Re: Fully automated DNSSEC with BIND 9.16

2023-04-11 Thread Matthijs Mekking
Hello David, On 4/11/23 12:02, David Carvalho via bind-users wrote: Hello, hope everyone is fine. So it seems that going to Bind version 9.16 was the right call as it simplifies DNSSEC a lot. Nevertheless, I would like to clarify some things because our organization has a parent domain and

Fully automated DNSSEC with BIND 9.16

2023-04-11 Thread David Carvalho via bind-users
Hello, hope everyone is fine. So it seems that going to Bind version 9.16 was the right call as it simplifies DNSSEC a lot. Nevertheless, I would like to clarify some things because our organization has a parent domain and I host my own e-mail servers. I know they had problems while implementing

RE: Fully automated DNSSEC with BIND 9.16

2023-04-11 Thread David Carvalho via bind-users
Thank you so much! Regards David -Original Message- From: bind-users On Behalf Of Matthijs Mekking Sent: 11 April 2023 13:03 To: bind-users@lists.isc.org Subject: Re: Fully automated DNSSEC with BIND 9.16 On 4/11/23 13:14, David Carvalho wrote: > Hello and thank you so much for your

Re: Fully automated DNSSEC with BIND 9.16

2023-04-11 Thread Matthijs Mekking
On 4/11/23 13:14, David Carvalho wrote: Hello and thank you so much for your help. Regarding question 1, My version is 9.16-9.1623-0.9.el8...so I got the bug. No update available from Oracle Linux yet, so I'll create a folder and maintain a copy of those files there. In which situation should I

Does DNSSEC increased packet size reach end computers?

2023-04-11 Thread Bob Harold
I was in the process of setting up a test server with DNSSEC signed domains, and asking users to point at the test server to see if the larger packets affected their application, when I realized I might be wrong. DNS Resolvers will get bigger responses from DNS Authoritative servers because of

Re: Does DNSSEC increased packet size reach end computers?

2023-04-11 Thread Josh Kuo
You are correct. Normal stub resolvers on desktop clients or mobile devices only see the AD flag (or SERVFAIL when validation fails). They will only get all the additional DNSSEC record types if they used the +dnssec option in dig (which sets the DO bit in the outbound query). On Tue, Apr 11,

RE: Fully automated DNSSEC with BIND 9.16

2023-04-11 Thread David Carvalho via bind-users
Hello and thank you so much for your help. Regarding question 1, My version is 9.16-9.1623-0.9.el8...so I got the bug. No update available from Oracle Linux yet, so I'll create a folder and maintain a copy of those files there. In which situation should I be required to resend my key to the top

Re: Does DNSSEC increased packet size reach end computers?

2023-04-11 Thread Mark Andrews
There are some applications that will do DNSSEC. You should assume that any application may ask for DNSSEC records and that is normal. DNSSEC was designed from the very beginning to be validated in the application and only works fully when that is done. The recursive server still needs to

BIND operating in Parental Agent role (according to RFC 7344)?

2023-04-11 Thread Nick Tait via bind-users
Hi list. I'm currently running a few DNSSEC zones in BIND using dnssec-policy option, albeit with an unlimited lifetime on the KSK, so that I can control KSK roll-overs (which is necessary because my Registrar doesn't support RFC 7344)... Anyway I know that BIND supports RFC 7344 via