Re: [dns-operations] Offline DNSSEC Validation

2024-04-01 Thread Shumon Huque
On Mon, Apr 1, 2024 at 10:37 AM Rithvik Vibhu 
wrote:

> Hi,
>
> I'm looking for a good way to validate DNSSEC for a chain of records,
> offline. I mean: given a list of records including all RRSIGs, NSECs,
> etc.), verify that all the signatures match and the whole trust chain leads
> to a trust anchor.
>
> I've seen a few libraries, but at least in golang, most packages either
> don't validate DNSSEC on their own (ex: stub resolvers) or the DNSSEC
> validation is tightly integrated with the recursor code that handles
> querying for any required records.
>
> Does anyone know of an existing library that only does DNSSEC validation
> without resolution? Preferably in go, but any other language will do at
> least as reference.
>

I'm not aware of anything in Go, but getdns (in C) has the function
getdns_validate_dnssec() which can do this:

https://getdnsapi.net/documentation/spec/#7-more-helper-functions

(Code in https://github.com/getdnsapi/getdns/blob/develop/src/dnssec.c )

Shumon.
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] DNS .com/.net resolution problems in the Asia/Pacific region

2023-07-19 Thread Shumon Huque
On Wed, Jul 19, 2023 at 3:28 AM Shane Kerr 
wrote:

> Shumon and all,
>
> On 18/07/2023 21.41, Shumon Huque wrote:
> > On Tue, Jul 18, 2023 at 3:29 PM Viktor Dukhovni  > <mailto:ietf-d...@dukhovni.org>> wrote:
> >
> > Yes, I agree. A resolver can't really tell that a response with an
> > expired signature wasn't an attacker trying to replay old data. For
> > robustness against attacks, it must re-query other available other
> > servers if they exist.
>
> I kind of think that a resolver using UDP should just drop a response on
> the floor if it has an expired signature. Otherwise an attacker can
> induce behavior change by spoofing replies, which is itself a security
> problem (in this case, blocking with a response that would arrive later
> and work, effectively removing a name server from the set of name
> servers queried for a given lookup).
>

The problem is that in the general case the resolver can't really tell if
this was an attack or a misconfiguration. So, it's best to build in robust
behavior to deal with the case more generally. Which in my opinion is
"drop the response on the floor, maybe blacklist the server for a while,
and retry the next server". If a later valid response does come, then be
prepared to accept it (if you've still held on to the query).

This idea mostly applies to UDP without DNS cookies since it is the only
> transport easily vulnerable to spoofing. With other transports you are
> much more sure that the answer actually came from the server you are
> querying, and so you can be confident that the server is giving out
> bogus answers. (TCP is vulnerable to BGP hijacking and the like, but in
> that case you would still expect to get bogus answers for subsequent
> queries to the same server.)
>

Well, there are inline attackers as well and DNSSEC is designed to protect
against those too. If this only applied to UDP, then other protocols that
use
connection oriented transport or session oriented frameworks on top of UDP
would not bother with cryptographic authentication either. And yet, they all
do.

Unfortunately I don't think any resolvers hold onto a UDP query until
> after the DNSSEC validation. So there is not really much option other
> than to try again. 邏
>

Yeah, but I don't really see that as a problem. I see concerns have been
raised in this thread about the NXNAME attack and such dissuading
resolver implementers from more retries, but in my view the only thing
that taught us is that resolver implementers need to go back to first
principles and sensibly bound the amount of work they are willing to do,
not eliminate retries.

To quote RFC 1034 (published in 1987):

"The recommended priorities for the resolver designer are:

   1. Bound the amount of work (packets sent, parallel processes
  started) so that a request can't get into an infinite loop or
  start off a chain reaction of requests or queries with other
  implementations EVEN IF SOMEONE HAS INCORRECTLY
  CONFIGURED SOME DATA."

Note: the capitalized phrase for emphasis.

(My addendum: they should also bound the time spent.)

Transient configuration problems are _pervasive_ in deployed DNS
infrastructure. If BIND for example did not have the robust retry
behavior that Mark Andrews documented upthread, we could never
have used them in our infrastructure. In my experience Unbound also
had the same robustness, but I'm now a little concerned by the description
of the Unbound failures reported by Gavin M during this Verisign incident.
Maybe they have limited retries too aggressively? It would be good to
get some NLnetLabs colleagues to chime in with a description of their
behavior.

Shumon.
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] DNS .com/.net resolution problems in the Asia/Pacific region

2023-07-18 Thread Shumon Huque
On Tue, Jul 18, 2023 at 3:29 PM Viktor Dukhovni 
wrote:

> On Tue, Jul 18, 2023 at 08:54:04PM +0200, Ondřej Surý wrote:
>
> > With my implementor’s hat on, I think this is wrong approach. It
> > (again) adds a complexity to the resolvers and yet again based
> > (mostly) on isolated incident. I really don’t want yet another
> > “serve-stale” in the resolvers. I have to yet see an evidence that
> > serve-stale has helped anything since the original incident, but now
> > every resolver has to have it because people want it.
>
> How is this akin to "serve stale"?  We're talking about retrying
> response that fail to validate, just one might/would retry a response
> that is "REFUSED", "SERVFAIL", has TC=1 over UDP, contains garbage, ...
>
> The "serve stale" situation is quite different, here substantial new
> logic is required, whereas with invalid responses, it is just a matter
> of trying the next server up to some reasonable work limit.
>
> Retries to reach a better authoritative server are core element of DNS
> resilience in the face if inevitable partial degradation of service.
>

Yes, I agree. A resolver can't really tell that a response with an expired
signature wasn't an attacker trying to replay old data. For robustness
against attacks, it must re-query other available other servers if they
exist.

Also, I was under the impression that most resolvers already had this
robust behavior. Since Unbound was mentioned, I just tested an unbound
resolver against a test DNS record that I have provisioned with an
intentionally expired DNSSEC signature - it sent queries to all 4 servers
for the zone before giving up and returning SERVFAIL.

Shumon.
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] Cloudflare TYPE65283

2023-03-27 Thread Shumon Huque
On Tue, Mar 28, 2023 at 6:19 AM Viktor Dukhovni 
wrote:

>
> A possibly inconvenient question, just to make sure we're not ignoring
> the obvious sceptical position:
>
> * How compelling are compact lies?
>
> The reason to ask is that both the original and now modified protocols
> involve non-trivial complexity, and would have resolvers responding
> differently to queries with the DO bit set (tell them the truth) vs.
> queries that don't request validated answers (unmask the lie).
>
> The savings vs. actual by-the-book NSEC responses appear to be a 2x
> reduction in the number of signatures to compute (the SOA RRSIG is
> presumably easily cached) and a 1.5x reduction in the number of
> signatures to transmit (SOA + 1 NSEC, vs. SOA + 2 NSEC).
>
> Do the CPU and packet size reductions justify the additional protocol
> complexity?
>

That's a reasonable question, and perhaps best directed to the originators
of the scheme at Cloudflare. I don't know if there have been any
measurement studies or analyses of the cost benefits vs by-the-book DNSSEC.
There are currently 3 large commercial DNS providers that have had it
deployed for a while now, so I suspect that it is here to stay.

Note that one other provider (UltraDNS) does support traditional NSEC White
"Lies" that give by-the-book DNSSEC proofs for NXDOMAIN, so apparently they
are bearing the additional costs just fine.

One other point -- without the additional rcode substitution schemes under
discussion, Compact Answers can cause additional work for authority
servers, since NODATA responses may lead to follow-on queries by DNS client
applications (e.g. the common  followed by A pattern). So, the
per-response crypt & size reductions need to also be weighed against the
cost of these additional queries.

Shumon.
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] Cloudflare TYPE65283

2023-03-27 Thread Shumon Huque
On Tue, Mar 28, 2023 at 12:16 AM Viktor Dukhovni 
wrote:

> On Mon, Mar 27, 2023 at 04:28:30PM +0200, Emmanuel Fusté wrote:
>
> > > definitely does not exist.  The issue I take it that the
> > > sentinel-free:
> > >
> > >  nxdomain.example. IN NSEC \0.nxdomain.example. RRSIG NSEC
> > >
> > > which is an ENT per:
> > >
> > >
> https://datatracker.ietf.org/doc/html/draft-huque-dnsop-compact-lies-01#section-3.2
> > >
> > > may for some time be ambiguous while still used for NXDOMAIN by earlier
> > > implementations.  For that, sure, we should encourage those
> > > implementations to adopt whatever becomes the published protocol at
> > > their earliest convenience (realistically a year or two based on prior
> > > experience nagging operators to resolve compliance issues).
> >
> > Thank you Viktor.
> > That confirm my understanding and my analysis in my answers to Petr.
>
> Do you have a list of operators that currently return just "RRSIG NSEC"
> for ENTs?  Do you what software they are running?
>
> On the fly signing with compact denial of existence is a bleeding-edge
> behaviour, and one might expect that the software in question is not
> ossified and operators might be proactive.  So with a bit of luck any
> ambiguity might be resolved before long.
>
> The only other option is to introduce yet another sentinel that signals
> that the node in question is an ENT, so that the bare "RRSIG NSEC"
> combination is ultimately never used.
>
> And, FWIW, the sentinel value will surely need to change (once a better
> codepoint is assigned).  The current 0xff03 is in the private-use range.
>

I've spoken to both NS1 and Route53, and both are amenable to adjusting
their implementations to support the changes specified in
draft-huque-dnsop-compact-lies. So, we hope that the end result will be
that all known implementations of compact lies will support this common
mechanism to distinguish NXDOMAIN vs ENT vs (other) NODATA.

If there are any other implementations of Compact Lies that folks are aware
of, we should make them aware of this and bring them into the fold.

Shumon.
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] Looking for zones using white lies (RFC 4470)

2023-01-27 Thread Shumon Huque
On Fri, Jan 27, 2023 at 11:16 AM Paul Ebersman <
list-dns-operati...@dragon.net> wrote:

> shuque> UltraDNS (Neustar Security Services) is known to use NSEC White
> shuque> Lies. I have a test zone there,
>
> shuque> which you can examine: "[[ultratest.huque.com]]".
>
> My recollection is that the NSS implementation is really grey lies,
> i.e. not quite RFC white lies but not fully black like cloudflare.
>

Paul - what's the definition of "grey lies"?

The UltraDNS implementation doesn't use the more precise white lies
epsilon function defined in the spec, but it is probably good enough for
all practical purposes.

And it's much closer to white lies than "black" lies, because it preserves
the correct semantics of NXDOMAIN.

Shumon.
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] Looking for zones using white lies (RFC 4470)

2023-01-27 Thread Shumon Huque
On Fri, Jan 27, 2023 at 3:39 AM Stephane Bortzmeyer 
wrote:

> On Fri, Jan 27, 2023 at 12:19:18AM -0500,
>  Viktor Dukhovni  wrote
>  a message of 30 lines which said:
>
> > Three sample zones:
>
> They all seem to use black lies, not white lies.
>

I took a quick look:

* herokudns.com is definitely "black" ("minimal"?) lies, hosted on NS1,
which uses that method.
* cfcualerts.com appears to use normal pre-computed NSEC3.
* technohazard.io - no idea; my attempts at eliciting negative responses
result in SERVFAIL.

UltraDNS (Neustar Security Services) is known to use NSEC White Lies. I
have a test zone there,
which you can examine: "ultratest.huque.com".

$ dig +dnssec foobar.nxd.ultratest.huque.com. A +noall +authority
!~.nxd.ultratest.huque.com. 1792 IN RRSIG   NSEC 13 5 1800
20230722123724 20230123123724 39543 ultratest.huque.com.
q+TWfjkPmlWs/xVBsZu3kiWyhUqcZJWjq2U28BVoLcT8kCacqjRF1NKM
qEss4HsL9VxpAlq7AfRarczZwNtBaA==
!~.nxd.ultratest.huque.com. 1792 IN NSEC-.nxd.ultratest.huque.com.
RRSIG NSEC
foobaq~.nxd.ultratest.huque.com. 1792 IN RRSIG  NSEC 13 5 1800
20230722123724 20230123123724 39543 ultratest.huque.com.
UM1w+ZxUTUXCZ/T8xD5cOHOgrJaBHJM7UPFTOs4UlMjkbRcK3L7eEn8M
/36nCgTfQNk+cllamUqr5CJ+FuUDFw==
foobaq~.nxd.ultratest.huque.com. 1792 IN NSEC   foobar!.
nxd.ultratest.huque.com. RRSIG NSEC
ultratest.huque.com.1792IN  SOA dns01.salesforce.com.
hostmaster.salesforce.com. 2019101692 1800 900 2592000 1800
ultratest.huque.com.1792IN  RRSIG   SOA 13 3 1800
20230722123724 20230123123724 39543 ultratest.huque.com.
6nhsLNAUv0TYiA6Gp0evnicallUmMEsr0T9qK3GvmkxVy+8FC9v2DsUR
rp+o7/QMjKl+dvYncQcIspRZmUlgZw==

Shumon.
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] DNSSec validation issue for .se (missing denial of existence for *.se)

2022-01-17 Thread Shumon Huque
On Mon, Jan 17, 2022 at 9:04 AM Ulrich Wisser via dns-operations <
dns-operati...@dns-oarc.net> wrote:

>
> -- Forwarded message --
> From: Ulrich Wisser 
> To: Mark Andrews 
> Cc: Shreyas Zare , Greg Choules via
> dns-operations 
> Bcc:
> Date: Mon, 17 Jan 2022 15:01:36 +0100
> Subject: Re: [dns-operations] DNSSec validation issue for .se (missing
> denial of existence for *.se)
> This is of course very interesting for us (at .se).
> I tried this with all our dns servers and all give the same answer.
> But I tend to agree that a proof for the non existence of the wildcard
> should be there.
>
> I am thinking of a domain setup as:
>
> *.example.com. TXT “wildcard”
> 0.example.com. TXT “zero”
> test.a.example.com. TXT “test.a”
>
> What answer should “dig +dnssec a.example.com txt” give?
>
> I would say “wildcard”. And if that is the case, shouldn’t it then send an
> extra sec in case there is no wildcard record?
>

Actually, no Ulrich, a query for "a.example.com" in your example will not
match the wildcard, since the node "a.example.com"
positively exists (as an empty non-terminal with a descendant node,
test.a.example.com, that has data). The DNS name
matching algorithm is label by label inspection from the top down (see RFC
1034, Section 4.3.2).

  c. If at some label, a match is impossible (i.e., the
corresponding label does not exist), look to see if a
the "*" label exists.

(At this stage in your example, a match is found)

Hence, no wildcard non-existence proof is needed. Those are needed only for
NXDOMAIN responses, where we you
have to additionally prove that although the name did not explicitly exist,
a response for it could not have been synthesized
by a wildcard.

Shumon.
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] DNSSec validation issue for .se (missing denial of existence for *.se)

2022-01-11 Thread Shumon Huque
Hannes,

This is a NODATA response for an empty non-terminal, so no wildcard
non-existence
proof is needed.

The following NSEC record demonstrates that "a.se" is an empty non-terminal:

_nicname._tcp.se.   6694IN  NSECacem.a.se. SRV RRSIG NSEC

Shumon.

On Tue, Jan 11, 2022 at 10:58 AM Hannes Mehnert  wrote:

> Hi DNS operators,
>
> since this is my first mail here, I first would like to thank you all
> for the constructive discussions and technical expertise. I'm developing
> a DNS suite in OCaml, a statically typed functional programming language
> [see https://github.com/mirage/ocaml-dns // https://mirageos.org if
> interested], and have learned a lot from lurking on this list. My
> current work item is a recursive resolver.
>
> When I just implemented the denial of existence for DNSSec (with NSEC),
> I stumbled upon the TLD .se that uses NSEC. I mailed earlier to
> registry-default at nic dot se (the hostmaster in the SOA of .se), but
> didn't get a reply.
>
> Of course, I may be wrong with my analysis, if this is the case please
> help me to understand how this should work.
>
> I'm wondering how other validators (public resolvers) deal with the
> following issue, which is a missing denial of existence for *.se: So, a
> request for resource record type A, domain name a.se results in the
> following:
>
> $ dig +dnssec a.se
>
> se. 5363IN  SOA catcher-in-the-rye.nic.se.
> registry-default.nic.se. 2022010921 1800 1800 864000 7200
> se. 5363IN  RRSIG   SOA 8 1 172800
> 20220122054639 20220109191050 30015 se.  [...]
> _nicname._tcp.se.   6694IN  NSECacem.a.se. SRV RRSIG NSEC
> _nicname._tcp.se.   6694IN  RRSIG   NSEC 8 3 7200
> 20220121191006 20220108001053 30015 se. [...]
>
> Which provides a non-existence proof for everything between
> _nicname._tcp.se and acem.a.se, but nothing for *.se (which according to
> the order of canonical domain names, is before _nicname._tcp.se -- even
> before 0.se that seems to be the first registered domain name).
>
> The NSEC record missing from the reply above is the following NSEC and
> RRSIG ($ dig +dnssec ns \!.se).
>
> se. 4353IN  NSEC0.se. NS SOA TXT RRSIG
> NSEC DNSKEY
> se. 4353IN  RRSIG   NSEC 8 1 7200
> 20220121132017 20220108061050 30015 se.
> jzWI5l5Sxyb2sOLzCWNX06nwmCtZuFdS3PvmivnyOPVZ3cw+blBXNYwN
> cFCYFdMC7R31W0ABBuT587mAm7Ae5NJX2GnXGcNgaVcD9VhKWAjJHpqf
> +NJcLOF9771m/BKPC7dKTwt/zVdKJSwFjaYTr0streS9OMCnJXbiWaQc
> CMDmzko2WiWdBNDAbZ8H/OfKymYjgJz1hZynMdl5LyWcGgxlOksuLKSv
> 4xg4Ey07r4ZCy5XTQwfHG74qWa+61BVjfP3KEEEB42B0rZX8lT15B9MS
> Cg9RmBObNC5FYjXGkbeik6iXrdOGzUUURHay+th9SJ4BGIFIV8fyyDTd oxOc5w==
>
>
> Thank you for reading,
>
> Hannes Mehnert
> ___
> dns-operations mailing list
> dns-operations@lists.dns-oarc.net
> https://lists.dns-oarc.net/mailman/listinfo/dns-operations
>
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] NSEC3 parameter selection (BCP: 1 0 0 -)

2021-01-19 Thread Shumon Huque
On Tue, Jan 19, 2021 at 8:44 AM Viktor Dukhovni 
wrote:

>
> Sorry for leaving this vague.  Changing the salt requires rebuilding the
> entire NSEC3 chain, and so is difficult to combine with incremental zone
> signing (such as BIND's "auto-dnssec maintain").  If you're doing
> periodic whole zone signing, which reconstructs the entire chain, you
> can change the salt at will each time the zone is signed from scratch.
>
> If, on the other hand, the zone is signed incrementally as individual
> records are modified, then there is not an opportunity to change the
> salt, which needs to be consistent across the entire chain.
>

It should work with incremental signing too. I haven't actually tried it
with
BIND's 'auto-dnssec maintain' - perhaps ISC folks can confirm.

The way it should work is that you tell the BIND signing server that you're
updating the NSEC3 parameters (by dynamic update or issuing an 'rndc'
control command). It will then in the background rebuild a second complete
NSEC3 chain. While doing this, it will temporarily house the NSEC3PARAM
data in a private record (so that the auth servers don't instantly start
using
that chain to construct negative responses), and will only make that visible
in the apex NSEC3PARAM record once the chain has been fully built. You
can then delete the old NSEC3PARAM.

Shumon.
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] is anybody awake at 5.0.1.0.0.2.ip6.arpa? (comcast and/or arin)

2020-10-06 Thread Shumon Huque
On Mon, Oct 5, 2020 at 11:22 PM Mark Andrews  wrote:

> > On 6 Oct 2020, at 13:18, Paul Vixie  wrote:
> >
> > ssh gets hinky when i connect from a server whose PTR is "servfail"
> (dnssec "bogus")
> >
> >   • 5.0.1.0.0.2.ip6.arpa to 9.5.5.0.1.0.0.2.ip6.arpa: No valid
> RRSIGs made by a key corresponding to a DS RR were found covering the
> DNSKEY RRset, resulting in no secure entry point (SEP) into the zone.
> (68.87.68.244, 68.87.72.244, 68.87.76.228, 68.87.85.132, 69.252.250.103,
> 2001:558:1004:7:68:87:85:132, 2001:558:100a:5:68:87:68:244,
> 2001:558:100e:5:68:87:72:244, 2001:558:1014:c:68:87:76:228,
> 2001:558:fe23:8:69:252:250:103, UDP_-_EDNS0_4096_D_K)
>
> I have no idea why DNSVIZ is reporting this NSEC record (?) given there is
> a DS RRset.  The covering NSEC record for 9.5.5.0.1.0.0.2.ip6.arpa that
> would prove the non existence of the DS RRset if it didn’t exist is
> 9.5.5.0.1.0.0.2.ip6.arpa.  I suspect a DNSVIZ bug here.
>

Sorry Mark - where do you see dnsviz complaining about an NSEC record?

This error message says that no "valid" DNSKEY RRSIGs made by a key
matching the DS RRset were found -- which is a correct diagnosis. No NSEC
records are involved in that determination.

As you've already pointed out, DNSKEY with keytag 47242 has an expired
signature on the DNSKEY RRset. Key 30705 has a valid unexpired signature
but that does not match the DS set (it also doesn't have the advisory SEP
flag, so was likely not intended to be used as a secure entry point).

Shumon.
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] Cloudflare (and perhaps also Google) public DNS sometimes forwards incomplete subset of NSEC RRs

2020-09-01 Thread Shumon Huque
On Tue, Sep 1, 2020 at 4:24 AM Viktor Dukhovni 
wrote:

> On Tue, Sep 01, 2020 at 01:48:17AM -0400, Viktor Dukhovni wrote:
> >
> > @ 1.1.1.1 _25._tcp.mx.runbox.com. IN TLSA ? ; +cd +dnssec
> [...]
>
> So I'm at a loss to explain what's happening...  Haven't seen any
> anomalous replies yet from either VRSN or Quad9.
>

It looks to me like a bug in Cloudflare and Google, and we probably need to
await their response to figure out what's going on.

Cloudflare omits the wildcard NODATA NSEC, and Google omits the no closer
match NSEC. Both are required. Interestingly, they both set AD=1, so
perhaps internally they authenticated the full NSEC set.

Shumon.
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] Test Zone Metalist

2020-06-06 Thread Shumon Huque
On Thu, Jun 4, 2020 at 10:05 AM Matthew Pounsett  wrote:

> On the suggestion of some community members, I’m considering setting up a
> list of known DNS test zones to be posted on OARC’s web site.  The list
> will include zones designed to provide data to use as input to DNS software.
>
> Off the top of my head, and with five minutes of googling, I know of only
> two:
>
> test.dnssec-tools.org <https://dnssec-tools.org/testzone/>
> workbench.sidnlabs.nl <https://workbench.sidnlabs.nl/>
>
> This seems to be one of those subjects that is hard to search; I’m mostly
> getting test *software* in my search results.
>
> What other zones should be on such a list?


Hi Matt,

These don't appear to be listed on the rootcanary project's website (
rootcanary.org), but Willem Toorop recently made me aware that they have a
set of DNSSEC test zones of the form "dNaNnN.rootcanary.net", where:

dN: DS digest algorithm number
aN: algorithm number
nN: NSEC version (1 or 3)

So, the zone "d2a15n3.rootcanary.net" has a DS record with hash algorithm 2
(SHA256), is signed with algorithm 15 (EdDSA25519), and uses NSEC3, etc.

-- 
Shumon Huque
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] Anyone from Google here?

2020-05-12 Thread Shumon Huque
On Mon, May 11, 2020 at 1:48 PM Robert Evans via dns-operations <
dns-operati...@dns-oarc.net> wrote:

> From: Robert Evans 
> On Fri, Apr 17, 2020 at 1:23 PM Robert Evans  wrote:
>
>> [...]
>>
>> Not sure the motivation for why the server does that, but I agree it
>> should be NOERROR or NXDOMAIN for all RTYPEs that don't exist including
>> unknown ones. We're looking into this and will get back to you.
>>
>
> Following up here: I've confirmed this behavior is an oversight and will
> be corrected in an upcoming server release.
>

Hi Bob,

I just want to elaborate on one important point from Mark's earlier
response.

For the query in question (google.com, type 1001), the response should be
NOERROR, and not NXDOMAIN (the name google.com exists, so the response
cannot be NXDOMAIN, regardless of what query type was issued).
Specifically, it should be a "NODATA" response (response code: NOERROR, an
empty answer section, and a SOA record in the Authority section). More
generally, if the domain name exists (either because it has other RR types
associated with it, or if it has none but has descendent nodes that do have
RRsets), then the response must be NODATA.

Shumon.
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] DNSSEC Signatures failed in Top-Level Domain fr.

2020-05-04 Thread Shumon Huque
On Mon, May 4, 2020 at 3:41 PM Martin Wismer 
wrote:

> Hello, Bonjour,
>
> I noticed, that the DNSSEC signed Domains under top-Level Domain fr.
> failed since about 4 hours.
>
> Example Domains:
> m6replay.fr.
> climato-realistes.fr.
> langue-au-chat.fr
> sully-group.fr
>
> Could anybody please fix this?
> Does anybody else also noticed this?
> Thanks or merci beaucoup. Greetings
> Martin.Wismer.
>

Yes, I notice the same.

The signature on the DS RRset for these zones (in the .fr parent) has
expired (May  4 15:19:46 2020 UTC for the first).

Shumon.
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] At least 3 CloudFlare DNS-hosted domains with oddball TLSA lookup ServFail

2020-04-23 Thread Shumon Huque
On Thu, Apr 23, 2020 at 2:25 AM Viktor Dukhovni 
wrote:

> On Mon, Apr 20, 2020 at 11:55:38AM +0100, Christian Elmerot wrote:
>
> > On 2020-04-19 07:55, Viktor Dukhovni wrote:
> > > The CloudFlare auth servers return ServFail for the TLSA lookup of:
> > >
> > >  https://dnsviz.net/d/_25._tcp.mx01.mx-hosting.ch/XpvvXg/dnssec/
> > >  https://dnsviz.net/d/_25._tcp.mail.markleenen.eu/Xpvvcg/dnssec/
> > >  https://dnsviz.net/d/_25._tcp.box.nobodyghost.net/Xpvvow/dnssec/
> >
> > Those ServFails are being looked into as that is something different and
> > a bug I believe. I'll get back with more information when the issue's
> > been identified in our pipeline.
>
> Great, thanks.  Not yet resolved FWIW:
>
> http://dnssec-stats.ant.isi.edu/~viktor/dnsviz/cloudflare.com.html


I didn't see the reason for the SERVFAIL in the dnsviz output. So I ran
my own debugging tool on these domains. All the CF servers for the zone
are unresponsive to DNS queries for the TLSA record at those names. I
assume that's why we get SERVFAIL. They respond to other queries fine
such as apex SOA, A, etc):

Abbreviated transcript from the first:

[...]
# QUERY: _25._tcp.mail.markleenen.eu. TLSA IN at zone eu. address
194.146.106.90
#[SECURE Referral to zone: markleenen.eu. in 0.080 s]
ZONE: markleenen.eu.
NS: darl.ns.cloudflare.com. 173.245.59.98 2606:4700:58::adf5:3b62
NS: tegan.ns.cloudflare.com. 173.245.58.226 2606:4700:50::adf5:3ae2
DS: 2371 13 2
23de654eeaae6a7acf8192d2604cdaad5b0ae6abc4dc6456e89559fb5d7a19f0
DNSKEY: markleenen.eu. 257 2371 ECDSA-P256 (13) 512-bits
DNSKEY: markleenen.eu. 256 34505 ECDSA-P256 (13) 512-bits

# QUERY: _25._tcp.mail.markleenen.eu. TLSA IN at zone markleenen.eu.
address 173.245.59.98
WARN: UDP query timeout for 173.245.59.98
WARN: UDP query timeout for 173.245.59.98

# QUERY: _25._tcp.mail.markleenen.eu. TLSA IN at zone markleenen.eu.
address 2606:4700:58::adf5:3b62
WARN: UDP query timeout for 2606:4700:58::adf5:3b62
WARN: UDP query timeout for 2606:4700:58::adf5:3b62

# QUERY: _25._tcp.mail.markleenen.eu. TLSA IN at zone markleenen.eu.
address 173.245.58.226
WARN: UDP query timeout for 173.245.58.226
WARN: UDP query timeout for 173.245.58.226

# QUERY: _25._tcp.mail.markleenen.eu. TLSA IN at zone markleenen.eu.
address 2606:4700:50::adf5:3ae2
WARN: UDP query timeout for 2606:4700:50::adf5:3ae2
WARN: UDP query timeout for 2606:4700:50::adf5:3ae2

Queries to all servers for zone markleenen.eu. failed.
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] Validation anomalies under gpo.gov

2020-04-03 Thread Shumon Huque
On Fri, Apr 3, 2020 at 4:54 PM Viktor Dukhovni 
wrote:

>
> The AD=1 replies from Google and Verisign are not "wrong".  They just
> reflect the fact that any ancestor zone is in principle free to bypass
> delegation and return "unexpected" signed answers for a child domain,
> legitimately or otherwise.


In this case, I think the explanation might be a bit simpler. The parent
zone
isn't really bypassing anything. The behavior is likely a result of the
fact that
both the parent (gpo.gov) and child (access.gpo.gov) are served by the same
set of nameservers. An incoming query containing the full qname (as opposed
to
qname minimization), will cause most authoritative servers to find the
closest
enclosing zone for the query (i.e. the child zone) and answer directly from
that.
And since the signer for permanent.access.gpo.gov is claimed to be gpo.gov,
it validates, and the broken delegation isn't even being seen.

Cloudflare I believe does qname minimization, so is likely reacting to
discovery
of the broken delegation.

Shumon.
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] [Ext] OpenDNS, Google, Nominet - New delegation update failure mode

2020-04-03 Thread Shumon Huque
On Fri, Apr 3, 2020 at 1:55 PM Puneet Sood  wrote:

> On Fri, Apr 3, 2020 at 1:53 PM Paul Hoffman 
> wrote:
> >
> > Shouldn't this part of the thread (proposed changes base on an Internet
> Draft) be in the DNSOP WG in the IETF? Said another way, if you don't move
> it there soon, when the topic appears there, you'll have to repeat
> yourselves.
>
> +1. From Google Public DNS perspective, I also have thoughts on this
> topic. Would prefer to discuss on the dnsop WG list.
>

Yes, sure. I was actually planning to post it there in the run up to
IETF107, but then the pandemic derailed everything, and I forgot about it,
until the topic showed up here, so ..

Rather than posting it now just before the weekend, I'll wait til Monday -
more likely that people will read and pay attention. Thanks for the nudge
Paul!

Shumon.
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] OpenDNS, Google, Nominet - New delegation update failure mode

2020-04-03 Thread Shumon Huque
On Fri, Apr 3, 2020 at 11:59 AM Ralf Weber  wrote:

> Well it was you think and others (including me) disagree for valid reasons.
> There is absolutely no reason to issue queries for some validation, when
> you already got good results.
>
> I see this is a workaround for people to lazy to update the delegations,
> and put more complexity and work on resolvers.
>

Dear Ralf,

It is possible that there exist some people who want this because they
are "too lazy" to update delegations. But I strongly suspect there are other
reasons.

Let me explain why I am personally interested in having this behavior
implemented widely. We can take care to make sure the contents of
parent/child NS sets are always in sync (and we do). What we cannot
control is the TTL value of the NS RRset in the parent. Many TLDs are
quite inflexible in this regard and only support long (~2 day) TTLs. (I
know some people will immediately say let's fix this. But we have to live
in the real world of TLDs. Folks have been asking for this forever, and
there has been no movement. And if there is movement, that will happen
on the timescale of many years or longer).

Normally, this is not an issue for us, as we prefer long TTLs on zone
infrastructure records for stability and performance reasons. The issue
arises when we are making changes to the infrastructure, such as
migrating to another DNS provider, or deploying DNSSEC etc. We want
to make sure we can very quickly backout changes if we encounter
unanticipated problems, by temporarily deploying a short TTL.

To give you a real case, some time last year, we signed and migrated
some of our important zones to a set of new providers, after extensive
testing (verifying the zones were correctly deployed and signed, detailed
pre-delegation testing, distributed monitoring of the provider footprints
etc).
A couple of days after pulling the trigger, we discovered breakage in a
particular region of the world where one of the provider's servers were
misconfigured. We weren't able to catch this pre-deployment, since our
distributed monitoring did not include nodes in the anycast catchment
area(s) of these broken servers. So, we had to backout the change, and
then deal with the lingering up-to-2-day effect of the parent NS TTL (for
parent centric resolvers).

To fend off these kinds of issues, there are some well known infrastructure
operators that configure their resolvers to enforce a maximum cache TTL
of only 60 seconds. Should we be advocating things like that? :)

(There is a larger philosophical question that I will avoid for now, about
why resolvers should prefer non-authoritative glue, which cannot be signed,
over signed authoritative data, and whether or not we should redesign
the DNS delegation mechanism to fix that. The security of DNSSEC does
not currently rely on signed nameserver records, but why not try to catch
spoofed delegation data as early as possible, at its source?).

Shumon Huque
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] NXDOMAIN vs NOERROR/no answers for non-existant records

2020-04-03 Thread Shumon Huque
On Fri, Apr 3, 2020 at 8:20 AM Stephane Bortzmeyer 
wrote:

> On Fri, Apr 03, 2020 at 07:48:16AM -0400,
>  Shumon Huque  wrote
>  a message of 98 lines which said:
>
> > The second one,  doesnotexist.monitor.itconsult.net., does not appear
> to be
> > delegated from its parent.
>
> This is not what I see. Both are delegated from itconsult.net
> (source: their SOA).
>

Ah, yes. The subtlety here (which I didn't notice at first) is that
monitor.itconsult.net is served by the same name servers as its parent.
Since most authority servers answer from their closest enclosing zone, most
iterative debugging tools like dig+trace etc won't see the delegation.

Shumon.
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] OpenDNS, Google, Nominet - New delegation update failure mode

2020-04-03 Thread Shumon Huque
On Thu, Apr 2, 2020 at 5:10 PM Brian Somers  wrote:

> FWIW, OpenDNS/Umbrella/Cisco will use the glue to look things
> up and won’t explicitly ask the authority for its own NS record.
>
> However, if we’re asked for an NS record by a client, we’ll lookup
> & return the authoritative answer and that answer will trump the glue.
> We’ll never serve glue to a client.
>
> One of the problems with caching NS records is that you’ve got to be
> careful that you don’t let them keep re-asserting their own presence
> in the cache (by repeating their RRset in the AUTH section every time
> you talk to them).  We do *force* their eventual TTL decay, but
> for frequently queried domains, the original glue TTL is *not* honoured
> due to the authoritative RRset trumping it!
>

Folks may be interested in this proposal, Paul Vixie, Ralph Dolmans, and I
have been working on, to cause resolvers to deterministically prefer the
child NS set, while avoiding the problem you mention in the last paragraph:

   https://tools.ietf.org/html/draft-huque-dnsop-ns-revalidation-01

I realize some implementers (Petr Spacek?) do not agree, but on balance we
think this is what resolvers should do.

Shumon Huque.
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] NXDOMAIN vs NOERROR/no answers for non-existant records

2020-04-03 Thread Shumon Huque
On Fri, Apr 3, 2020 at 7:35 AM Matthew Richardson 
wrote:

> I am observing responses from particular authoratitive servers for
> non-existant domains, which is puzzling me.  I thought I understood this
> topic, but am now having doubts...
>
> Consider two (real) non-existant records (which are not empty non-terminals
> - there is nothing below them):-
>
> doesnotexist.mtgmon.itconsult.net
> doesnotexist.monitor.itconsult.net
>
> where mtgmon.itconsult.net & monitor.itconsult.net are delegated to
> different authoratitives.
>
> Querying each against the authoratitives returns NOERROR with "ANSWER: 0"
> for the first one and NXDOMAIN for the second, behaviour which is
> consistent across all the authoratitives:-
>

The second one,  doesnotexist.monitor.itconsult.net., does not appear to be
delegated from its parent. That's why you're getting NXDOMAIN - that
response is coming from the parent zone: itconsult.net.

>> Query: doesnotexist.monitor.itconsult.net. A IN at zone itconsult.net.
>>   Send to zone itconsult.net. at address 193.201.42.1
ERROR: NXDOMAIN: doesnotexist.monitor.itconsult.net. not found

Shumon.
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] Extended Submissions Deadline: 33rd DNS-OARC Workshop, Paris, France, May 09 - 10th 2020

2020-03-09 Thread Shumon Huque
On Mon, Mar 9, 2020 at 2:41 PM Paul Vixie  wrote:

> On Monday, 9 March 2020 14:44:09 UTC Shumon Huque wrote:
> > ** We have extended the submissions deadline for the 33rd DNS-OARC
> > ** workshop to March 19th 2020 (midnight CEST).
> >
> > The 33rd DNS-OARC Workshop will take place at the Marriott Rive Gauche
> > Hotel & Conference Center in Paris, France on May 9th and 10th 2020. It
> > is co-located with and will take place right after the ICANN GDD (May
> > 3rd to 6th), Registrations Operations Workshop (May 6th) and ICANN DNS
> > Symposium (May 7th and 8th).
> >
> > ...
>
> Early May is going to be a very bad time:
>
> https://threadreaderapp.com/thread/1236095180459003909.html
>
> i suggest ICANN and DNSOARC be ready to convert to virtual for this.
>

Yeah, I'm aware that contingencies are being actively discussed. But I'll
defer to OARC and ICANN staff to officially comment.

Shumon.
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


[dns-operations] Extended Submissions Deadline: 33rd DNS-OARC Workshop, Paris, France, May 09 - 10th 2020

2020-03-09 Thread Shumon Huque
** We have extended the submissions deadline for the 33rd DNS-OARC
** workshop to March 19th 2020 (midnight CEST).

The 33rd DNS-OARC Workshop will take place at the Marriott Rive Gauche
Hotel & Conference Center in Paris, France on May 9th and 10th 2020. It
is co-located with and will take place right after the ICANN GDD (May
3rd to 6th), Registrations Operations Workshop (May 6th) and ICANN DNS
Symposium (May 7th and 8th).

The Workshop's Program Committee is requesting proposals for
presentations. All DNS-related subjects are welcome.

A time slot will also be available for lightning talks (5-10 minutes
each) on day two of the workshop, for which submissions will be accepted
just before the start of the workshop and until the start of the morning
break on day two. Poster submissions are also welcome.

There will be an OARC Business session during the workshop, which will
be for OARC Members only. If you are an OARC member and have a sensitive
topic that you wish to present during that session those can be
accommodated.

Workshop Milestones:
10 Jan 2020 - Submissions open via Indico
19 Mar 2020 - Extended Deadline for submission (midnight CEST)
20 Mar 2020 - Initial Contribution list published
02 Apr 2020 - Full agenda published
02 May 2020 - Deadline for slideset submission
09 May 2020 - Workshop begins

Details for presentation submission are published here:

<https://indico.dns-oarc.net/event/34/call-for-abstracts/>

The workshop presentations will be organized by common themes, depending
on the topics and the timing of each presentation. There are 30-minute
and 15-minute slots, let us know your preference in your submission.

To allow the Programme Committee to make objective assessments of
submissions, so as to ensure the quality of the workshop, submissions
SHOULD include slides. Draft slides are acceptable on submission.

If you have questions or concerns you can contact the Programme Committee:

https://www.dns-oarc.net/oarc/programme

via 

Shumon Huque, for the DNS-OARC Programme Committee

OARC depends on sponsorship to fund its workshops and associated social
events.  Please contact  if your organization is
interested in becoming a sponsor.

OARC is aware of concerns around the ongoing novel Coronavirus outbreak
and how that may potentially affect travel. More details are available at:

https://indico.dns-oarc.net/event/34/page/93-covid-19-situation

(Please note that OARC is run on a non-profit basis, and is not in a
position to reimburse expenses or time for speakers at its meetings.)
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] c.root-servers.net over IPv6

2020-02-03 Thread Shumon Huque
Didn't we discuss this recently?

I assume this is the Cogent<->Hurricane Electric IPv6 peering issue. See
the long thread that starts here (short summary: dnsviz is singly homed to
HE so can't reach Cogent IPv6 servers):

https://lists.dns-oarc.net/pipermail/dns-operations/2019-October/019276.html

Shumon.

On Mon, Feb 3, 2020 at 3:14 PM SM  wrote:

> Hello,
>
> c.root-servers.net (2001:500:2::c) is not responding to queries over IPv6
> [1].
>
> Regards,
> -sm
>
> 1. The error from DNSViz is "arpa zone: The server(s) were not
> responsive to queries over UDP. (2001:500:2::c)"
>
> ___
> dns-operations mailing list
> dns-operations@lists.dns-oarc.net
> https://lists.dns-oarc.net/mailman/listinfo/dns-operations
>
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


[dns-operations] Extended Submission Deadline for 32nd DNS-OARC Workshop

2019-12-10 Thread Shumon Huque
Hi folks,

In order to help us construct the best program we can for OARC32, we are
still soliciting a few more submissions, and have extended the submission
deadline by one week, to December 16th (midnight PST):

The 32nd DNS-OARC Workshop will take place at the Hyatt Regency
San Francisco in San Francisco, California, USA on February 8th 2020.
It is co-located with and will take place right before NANOG 78 (Feb 10th
to Feb 12th 2020). The Workshop's Program Committee is now requesting
proposals for presentations. All DNS-related subjects are welcome.

Workshop Milestones:
28 Sep 2019 - Submissions open via Indico
16 Dec 2019 - Extended deadline for submission (23:59 PT)
20 Dec 2019 - Initial Contribution list published
03 Jan 2020 - Full agenda published
24 Jan 2020 - Deadline for slideset submission
08 Feb 2020 - Workshop

Details for presentation submission are published here:

<https://indico.dns-oarc.net/event/33/call-for-abstracts/>

The workshop presentations will be organized by common themes,
depending on the topics and the timing of each presentation. There
are 30-minute and 15-minute slots, let us know your preference in
your submission.

To allow the Programme Committee to make objective assessments
of submissions, so as to ensure the quality of the workshop, submissions
SHOULD include slides. Draft slides are acceptable on submission.

If you have questions or concerns you can contact the Programme
Committee via submissi...@dns-oarc.net

Shumon Huque, for the DNS-OARC Programme Committee


OARC depends on sponsorship to fund its workshops and associated
social events. Please contact spon...@dns-oarc.net if your organization
is interested in becoming a sponsor. OARC is run on a non-profit basis,
and is not in a position to reimburse expenses or time for speakers at its
meetings.
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


[dns-operations] Call for Presentations: 32nd DNS-OARC Workshop, San Francisco, CA, Feb 08 2020

2019-10-14 Thread Shumon Huque
Hi folks,

The 32nd DNS-OARC Workshop will take place at the Hyatt Regency
San Francisco in San Francisco, California, USA on February 8th 2020.
It is co-located with and will take place right before NANOG 78 (Feb 10th
to Feb 12th 2020). The Workshop's Program Committee is now requesting
proposals for presentations. All DNS-related subjects are welcome.

Workshop Milestones:
28 Sep 2019 - Submissions open via Indico
07 Dec 2019 - Deadline for submission (23:59 PT)
20 Dec 2019 - Initial Contribution list published
03 Jan 2020 - Full agenda published
24 Jan 2020 - Deadline for slideset submission
08 Feb 2020 - Workshop

Details for presentation submission are published here:

<https://indico.dns-oarc.net/event/33/call-for-abstracts/>

The workshop presentations will be organized by common themes,
depending on the topics and the timing of each presentation. There
are 30-minute and 15-minute slots, let us know your preference in
your submission.

To allow the Programme Committee to make objective assessments
of submissions, so as to ensure the quality of the workshop, submissions
SHOULD include slides. Draft slides are acceptable on submission.

If you have questions or concerns you can contact the Programme
Committee via submissi...@dns-oarc.net

Shumon Huque, for the DNS-OARC Programme Committee

OARC depends on sponsorship to fund its workshops and associated
social events. Please contact spon...@dns-oarc.net if your organization
is interested in becoming a sponsor. OARC is run on a non-profit basis,
and is not in a position to reimburse expenses or time for speakers at its
meetings.
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] glitch on [ip6|in-addr].arpa?

2019-10-11 Thread Shumon Huque
On Fri, Oct 11, 2019 at 4:12 PM Warren Kumari  wrote:

> On Fri, Oct 11, 2019 at 9:00 PM Joe Abley  wrote:
>
>>
>> What some people are seeing in this thread as a problem is actually a
>> nice demonstration that the system as a whole is immune to damage due to
>> partial-table peering disagreements.
>
>
> Indeed.
> W
>

I certainly agree that the Cogent-HE IPv6 peering dispute poses no
reliability or availability problems for the DNS root service.

But what impact might it have on individual services, organizations, and
other smaller entities? Since the Internet is still IPv4 omni-present, and
only partially IPv6, it probably doesn't matter at all to most.

It might be much more important for diagnostic and measurement services
like DNSviz though. At the moment, if you run IPv6 DNS servers on networks
that are singly connected to Cogent, it will probably incorrectly flag
those servers as unavailable. For such services, perhaps it would be better
if they were not single-homed to either Cogent or HE.

(To be clear, I'm happy that DNSviz is housed at OARC. So, I guess I might
be suggesting that the community might consider how to fund a second ISP
connection for OARC).

-- 
Shumon Huque
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] Lack of tlsa support

2015-05-27 Thread Shumon Huque
: Wed May 27 15:50:57 EDT 2015
;; MSG SIZE  rcvd: 108


 ns5.dns.nic.accountant. 156.154.157.195

;  DiG 9.10.1  @156.154.157.195 _443._tcp.accountant. TLSA
; (1 server found)
;; global options: +cmd
;; connection timed out; no servers could be reached

 ns5.dns.nic.accountant. 2610:a1:1075::c3

;  DiG 9.10.1  @2610:a1:1075::c3 _443._tcp.accountant. TLSA
; (1 server found)
;; global options: +cmd
;; Got answer:
;; -HEADER- opcode: QUERY, status: NOERROR, id: 56808
;; flags: qr aa rd; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; WARNING: recursion requested but not available

;; QUESTION SECTION:
;_443._tcp.accountant. IN TLSA

;; AUTHORITY SECTION:
accountant. 7200 IN SOA ns1.dns.nic.accountant. hostmaster.neustar.biz. 189
900 900 604800 86400

;; Query time: 13 msec
;; SERVER: 2610:a1:1075::c3#53(2610:a1:1075::c3)
;; WHEN: Wed May 27 15:51:12 EDT 2015
;; MSG SIZE  rcvd: 108


 ns6.dns.nic.accountant. 156.154.158.195

;  DiG 9.10.1  @156.154.158.195 _443._tcp.accountant. TLSA
; (1 server found)
;; global options: +cmd
;; connection timed out; no servers could be reached

 ns6.dns.nic.accountant. 2610:a1:1076::c3

;  DiG 9.10.1  @2610:a1:1076::c3 _443._tcp.accountant. TLSA
; (1 server found)
;; global options: +cmd
;; Got answer:
;; -HEADER- opcode: QUERY, status: NOERROR, id: 40030
;; flags: qr aa rd; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; WARNING: recursion requested but not available

;; QUESTION SECTION:
;_443._tcp.accountant. IN TLSA

;; AUTHORITY SECTION:
accountant. 7200 IN SOA ns1.dns.nic.accountant. hostmaster.neustar.biz. 189
900 900 604800 86400

;; Query time: 1 msec
;; SERVER: 2610:a1:1076::c3#53(2610:a1:1076::c3)
;; WHEN: Wed May 27 15:51:27 EDT 2015
;; MSG SIZE  rcvd: 108

-- 
Shumon Huque
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

Re: [dns-operations] Lack of tlsa support

2015-05-27 Thread Shumon Huque
On Wed, May 27, 2015 at 3:59 PM, Shumon Huque shu...@gmail.com wrote:



 Here's a transcript of my attempt to query all the NS addresses at
 accountant for TLSA records (from one location, a datacenter in New
 Jersey). Quick summary: no response/timeout from all the IPv4 addresses,
 correct NODATA answers from all the IPv6 addresses. Hmm (and no, the
 machine originating the queries has working IPv4 and can query other
 records successfully):


Actually, I was wondering why those answers are NODATA rather than NXDOMAIN
since presumably there aren't other record types at the name I queried. It
looks like this is because this zone is in the controlled interruption mode
(it has a wildcard at the apex for A, MX, etc).

Shumon Huque.
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

Re: [dns-operations] An simple observation

2014-09-29 Thread Shumon Huque
On Wed, Sep 24, 2014 at 9:27 PM, Davey Song songlinj...@gmail.com wrote:

 Hi everyone, I‘m recently doing a little survey on the penetration of IPv6
 in DNS system and it's latent problems.

 I find that top websites like Google, Wikipedia,Yahoo already support IPv6
 access, but its name servers are still IPv4-only. I'm wondering why? is
 there any operation consideration or risk in their IPv6 deployment?


I've done brief surveys of a small group of well known tech companies (and
a few other groups) and a little over half of those have at least one IPv6
reachable authoritative nameserver (28 of 52 or ~ 54%):

http://www.huque.com/app/dnsstat/category/techcom/

Yes, the new gTLDs do require IPv6, and my survey of that group seems to
confirm that this is the case in practice:

 http://www.huque.com/app/dnsstat/category/new_gtld/

You might be interested in NIST's larger measurement of over 2000 US
companies also. They show 77 of 2150 IPv6 reachable DNS domains (only 3.6%).

http://fedv6-deployment.antd.nist.gov/cgi-bin/generate-com

--Shumon
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

Re: [dns-operations] An simple observation

2014-09-29 Thread Shumon Huque
On Mon, Sep 29, 2014 at 3:15 PM, Shumon Huque shu...@gmail.com wrote:


 You might be interested in NIST's larger measurement of over 2000 US
 companies also. They show 77 of 2150 IPv6 reachable DNS domains (only 3.6%).

 http://fedv6-deployment.antd.nist.gov/cgi-bin/generate-com


A quick correction on the NIST measurement. For IPv6/DNS it's actually 398
out of 2150 or 18.5%

--Shumon.
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

Re: [dns-operations] First new gTLD using ICANN's Name Collision Occurrence Management Framework

2014-08-28 Thread Shumon Huque
A related observation: according the ICANN webinar on this topic from a
couple of weeks ago, all new gTLDs delegated on or after August 18th were
supposed to deploy these kinds of controlled interruption wildcard records.
The slides are here:


https://www.icann.org/en/system/files/files/name-collision-framework-slides-12aug14-en.pdf

It looks like the following new gTLDs were delegated on/after that date.
But only .otsuka has the records:

business
gbiz
gmail
immo
network
otsuka
pizza
xn--vhquv

--Shumon.

On Thu, Aug 28, 2014 at 8:38 AM, Chris Thompson c...@cam.ac.uk wrote:

 The gTLD otsuka, created sometime in the last 24 hours, appears to be the
 first to use the wildcards described at

 https://www.icann.org/news/announcement-2-2014-08-01-en
 https://www.icann.org/en/system/files/files/name-
 collision-framework-30jul14-en.pdf

 That is, it contains

 *.otsuka.  3600  IN  A127.0.53.53
 *.otsuka.  3600  IN  TXT  Your DNS configuration needs immediate
 attention see https://icann.org/namecollision;
 *.otsuka.  3600  IN  SRV  10 10 0 your-dns-needs-immediate-
 attention.otsuka.
 *.otsuka.  3600  IN  MX   10 your-dns-needs-immediate-attention.otsuka.

 and the corresponding RRSIGs.

 What do people think about this business? Is anyone taking specific
 precautions
 to detect attempts to connect to 127.0.53.53?

 --
 Chris Thompson   University of Cambridge Information Services,
 Email: c...@uis.cam.ac.ukRoger Needham Building, 7 JJ Thomson Avenue,
 Phone: +44 1223 334715   Cambridge CB3 0RB, United Kingdom.
 ___
 dns-operations mailing list
 dns-operations@lists.dns-oarc.net
 https://lists.dns-oarc.net/mailman/listinfo/dns-operations
 dns-jobs mailing list
 https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs