Re: [Dnsmasq-discuss] [Cerowrt-devel] Problems with DNSsec on Comcast, with Cero 3.10.38-1/DNSmasq 4-26-2014

2015-01-10 Thread Simon Kelley
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 OK, that's useful, but not good. The last thing DNSSEC/IPv6 needs is yet another reason why network access which used to work now doesn't. edns-packet-max=1280 seems to be working fine here. Please let me know if you find anything more. Cheers, Si

Re: [Dnsmasq-discuss] [Cerowrt-devel] Problems with DNSsec on Comcast, with Cero 3.10.38-1/DNSmasq 4-26-2014

2015-01-09 Thread Dave Taht
I strongly suspect an ipv6 fragmentation handling bug in the kernel version cerowrt uses. Have tons of evidence pointing to that now, starting with some tests run last year from iwl and also the tests that netalyzer was doing. And: I just locked up the box completely while doing some dnssec stuff.

Re: [Dnsmasq-discuss] [Cerowrt-devel] Problems with DNSsec on Comcast, with Cero 3.10.38-1/DNSmasq 4-26-2014

2015-01-09 Thread Simon Kelley
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 An interesting observation: my IPv6 connectivity is via a sixXS tunnel. Resolving isc.org through dnsmasq w/DNSSEC to google's IPv6 DNS servers times out, because dnsmasq was never getting a reply to a query for the DNSKEY RRset for org. This reply

Re: [Dnsmasq-discuss] [Cerowrt-devel] Problems with DNSsec on Comcast, with Cero 3.10.38-1/DNSmasq 4-26-2014

2015-01-09 Thread Simon Kelley
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 A backtrace is the most important starting point. A query log _if_ it's query dependent, but that seems unlikely since it doesn't break when forwarding to IPv4. An easy way to reproduce would be great :-) I can do the same tests here, but it's a bit

Re: [Dnsmasq-discuss] [Cerowrt-devel] Problems with DNSsec on Comcast, with Cero 3.10.38-1/DNSmasq 4-26-2014

2015-01-09 Thread Dave Taht
I was able to lock up this version of dnsmasq twice: 100% cpu usage. No syscalls were visible from strace during the lockup. Lockups occurred once on nearly at boot, and the second time, after a few hours of casual usage, with only ipv6 upstreams, on cero-3.10.50-1. furthermore, the only thing tha

Re: [Dnsmasq-discuss] [Cerowrt-devel] Problems with DNSsec on Comcast, with Cero 3.10.38-1/DNSmasq 4-26-2014

2015-01-08 Thread Dave Taht
OK, I built this latest dnsmasq as a test for cerowrt-3.10-50 users: login to the router cd /tmp wget http://snapon.lab.bufferbloat.net/~cero2/dnsmasq/dnsmasq-full_2.73-3_ar71xx.ipk opkg install ./dnsmasq-full_2.73-3_ar71xx.ipk (ignore the warnings about not overwriting several files) I did a fe

Re: [Dnsmasq-discuss] [Cerowrt-devel] Problems with DNSsec on Comcast, with Cero 3.10.38-1/DNSmasq 4-26-2014

2015-01-08 Thread Simon Kelley
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 08/01/15 17:44, Dave Taht wrote: > Wow, this thread goes back a ways. Is ds.test-ipv6.com still > configured wrong, and does it pass now? It passes for me (but I am > behind a more modern openwrt box right now) ds.test-ipv6.com is still showi

Re: [Dnsmasq-discuss] [Cerowrt-devel] Problems with DNSsec on Comcast, with Cero 3.10.38-1/DNSmasq 4-26-2014

2015-01-08 Thread Dave Taht
Wow, this thread goes back a ways. Is ds.test-ipv6.com still configured wrong, and does it pass now? It passes for me (but I am behind a more modern openwrt box right now) Is there another site that demonstrates this problem? BTW: For a while there (on comcast), in production, I ran with pure ipv

Re: [Dnsmasq-discuss] [Cerowrt-devel] Problems with DNSsec on Comcast, with Cero 3.10.38-1/DNSmasq 4-26-2014

2015-01-08 Thread Simon Kelley
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 OK, it's taken some time, but with this insight, I've recoded the relevant stuff to look for the limits of the signed DNS tree from the DNS root down. That's clearly the correct way to do it, and should avoid the original problem here, caused by send

Re: [Dnsmasq-discuss] [Cerowrt-devel] Problems with DNSsec on Comcast, with Cero 3.10.38-1/DNSmasq 4-26-2014

2014-10-04 Thread Anders Kaseorg
On Fri, 3 Oct 2014, Anders Kaseorg wrote: > > secure no DS means that the original unsigned answer should be > > accepted, except that it shouldn't. There's no way to distinguish > > between secure lack of DS because we've reached an unsigned branch of > > the tree, and secure lack of DS because

Re: [Dnsmasq-discuss] [Cerowrt-devel] Problems with DNSsec on Comcast, with Cero 3.10.38-1/DNSmasq 4-26-2014

2014-10-03 Thread Anders Kaseorg
On Fri, 3 Oct 2014, valdis.kletni...@vt.edu wrote: > On Fri, 03 Oct 2014 05:28:35 -0400, Anders Kaseorg said: > > This bottom-up algorithm also seems to have a security problem that’s > > just as bad as one with the top-down algorithm that you rejected > > below. Consider the same department.cam

Re: [Dnsmasq-discuss] [Cerowrt-devel] Problems with DNSsec on Comcast, with Cero 3.10.38-1/DNSmasq 4-26-2014

2014-10-03 Thread Anders Kaseorg
I just ran into this timeout behavior myself while testing the new DNSSEC support in OpenWrt 14.07 (dnsmasq 2.71-4). After staring at the problem for a few hours, I think there’s something wrong with your justification. On 04/29/2014 09:22 AM, Simon Kelley wrote: To do that, we need to find

Re: [Dnsmasq-discuss] [Cerowrt-devel] Problems with DNSsec on Comcast, with Cero 3.10.38-1/DNSmasq 4-26-2014

2014-05-02 Thread James Cloos
> "SK" == Simon Kelley writes: SK> A valid point, but "every leaf system has to be a recursor" is not a SK> pleasant outcome of widely implementing DNSSEC. >From a security POV, every system needs its own local verifier, and every administrative domain needs its own recursor. Optimally ever

Re: [Dnsmasq-discuss] [Cerowrt-devel] Problems with DNSsec on Comcast, with Cero 3.10.38-1/DNSmasq 4-26-2014

2014-05-01 Thread Dave Taht
On Thu, May 1, 2014 at 1:26 PM, Rich Brown wrote: > > On May 1, 2014, at 2:37 PM, Simon Kelley wrote: > >> On 30/04/14 18:26, Dave Taht wrote: >>> On Tue, Apr 29, 2014 at 1:57 PM, Phil Pennock >>> wrote: > > snip, snip snip... > >>> Is the consensus to not run with negative proofs on at this jun

Re: [Dnsmasq-discuss] [Cerowrt-devel] Problems with DNSsec on Comcast, with Cero 3.10.38-1/DNSmasq 4-26-2014

2014-05-01 Thread Simon Kelley
On 30/04/14 18:26, Dave Taht wrote: > On Tue, Apr 29, 2014 at 1:57 PM, Phil Pennock > wrote: >> On 2014-04-29 at 14:22 +0100, Simon Kelley wrote: >>> secure no DS means that the original unsigned answer should be accepted, >>> except that it shouldn't. There's no way to distinguish between secure

Re: [Dnsmasq-discuss] [Cerowrt-devel] Problems with DNSsec on Comcast, with Cero 3.10.38-1/DNSmasq 4-26-2014

2014-05-01 Thread Simon Kelley
On 29/04/14 21:57, Phil Pennock wrote: > On 2014-04-29 at 14:22 +0100, Simon Kelley wrote: >> secure no DS means that the original unsigned answer should be accepted, >> except that it shouldn't. There's no way to distinguish between secure >> lack of DS because we've reached an unsigned branch of

Re: [Dnsmasq-discuss] [Cerowrt-devel] Problems with DNSsec on Comcast, with Cero 3.10.38-1/DNSmasq 4-26-2014

2014-04-30 Thread Dave Taht
On Tue, Apr 29, 2014 at 1:57 PM, Phil Pennock wrote: > On 2014-04-29 at 14:22 +0100, Simon Kelley wrote: >> secure no DS means that the original unsigned answer should be accepted, >> except that it shouldn't. There's no way to distinguish between secure >> lack of DS because we've reached an unsi

Re: [Dnsmasq-discuss] [Cerowrt-devel] Problems with DNSsec on Comcast, with Cero 3.10.38-1/DNSmasq 4-26-2014

2014-04-29 Thread Simon Kelley
On 29/04/14 00:24, Phil Pennock wrote: > On 2014-04-28 at 20:32 +0100, Simon Kelley wrote: >> On 28/04/14 19:56, Dave Taht wrote: >>> I see A and requests for for "ds.test-ipv6.com" that fail. >> >> The root of this failure is that DS ds.test-ipv6.com is broken. >> >> <<>> DiG 9.8.1-P1 <<>> @

Re: [Dnsmasq-discuss] [Cerowrt-devel] Problems with DNSsec on Comcast, with Cero 3.10.38-1/DNSmasq 4-26-2014

2014-04-28 Thread Aaron Wood
This timeout, I'm guessing this is older/naive setups that aren't expecting to support DNSSEC, and thought "over-securing" their setup, have managed to break the non-existence-proof process? -Aaron On Mon, Apr 28, 2014 at 9:32 PM, Simon Kelley wrote: ... > Neither of authoritative nameservers f

Re: [Dnsmasq-discuss] [Cerowrt-devel] Problems with DNSsec on Comcast, with Cero 3.10.38-1/DNSmasq 4-26-2014

2014-04-28 Thread Simon Kelley
On 28/04/14 19:56, Dave Taht wrote: > I see A and requests for for "ds.test-ipv6.com" that fail. > The root of this failure is that DS ds.test-ipv6.com is broken. <<>> DiG 9.8.1-P1 <<>> @8.8.8.8 ds ds.test-ipv6.com ; (1 server found) ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- o

Re: [Dnsmasq-discuss] [Cerowrt-devel] Problems with DNSsec on Comcast, with Cero 3.10.38-1/DNSmasq 4-26-2014

2014-04-28 Thread Dave Taht
I see A and requests for for "ds.test-ipv6.com" that fail. On Mon, Apr 28, 2014 at 11:37 AM, Dave Taht wrote: > I have put a link up to two of jim's captures going to test-ipv6 via cero, > one with dnssec enabled, captured at the local laptop > > http://snapon.lab.bufferbloat.net/~cero2/ba

Re: [Dnsmasq-discuss] [Cerowrt-devel] Problems with DNSsec on Comcast, with Cero 3.10.38-1/DNSmasq 4-26-2014

2014-04-28 Thread Dave Taht
I have put a link up to two of jim's captures going to test-ipv6 via cero, one with dnssec enabled, captured at the local laptop http://snapon.lab.bufferbloat.net/~cero2/baddns/ definately a lot of missing responses when captured at this end. the local laptop is using a local dnsmasq forwarder.

Re: [Dnsmasq-discuss] [Cerowrt-devel] Problems with DNSsec on Comcast, with Cero 3.10.38-1/DNSmasq 4-26-2014

2014-04-28 Thread Dave Taht
On Mon, Apr 28, 2014 at 9:55 AM, Jim Gettys wrote: > ​​Comcast recently lit up IPv6 native dual stack in the Boston area. > > The http://test-ipv6.com/ web site complains about DNS problems unless > dnssec is disabled; if it is, I get various timeouts. > > > Test with IPv4 DNS record > ok (4.196