.2.a.9.d.f.ip6.arpa. 3600 IN NS iowadc2.iowa.uiowa.edu.
  d.0.8.6.c.0.d.7.5.7.c.2.a.9.d.f.ip6.arpa. 3600 IN NS iowadc6.iowa.uiowa.edu.

  ;; Query time: 2 msec
  ;; SERVER: fd9a:2c75:7d0c:5::e#53(fd9a:2c75:7d0c:5::e)
  ;; WHEN: Fri Jul 12 09:19:30 CDT 2019
  ;; MSG SIZE  rcvd: 215

but sometimes fails like this:

  % dig -t ns d.0.8.6.c.0.d.7.5.7.c.2.a.9.d.f.ip6.arpa @dns-cb.uiowa.edu

  ; <<>> DiG 9.10.3-P4-Debian <<>> -t ns 
d.0.8.6.c.0.d.7.5.7.c.2.a.9.d.f.ip6.arpa @dns-cb.uiowa.edu
  ;; global options: +cmd
  ;; Got answer:
  ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20175
  ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

Re: static stub zone not working as expected

2019-07-12 Thread Jay Ford

On Fri, 12 Jul 2019, Mark Andrews wrote:

On 12 Jul 2019, at 1:00 pm, Mark Andrews  wrote:


On 12 Jul 2019, at 11:12 am, Jay Ford  wrote:

I have a similar problem with zones for IPv6 ULA space.  I'm running BIND 
9.14.3.  I had hoped that validate-except would do the trick, such as:

  validate-except { "f.ip6.arpa"; };

but alas, no.

Extra puzzling so far is that the behavior is time-variable: delegated zones 
will resolve most of the time, but then fail (NXDOMAIN) for a while.

In the ULA space it doesn't seem trivial to own the top zone (ip6.arpa) without 
breaking stuff.  Any suggestions for that case?


ULA space it trivial to own.  D.F.IP6.ARPA is what you use if you have multiple 
ULA prefixes.
If you have a single ULA prefix in use then just use that.  e.g. 
e.8.b.0.5.6.0.7.2.9.d.f.ip6.arpa
which matches the ULA prefix used in the system tests (fd92:7065:b8e::/48).

This is no different to using 10.in-addr.arpa, 168.192.in-addr.arpa or one of 
16.172.in-addr.arpa
though 31.172.in-addr.arpa for RFC 1918 space.

If fc00::/8 is ever used then you would also have C.F.IP6.ARPA.

Named creates the D.F.IP6.ARPA zone automatically if you don’t create it when 
the view is
configured for recursion.  This is done to stop reverse lookups leaking onto 
the internet
as a whole.

% dig soa d.f.ip6.arpa
;; BADCOOKIE, retrying.

; <<>> DiG 9.15.1 <<>> soa d.f.ip6.arpa
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 23519
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
; COOKIE: aa8a24a1cce6c010b9d3a1b75d28009bb013cb0a2f58a961 (good)
;; QUESTION SECTION:
;d.f.ip6.arpa.  IN  SOA

;; ANSWER SECTION:
D.F.IP6.ARPA.   86400   IN  SOA D.F.IP6.ARPA. . 0 28800 7200 
604800 86400

;; Query time: 0 msec
;; SERVER: 127.0.0.1#53(127.0.0.1)
;; WHEN: Fri Jul 12 13:38:03 AEST 2019
;; MSG SIZE  rcvd: 116


Yep, that's what I thought.  I have master/slave for the zone corresponding
to my ULA /48 (c.0.d.7.5.7.c.2.a.9.d.f.ip6.arpa), which is solid including
zones under it also handled as master/slave, but not for zones which are
delegated via NS records to other servers (not master/slave), such as
d.0.8.6.c.0.d.7.5.7.c.2.a.9.d.f.ip6.arpa which usually resolves like this:

   % dig -t ns d.0.8.6.c.0.d.7.5.7.c.2.a.9.d.f.ip6.arpa @dns-itf.uiowa.edu

   ; <<>> DiG 9.10.3-P4-Debian <<>> -t ns 
d.0.8.6.c.0.d.7.5.7.c.2.a.9.d.f.ip6.arpa @dns-itf.uiowa.edu
   ;; global options: +cmd
   ;; Got answer:
   ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 23886
   ;; flags: qr rd ra; QUERY: 1, ANSWER: 6, AUTHORITY: 0, ADDITIONAL: 1

   ;; OPT PSEUDOSECTION:
   ; EDNS: version: 0, flags:; udp: 4096
   ;; QUESTION SECTION:
   ;d.0.8.6.c.0.d.7.5.7.c.2.a.9.d.f.ip6.arpa. IN NS

   ;; ANSWER SECTION:
   d.0.8.6.c.0.d.7.5.7.c.2.a.9.d.f.ip6.arpa. 3600 IN NS iowadc1.iowa.uiowa.edu.
   d.0.8.6.c.0.d.7.5.7.c.2.a.9.d.f.ip6.arpa. 3600 IN NS iowadc4.iowa.uiowa.edu.
   d.0.8.6.c.0.d.7.5.7.c.2.a.9.d.f.ip6.arpa. 3600 IN NS iowadc3.iowa.uiowa.edu.
   d.0.8.6.c.0.d.7.5.7.c.2.a.9.d.f.ip6.arpa. 3600 IN NS iowadc5.iowa.uiowa.edu.
   d.0.8.6.c.0.d.7.5.7.c.2.a.9.d.f.ip6.arpa. 3600 IN NS iowadc2.iowa.uiowa.edu.
   d.0.8.6.c.0.d.7.5.7.c.2.a.9.d.f.ip6.arpa. 3600 IN NS iowadc6.iowa.uiowa.edu.

   ;; Query time: 2 msec
   ;; SERVER: fd9a:2c75:7d0c:5::e#53(fd9a:2c75:7d0c:5::e)
   ;; WHEN: Fri Jul 12 09:19:30 CDT 2019
   ;; MSG SIZE  rcvd: 215

but sometimes fails like this:

   % dig -t ns d.0.8.6.c.0.d.7.5.7.c.2.a.9.d.f.ip6.arpa @dns-cb.uiowa.edu

   ; <<>> DiG 9.10.3-P4-Debian <<>> -t ns 
d.0.8.6.c.0.d.7.5.7.c.2.a.9.d.f.ip6.arpa @dns-cb.uiowa.edu
   ;; global options: +cmd
   ;; Got answer:
   ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20175
   ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

   ;; OPT PSEUDOSECTION:
   ; EDNS: version: 0, flags:; udp: 4096
   ;; QUESTION SECTION:
   ;d.0.8.6.c.0.d.7.5.7.c.2.a.9.d.f.ip6.arpa. IN NS

   ;; AUTHORITY SECTION:
   ip6.arpa.  3009  IN  SOA  b.ip6-servers.arpa. nstld.iana.org. 2019024499 
1800 900 604800 3600

   ;; Query time: 0 msec
   ;; SERVER: fd9a:2c75:7d0c:5::a#53(fd9a:2c75:7d0c:5::a)
   ;; WHEN: Fri Jul 12 09:19:25 CDT 2019
   ;; MSG SIZE  rcvd: 145

Those 2 servers (& others) are configured identically regarding the zones in
question, but some of them sometimes fail this way despite being
authoritative for c.0.d.7.5.7.c.2.a.9.d.f.ip6.arpa.  An "rndc flushtree
ip6.arpa" will fix it for a while.

I do very similar stuff with zones for IPv4 RFC1918 space with no trouble.  I
had noticed the authenticated behavior for f.ip6.arpa differing from the
behavior for 10.in-addr.arpa & friends.  Thanks for poking at IANA about
that.  As I mentioned earlier, my use of validate-except { "f.ip

Re: static stub zone not working as expected

2019-07-11 Thread Jay Ford
I have a similar problem with zones for IPv6 ULA space.  I'm running BIND 
9.14.3.  I had hoped that validate-except would do the trick, such as:


   validate-except { "f.ip6.arpa"; };

but alas, no.

Extra puzzling so far is that the behavior is time-variable: delegated zones 
will resolve most of the time, but then fail (NXDOMAIN) for a while.


In the ULA space it doesn't seem trivial to own the top zone (ip6.arpa) 
without breaking stuff.  Any suggestions for that case?


______
Jay Ford , Network Engineering, University of Iowa

On Fri, 12 Jul 2019, Mark Andrews wrote:

Because static-stub only overrides “where” to find the information about the 
zone
not whether the zone content is valid.

With DNSSEC named will treat zone content as trusted (master/slave).  Slave the 
top
level internal zones.  Note this doesn’t help any application that is also 
performing
DNSSEC validation.

Note .local is reserved for mDNS. getaddrinfo() shouldn’t be looking in the DNS 
for
.local names.

Mark


On 12 Jul 2019, at 7:25 am, btb via bind-users  wrote:

hi-

i have an environment which over time has managed to accumulate various "internal" zones 
[in this specific case, "foo.local"].  eventually, these zones will be phased out, but 
unfortunately in the interim, i'm stuck with this.  i'm attempting to configure them as static-stub 
zones:

zone "foo.local" {
type static-stub;
server-addresses {
192.168.220.20;
192.168.220.21;
};
};

however, queries are not working.  following a cache flush, the initial query 
is servfail and subsequent queries are nxdomain:


dig @localhost foo.local ns

; <<>> DiG 9.9.5-3ubuntu0.5-Ubuntu <<>> @localhost foo.local ns
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 2550
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;foo.local. IN  NS

;; Query time: 181 msec
;; SERVER: 127.0.0.1#53(127.0.0.1)
;; WHEN: Thu Jul 11 16:11:02 EDT 2019
;; MSG SIZE  rcvd: 38


dig @localhost foo.local ns

; <<>> DiG 9.9.5-3ubuntu0.5-Ubuntu <<>> @localhost foo.local ns
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43056
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;foo.local. IN  NS

;; AUTHORITY SECTION:
.   10796   IN  SOA a.root-servers.net. 
nstld.verisign-grs.com. 2019071101 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 127.0.0.1#53(127.0.0.1)
;; WHEN: Thu Jul 11 16:11:06 EDT 2019
;; MSG SIZE  rcvd: 113

querying the auth nameservers directory is successful:

dig @192.168.220.20 foo.local ns +norec


; <<>> DiG 9.9.5-3ubuntu0.5-Ubuntu <<>> @192.168.220.20 foo.local ns +norec
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 23
;; flags: qr aa ra; QUERY: 1, ANSWER: 4, AUTHORITY: 0, ADDITIONAL: 5

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4000
;; QUESTION SECTION:
;foo.local. IN  NS

;; ANSWER SECTION:
foo.local.  3600IN  NS  01.foo.local.
foo.local.  3600IN  NS  02.foo.local.
foo.local.  3600IN  NS  a2.foo.local.
foo.local.  3600IN  NS  a1.foo.local.

;; ADDITIONAL SECTION:
01.foo.local. 3600  IN  A   192.168.0.20
02.foo.local. 3600  IN  A   192.168.0.21
a2.foo.local. 3600  IN  A   10.201.11.8
a1.foo.local. 1200  IN  A   10.201.10.119

;; Query time: 82 msec
;; SERVER: 192.168.220.20#53(192.168.220.20)
;; WHEN: Thu Jul 11 16:35:39 EDT 2019
;; MSG SIZE  rcvd: 214

additionally unfortunate, there is nat involved here, due to address space 
collision, and while this obviously means the practical functionality of this 
is questionable, i was expecting that with a static-stub zone, the query itself 
would at least function.

i see these messages in the logs:
11-Jul-2019 16:08:51.406 lame-servers: info: error (insecurity proof failed) 
resolving 'foo.local/NS/IN': 192.168.220.20#53
11-Jul-2019 16:08:51.489 lame-servers: info: error (insecurity proof failed) 
resolving 'foo.local/NS/IN': 192.168.220.21#53
11-Jul-2019 17:08:44.111 lame-servers: info: error (no valid DS) resolving 
'foo.local/NS/IN': 192.168.220.21#53
11-Jul-2019 17:08:44.194 lame-servers: info: error (broken trust chain) 
resolving 'foo.local/NS/IN': 192.168.220.20#53

i've not had much experience with dnssec yet,

Re: Concerns/warnings in upgrading from 9.9 to 9.11?

2018-01-09 Thread Jay Ford

On Tue, 9 Jan 2018, Oscar Ricardo Silva wrote:
I currently run 9.9.9-P4 on recursive caching servers and with the 
announcement that 9.9 and 9.10 are approaching end of maintenance, I've 
decided it's time to move to 9.11.


Are there any issues, warnings, concerns in upgrading? Changes that need to 
be made to named.conf? I know there are new features but I'm more concerned 
about an in-place upgrade with no change to the current build process or 
configuration.


I've not actually run 9.11 in full deployment because we couldn't tolerate
the number of names which were rendered unresolvable due to the more
strenuous EDNS checking introduced in 9.11 (apparently as part of the COOKIE
features).  The problem is in the other broken servers rather than in BIND,
but the practical effect that names couldn't be resolved prompted us to stay
with 9.10 so far.  The use of the relatively recent "send-cookie no;" option
seems to work around that problem, providing a way for us to run 9.11 here.
However, at this point I'm planning to skip 9.11 & go with 9.12 when it gets
released for real (assuming my testing continues to yield favorable results).

Some of the good things in BIND 9.11 (some introduced in 9.10 & some in 9.11)
are:
   o  IPv6 is enabled by default, including listening
   o  response rate-limited (RRL) is built-in by default; that doesn't apply
  to purely recursive servers, but it's very nice
   o  the "in-view" method allowing a zone to be shared among views
   o  DNSTAP
   o  general DNSSEC improvements

The main things I'm after in 9.12 are:
   o  named-handled rotation of DNSTAP output files;  based on my testing
  that's broken for multi-threaded use in 9.12.0rc1 because the
  rolling of the file(s) seems to be done simultaneously by multiple
  threads with no coordination, but I hope to see it fixed in the real
  9.12 release
   o  configuration of the COOKIE secret, required for anycast servers;
  that's broken in 9.11 but seems to work correctly in 9.12

________
Jay Ford, Network Engineering, University of Iowa
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: DNSTAP output file rolling trouble in BIND 9.12.0rc1

2018-01-02 Thread Jay Ford
Yeah, that's what I figured too, but I wasn't quite sure of the behavior. 
After some experimenting I'm more sure of what I'm seeing now so I'll report 
it as a bug.


Jay

On Tue, 2 Jan 2018, Alan Clegg wrote:

Looks like something that ISC would like to have logged as a bug...  And
a perfect thing to find in rc1. 8-)

AlanC

On 1/2/18 3:00 PM, Jay Ford wrote:

I'm having some odd trouble with DNSTAP output file rolling in BIND
9.12.0rc1.

I have named built like:
   BIND 9.12.0rc1 
   running on Linux x86_64 3.16.0-4-amd64 #1 SMP Debian 3.16.7-ckt25-1
(2016-03-06)
   built by make with 'STD_CDEFINES=-DISC_FACILITY=LOG_LOCAL5'
'--libdir=/usr/lib/x86_64-linux-gnu' '--with-openssl' '--enable-dnstap'
'--enable-fixed-rrset' '--disable-openssl-version-check'
'--with-libtool' '--enable-dnsrps'
   compiled by GCC 6.3.0 20170516
   compiled with OpenSSL version: OpenSSL 1.1.0f  25 May 2017
   linked to OpenSSL version: OpenSSL 1.1.0f  25 May 2017
   compiled with libxml2 version: 2.9.4
   linked to libxml2 version: 20904
   threads support is enabled

I have DNSTAP configured like:
   dnstap {
  client query;
   };
   dnstap-output file "tmp/dnstap.out" versions 10 size 10m;

It mostly works as expected, except that named:
   o  logs twice about rolling the file every time, such as:
 Jan  2 05:15:42 named[24758]: dnstap: info: rolling dnstap
    destination 'tmp/dnstap.out'
 Jan  2 05:15:42 named[24758]: dnstap: info: rolling dnstap
    destination 'tmp/dnstap.out'
   o  sometimes crashes after logging that, possibly after rolling the file
   o  writes to multiple output files simultaneously, such as:
 ls -lt dnstap* | head -2
 -rw-r--r-- 1 bind bind  1282048 Jan  2 16:24 dnstap.out
 -rw-r--r-- 1 bind bind  1273856 Jan  2 16:24 dnstap.out.0
  & 2 minutes later:
 ls -lt dnstap* | head -2
 -rw-r--r-- 1 bind bind  1286144 Jan  2 16:26 dnstap.out
 -rw-r--r-- 1 bind bind  1277952 Jan  2 16:26 dnstap.out.0

This system had 4 worker threads in use.  Another similar system with
only 1 thread does not have such trouble, which got me wondering about
problems with threads & DNSTAP, specifically output file rolling. 
Reducing the threads on the afflicted system (via named option "-n 1")
seems to avoid the problem, but it's a little early to tell, & it's not
a desirable fix.

I'd appreciate it if somebody who knows the code would comment on the
threads vs DNSTAP possibility or point me in some other direction to
figure this out.

I have a named core file & can provide more config... details if required.

________
Jay Ford, Network Engineering Group, Information Technology Services
University of Iowa, Iowa City, IA 52242
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to
unsubscribe from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users





___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

DNSTAP output file rolling trouble in BIND 9.12.0rc1

2018-01-02 Thread Jay Ford
I'm having some odd trouble with DNSTAP output file rolling in BIND 
9.12.0rc1.


I have named built like:
   BIND 9.12.0rc1 
   running on Linux x86_64 3.16.0-4-amd64 #1 SMP Debian 3.16.7-ckt25-1 
(2016-03-06)
   built by make with 'STD_CDEFINES=-DISC_FACILITY=LOG_LOCAL5' 
'--libdir=/usr/lib/x86_64-linux-gnu' '--with-openssl' '--enable-dnstap' 
'--enable-fixed-rrset' '--disable-openssl-version-check' '--with-libtool' 
'--enable-dnsrps'
   compiled by GCC 6.3.0 20170516
   compiled with OpenSSL version: OpenSSL 1.1.0f  25 May 2017
   linked to OpenSSL version: OpenSSL 1.1.0f  25 May 2017
   compiled with libxml2 version: 2.9.4
   linked to libxml2 version: 20904
   threads support is enabled

I have DNSTAP configured like:
   dnstap {
  client query;
   };
   dnstap-output file "tmp/dnstap.out" versions 10 size 10m;

It mostly works as expected, except that named:
   o  logs twice about rolling the file every time, such as:
 Jan  2 05:15:42 named[24758]: dnstap: info: rolling dnstap
destination 'tmp/dnstap.out'
 Jan  2 05:15:42 named[24758]: dnstap: info: rolling dnstap
destination 'tmp/dnstap.out'
   o  sometimes crashes after logging that, possibly after rolling the file
   o  writes to multiple output files simultaneously, such as:
 ls -lt dnstap* | head -2
 -rw-r--r-- 1 bind bind  1282048 Jan  2 16:24 dnstap.out
 -rw-r--r-- 1 bind bind  1273856 Jan  2 16:24 dnstap.out.0
  & 2 minutes later:
 ls -lt dnstap* | head -2
 -rw-r--r-- 1 bind bind  1286144 Jan  2 16:26 dnstap.out
 -rw-r--r-- 1 bind bind  1277952 Jan  2 16:26 dnstap.out.0

This system had 4 worker threads in use.  Another similar system with only 1 
thread does not have such trouble, which got me wondering about problems with 
threads & DNSTAP, specifically output file rolling.  Reducing the threads on 
the afflicted system (via named option "-n 1") seems to avoid the problem, 
but it's a little early to tell, & it's not a desirable fix.


I'd appreciate it if somebody who knows the code would comment on the threads 
vs DNSTAP possibility or point me in some other direction to figure this out.


I have a named core file & can provide more config... details if required.

________
Jay Ford, Network Engineering Group, Information Technology Services
University of Iowa, Iowa City, IA 52242
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Re: checkhints: view “internal”: b.root-servers.net/AAAA (2001:500:200::b) extra record in hints

2017-09-09 Thread Jay Ford

On Sun, 10 Sep 2017, Mark Andrews wrote:

I suspect that you are forwarding your queries and that your forwarder is
returning out-of-date addresses.




No forwarding here.


Jay Ford, Network Engineering Group, Information Technology Services
University of Iowa, Iowa City, IA 52242
email: jay-f...@uiowa.edu, phone: 319-335-
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: checkhints: view “internal”: b.root-servers.net/AAAA (2001:500:200::b) extra record in hints

2017-09-09 Thread Jay Ford

On Sat, 9 Sep 2017, Stefan Sticht wrote:

since a couple of weeks i repeatedly see this in all my nameserver logs:

Sep  8 12:12:56 ns-01 named[17926]: checkhints: view “internal”: 
b.root-servers.net/ (2001:500:200::b) extra record in hints
Sep  8 12:13:03 ns-01 named[17926]: checkhints: view “internal”: 
b.root-servers.net/ (2001:500:84::b) missing from hints


I get that, too, with the same view situation, but running BIND 9.10.6 using
the built-in root hints.

A query for view=internal type= name=b.root-servers.net fixes it for a
while.


Jay Ford, Network Engineering Group, Information Technology Services
University of Iowa, Iowa City, IA 52242
email: jay-f...@uiowa.edu, phone: 319-335-___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: view problem

2016-10-18 Thread Jay Ford

On Wed, 19 Oct 2016, Mark Andrews wrote:

In message <alpine.deb.2.20.1610181109390.8...@headset.its.uiowa.edu>, Jay Ford 
writes:

Right.  "in-view" can be useful for this, as long as you only need to refer
to previously defined views (i.e., it unfortunatley doesn't allow forward
references).


So put the zone in the first view.  Updates, notifies and queries
are delivered to the zone from all views the zone is in.  Acls are
all configurable on the zone level if you don't like the inherited
acls from the first view.

To get any order we need to configure all views without the in-view
zones then go back and configure all the in-view zones.

We then would need to go and configure all the automatic empty zones
as they need to be aware of bottom of zone cuts.

It's do able but it isn't high on the priority list.


Understood.  I didn't say it was unreasonable; just unfortunate.  There are 
some configurations which would benefit from order-independent in-view 
references, but I understand that it's not trivial.


________
Jay Ford, Network Engineering Group, Information Technology Services
University of Iowa, Iowa City, IA 52242
email: jay-f...@uiowa.edu, phone: 319-335-
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: view problem

2016-10-18 Thread Jay Ford

On Tue, 18 Oct 2016, Barry Margolin wrote:

If there are zones that both sets of clients should see, you have to
duplicate them in both views. Overlapping views don't do this
automatically.


Right.  "in-view" can be useful for this, as long as you only need to refer 
to previously defined views (i.e., it unfortunatley doesn't allow forward 
references).


________
Jay Ford, Network Engineering Group, Information Technology Services
University of Iowa, Iowa City, IA 52242
email: jay-f...@uiowa.edu, phone: 319-335-
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Disabling rate-limit?

2016-08-15 Thread Jay Ford

On Mon, 15 Aug 2016, blrmaani wrote:
I inherited a DNS server which is running BIND 9.8.x. There was a DNS 
incident where our customers complained that they saw query timeouts 
intermittently (Our customers run cassandra/hadoop applications and send 
same queries repeatedly). They also run nscd on their hosts but I was told 
all have same TTL value of 3600 indicating all names expire at the same 
time on thousands of client hosts).


I tried to reproduce the issue by sending hostname.bind queries and I see 
logs similar to the one below:


  named[]: limit responses to  for hostname.bind 
CH TXT 
  named[]: *stop limiting responses to  for 
hostname.bind CH TXT 

I reviewed /etc/named.conf and do not see 'rate-limit' configuration. I am 
confused because BIND ARM says rate-limit is disabled by default. But logs 
indicate otherwise.


The built-in view for the "CH" class has response rate-limting (RRL) enabled 
by default.  It's possible to override it, but it might not help you any. 
Basically, your test queries are sufficiently different than normal queries 
that your test methodology is probably invalid.


Do you see RRL log messages for normal queries?  If not, then RRL is probably 
not your trouble.  Other things like insufficient UDP buffering, lacking CPU 
horsepower, or overwhelmed iptables connection tracking can also cause 
time-outs.


________
Jay Ford, Network Engineering Group, Information Technology Services
University of Iowa, Iowa City, IA 52242
email: jay-f...@uiowa.edu, phone: 319-335-
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: DNSSEC validation failures for www.hrsa.gov

2016-06-24 Thread Jay Ford

On Sat, 25 Jun 2016, Mark Andrews wrote:

The servers for webfarm.dr.hrsa.gov are not EDNS and DNSSEC compliant.
They are returning FORMERR to queries with EDNS options.  Unknown
EDNS options are supposed to be ignored (RFC 6891).

You can workaround this with a server clause to disable sending the
cookie option with a server clause.

server  { request-sit no; }; // 9.10.x
server  { send-cookie no; }; // 9.11.x


That did it, at least for now.


Now one could argue that FORMERR is legal under RFC 2671 (the initial
EDNS specification) as no options were defined and to use a option
you need to bump the EDNS version but the servers don't do EDNS
version negotiation either as they return FORMERR to a EDNS version 1
query rather than BADVERS.  They also incorrectly copy back unknown
EDNS flags.



Whether this is the cause of your issue I don't know but it won't be
helping.


The HRSA folks claim that their "site is fine".  In hopes of disabusing them 
of that notion I'll have our folks who have to try to use the HRSA site pass 
along the trouble report.


Thanks for the diagnosis & work-around.  Excellent as always & crazy fast, 
too!


________
Jay Ford, Network Engineering Group, Information Technology Services
University of Iowa, Iowa City, IA 52242
email: jay-f...@uiowa.edu, phone: 319-335-
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


DNSSEC validation failures for www.hrsa.gov

2016-06-24 Thread Jay Ford

I'm getting DNSSEC validation failures by BIND 9.10.4-P1 for www.hrsa.gov.

The pertinent log messages are things like:

   lame-servers: info: no valid RRSIG resolving 'webfarm.dr.hrsa.gov/DS/IN': 
165.112.137.222#53
   lame-servers: info: no valid RRSIG resolving 'webfarm.dr.hrsa.gov/DS/IN': 
162.99.248.222#53
   lame-servers: info: no valid DS resolving 'webfarm.dr.hrsa.gov/A/IN': 
162.99.248.222#53
   lame-servers: info: broken trust chain resolving 'webfarm.dr.hrsa.gov/A/IN': 
165.112.137.222#53
   lame-servers: info: insecurity proof failed resolving 'dr.hrsa.gov/SOA/IN': 
162.99.248.222#53
   lame-servers: info: insecurity proof failed resolving 'dr.hrsa.gov/SOA/IN': 
165.112.137.222#53

The dig output is:

   $ dig www.hrsa.gov @dns-spare.uiowa.edu

   ; <<>> DiG 9.10.3-P4-Debian <<>> www.hrsa.gov @dns-spare.uiowa.edu
   ;; global options: +cmd
   ;; Got answer:
   ;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 42947
   ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

   ;; OPT PSEUDOSECTION:
   ; EDNS: version: 0, flags:; udp: 4096
   ;; QUESTION SECTION:
   ;www.hrsa.gov.  IN  A

   ;; Query time: 103 msec
   ;; SERVER: fd9a:2c75:7d0c:5::2#53(fd9a:2c75:7d0c:5::2)
   ;; WHEN: Fri Jun 24 18:49:06 CDT 2016
   ;; MSG SIZE  rcvd: 41

It doesn't fail with a similar config on 9.10.3-P4, but there are admittedly 
config differences.


Other DNSSEC-signed things validate fine at both versions, so things are
mostly OK.

My guess is that BIND 9.10.4-P1 is checking something more stringently than
previous versions did, & that something is broken with the DNS for
www.hrsa.gov, but I can't spot what it is.  There are some very short TTLs (5
seconds) in the data tree in question, including for SOAs, which seems like a
really bad idea but I'm not sure it definitely breaks things.  There are also
some answers with both "AA" & "AD" set, which seems odd, but again, not
definitely broken.

dnsviz.net reports a couple of warnings, including a non-AA answer from
authoritative servers, but it doesn't say it's bogus.

If anybody can spot something broken for www.hrsa.gov, I'd be very glad to
hear about it.

________
Jay Ford, Network Engineering Group, Information Technology Services
University of Iowa, Iowa City, IA 52242
email: jay-f...@uiowa.edu, phone: 319-335-
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: dnskey algorithm update

2016-01-06 Thread Jay Ford

On Wed, 6 Jan 2016, Carl Byington wrote:

My zones are currently using algorithm 5 (RSASHA1), with two KSKs and
two ZSKs with overlapping timers. In preparation for updating to
algorithm 8 (RSASHA256), I read:

 The bind-users thread "KSK signing all records; NSEC3 algorithm
status?"
 https://tools.ietf.org/html/rfc6781#page-31
 https://labs.ripe.net/Members/anandb/dnssec-algorithm-roll-over

Is there a more authoritative document that describes the algorithm roll
over procedure? It seems that I need to:

 generate new ZSK and KSKs using algorithm 8
 sign the zone with all the keys
 wait one ttl cycle, then publish a new dnskey rrset
 wait one ttl cycle, then upload the new ds rrset
...
 eventually, remove the old KSKs from the dnskey rrset,
   but still use them to sign the zone
 wait one ttl cycle, then resign the zone without the
   old KSKs.


Carl:

When I did that algorithm upgrade, I used something close to this process
(based on the dual-signature method):

   # generate new RSASHA256 ZSK & KSK (active & published)
   dnssec-keygen -K Keys.dnssec -a RSASHA256 -b 1024 -n ZONE $ZONE
   dnssec-keygen -K Keys.dnssec -a RSASHA256 -b 4096 -n ZONE -f KSK $ZONE

   # re-sign the zone, using smart signing to pick up all keys
   dnssec-signzone -K $KEY_DIR -d $KEY_DIR -S -o $ZONE $DIR/$ZONE

   # re-load the zone (add any other required rndc args)
   rndc reload $ZONE

   # add DS record(s) for new KSK in parent zone;
   # left as an exercise for the reader

   # wait at least 1 TTL cycle (minimum of that for $ZONE & that for the
   # DS records in the parent zone) to let new DNSKEY, RRSIG, & DS records
   # propagate

   # move old keys out of key dir so they don't get used
   mv $KEY_DIR/K$ZONE.+005+* $TMP_DIR

   # re-sign the zone (with just new keys)
   dnssec-signzone -K $KEY_DIR -d $KEY_DIR -S -o $ZONE $DIR/$ZONE

   # re-load the zone (add any other required rndc args)
   rndc reload $ZONE

   # delete DS record(s) for old KSK in parent zone;
   # left as an exercise for the reader

   # if all good, delete old keys
   rm $TMP_DIR/K$ZONE.+005+*

where:
   $ZONE is the zone being upgraded
   $KEY_DIR contains the key files
   $DIR contains the zone files
   $TMP_DIR contains old keys temporarily

You can get by with activating the new (RRSIG,DNSKEY,DS) set as a group
immediately after creation & re-signing because the old set is still present
as the basis for validation while the new set propagates around.

Likewise, after the TTL cycle you can delete the old (RRSIG,DNSKEY,DS) set as
a group because by then the new set is present as the basis for validation.

It worked for me.  As always, your experience might vary.

I recommend working through this for a zone which:
   o  doesn't matter
   o  has the parent under your direct control

These tools are extremely useful:
   http://dnsviz.net/
   http://dnssec-debugger.verisignlabs.com/

Use them to view & verify things at each stage.  To really have some fun,
purposefully break some part of your test zone & see how the above tools show
it.

________
Jay Ford, Network Engineering Group, Information Technology Services
University of Iowa, Iowa City, IA 52242
email: jay-f...@uiowa.edu, phone: 319-335-
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


RE: Cloud DNS providers for secondary DNS

2015-12-30 Thread Jay Ford

On Wed, 30 Dec 2015, Diggins Mike wrote:
Thanks for the help. My question is hypothetical at this point and likely 
pointless since I intend to implement it the "right" way, but I'd still 
like to understand this better. I'm not looking to circumvent the rules.


Good plan.

My more specific question is this: If I'm a site on the internet looking 
for a server in my domain for the first time, I query the TLD servers for a 
list of name servers for my domain and pick one to query. Suppose I pick 
one that has the correct zone information and can answer the query, but 
that specific NS is not listed in the zone record. I believe that's called 
a LAME nameserver, correct? What happens? Does it answer the query 
regardless? Does specifying the NS record in the zone simply confirm to the 
remote site that this is a valid nameserver for this zone?


A lame delegation is when you have an NS record to a server which doesn't 
know about the domain in question.


You're glossing over some details which matter, & which often contribute to
broken DNS configurations.

The servers for the parent domain (edu, com, org...) will provide whatever
information you specify via your registrar (NS records & A/ records for
glue if pertinent).  However, that information isn't authoritative, because
those servers aren't authoritative for your domain.  The information is
offered as hints to find authoritative information.  If you specify NS
records for your servers & cloud servers, queriers will use both sets as
hints.

A querier with no knowledge of your domain will use those hints to find 
authoritative information.  In your case, that querier will talk to your 
servers and/or the cloud servers.  If the cloud servers respond with NS 
records for only your servers, the querier will subsequently talk to only 
your servers & not the cloud servers, because that's what the authoritative 
information says to do.  This probably isn't what you want to happen, so you 
probably want to include NS records for the cloud servers, so that queriers 
will use the cloud servers for subsequent queries.


The flip side of this is what your on-campus (or on-whatever) queriers do.
If you have devices on your campus/whatever which use NS records (as opposed
to just being pointed at a recursive resolver), they will (in general) use
all of the NS records.  As result some amount of such queries will go to the
cloud servers when it might be better to have them go to your (presumably
local) servers.  As long as all the servers have the same information, the
answers will be consistent, but performance might suffer.  This might or
might not be a problem.

If you do split-view games, things get even more interesting.

________
Jay Ford, Network Engineering Group, Information Technology Services
University of Iowa, Iowa City, IA 52242
email: jay-f...@uiowa.edu, phone: 319-335-
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: IPv6 PTR Records

2014-03-10 Thread Jay Ford

On Mon, 10 Mar 2014, Maechler Philippe wrote:

How do you manage your IPv6 Reverse Entries?

Let's assume that we have a /32 IPv6 subnet for our needs and that we only
publish PTR records where they are needed like for mail servers and maybe
DNS and web servers.

Our Network is: 2001:db8::/32
This would give us a Zone named 8.b.d.0.1.0.0.2.ip6.arpa

Our DNS has the ip 2001:db8:193:192::20/64 and the other one has
2001:db8:193:193::20/64

1) Would you create an entry in 8.b.d.0.1.0.0.2.ip6.arpa like:

20.2.9.1.0.3.9.1.0  IN A  dns1.example.org.
20.3.9.1.0.3.9.1.0  IN A  dns2.example.org.


As Chris Buxton pointed out, you lost a few necessary 0s  need 0.2 on the
tail instead of 20.

Provided you get the syntax right, any of those can work.

Choose whatever level of delegation is convenient.  We do most of ours at the 
/64 boundary, but we do some sparse subnets delegated at /56  such to avoid 
having a bunch of zones with almost nothing in them.



Jay Ford, Network Engineering Group, Information Technology Services
University of Iowa, Iowa City, IA 52242
email: jay-f...@uiowa.edu, phone: 319-335-
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Disabling RPZ for a few clients / views sharing zones

2014-02-06 Thread Jay Ford

On Thu, 6 Feb 2014, Chuck Anderson wrote:

On Thu, Feb 06, 2014 at 09:50:26AM -0800, Doug Barton wrote:

On 02/06/2014 06:27 AM, Chuck Anderson wrote:

I was kinda hoping that newer
versions of BIND could share zones (with identical zone contents)
between views without requiring the messy multiple IP alias setup.


Evan Hunt just replied, but I already this typed so

I think that's coming in 9.10, which is in alpha now.


You have always been able to do this with include files.


I'm not sure how this helps.  If you do this:

named.conf:

view no-rpz {
   match-clients { 192.168.1.1; };

   zone example.com {
type slave;
file /var/named/slaves/example.com.zone;
masters { 10.0.0.1; };
   };
};

view global {
   match-clients { any; };
   response-policy { zone rpzip.example.com; };

   zone rpzip.example.com {
type slave;
   file /var/named/slaves/rpzip.example.com.zone;
   masters { 10.0.0.2; };
   };

   zone example.com {
type slave;
file /var/named/slaves/example.com.zone;
masters { 10.0.0.1; };
   };
};

Then the global view sees updates to example.com quickly, as soon as
NOTIFY is sent by the master and the zone is transferred.  However,
the no-rpz view doesn't see changes to example.com in a timely
manner.  I've had to wait awhile (SOA refresh) for new records to
appear and old records to disappear from the no-rpz view's
example.com zone.


I like the trick of having view A pull the zone from the real master 
notify view B, while view B pulls the zone locally from view A, using TSIG
keys to indicate the other view for the notify  transfer.

Adapting your config, using IPv6 loopback addresses, something like this
might work for you:

   key be-internal.keys.example.com. {
   algorithm hmac-md5;
  secret ...secret stuff...;
   };

   view no-rpz {
  match-clients {
 192.168.1.1;
 key be-internal.keys.example.com.;
  };

  zone example.com {
type slave;
file /var/named/slaves/example.com.zone;
masters { ::1; };
allow-notify { localhost; };
  };
   };

   view global {
  match-clients { any; };

  // define self as server using be-internal key to allow
  // external-internal notify for common zones mastered by
  // servers unaware of our view games
  server ::1 { keys intra-dns-be-internal.keys.uiowa.edu.; };

  response-policy { zone rpzip.example.com; };

  zone rpzip.example.com {
type slave;
  file /var/named/slaves/rpzip.example.com.zone;
  masters { 10.0.0.2; };
  };

  zone example.com {
type slave;
file /var/named/slaves/example.com.zone;
masters { 10.0.0.1; };
also-notify { ::1; };  // internal-external trickery
  };
   };

The relatively new ability to specify a key in a masters statement can
also be useful, but isn't required for the above example.

Evaluate it for use in your context.  I don't know how/if this interacts with
RPZ.  It also assumes you don't do anything else with DNS via loopback
addresses. ...


Jay Ford, Network Engineering Group, Information Technology Services
University of Iowa, Iowa City, IA 52242
email: jay-f...@uiowa.edu, phone: 319-335-
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Disabling RPZ for a few clients / views sharing zones

2014-02-06 Thread Jay Ford

On Thu, 6 Feb 2014, Chuck Anderson wrote:

Neat.  Is there any problem with using the exact same zone file in
both views?  I worry that one view might fight with the file from the
other view...


Oh yeah, sorry, I left that bit out.  The slave files do need to be unique or 
they will over-write each other.  I use a directory per view to keep things 
tidy.


Jay
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


IPv4 control socket binding failure with BIND 9.9.4-P1 on RHEL6

2013-12-05 Thread Jay Ford

I'm testing BIND 9.9.4-P1 on a RHEL6 system  am getting this log message:

   /etc/named.conf:56: couldn't add command channel 127.0.0.1#953: address in 
use

That's with an rndc.key file in place  no controls config, which implies
TCP 953 on 127.0.0.1  ::1.

Control via IPv6 (::1 port 953) works fine, but IPv4 doesn't:
   % netstat -an -A inet | fgrep :953
   % netstat -an -A inet6 | fgrep :953
   tcp0  0 ::1:953:::* LISTEN

Even if I try to configure the controls to listen on a different port for
IPv6, such as:
   controls {
 inet ::1 port 954 allow { localhost; };
 inet 127.0.0.1 allow { localhost; };
   };
the IPv4 bind still fails, while the IPv6 bind works.

Interestingly, the bindings for the query ports (TCP  UDP 53 IPv4  IPv6)
work fine, with just this under options:
   listen-on-v6 { any; };

This is all using BIND built from ISC source (not a RedHat package).  Here's 
the named -V output:


   BIND 9.9.4-RedHat-9.9.4-P1_UIOWA.el6 (Extended Support Version)
   id:8f9657aa built with '--host=x86_64-redhat-linux-gnu'
   '--build=x86_64-redhat-linux-gnu' '--program-prefix=' '--prefix=/usr'
   '--exec-prefix=/usr' '--bindir=/usr/bin' '--sbindir=/usr/sbin'
   '--sysconfdir=/etc' '--datadir=/usr/share' '--includedir=/usr/include'
   '--libdir=/usr/lib64' '--libexecdir=/usr/libexec'
   '--sharedstatedir=/var/lib' '--mandir=/usr/share/man'
   '--infodir=/usr/share/info' '--with-libtool' '--localstatedir=/var'
   '--enable-threads' '--enable-ipv6' '--with-pic' '--disable-static'
   '--disable-openssl-version-check' '--enable-rrl' '--with-gssapi=yes'
   '--disable-isc-spnego'
   '--with-docbook-xsl=/usr/share/sgml/docbook/xsl-stylesheets'
   '--enable-fixed-rrset' 'build_alias=x86_64-redhat-linux-gnu'
   'host_alias=x86_64-redhat-linux-gnu' 'CFLAGS= -O2 -g' 'CPPFLAGS=
   -DDIG_SIGCHASE'
   using OpenSSL version: OpenSSL 1.0.1e 11 Feb 2013
   using libxml2 version: 2.7.6

RHEL6 has kernel variable net.ipv6.bindv6only set to 0, which might or might
not be related.  BIND 9.8.5-P2 works correctly on a RHEL5 system which also
has it set to 0.  There are some comments in some of the 9.9 release notes
about bindv6only, but I couldn't find anything specific to this situation.

Is this a configuration problem or something more in the bug category?


Jay Ford, Network Engineering Group, Information Technology Services
University of Iowa, Iowa City, IA 52242
email: jay-f...@uiowa.edu, phone: 319-335-
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: IPv4 control socket binding failure with BIND 9.9.4-P1 on RHEL6

2013-12-05 Thread Jay Ford

On Thu, 5 Dec 2013, Shumon Huque wrote:

On 12/5/13 11:49 AM, Jay Ford wrote:

I'm testing BIND 9.9.4-P1 on a RHEL6 system  am getting this log message:

/etc/named.conf:56: couldn't add command channel 127.0.0.1#953:
address in use



I'm going to take a guess: you might have portreserve running
that is reserving the control channel port, or v4 only because
they forgot about v6. We usually turn it off.


That was indeed the problem  killing portreserve lets things work correctly
now.  Thanks much!


Jay Ford, Network Engineering Group, Information Technology Services
University of Iowa, Iowa City, IA 52242
email: jay-f...@uiowa.edu, phone: 319-335-
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: DDOS attack Bind 9.9 - P2

2013-04-30 Thread Jay Ford

On Tue, 30 Apr 2013, Jose Manuel Delgado G. wrote:
I have isc.org attack. isc.org internet *?. It comes from my own clients 
that I have allowed in my ACL. the question is how to stop this attack? 
this causes my traffic on the interface is intense and also up my cpu 
percentage. that I can do to prevent it??


Assuming clients means things you connect to the net...

If the queries are really from your clients, find  fix them.  They are 
probably attacking others in addition to you, so you'd be doing the rest of 
the Internet a favor while solving your own problem.


If the traffic is spoofed as being from your clients, stop accepting traffic 
from elsewhere sourced from your client address space.



Jay Ford, Network Engineering Group, Information Technology Services
University of Iowa, Iowa City, IA 52242
email: jay-f...@uiowa.edu, phone: 319-335-, fax: 319-335-2951
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


RSA warnings errors in 9.8.4

2013-01-04 Thread Jay Ford

I just upgraded BIND on a Linux-based server from 9.8.3-P3 to 9.8.4.

I started getting a bunch of RSA_verify errors, as has been discussed on 
this list.  Is there a 9.8 release which quells those messages, or is hacking

the source post-download still the recommended fix?


Also, I got a spurt of log messages like:

   general: info: error:0407006A:rsa 
routines:RSA_padding_check_PKCS1_type_1:block type is not 01:rsa_pk1.c:100:
   general: info: error:04067072:rsa routines:RSA_EAY_PUBLIC_DECRYPT:padding 
check failed:fips_rsa_eay.c:748:

Anybody know what that's about?


Jay Ford, Network Engineering Group, Information Technology Services
University of Iowa, Iowa City, IA 52242
email: jay-f...@uiowa.edu, phone: 319-335-, fax: 319-335-2951
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: reverse dns for IPV6 ranges

2012-03-19 Thread Jay Ford

On Mon, 19 Mar 2012, hugo hugoo hugo...@hotmail.com wrote:

 Jay,

- Can you give me an example of such configuration?


Sure.

Say I use a DHCP pool of /64_prefix:a123:b456::/96 within each /64 subnet.

For example:
   subnet DHCP pool
   _  ___
   2001:db8:0:a::/64  2001:db8:0:a:a123:b456::/96
   2001:db8:0:b::/64  2001:db8:0:b:a123:b456::/96
   2001:db8:0:c::/64  2001:db8:0:c:a123:b456::/96

Then you put this in every /64 subnet zone:
;
*.6.5.4.b.3.2.1.a   IN  PTR dhcpv6.whatever.edu.
;

so that PTR queries for addresses like:
   2001:db8:0:a:a123:b456::4
   2001:db8:0:b:a123:b456:1:2
   2001:db8:0:c:a123:b456:abc:def
all return dhcpv6.whatever.edu.

To make that less tedious, I create a file called dhcpv6.ptr.inc like this:

;
; dhcpv6.ptr.inc
; include file defining wildcard PTR record for DHCPv6 pools
$TTL 86400
@   IN  PTR dhcpv6.whatever.edu.
;

Each subnet zone file (e.g., zone a.0.0.0.0.0.0.0.8.b.d.0.1.0.0.2.ip6.arpa
for subnet 2001:db8:0:a::/64) pulls in that file via:

;
$INCLUDE dhcpv6.ptr.inc *.6.5.4.b.3.2.1.a
;

That way if I want to change the name in the PTR record I edit 1 file instead
of every zone file.


Jay Ford, Network Engineering Group, Information Technology Services
University of Iowa, Iowa City, IA 52242
email: jay-f...@uiowa.edu, phone: 319-335-, fax: 319-335-2951
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


RE: reverse dns for IPV6 ranges

2012-03-12 Thread Jay Ford

On Mon, 12 Mar 2012, hugo hugoo wrote:

Has anyone else experience with reverse IPV6 configuration with Bind?


We do static PTR records in the ip6.arpa zones like we do in the in-addr.arpa
zones, to create address-name mappings matching the name-address mappings
created by the   A records.

I fairly recently started fiddling with wildcard PTR records for DHCPv6 
address pools, to at least return some answer for a query about the 
addresses.  Right now I have it configured so that a query for any address in 
any of the pools returns the same name, but it could be changed to return 
different names for different pools.  This obviously doesn't create symmetric 
name-address  address-name mapping, which might or might not be a problem. 
I don't have enough real use of this to know whether this wildcard stuff is 
helpful or not.



Jay Ford, Network Engineering Group, Information Technology Services
University of Iowa, Iowa City, IA 52242
email: jay-f...@uiowa.edu, phone: 319-335-, fax: 319-335-2951
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Format of the IPv6 reversed zone

2011-07-28 Thread Jay Ford

On Thu, 28 Jul 2011, Khuu, Linh   Contractor wrote:

I'm new to IPv6 configuring in BIND. I need help. The forward zone is
simple enough with  record, but the reversed zone is a bit confusing to
me.

For example, I want to add a hostname of www.example.com to
2001:1930:c00::2. This IPv6 address is /48.

How can I add this IPv6 address in a reversed format?

$ORIGIN 0.0.0.0.0.0.0.c.0.3.9.1.1.0.0.2.ip6.arpa. IN SOA ..

@ NS dnstemp1.example.com

What should I put for the PTR???

Is the reversed for IPv6 in the ip6.arpa file or IP6.int file???


It's in ip6.arpa.  The whole name for 2001:1930:c00::2 should be:
   2.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.C.0.0.3.9.1.1.0.0.2.IP6.ARPA

In your origin above you lost a 0 right of the c.  The :c00: chunk is
actually :0c00:, so the correct origin is:
   0.0.0.0.0.0.c.0.0.3.9.1.1.0.0.2.ip6.arpa
in which the PTR RR would be:
   2.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0  IN  PTR www.example.com


Jay Ford, Network Engineering Group, Information Technology Services
University of Iowa, Iowa City, IA 52242
email: jay-f...@uiowa.edu, phone: 319-335-, fax: 319-335-2951
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Split-DNS + Views + master/slave

2011-07-07 Thread Jay Ford
, NS..., external-only data,  an $INCLUDE of
  file #3
   3. common view file: common data (no SOA...)
If the SOA, NS... are the same between the views, they can also be in the
common file.


Jay Ford, Network Engineering Group, Information Technology Services
University of Iowa, Iowa City, IA 52242
email: jay-f...@uiowa.edu, phone: 319-335-, fax: 319-335-2951
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: slave timers

2011-04-18 Thread Jay Ford

On Mon, 18 Apr 2011, hugo hugoo wrote:

I am testing the migration bind8  to Bind9 and the working for slave zones.

To do this, I have put the following values to the timers in the master zone.

$ORIGIN com.
toto  3600IN  SOA ns1.toto.com. postmaster.toto.com. (

2011041404 302 3600 604800 3600 )



It is really not working good!

- Are there some constraint  in the timer values?

  For my test I have a 302 seconds expired time   can this work even if
this timer is smaller than the other ones?


The second parameter is the refresh timer, not the expire timer.

302 seconds is pretty short.  Assuming your master-slave notifies are
working correctly an hour or 2 (3600 or 7200 seconds) should be fine for a
refresh timer value, but there are probably valid reasons to use shorter
values.


- When I do a 'rndc reload' on the slave name server, there is no AXFR
request to the Master.

- When I do a bind9 stop/start on the slave name server, there is no AXFR
request to the master.

- There is no AXFR request to the master every 302 seconds.


The slave will check the SOA serial number it has against that of the master.
If the master's is newer, it will transfer the zone.  If not, the slave has
current data so doesn't need to transfer it again.

Are you incrementing the SOA serial number on the master?

rndc retransfer zone on the slave will force a transfer, ignoring the SOA
serial number.  See if that works.


Jay Ford, Network Engineering Group, Information Technology Services
University of Iowa, Iowa City, IA 52242
email: jay-f...@uiowa.edu, phone: 319-335-, fax: 319-335-2951
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: FORMERR for wikipedia...

2011-03-17 Thread Jay Ford

On Thu, 17 Mar 2011, Mark Andrews wrote:

The nameservers for wikipedia.org are broken.  They put the wrong
SOA record in the negative response, wikipedia.org != wikimedia.org.

M vs P


Exactly.


The adminstrators of wikimedia.org were informed about this months
ago but they don't seem to care.  They fail to acknowledge the
problem or to fix the problem.  wikimedia.org are not alone in this.
There are thousands on web sites that return the wrong answers to
 lookups.

Meanwhile everyone wants resolver vendors to make the lookups work.
We can't when the authoritative servers are broken.  It time the
users complained.


That's where I'm going with this, but specific information with a suggested 
fix is usually better than just pointing out that it's broken.  Is it known 
what software and/or config causes this broken behavior?



Jay Ford, Network Engineering Group, Information Technology Services
University of Iowa, Iowa City, IA 52242
email: jay-f...@uiowa.edu, phone: 319-335-, fax: 319-335-2951
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: FORMERR for wikipedia...

2011-03-17 Thread Jay Ford

On Thu, 17 Mar 2011, Mark Bergsma wrote:

On Mar 17, 2011, at 6:48 AM, Jay Ford wrote:


On Thu, 17 Mar 2011, Mark Andrews wrote:

The nameservers for wikipedia.org are broken.  They put the wrong
SOA record in the negative response, wikipedia.org != wikimedia.org.



The adminstrators of wikimedia.org were informed about this months
ago but they don't seem to care.  They fail to acknowledge the
problem or to fix the problem.  wikimedia.org are not alone in this.
There are thousands on web sites that return the wrong answers to
 lookups.

Meanwhile everyone wants resolver vendors to make the lookups work.
We can't when the authoritative servers are broken.  It time the
users complained.


That's where I'm going with this, but specific information with a 
suggested fix is usually better than just pointing out that it's broken. 
Is it known what software and/or config causes this broken behavior?




It's PowerDNS 2.9.22 that is breaking this, and it will be fixed by 
PowerDNS 3.0 once that's released, and we get around to deploying it.

HTH!


Indeed it helps.  Thanks for the info  good luck with the upgrade.


Jay Ford, Network Engineering Group, Information Technology Services
University of Iowa, Iowa City, IA 52242
email: jay-f...@uiowa.edu, phone: 319-335-, fax: 319-335-2951
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


FORMERR for wikipedia...

2011-03-16 Thread Jay Ford

A recursive resolver of mine running BIND 9.7.3 logs many messages like:

   resolver: DNS format error from 208.80.152.130#53 resolving \
 en.wikipedia.org/ for client ::1#33887: invalid response
   lame-servers: error (FORMERR) resolving 'en.wikipedia.org//IN': \
 208.80.152.130#53

I see this for a variety of domains, including wikipedia.org, yahoodns.net,
officedepot.com,  staples.com.  I did some investigation, including sniffing
the DNS traffic.  The problematic case seems to be names which have CNAMEs to
names in other zones for which the queried record type doesn't exist.  For
example:

   en.wikipedia.org is a CNAME - text.wikimedia.org
   text.wikimedia.org is a CNAME - text.pmtpa.wikimedia.org
   text.pmtpa.wikimedia.org has an A record, but no , TXT...

A query for type= name=en.wikipedia.org returns:

   % dig -t  en.wikipedia.org

   ;  DiG 9.7.3  -t  en.wikipedia.org
   ;; global options: +cmd
   ;; Got answer:
   ;; -HEADER- opcode: QUERY, status: SERVFAIL, id: 45218
   ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0

   ;; QUESTION SECTION:
   ;en.wikipedia.org.  IN  

   ;; Query time: 229 msec
   ;; SERVER: ::1#53(::1)
   ;; WHEN: Wed Mar 16 11:34:08 2011
   ;; MSG SIZE  rcvd: 34

The response packet from the wikipedia/wikimedia DNS servers is:

   Internet Protocol, Src: 208.80.152.142 (208.80.152.142), \
  Dst: 128.255.204.16 (128.255.204.16)
   User Datagram Protocol, Src Port: 53 (53), Dst Port: 55497 (55497)
   Domain Name System (response)
   [Request In: 159]
   [Time: 0.061065000 seconds]
   Transaction ID: 0xd49c
   Flags: 0x8400 (Standard query response, No error)
   Questions: 1
   Answer RRs: 0
   Authority RRs: 1
   Additional RRs: 0
   Queries
   en.wikipedia.org: type , class IN
   Authoritative nameservers
   wikimedia.org: type SOA, class IN, mname ns0.wikimedia.org

so, basically:
   code NOERROR
   no answer
   authority citing wikimedia.org

NOERROR seems right, but it includes authority information for the zone of
the CNAME target without including the CNAME as an answer, amounting to a
mismatch between the original query  the cited authority.

Note that if I do an A query first, I get the CNAME via a correctly formed
response, after which the TXT   queries work, with the CNAME chain 
filled in from local cache.


To me it looks like BIND is doing the right thing (as usual ;^), but the 
wikipedia... servers are returning bogus responses.  Is this interpretation 
correct?  If so, does anybody know what apparently screwy DNS server or 
configuration causes this behavior?  I saw something similar with an F5 
installation here on campus briefly before I had the local folks fix it, but 
I'd like some confirmation that's what's going on with wikipedia... before I 
try to get them  others to fix it.  Further, if it's a systemic F5... 
problem, then a different approach is probably in order.



Jay Ford, Network Engineering Group, Information Technology Services
University of Iowa, Iowa City, IA 52242
email: jay-f...@uiowa.edu, phone: 319-335-, fax: 319-335-2951
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Advice wanted on Nameserver switchover

2011-03-15 Thread Jay Ford

On Tue, 15 Mar 2011, Stewart Dean wrote:

Have two questions about the switchover of our external nameservers:

I'll call the old nameservers oldns1, oldns2, offsitens and the new 
nameservers newns1 and newns2


So, you're replacing oldns1  oldns2 with newns1  newns2, while keeping
offsitens.  The master is currently oldns1  will be newns1.  The others are
slaves.  Yes?

I suggest:
   1. replace oldns2 with newns2
  a. configure newns2 how you want it, pretty much identical to oldns2
 but with different interface addresses; verify things work
  b. disconnect newns2 from the net
  c. change interface addresses of newns2 to those of oldns2
  d. disconnect oldns2 from the net
  e. connect newns2 to the net
  f. verify newns2 working: zone transfers, query resolution...

   2. replace oldns1 with newns1
  a. configure newns1 how you want it, pretty much identical to oldns1
 but with different interface addresses; verify things work
  b. disconnect newns1 from the net
  c. change interface addresses of newns1 to those of oldns1
  d. disconnect oldns1 from the net
  e. connect newns1 to the net
  f. verify newns1 working: zone transfers, query resolution...

   3. verify offsitens still works

No SOA changes, no whois fiddling, back-out 1 box at a time if necessary.

Regarding your idea of pointing whois information at name servers which
aren't live: don't do that.  DNS will probably handle it, but only after
dealing with the fact that 2 of the 5 servers don't work.  You'll see delays
 possibly failures.


Jay Ford, Network Engineering Group, Information Technology Services
University of Iowa, Iowa City, IA 52242
email: jay-f...@uiowa.edu, phone: 319-335-, fax: 319-335-2951
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: tools for searching/removing stale keys

2011-02-28 Thread Jay Ford

On Thu, 24 Feb 2011, Antonio Querubin wrote:
Has anyone come up with scripts/tools for removing stale zone-signing keys 
but leaving key-signing keys which are in the same directory alone?


Take a look at http://seatpost.its.uiowa.edu/bind_stuff/

It's a collection of scripts for dealing with routine DNS tasks related to 
multiple views  DNSSEC.  The check-keys script might be close to what 
you're after.



Jay Ford, Network Engineering Group, Information Technology Services
University of Iowa, Iowa City, IA 52242
email: jay-f...@uiowa.edu, phone: 319-335-, fax: 319-335-2951
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Some dnssec-signzone questions

2011-02-01 Thread Jay Ford

On Tue, 1 Feb 2011, Torinthiel wrote:

Third is about -N option:
a well established practice (although I don't know what was the origin) is
to set SOA serial number to eg 2011020101, which is current day and
two-digit of daily version. This has benefit of being almost as good as
putting unixtime of last modification, while being much more human-readable.
How difficult would it be to implement this for  dnssec-signzone -N, using a
fourth format specifier?


It's not hard.  See my bind-users post of Oct 15 with subject:
   more flexible serial number handling in dnssec-signzone

Since then I've quit using the serial number fiddling ability of
dnssec-signzone.  The problem is that it doesn't increment the serial number
in the unsigned file, so future uses of dnssec-signzone -N could result
with the same or even lower values.

Instead, I created a zap-serial tool to zap the serial number in place within
the unsigned zone file, either to a new literal value or incrementing the old
number.  My DNSSEC-related processes now zap the serial number before signing
with dnssec-signzone.  You can find the C source for zap-serial  some
possibly useful other DNSSEC-related scripts here (at least for now):
   http://seatpost.its.uiowa.edu/bind_stuff


Jay Ford, Network Engineering Group, Information Technology Services
University of Iowa, Iowa City, IA 52242
email: jay-f...@uiowa.edu, phone: 319-335-, fax: 319-335-2951
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Telling rndc Which IP Address to Use

2011-01-19 Thread Jay Ford

On Wed, 19 Jan 2011, Barry Finkel wrote:

I have a master DNS server that has two IP addresses - one used for
DNS and one used for non-DNS.  On that master I run rndc to load
zones on slave servers.  On the slave servers I have

   controls{
 inet a.b.c.d port 953
  allow {127.0.0.1; e.f.g.h; } keys { rndc-key';};
   }

Where e.f.g.h is the DNS address for the master server.  Is there a
way on the master to run rndc and tell rndc which IP address to use?
Or do I have to put the non-DNS address of the master in the controls
directive on the slaves.  I am running 9.7.2-P3.  Thanks.


Does the -b option not suffice?


Jay Ford, Network Engineering Group, Information Technology Services
University of Iowa, Iowa City, IA 52242
email: jay-f...@uiowa.edu, phone: 319-335-, fax: 319-335-2951
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Private Zones and Deligation bind9.7.2

2010-12-06 Thread Jay Ford

On Mon, 6 Dec 2010, Martin McCormick wrote:

the config for this private zone is:

zone r.ds {
type master;
file /etc/namedb/master/r.ds.zone;
   allow-update {
key updsrv;
};
   allow-query { any; };
#a list of slaves
include /etc/zoneconfigs/stwnotify;
notify yes;
};


You configured this server to be master for the r.ds zone, which tells this
server that it is authoritative for names in that zone.  If it gets a query
for a resource record in that zone which it doesn't know, it will answer
authoritatively with a negative answer (either NXDOMAIN if the name doesn't
exist at all, or NOERROR with no answer data if the name exists but not
with the queried type).  NS records in a zone don't cause an authoritative
server to send queries elsewhere, because the server knows the answer by
virtue of being authoritative for the zone.

The NS records you list will direct *other* resolvers which see those NS
records to send queries for names in r.ds to the targets of the NS records,
but any queries for names in r.ds which end up at your server will get
handled as described above.

What you probably want to do is add something like the following to the 
parent ds zone:

   r   IN  NS  stwrdc02.r.ds.
   IN  NS  stwrdc03.r.ds.
   stwrdc02.r  IN  A   192.168.1.1
   stwrdc03.r  IN  A   192.168.1.2
then get rid of the r.ds zone definition on your server.

Your subject line includes private.  What is it that's private about this
situation?


Jay Ford, Network Engineering Group, Information Technology Services
University of Iowa, Iowa City, IA 52242
email: jay-f...@uiowa.edu, phone: 319-335-, fax: 319-335-2951
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: how to see ALL NS records in a zone file with dig

2010-11-12 Thread Jay Ford

On Fri, 12 Nov 2010, M. Meadows wrote:
If I use dig NS domain name I know I will see the NS records for the 
domain. I know I can do the same thing for other RR types. In the case 
where a zone file has RR records that define delegation for subdomains why 
can't I use this dig command to see those delegations? I assume this is 
easy and it's just something I've forgotten how to do. Thanks for any help 
you can provide!


Try adding +norec to the dig command to disable recursion by the server:
   dig +norec -t ns name @server

That will get the NS records as known by the parent above the delegation cut, 
instead of the NS records as known by the child below the delegation cut. 
Differences in those sets can sometimes be, shall we say, interesting.



Jay Ford, Network Engineering Group, Information Technology Services
University of Iowa, Iowa City, IA 52242
email: jay-f...@uiowa.edu, phone: 319-335-, fax: 319-335-2951
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Multiple zones pointing to same zone file

2010-10-19 Thread Jay Ford

On Tue, 19 Oct 2010, John Wingenbach wrote:
I know that per Mark Andrews that named does not support having multiple 
zones pointing to the same zone file.  I can understand the issue if named 
does not support it for a slave server.  What about for a master server?  Are 
there any issues with named supporting that?


I would assume that whenever the zone file is changed, notifies for each zone 
utilizing that file would be sent out.  Is that correct?  Does named support 
that?  If not, are there any plans for named to support having multiple zones 
utilizing the same zone file?


I would prefer to make sure that we are using named in a supported fashion 
despite that it has been working this way. :)


support might a little strong, but it won't cause problems for non-dynamic
master zones like it will for slave zones.  Dynamic zones will break if 
you have them share files, just like slave zones will break.


Note that notifies are sent when the zone is (re)loaded, not when the 
associated file changes.  You'll have to reload each zone which is based on 
the file after you change the file.


This (along with other things) gets more interesting when you start signing
the zones for DNSSEC, but you might be able to play symlink games with the
unsigned file names to deal with that.


Jay Ford, Network Engineering Group, Information Technology Services
University of Iowa, Iowa City, IA 52242
email: jay-f...@uiowa.edu, phone: 319-335-, fax: 319-335-2951
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


more flexible serial number handling in dnssec-signzone

2010-10-15 Thread Jay Ford
I found myself in need of more flexibility in the way dnssec-signzone handled 
SOA serial numbers, so I hacked in a way to have the new serial number 
generated by calling strftime(3) with a user-specified time format.  For 
example

   dnssec-signzone -N '%Y%m%d1' ...
will generate a serial number of the form mmdd1 (e.g., 201010151).

The diff files for dnssec-signzone  its documentation relative to the
9.7.2-P2 version of BIND are available at (for now anyway):
   http://seatpost.its.uiowa.edu/bind_stuff

I'm a net guy not a programmer, so it's not the best code ever written  I
didn't increment any of the version headers, but it might be useful to some
anyway.

ISC folk:
   Please consider incorporating this or something similar into the stock
   dnssec-signzone.


Jay Ford, Network Engineering Group, Information Technology Services
University of Iowa, Iowa City, IA 52242
email: jay-f...@uiowa.edu, phone: 319-335-, fax: 319-335-2951
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: non-24 bit subnets

2010-10-06 Thread Jay Ford

On Wed, 6 Oct 2010, Alex McKenzie wrote:

Unfortunately, we do have need -- or at least a use -- to have smaller
subnets in multiple files, but without delegating authority.  The
problem is that some of those small subnets should have a shorter TTL,
or other settings changed.  If there's a way to change all the settings
by host in a single file, that would at least make that easier.


You could use one real zone file which is referenced by named.conf, with 
$INCLUDE directives in that zone file to pull in the parts of the zone from 
files containing the subsets you want.  A $TTL directive at the top of each 
small file should give you the variable TTL defaulting you want.



For larger subnets we can use multiple zones, but I'd hoped to avoid it
if possible.  It sounds from this like there isn't a way, though.


Right.


Jay Ford, Network Engineering Group, Information Technology Services
University of Iowa, Iowa City, IA 52242
email: jay-f...@uiowa.edu, phone: 319-335-, fax: 319-335-2951
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: non-24 bit subnets

2010-10-06 Thread Jay Ford

On Wed, 6 Oct 2010, Alex McKenzie wrote:

Out of curiosity:  what if it's a /16 or /8 network?  Do those also get
built as 24 bit files, or can they be built differently?  I seem to
recall seeing an option for a reverse lookup file with hosts declared as:

x.y PTR host.domain.tld.

Does that work, or was that an old format that's been deprecated, or
would it never have worked?


Sure, that works

For the /16 case, define the zone like b.a.in-addr.arpa  define records like
d.c PTR name. for address a.b.c.d.

For the /8 case, define the zone like a.in-addr.arpa  define records like
d.c.b PTR name. for address a.b.c.d.

Note the order of the address components in the zone file, with least
significant furthest left.


Jay Ford, Network Engineering Group, Information Technology Services
University of Iowa, Iowa City, IA 52242
email: jay-f...@uiowa.edu, phone: 319-335-, fax: 319-335-2951
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Recover deleted zone file

2010-10-05 Thread Jay Ford

On Tue, 5 Oct 2010, Jay Moore wrote:
I am running BIND 9.4.3-P1 on slackware  12.2.  The server is only for 
internal use.  I have accidentally removed one of my zone files, and I have 
no backup!  Is there a way to restore this zone file from the cache?  I 
looked at rndc and named options, but don't see anything that will help? 


Assuming zone transfers are allowed:
   dig -t axfr zone_name @127.0.0.1 rescued_zone_file


Jay Ford, Network Engineering Group, Information Technology Services
University of Iowa, Iowa City, IA 52242
email: jay-f...@uiowa.edu, phone: 319-335-, fax: 319-335-2951___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: Split View DNS

2010-03-11 Thread Jay Ford

On Thu, 11 Mar 2010, Matus UHLAR - fantomas wrote:

On 11.03.10 10:06, Jason Gates wrote:

When using split view, can one point to the same file in both views?


for master zones, yes, but you will have to reload it in all views
explicitly (I think that server reload should take care of that)


Right.  A server reload will load all zones in all views.  You can also 
reload individual zones in individual zones:

   rndc reload zone class view
such as:
   rndc reload example.com in internal
   rndc reload example.com in external
to load zone example com in view internal  zone example com in view
external.

For split zones with common data, I like to have a (usually small) zone file
for each view with the SOA RR  any view-specific data, each including a
(usually larger) file of data common to all views.  This avoids duplication
of data which are supposed to be the same  could otherwise get out of sync.
The common file doesn't have an SOA RR, so it's not a complete zone file, so
you have to refer to the view-specific files for the master files  when
doing named-checkzone.  (Pay attention to the origin in the included file,
explicitly specifying it with @ if the first RR applies to the bare zone
name.)

I use directories for managing the files in each view.  On the master:
   Primary.internal for internal view files
   Primary.external for external view files
   Primary.common for files common to both views
On the slave:
   Secondary.internal for internal backup files
   Secondary.external for external backup files
(There is no Secondary.common because the slave tranfers whole zones in each
view, having no knowledge of how the zones were assembled on the master.)


for slave zones, I'm afraid it's not possible. You will have either to fetch
it two times from the master, or fetch from one view to another one...


Yes, if you want slaves to have the same split-view behavior, they will need
to transfer the zones in all views independently.  I use special TSIG keys
for this: the slaves use the special key for the view they want to get from
the master, while the master uses the special key to present the
corresponding view.  It's a little complicated, but it does the trick for me.

Note that the zones in each view are independent of zones in other views,
even if they happen to have the same zone name.

The master files are just loaded by named  not messed with (unless you're
doing dynamic update, in which case what I'm saying might not apply).  Thus,
you can have multiple zones loaded from the same file on the master.  (This
applies to other cases than just split-view, such is if you want the same
data in multiple IPv6 prefixes because they're laid onto the same net.)

The backup files on the slaves are written by named, so each (zone,view)
instance has to have its own file.


Jay Ford, Network Engineering Group, Information Technology Services
University of Iowa, Iowa City, IA 52242
email: jay-f...@uiowa.edu, phone: 319-335-, fax: 319-335-2951
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Differences between 9.3 and later versions

2010-02-23 Thread Jay Ford

On Tue, 23 Feb 2010, jcarrol...@cfl.rr.com wrote:
Due to an security audit I have been given the task of upgrading our BIND 
from 9.3 to a new version (9.7 is preferred). Using the package from 
sunfreeware.com (Solaris 10/X86) the upgrade seem to work well. However, 
whenever someone tries to nslookup (or dig) an external site (i.e. cnn.com) 
they get REFUSED. If I back down to the 9.3 version all is well. I've tried 
to find what new security feature is required, but alas I can't seem to get 
it. What changes affect resolving outside sites?


The allow-query* options might be pertinent.


Jay Ford, Network Engineering Group, Information Technology Services
University of Iowa, Iowa City, IA 52242
email: jay-f...@uiowa.edu, phone: 319-335-, fax: 319-335-2951
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users