RE: Test, please ignore

2016-11-20 Thread Browne, Stuart
I dunno, at this rate someone's going to have to owe someone a beer or something. :P > From: bind-users [mailto:bind-users-boun...@lists.isc.org] On Behalf Of John > W. Blue > Sent: Monday, 21 November 2016 5:24 PM > To: bind-us...@isc.org > Subject: Re: Test, please ignore > > Ignoring level

RE: BIND 9 windows XP builds

2017-04-18 Thread Browne, Stuart
Which we can assume is the reason Evan raised the question in the first place. Stuart -Original Message- From: bind-users [mailto:bind-users-boun...@lists.isc.org] On Behalf Of Darcy Kevin (FCA) Sent: Wednesday, 19 April 2017 8:59 AM To: bind-users@lists.isc.org Subject: RE: BIND 9

Tuning suggestions for high-core-count Linux servers

2017-05-31 Thread Browne, Stuart
Hi, I've been able to get my hands on some rather nice servers with 2 x 12 core Intel CPU's and was wondering if anybody had any decent tuning tips to get BIND to respond at a faster rate. I'm seeing that pretty much cpu count beyond a single die doesn't get any real improvement. I understand

RE: [EXTERNAL] Re: Tuning suggestions for high-core-count Linux servers

2017-06-01 Thread Browne, Stuart
> -Original Message- > From: Plhu [mailto:p...@seznam.cz] > a few simple ideas to your tests: > - have you inspected the per-thread CPU? Aren't some of the threads > overloaded? I've tested both the auto-calculated values (one thread per available core) and explicitly overridden

RE: Tuning suggestions for high-core-count Linux servers

2017-06-01 Thread Browne, Stuart
> -Original Message- > From: Mathew Ian Eis [mailto:mathew@nau.edu] > > > Basically the math here is “large enough that you can queue up the > 9X.XXXth percentile of traffic bursts without dropping them, but not so > large that you waste processing time fiddling with the queue”.

Re: Tuning suggestions for high-core-count Linux servers

2017-06-02 Thread Browne, Stuart
Just some interesting investigation results. One of the URL's Matthew Ian Eis linked to talked about using a tool called 'perf'. For the hell of it, I gave it a shot. Sure enough it tells some very interesting things. When BIND was restricted to using a single NUMA node, the biggest call (to

RE: Tuning suggestions for high-core-count Linux servers

2017-06-01 Thread Browne, Stuart
2017 10:30 AM To: bind-users@lists.isc.org Cc: Browne, Stuart Subject: [EXTERNAL] Re: Tuning suggestions for high-core-count Linux servers 360k qps is actually quite good… the best I have heard of until now on EL was 180k [1]. There, it was recommended to manually tune the number of subthreads

RE: [EXTERNAL] Re: Tuning suggestions for high-core-count Linux servers

2017-06-04 Thread Browne, Stuart
Ugh, let me try that again (apologies if you got the half-composed version). > The lab uses Dell R430s running Fedora Core 23 with Intel X710 10GB NICs > and each populated with a single Xeon E5-2680 v3 2.5 GHz 12-core CPU. R630 chassis I believe, same NIC's, smaller processor

RE: Tuning suggestions for high-core-count Linux servers

2017-06-05 Thread Browne, Stuart
So, different tact today, namely the monitoring of '/proc/net/softnet_stat' to try reduce potential errors on the interface. End result: 517k qps. Final changes for the day: sysctl -w net.core.netdev_max_backlog=32768 sysctl -w net.core.netdev_budget=2700 /root/nic_balance.sh em1 0 2

BIND and ulimit's on Linux

2017-09-05 Thread Browne, Stuart via bind-users
Hi, Just a quick question. I've recently run in to another daemon (not associated with BIND) that inherited its 'nofile' ulimit before dropping privileges and was wanting to confirm that BIND doesn't work this way. On some of our servers (zone distribution points) where lots of AXFR's (over

RE: Stopping name server abuse

2018-06-24 Thread Browne, Stuart via bind-users
If the incoming query has already been parsed and it BIND instance now knows it doesn't need to respond, it's already done all the work, so there's no point not sending the response. To introduce something before the BIND instance in userspace, then for every legitimate query you are

RE: named tcp dos?

2018-08-02 Thread Browne, Stuart via bind-users
> -Original Message- > From: bind-users [mailto:bind-users-boun...@lists.isc.org] On Behalf Of > Randy Bush > Sent: Friday, 3 August 2018 6:08 AM > > >> ... are there that many folk doing tcp out there? > > All name servers fall back to TCP when they receive truncated replies. > > we

RE: Authoritative dns with private IP for hostname

2018-07-30 Thread Browne, Stuart via bind-users
Be wary of DNAME's; they can be quite limited. Here's an example from our old system: internal. 3600IN SOA mgmt1.mel.internal.local. sysadmin.external.com.au. 2014051201 28800 14400 360 86400 internal. 3600IN NS mgmt1.mel.internal.local. internal. 3600IN

'tsig-keygen' vs 'dnssec-keygen' - keysize

2018-09-04 Thread Browne, Stuart via bind-users
Was adding in some new internal functionality and noted that the 'tsig-keygen' tool doesn't give the ability to alter the keysize like dnssec-keygen does for generating HMAC based tsig keys. I also noticed that in 9.13, dnssec-keygen will no longer be able to generate HMAC tsig's, so I'm

RE: 'tsig-keygen' vs 'dnssec-keygen' - keysize

2018-09-05 Thread Browne, Stuart via bind-users
2018 3:40 PM > To: Browne, Stuart > Cc: bind-users@lists.isc.org > Subject: Re: 'tsig-keygen' vs 'dnssec-keygen' - keysize > > > > On 5 Sep 2018, at 2:50 pm, Browne, Stuart via bind-users us...@lists.isc.org> wrote: > > > > Was adding in some new internal fun

RE: [BIND] RE: KSK Rollover

2018-09-06 Thread Browne, Stuart via bind-users
The kicker was probably this line: Sep 6 15:44:40 ns3 audit: { write } for pid=15447 comm="named" name="named.secroots" dev="dm-0" ino=135707451 scontext=system_u:system_r:named_t:s0 tcontext=unconfined_u:object_r:etc_t:s0 tclass=file permissive=0 The SELinux context that BIND runs in on a

RE: 'tsig-keygen' vs 'dnssec-keygen' - keysize

2018-09-06 Thread Browne, Stuart via bind-users
> -Original Message- > From: Evan Hunt [mailto:e...@isc.org] > Sent: Thursday, 6 September 2018 4:35 PM > To: Browne, Stuart > Cc: Mark Andrews; bind-users@lists.isc.org > Subject: Re: 'tsig-keygen' vs 'dnssec-keygen' - keysize > > > Is there no crypt

RE: Logrotate for bind9

2018-07-05 Thread Browne, Stuart via bind-users
How about a clear, direct example of using external service 'logrotate' (this is from one of my redhat systems, but the same concept applies to Ubuntu/Debian): [be...@dns-nomnom1.den ~]$ cat /etc/logrotate.d/named /var/log/named/*.log { compress create 0644 named named daily dateext

RE: Stealth NS records

2018-04-03 Thread Browne, Stuart via bind-users
A number of places use a 'stealth' (or 'hidden') master as a bit of protection from potential bad actors. It's a network domain barrier between the master (usually on an internal-only network) from a public network with potential bad actors. For example, a dynamic update for a zone will

RE: Handling expired domains

2018-06-28 Thread Browne, Stuart via bind-users
Assuming the slave can retrieve the SOA and zone, yup. It should just come right back online. Stuart From: bind-users [mailto:bind-users-boun...@lists.isc.org] On Behalf Of rohan.henry cwjamaica.com Sent: Friday, 29 June 2018 8:48 AM To: bind-users@lists.isc.org Subject: Handling expired

RE: concurrent-session

2018-11-01 Thread Browne, Stuart via bind-users
It does depend somewhat on what you mean by concurrent sessions. Do you mean incoming queries? Do you mean incoming zone transfers? Do you mean outgoing zone transfers? Each is a different tunable. Ultimately, system-wide file descriptor limits do come in to play, but the zone transfers listed

RE: BIND and UDP tuning

2018-09-30 Thread Browne, Stuart via bind-users
> -Original Message- > From: bind-users On Behalf Of Alex > I'm leaning towards that, too. The problem persists even when using > the provider's DNS servers. I thought for sure I'd see some verifiable > info from other people having problems with cable, such as from > dslreports, etc,

RE: Beginner - Bind - Bad dotted quad

2018-09-23 Thread Browne, Stuart via bind-users
>From my reading of the error message and the zone data provided, they don't >match. The error is stating near db.fin line 17 that the label is 'hp4000.' (note the full-stop); this doesn't appear to be the case with the pasted data. Did you modify the zone data before pasting it in (i.e. mask

RE: BIND and UDP tuning

2018-09-26 Thread Browne, Stuart via bind-users
> -Original Message- > From: bind-users [mailto:bind-users-boun...@lists.isc.org] On Behalf Of > Alex > Sent: Thursday, 27 September 2018 2:52 AM > To: bind-users@lists.isc.org > Subject: BIND and UDP tuning > > Hi, > > I reported a few weeks ago that I was experiencing a really high >

RE: BIND and UDP tuning

2018-09-27 Thread Browne, Stuart via bind-users
> -Original Message- > From: Tony Finch [mailto:d...@dotat.at] > > > - { name: 'net.ipv4.tcp_sack', value: 0 } > > Why? SACK is super important for TCP performance over links that have any > degree of lossiness, and I don't recall hearing of any caveats. > > Tony. > -- >

Views, Match-Destination, Alternate Ports

2018-12-05 Thread Browne, Stuart via bind-users
Hi, Whilst I've confirmed that notifies can be sent to alternate ports (using masters definitions), I can't seem to mangle BIND to use an alternate port in a view's match-destination configuration item (as it takes an ACL and they don't take ports from what I can read/test). Am I missing

BIND and persistent connections

2018-12-18 Thread Browne, Stuart via bind-users
Hi, I noticed that over the last few days on a number of our name servers in Tokyo that Google has started making persistent TCP connections to our name servers. I'm all for this as a concept, but it appears they're making many thousands of connections and not tearing them down after any given

RE: what is this python stuff in 9.11.7 ??

2019-05-30 Thread Browne, Stuart via bind-users
Maybe to state a little clearer; the dnssec-keymgr is for the automation of creation and date management of keys. All of the actual signing does not require the new python bit. If you're happy managing your keys with dnssec-keygen and dnssec-settime, you can continue using those (non-python)

RE: Bind9 stops responding for some clients

2019-05-30 Thread Browne, Stuart via bind-users
Whilst you mentioned 150 seats and you mentioned 'no firewalls', you didn't mention the network topology at all, in particular is traffic passing through a commercial firewall/router (hardware or virtualized) to get to the DNS server? If there is, it may be worth checking what packet inspection

RE: Bind9 stops responding for some clients

2019-06-06 Thread Browne, Stuart via bind-users
Congratulations on finding the cause. Sometimes, it's the simplest of things. Stuart From: bind-users [mailto:bind-users-boun...@lists.isc.org] On Behalf Of Gregory Sloop Sent: Thursday, 6 June 2019 12:37 PM To: bind-users@lists.isc.org Subject: Re: Bind9 stops responding for some clients

RE: A policy for removing named.conf options.

2019-06-13 Thread Browne, Stuart via bind-users
> -Original Message- > From: bind-users [mailto:bind-users-boun...@lists.isc.org] On Behalf Of > Evan Hunt > Sent: Friday, 14 June 2019 5:40 AM > To: Warren Kumari > Cc: Ondřej Surý; comp-protocols-dns-b...@isc.org > Subject: Re: A policy for removing named.conf options. > > On Thu,

RE: SERVFAIL when looking up TXT from particular domain

2019-06-26 Thread Browne, Stuart via bind-users
Trying with +cd, +noedns and +tcp elicits a similar result; a SERVFAIL. As these work fine if querying the authoritative servers directly (or using +trace), it appears to be a quirk in the resolver code. Stuart > -Original Message- > From: bind-users

RE: BIND and persistent connections

2019-11-14 Thread Browne, Stuart via bind-users
Not sure if I responded to this last year, but thanks. Stuart > -Original Message- > From: Tony Finch [mailto:d...@dotat.at] > Sent: Wednesday, 19 December 2018 10:26 PM > To: Browne, Stuart > Cc: bind-users@lists.isc.org > Subject: Re: BIND and persistent connections &

RE: Bind 9.14 and bind-tools 9.16

2020-03-01 Thread Browne, Stuart via bind-users
It looks to me as if you are trying to generate a TSIG key for DNS updates. Try using "tsig-keygen" instead. Stuart > -Original Message- > From: bind-users [mailto:bind-users-boun...@lists.isc.org] On Behalf Of > @lbutlr > Sent: Monday, 2 March 2020 1:13 PM > To: bind-users > Subject:

RE: DNSSEC zones not updated

2020-01-22 Thread Browne, Stuart via bind-users
Sadly, no ideas other than a shared experience. It's not just the Windows release nor is it just the 9.14 series of releases; we've been witnessing this since the 9.10 releases on Linux (whilst using inline-signing). I don't recall off the top of my head if we saw it in the 9.9 series; even for

Re: DoH plugin for BIND

2020-05-05 Thread Browne, Stuart via bind-users
On 6/5/20, 02:21, "bind-users on behalf of Chuck Aurora" wrote: On 2020-05-02 14:35, Reindl Harald wrote: > Am 02.05.20 um 21:31 schrieb Chuck Aurora: >> On 2020-05-02 13:23, Erich Eckner wrote: >>> Will there be client-side DoT/DoH support in bind, too? E.g. will my >>>

Re: queries for external hostnames inside my domain?

2020-09-07 Thread Browne, Stuart via bind-users
You might want to look at the requestor machine's "search" domains. If the stub resolver starts appending search domains when it doesn't get a response it can use. Stuart On 8/9/20, 09:51, "bind-users on behalf of L. A. Walsh" wrote: Notice: This email is from an external sender.

Re: Request for review of performance advice

2020-07-07 Thread Browne, Stuart via bind-users
Just one quick one before I run off to lunch with regards to section 2: - Try to avoid crossing NUMA boundaries. At high throughput, the context switching and far memory calls kills performance. Stuart From: bind-users on behalf of Victoria Risk Date: Wednesday, 8 July 2020 at 11:58 To: