Re: 9.11 can't validate sss.gov

2018-01-22 Thread Grant Taylor via bind-users

On 01/22/2018 09:21 AM, Warren Kumari wrote:
http://www.sss.gov works OK, but http://sss.gov always seems to return 
"The requested service is temporarily unavailable. It is either overloaded 
or under maintenance. Please try later.".


Inconsistency between related things is annoying.

I guess props for consistently returning different things.

There is a fair bit os disagreement over if a bare domain should resolve 
/ have a web-server listening, but ISTM that if you do, you should have 
it work


I agree that this (at the very least) violates (what I consider to be) 
reasonable expectation and surprises users.


I'm of the opinion that if you have www.sss.gov and sss.gov, that they 
should behave in very similar and related ways.  -  My personal 
preference would be for sss.gov to 30[1267] redirect to www.sss.gov. 
Ideally any non-HTTPS to HTTPS.


I wonder how many people have tried the bare domain and never realized 
that adding in the 'www' "fixes" it.


I expect that there are a lot more than we may think.



--
Grant. . . .
unix || die



smime.p7s
Description: S/MIME Cryptographic Signature
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: 9.11 can't validate sss.gov

2018-01-22 Thread Warren Kumari
Unrelated to the DNS bit, but still silly / annoying:

http://www.sss.gov works OK, but http://sss.gov always seems to return
"The requested service is temporarily unavailable. It is either
overloaded or under maintenance. Please try later.".

There is a fair bit os disagreement over if a bare domain should
resolve / have a web-server listening, but ISTM that if you *do*, you
should have it work -- I wonder how many people have tried the bare
domain and never realized that adding in the 'www' "fixes" it.

W

On Mon, Jan 22, 2018 at 11:08 AM, Timothy A. Holtzen
 wrote:
> I've informed the selective service (sss.gov) of the issue.  They have
> supposedly passed it on to their "web support group".  We will see if
> anything happens but I'm not holding my breath.  At least a government
> agency should have more influence to get qwest to fix their servers than
> I do.
>
> Timothy A. Holtzen
> Campus Network Administrator
> Nebraska Wesleyan University
> Public PGP key CFB4 3AE8 B726 DEBF 00D9  CCFC 426E 76AF DABC B3D7
>
>
> On 01/19/2018 05:04 PM, Mark Andrews wrote:
>> Yes, qwest were informed years ago that there severs are broken. Report this 
>> to the .gov site operators.  The servers return BADVERS to the queries which 
>> was never part of the EDNS spec and is a invention of the servers 
>> developers. FORMERR was permissible by STD13  but this was tightened when 
>> the EDNS spec was revised to say ignore unknown EDNS options.
>>
>
>
>
> ___
> Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
> from this list
>
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users



-- 
I don't think the execution is relevant when it was obviously a bad
idea in the first place.
This is like putting rabid weasels in your pants, and later expressing
regret at having chosen those particular rabid weasels and that pair
of pants.
   ---maf
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: 9.11 can't validate sss.gov

2018-01-22 Thread Timothy A. Holtzen
I've informed the selective service (sss.gov) of the issue.  They have
supposedly passed it on to their "web support group".  We will see if
anything happens but I'm not holding my breath.  At least a government
agency should have more influence to get qwest to fix their servers than
I do.

Timothy A. Holtzen
Campus Network Administrator
Nebraska Wesleyan University
Public PGP key CFB4 3AE8 B726 DEBF 00D9  CCFC 426E 76AF DABC B3D7


On 01/19/2018 05:04 PM, Mark Andrews wrote:
> Yes, qwest were informed years ago that there severs are broken. Report this 
> to the .gov site operators.  The servers return BADVERS to the queries which 
> was never part of the EDNS spec and is a invention of the servers developers. 
> FORMERR was permissible by STD13  but this was tightened when the EDNS spec 
> was revised to say ignore unknown EDNS options. 
>




signature.asc
Description: OpenPGP digital signature
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: 9.11 can't validate sss.gov

2018-01-19 Thread Mark Andrews
Yes, qwest were informed years ago that there severs are broken. Report this to 
the .gov site operators.  The servers return BADVERS to the queries which was 
never part of the EDNS spec and is a invention of the servers developers. 
FORMERR was permissible by STD13  but this was tightened when the EDNS spec was 
revised to say ignore unknown EDNS options. 

-- 
Mark Andrews

> On 20 Jan 2018, at 03:39, Tony Finch  wrote:
> 
> Timothy A. Holtzen  wrote:
> 
>> I've run into an odd problem.  On the same host with nearly identical
>> configurations.  Bind 9.10.6 can resolve and DNSSEC validate sss.gov but
>> Bind 9.11.2 cannot.
> 
> Ah, this is because sss.gov is hosted on Qwest's DNS servers that have
> broken EDNS logic which is incompatible with DNS cookies.
> 
> I have a short script (quoted below) which generates a blacklist of broken
> servers which is included in my `named.conf`.
> 
> The number of problem reports I've received is mercifully small - Qwest
> are the worst cookie offenders.
> 
> 
> 
> #!/bin/sh
> 
> set -eu
> 
> noedns=roles/named/files/named.conf.noedns
> 
> : >$noedns
> 
> # qwest - bea.gov
> # barclays - myapplication.international.barclays.com
> 
> for s insauthns1.qwest.net. \
>sauthns2.qwest.net. \
>ns21.barclays.com. \
>ns22.barclays.net. \
>ns23.barclays.com. \
>ns24.barclays.net.
> do
>dig +noall +nottl +noclass +answer $s a $s 
> done |
> sort |
> while   read s t a
> do  echo "server $a { send-cookie no; }; # $s"
> done>>$noedns
> 
> 
> 
> Tony.
> -- 
> f.anthony.n.finchhttp://dotat.at/  -  I xn--zr8h punycode
> Hebrides, Bailey, Fair Isle, Faeroes, Southeast Iceland: Cyclonic 4 or 5,
> occasionally 6 in Hebrides, Bailey and Southeast Iceland. Moderate or rough,
> occasionally very rough in Hebrides and Bailey. Wintry showers. Good,
> occasionally poor.
> ___
> Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
> from this list
> 
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: 9.11 can't validate sss.gov

2018-01-19 Thread Tony Finch
Timothy A. Holtzen  wrote:

> I've run into an odd problem.  On the same host with nearly identical
> configurations.  Bind 9.10.6 can resolve and DNSSEC validate sss.gov but
> Bind 9.11.2 cannot.

Ah, this is because sss.gov is hosted on Qwest's DNS servers that have
broken EDNS logic which is incompatible with DNS cookies.

I have a short script (quoted below) which generates a blacklist of broken
servers which is included in my `named.conf`.

The number of problem reports I've received is mercifully small - Qwest
are the worst cookie offenders.



#!/bin/sh

set -eu

noedns=roles/named/files/named.conf.noedns

: >$noedns

# qwest - bea.gov
# barclays - myapplication.international.barclays.com

for s insauthns1.qwest.net. \
sauthns2.qwest.net. \
ns21.barclays.com. \
ns22.barclays.net. \
ns23.barclays.com. \
ns24.barclays.net.
do
dig +noall +nottl +noclass +answer $s a $s 
done |
sort |
while   read s t a
do  echo "server $a { send-cookie no; }; # $s"
done>>$noedns



Tony.
-- 
f.anthony.n.finchhttp://dotat.at/  -  I xn--zr8h punycode
Hebrides, Bailey, Fair Isle, Faeroes, Southeast Iceland: Cyclonic 4 or 5,
occasionally 6 in Hebrides, Bailey and Southeast Iceland. Moderate or rough,
occasionally very rough in Hebrides and Bailey. Wintry showers. Good,
occasionally poor.___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

9.11 can't validate sss.gov

2018-01-19 Thread Timothy A. Holtzen
I've run into an odd problem.  On the same host with nearly identical
configurations.  Bind 9.10.6 can resolve and DNSSEC validate sss.gov but
Bind 9.11.2 cannot.  If I turn off DNSSEC validation 9.11.2 resolves it
just fine.  According to http://dnsviz.net/d/sss.gov/dnssec/ it looks
like the the domain is properly signed and valid.  I get the following
in the log when validation fails.

Jan 19 09:26:20 stout named[11872]: dnssec: debug 3: validating
sss.gov/A: starting
Jan 19 09:26:20 stout named[11872]: dnssec: debug 3: validating
sss.gov/A: attempting insecurity proof
Jan 19 09:26:20 stout named[11872]: dnssec: debug 3: validating
sss.gov/A: checking existence of DS at 'gov'
Jan 19 09:26:20 stout named[11872]: dnssec: debug 3: validating
sss.gov/A: checking existence of DS at 'sss.gov'
Jan 19 09:26:20 stout named[11872]: dnssec: debug 3: validating
sss.gov/A: insecurity proof failed
Jan 19 09:26:20 stout named[11872]: validating sss.gov/A: got insecure
response; parent indicates it should be secure
Jan 19 09:26:20 stout named[11872]: dnssec: info: validating sss.gov/A:
got insecure response; parent indicates it should be secure
Jan 19 09:26:20 stout named[11872]: insecurity proof failed resolving
'sss.gov/A/IN': 2001:428::7#53
Jan 19 09:26:20 stout named[11872]: client @0x7fa6ec5ef6d0
10.9.2.18#39295 (sss.gov): view internal: query: sss.gov IN A +E(0)
(10.1.1.5)
Jan 19 09:26:21 stout named[11872]: dnssec: debug 3: validating
sss.gov/A: starting
Jan 19 09:26:21 stout named[11872]: dnssec: debug 3: validating
sss.gov/A: attempting insecurity proof
Jan 19 09:26:21 stout named[11872]: dnssec: debug 3: validating
sss.gov/A: checking existence of DS at 'gov'
Jan 19 09:26:21 stout named[11872]: dnssec: debug 3: validating
sss.gov/A: checking existence of DS at 'sss.gov'
Jan 19 09:26:21 stout named[11872]: dnssec: debug 3: validating
sss.gov/A: insecurity proof failed
Jan 19 09:26:21 stout named[11872]: validating sss.gov/A: got insecure
response; parent indicates it should be secure
Jan 19 09:26:21 stout named[11872]: dnssec: info: validating sss.gov/A:
got insecure response; parent indicates it should be secure
Jan 19 09:26:21 stout named[11872]: insecurity proof failed resolving
'sss.gov/A/IN': 63.150.72.5#53
Jan 19 09:26:23 stout named[11872]: client @0x7fa725012090
2606:1c00:2802:9::6#40869 (sss.gov): view internal: query failed
(SERVFAIL) for sss.gov/IN/A at query.c:8302
Jan 19 09:26:23 stout named[11872]: client @0x7fa728a30e50
10.9.2.18#39295 (sss.gov): view internal: query failed (SERVFAIL) for
sss.gov/IN/A at query.c:8302

Oddly enough other signed domains seem to validate correctly.  What
might have changed between 9.10 and 9.11?  I'm guessing that 9.11 is
probably more closely requiring some kind of standard conformance and
sss.gov is maybe not conforming completely.

Any thoughts?

It is kind of important for us.  As a University we are required to
verify that our students are properly registered with the selective
service(sss.gov).

-- 

Timothy A. Holtzen
Campus Network Administrator
Nebraska Wesleyan University
Public PGP key CFB4 3AE8 B726 DEBF 00D9  CCFC 426E 76AF DABC B3D7





signature.asc
Description: OpenPGP digital signature
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users