Re: [SOLVED?] BIND: managed-keys-zone: Unable to fetch DNSKEY set '.': timed out

2023-03-13 Thread Casey Deccio
> On Mar 13, 2023, at 4:14 PM, local10 wrote: > > Mar 13, 2023, 21:42 by recovery...@enotuniq.net: > >> Well, it was worth to check it. >> >> >> Next idea is somewhat more complicated. >> >> Install tcpdump. >> Run: >> tcpdump -pni any -s0 -w /tmp/dns.pcap -c 30 udp port 53 or tcp port 53

Re: BIND: managed-keys-zone: Unable to fetch DNSKEY set '.': timed out

2023-03-13 Thread Casey Deccio
> On Mar 13, 2023, at 12:08 AM, local10 wrote: > > I have a local caching DNS server that was working fine for a long time but > today, all of a sudden, it stopped resolving queries. > > More info: https://pastebin.com/iW5YeXgS > > Any ideas? Thanks Based on what I saw in the logs, your

Re: locating blocked port

2023-01-31 Thread Casey Deccio
> On Jan 31, 2023, at 8:05 AM, Haines Brown wrote: > > I have an application that refuses to start because its port is > blocked. But I have difficulty knowing what port it is I would try strace, which shows you all system calls being made. In this case, it is probably bind() that is

Re: locating blocked port

2023-01-31 Thread Casey Deccio
> On Jan 31, 2023, at 8:05 AM, Haines Brown wrote: > > I have an application that refuses to start because its port is > blocked. But I have difficulty knowing what port it is I would try strace, which shows you all system calls being made. In this case, it is probably bind() that is

Re: DNSSEC working but SSHFP reported as insecure

2022-12-04 Thread Casey Deccio
> On Dec 3, 2022, at 12:37 PM, Andre Rodier wrote: > > On Sat, 2022-12-03 at 12:09 -0700, Casey Deccio wrote: >> >> It could be that your default DNS resolver is not validating. ssh simply >> looks at the result of the DNSSEC validation >> provided by your

Re: DNSSEC working but SSHFP reported as insecure

2022-12-03 Thread Casey Deccio
> On Dec 3, 2022, at 9:22 AM, Andre Rodier wrote: > >> ssh -o VerifyHostKeyDNS=yes main.homebox.world > > Yes, this is the default option in my ssh/config file. > > I tried on the command line as well, but same result: It could be that your default DNS resolver is not validating. ssh

Re: DNSSEC working but SSHFP reported as insecure

2022-12-03 Thread Casey Deccio
> On Dec 3, 2022, at 8:30 AM, Andre Rodier wrote: > > Where am I making a mistake, please ? The DNSSEC looks fine. That is, there is a secure chain from the root to the SSHFP record (see below). Have you tried adding the VerifyHostKeyDNS=yes option? ssh -o VerifyHostKeyDNS=yes

Re: Bug - remote DNS monitoring

2022-09-13 Thread Casey Deccio
> On Aug 30, 2022, at 1:12 PM, Casey Deccio wrote: > > I am having trouble tracking down a bug in my monitoring setup. It all > happened when I upgraded the monitored host (host B in my example below) to > bullseye. Note that Host A is also running bullseye, but the problem

Re: TCP: tcp_parse_options: Illegal window scaling value 15 > 14 received

2022-09-07 Thread Casey Deccio
> On Sep 7, 2022, at 12:41 PM, Jim Popovitch wrote: > > On Wed, 2022-09-07 at 12:37 -0600, Casey Deccio wrote: >> >>> On Sep 7, 2022, at 11:46 AM, Jim Popovitch >> <mailto:j...@k4vqc.com>> wrote: >>> >>> I saw some much of the v

Re: TCP: tcp_parse_options: Illegal window scaling value 15 > 14 received

2022-09-07 Thread Casey Deccio
> On Sep 7, 2022, at 11:46 AM, Jim Popovitch wrote: > > I saw some much of the verbose '15 > 14' logs that I just decided to > net.ipv4.tcp_window_scaling=0 and be done with it. Cleared up the > noise, haven't noticed any problems since. ymmv. Sounds like you've seen a non-trivial amount of

Re: net.ipv6.conf.intf.disable_ipv6 behavior changes

2022-09-07 Thread Casey Deccio
> On Sep 3, 2022, at 7:30 PM, Kevin Price wrote: > > Am 03.09.22 um 06:32 schrieb Casey Deccio: >>> On Sep 2, 2022, at 8:14 PM, Kevin Price wrote > >>> We got him. :) Casey, you file the bug report, Okay? > >> Done! https://bugs.debian.org/cgi-

Re: TCP: tcp_parse_options: Illegal window scaling value 15 > 14 received

2022-09-07 Thread Casey Deccio
Hi Michael, > On Sep 7, 2022, at 5:49 AM, Michael Grant wrote: > > I'm seeing this error over and over in /var/log/messages: > > Sep 6 05:02:42 hostname kernel: [408794.655182] TCP: tcp_parse_options: > Illegal window scaling value 15 > 14 received > Sep 6 05:02:43 hostname kernel:

Re: net.ipv6.conf.intf.disable_ipv6 behavior changes

2022-09-02 Thread Casey Deccio
> On Sep 2, 2022, at 8:14 PM, Kevin Price wrote: > > Am 03.09.22 um 02:15 schrieb Kevin Price: >> Let's double check whether our connman is in fact the culprit, and then >> make arrest. (file bug report) > > We got him. :) Casey, you file the bug report, Okay? Done!

Re: net.ipv6.conf.intf.disable_ipv6 behavior changes

2022-09-02 Thread Casey Deccio
> On Sep 2, 2022, at 1:05 PM, Kevin Price wrote: > > I suspect your "very little customization" (since you're doing > networking stuff) or the "VBox Guest Additions" (since they mess with > network interfaces). In order to test this, I used > debian-11.3.0-amd64-netinst.iso from the archive to

Re: net.ipv6.conf.intf.disable_ipv6 behavior changes

2022-09-02 Thread Casey Deccio
> On Sep 2, 2022, at 2:51 AM, Kevin Price wrote: > > Am 02.09.22 um 06:33 schrieb Casey Deccio: >> 1) a sanity check (can others confirm the behavior discrepancy?); > > No. My 5.10.0-17 behaves like your 5.10.0-13. Thanks so much for checking! > 2) an expectati

Re: net.ipv6.conf.intf.disable_ipv6 behavior changes

2022-09-01 Thread Casey Deccio
> On Sep 1, 2022, at 10:33 PM, Casey Deccio wrote: > > I've come across some unexpected changes in interface behavior between > linux-image-5.10.0-13-amd64 and linux-image-5.10.0-17-amd64. > Relatedly, there is this behavior change: linux-image-5.10.0-13-amd64: $ sudo ip

net.ipv6.conf.intf.disable_ipv6 behavior changes

2022-09-01 Thread Casey Deccio
I've come across some unexpected changes in interface behavior between linux-image-5.10.0-13-amd64 and linux-image-5.10.0-17-amd64. Consider the following script: $ cat test.sh #!/bin/sh sudo ip link add test1 type veth peer test2 sudo ip link set test1 down sudo ip link set test2 down sudo

Re: Bug - remote DNS monitoring

2022-08-30 Thread Casey Deccio
> On Aug 30, 2022, at 1:40 PM, Nicholas Geovanis wrote: > > When you run check_dns by hand on Host B, you don't say who you are logged-in > as. That can make a difference. Nagios runs its scripts in a known > environment which may be different than you expect. > Thanks for the question. I

Bug - remote DNS monitoring

2022-08-30 Thread Casey Deccio
Hi all, I am having trouble tracking down a bug in my monitoring setup. It all happened when I upgraded the monitored host (host B in my example below) to bullseye. Note that Host A is also running bullseye, but the problem didn't show itself until Host B was upgraded. Here is the setup:

stty settings

2008-05-06 Thread Casey Deccio
I would like to pipe raw straight data through a terminal without any special characters, null character conversion, carriage return/newline conversion, or echo. 'stty raw' and 'stty sane' seem to approach this, but not exactly. Before I start guessing more with all the individual options in