Re: [dns-operations] Route 53 Unexpected geo location behavior

2023-06-12 Thread Dave Lawrence
Dan McCombs via dns-operations writes: > Ah, yes, so in this case the addresses given back when no edns > subnet is provided are the addresses of servers in eu-west, whereas > with the resolver's own IP (or /24 subnet, or the subnet of clients > querying it) as the edns subnet gets more expected

Re: [dns-operations] [DNSOP] bind fails to continue recursing on one specific query

2023-03-29 Thread Dave Lawrence
Peter DeVries via dns-operations writes: > Another relevant draft: > https://datatracker.ietf.org/doc/html/rfc8906 > > Not sure how, it doesn't address _. as a use case at all and I only > see testing for minimal EDNS not minimal qname. The journey of that document was with, essentially,

Re: [dns-operations] [DNSOP] bind fails to continue recursing on one specific query

2023-03-28 Thread Dave Lawrence
Peter DeVries via dns-operations writes: > We almost blocked these because we didn't know what they were but then > I stumbled upon one of the old RFC drafts for query minimization and > it does mention this as a technique. Why would you drop them if you had not stumbled on the old draft? It is

Re: [dns-operations] Name servers returning incorrectly truncated UDP responses

2022-07-30 Thread Dave Lawrence
Puneet Sood writes: > Jaap up-thread used fpdns to figure out the first question. > fingerprint (e.ns.email.sonyentertainmentnetwork.com, 207.251.96.133): DJ > Bernstein TinyDNS 1.05 [Old Rules] Subtle correction: to figure out one possible answer to the first question.

Re: [dns-operations] Name servers returning incorrectly truncated UDP responses

2022-07-30 Thread Dave Lawrence
Greg Choules via dns-operations writes: > I am including in this mail the RNAME from the SOA (same for both > zones) in the hope that someone who is responsible for DNS at Sony > entertainment will see this and take note. And tell us what in the world DNS software they're running, and why they

Re: [dns-operations] How should work name resolution on a modern system?

2022-06-15 Thread Dave Lawrence via dns-operations
--- Begin Message --- Vix said: > https://www.icann.org/en/system/files/files/sac-053-en.pdf Yep, thanks for bringing it up. Genuinely appreciated. I'm aware "SSAC also recommends that the use of DNS resource records such as A, , and MX in the apex of a TopLevel Domain (TLD) be

Re: [dns-operations] How should work name resolution on a modern system?

2022-06-15 Thread Dave Lawrence
Viktor Dukhovni writes: > Single label names passed to getaddrinfo(3) should not result in single > label "A" or "" DNS queries. http://ai./ Admittedly a rarity, and in general problematic in other contexts. My own corporate VPN won't even allow a proper DNS lookup of it (or any address

Re: [dns-operations] Input from dns-operations on NCAP proposal

2022-06-07 Thread Dave Lawrence
Dave Lawrence via dns-operations writes: > I accept that the only way to really capture > all of these queries into the global DNS is via a delegation, Brian Dickson reminded me of his CNAME proposal earlier in the thread, and I think that is also an approach worth further investi

Re: [dns-operations] Input from dns-operations on NCAP proposal

2022-06-06 Thread Dave Lawrence via dns-operations
--- Begin Message --- Vladimír Čunát writes: > If the root zone is unchanged, many names could be hidden before > reaching root servers - by DNSSEC aggressive caching and/or various > local-root variants.  (I'm not sure if we can well measure the extent to > which this happens.) That's an

Re: [dns-operations] Input from dns-operations on NCAP proposal

2022-06-06 Thread Dave Lawrence
John R Levine writes: > Unfortunately, now we've circled back to where we started. Remember that > the NC in NCAP stands for Name Collision, and the whole point of the > project is to figure out how risky it is to add familiar looking new > names. I seem to be exceptionally derpy right now,

Re: [dns-operations] slack.com bogus

2021-09-30 Thread Dave Lawrence
Michael Sinatra writes: > I was dead in the water with slack, and upon issuing an 'rndc flush > slack.com' to my home DNS resolver, and then doing same to $dayjob (for > those using our VPN), everything cleared up. I'll let everyone here > draw inferences. No inferences needed; that was the

Re: [dns-operations] Ultra DNS responding with NXDOMAIN for "www.uber.com"

2021-08-10 Thread Dave Lawrence
Shreyas Zare writes: > And all of the 3 CNAME records are within the zone cut for the > received SOA. To make the resolver work with this issue, the > negative cache implementation had to be removed for CNAMEs with > NXDOMAIN case. To be clear, and this could well be something that community was

Re: [dns-operations] Ultra DNS responding with NXDOMAIN for "www.uber.com"

2021-08-09 Thread Dave Lawrence
Viktor Dukhovni writes: > Well, in this particular case queryes with rtype DS for "cfe.uber.com" > do get NXDOMAIN, while queries of type NS do not. Ooh my bad. Yeah, that's hard broken. I can guess at the code path that is causing this set of symptoms, and expect that at least that until

Re: [dns-operations] Ultra DNS responding with NXDOMAIN for "www.uber.com"

2021-08-09 Thread Dave Lawrence
Paul Vixie writes: > On Sun, Aug 08, 2021 at 03:20:24PM +0530, Shreyas Zare wrote: > > ... The resolver I have does restart for the last CNAME regardless > > of the RCODE but, the negative cache implementation based on RFC2308 and > > RFC8020 caused the NXDOMAIN response to get cached causing the

Re: [dns-operations] Ultra DNS responding with NXDOMAIN for "www.uber.com"

2021-08-07 Thread Dave Lawrence
I agree with Viktor that the parent should have delegation records for the same-server child, but note that response with the rcode NXDOMAIN for a CNAME chain shouldn't be causing a problem for a modern resolver. A resolver should restart query processing with the target of each CNAME in the

Re: [dns-operations] Akamai outages possibly related to Edge DNS?

2021-07-24 Thread Dave Lawrence
Stephane Bortzmeyer writes: > Clearly Akamai Edge. They acknowledged it on their status site "a > software configuration update triggered a bug in the DNS system, the > system that directs browsers to websites. This caused a disruption > impacting availability of some customer websites." When we

Re: [dns-operations] Checking for signatures of a certain DNSKEY within a zone

2021-07-07 Thread Dave Lawrence
Klaus Darilion writes: > Are there any tools (bash, php ...) which accepts single > RRSIG RR and single DNSKEY RR and does the validation? dnsviz can be run on the command line for pre-delegation testing, using staged DNSSEC data as necessary. https://github.com/dnsviz/dnsviz

Re: [dns-operations] why does that domain resolve?

2021-06-14 Thread Dave Lawrence
Tony Finch writes: > > So, what are people's favorite tools, especially those that you can just > > point a user at? > > I wouldn't point a user at any of these unless I think they have a good > amount of DNS expertise :-) Indeed. I recently had to field a complaint that invoked an analysis by

[dns-operations] Dan Kaminsky has passed away

2021-04-25 Thread Dave Lawrence
Our friend and colleague Dan Kaminsky has passed away of complications from diabetes. He was the discoverer/inventor of the DNS vulnerability that came to bear his name, the ability to take over whole swaths of domains much more easily than had previously been thought possible. Announcement

Re: [dns-operations] [Ext] Historical reminiscences (was Re: nsec vs nsec3 use)

2021-04-15 Thread Dave Lawrence
Paul Vixie writes: > do you know for a fact that someone who argued the GDPR case was in > fact carrying water for verisign? No, I don't. To be clear that is not what I was asserting. "Carrying water" has a derogatory connotation that has never been in my mind about this whole thing, either

Re: [dns-operations] [Ext] Historical reminiscences (was Re: nsec vs nsec3 use)

2021-04-14 Thread Dave Lawrence
To me, Andrew's retelling of the facts but for the emphasis. There's stated reasons, then there's the motivating reasons. GDPR was useful in making the argument, but Verisign and the pain of .com were the real motivation. ___ dns-operations mailing list

[dns-operations] F-Root and DNS Cookies?

2021-04-14 Thread Dave Lawrence
A few recent analyses I've done at DNSViz have had warnings like these: com/DS (alg 8, id 30909): The server appears to support DNS cookies but did not return a COOKIE option. (192.5.5.241, UDP_-_EDNS0_4096_D_KN) Now I realize that F-Root is a large, heterogeneous set. Any idea which

Re: [dns-operations] [Ext] Signing on the fly and UltraDNS

2021-01-06 Thread Dave Lawrence
I'm not really following your logic, Andrew (or Mark), for how applying IDNA rules is relevant to interpreting the labels in question. Yes, I read your cited text from RFC 5890, but still am not grokking how it is relevant for dig choking on -.house.gov just because IDN output is enabled. It

Re: [dns-operations] [Ext] Signing on the fly and UltraDNS

2021-01-05 Thread Dave Lawrence
Paul Hoffman writes: > I started this thread with: >dig +dnssec +noidnout anynameyouwant.house.gov a > Try that without the +noidnout option. Interesting. FWIW at first I saw no problem, because my MacBook has an older version of dig in /usr/bin. On my server with 9.16.10, though, the

Re: [dns-operations] [Ext] Signing on the fly and UltraDNS

2021-01-05 Thread Dave Lawrence
Paul Hoffman writes: > I am using tools that expect host names instead of domain names (in > this case, dig); I think I must be misunderstanding something, or at least haven't imagined widely enough the possibilities of your meaning here. dig has a particular expectation for hostnames either

Re: [dns-operations] systemd resolved ignores specified root

2020-09-16 Thread Dave Lawrence
Peter van Dijk writes: > Apparently the trailing dot "thing" never hits the wire? > That is correct. The DNS protocol has no concept of a trailing dot being > present or not. Or to put it another way, language is tricky and I'd say that DNS on the wire always has a trailing dot and has no

Re: [dns-operations] Nameserver responses from different IP than destination of request

2020-09-01 Thread Dave Lawrence
Stephane Bortzmeyer writes: > P Vixie wrote > > you know that the plural of anecdote isn't data: > > I recently discovered this english word and I love it: > https://en.wiktionary.org/wiki/anecdata And one link more of relevance:

Re: [dns-operations] [Ext] Re: Separating .ARPA operations from the root zone

2020-08-07 Thread Dave Lawrence
Kim Davies writes: > Nothing in this proposal prejudices changes to how the KSK for the > "arpa" zone may evolve in the future. I would suggest any effort > to define new baseline requirements for the "arpa" KSK be handled > separately as they are distinct from the objective of this draft. The >

Re: [dns-operations] At least 3 CloudFlare DNS-hosted domains with oddball TLSA lookup ServFail

2020-05-27 Thread Dave Lawrence
Viktor Dukhovni writes: > Interesting. I would have expected the RDATA to just be opaque bytes > when stored, and the server to return what ever it had, e.g.: > > _25._tcp.smtp.example.com. IN TLSA #2 0001 > _25._tcp.smtp.example.com. IN RRSIG TLSA ... > > and let the client deal with

Re: [dns-operations] mail.protection.outlook.com

2020-04-20 Thread Dave Lawrence
Brian Somers writes: > Heh, mail.protection.outlook.com has consumed many hours of my time > in the past month :( The actual MTA itself is a bit vexsome, as well. I've had a message stuck in queue for several days now because "lost connection ... while sending message body". Even thought the

Re: [dns-operations] recursive glueless handling by 8.8.8.8

2020-04-15 Thread Dave Lawrence
Calvin Browne writes: > does anyone here know how 8.8.8.8 handles recursive glueless situations? The Google folks are on the list and undoubtedly will answer, but I'm still curious about what even prompts the question. If it's actually missing glue -- NS records that are under the delegation

Re: [dns-operations] NXDOMAIN vs NOERROR/no answers for non-existant records

2020-04-07 Thread Dave Lawrence
Ángel writes: > I have seen the opposite problem than the op, servers returning NXDOMAIN > when there are actually child records, and they should have returned > NODATA, such as querying _domainkeys. Right, this is absolutely a problem too, with the practical consequence that it thwarts qname

Re: [dns-operations] DNS over Wikipedia

2020-04-07 Thread Dave Lawrence
Wesley Peng writes: > My question is about their implementation. > Does it mean any domain ending with .idk went to an interface, this > interface queried the domain part before .idk from wikipedia, then > returned a URL redirection to some other website? Pretty much yes. They take the page

Re: [dns-operations] NXDOMAIN vs NOERROR/no answers for non-existant records

2020-04-06 Thread Dave Lawrence
Matthew Richardson writes: > However, is this going to cause any practical problems? Even outside DNSSEC, where it absolutely would be a problem, there are some context for specialty applications where the difference between the two types of negative answers is meaningful. The examples I can

Re: [dns-operations] [Ext] Re: Contingency plans for the next Root KSK Ceremony

2020-04-02 Thread Dave Lawrence
Denesh wrote: >> Interestingly enough, the Super 7 - part of the IAO - who ensured >> web addresses were real... were the main topic in the episode Ill >> Tidings of Sherlock inspired US TV show Elementary .. I think it was >> around 4 years ago. I'm surprised I never heard of it at the time.

Re: [dns-operations] [Ext] Re: Contingency plans for the next Root KSK Ceremony

2020-03-31 Thread Dave Lawrence
Grant Taylor via dns-operations writes: > I fail to see how any government would prevent the necessary parties > from attending if / when they fully understand the need. Especially > when some of said governments have directives ~> mandates for use of DNSSEC. It could turn into a real-life

[dns-operations] Contact at eNom?

2020-03-20 Thread Dave Lawrence
Who from the community is at eNom these days? Looking for a higher level operations contact. Thanks. ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https://lists.dns-oarc.net/mailman/listinfo/dns-operations

Re: [dns-operations] EDNS Client Subnet (ECS) in queries sent to Google Public DNS

2020-01-19 Thread Dave Lawrence
Florian Weimer writes: > How would a DoH client know that the recursive resolver is “forbidden > to forward” ECS data? It doesn't know clearly. All it knows is that if it gets REFUSED when it sends a prefix outside its own address space, then something was wrong. If that then succeeds it can

Re: [dns-operations] root? we don't need no stinkin' root!

2019-11-28 Thread Dave Lawrence
Paul Ebersman writes: > mallman> I wonder if we're ever allowed to just decide this sort of > mallman> thing is ridiculous old shit and for lots of reasons we can and > mallman> should just garbage collect it away. > > We aren't allowed as IETF/engineers. The world sort of is. ;) I see the :)

Re: [dns-operations] DNS Flag Day 2020 - the date

2019-11-16 Thread Dave Lawrence
Mehmet Akcin writes: > 5/3/2020 (March) Because National Absinthe Day? ... National Cheese Doodle Day? ... National Multiple Personality Day? (All true; ref: http://www.holidays-and-observances.com/march-5.html) Or maybe it's a historical reference? The Boston Massacre?

Re: [dns-operations] sophosxl.net problem?

2019-11-11 Thread Dave Lawrence
Viktor Dukhovni writes: > We can't have both of: > >* It is valid to return non-authoritative cached data for RD=0 >* It is invalid to return AA=0 in response to RD=0 requests. > > Which shall it be? You say you find the first useful, but then you > really can't have the second, the

Re: [dns-operations] sophosxl.net problem?

2019-11-11 Thread Dave Lawrence
Paul Vixie writes: > so, answering REFUSED when authoritative-only and receiving RD=1, and > answering REFUSED when recursive-only and receiving RD=0, and treating > AA=0 as "lame" when doing recursion, all lead to a choppy present but a > smoother future. The third one seems distinctly

Re: [dns-operations] CNAMEs pointing off into the weeds - inconsistent behavior from different recursive codebases

2019-10-09 Thread Dave Lawrence
Viktor Dukhovni writes: > Yes, the expected behaviour when you explicitly request a CNAME > record is that (modulo DNAMEs in some parent zone) the qname is > resolved without further indirection, returning a CNAME if present > there, NXDOMAIN if the qname does not exist, or else NODATA. Spot on.